100% found this document useful (1 vote)
56K views33 pages

Computer Book 8 Answer Key

This document provides an answer key for a summative assessment test on basic processing and number systems in computer science. It includes multiple choice questions, true/false questions, and short answer questions testing understanding of concepts like storage, RAM, CPU, binary, octal, hexadecimal and BCD number systems. The answer key also provides formative assessment questions and answers testing comprehension of additional topics like data types, number systems and MS Word functions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
56K views33 pages

Computer Book 8 Answer Key

This document provides an answer key for a summative assessment test on basic processing and number systems in computer science. It includes multiple choice questions, true/false questions, and short answer questions testing understanding of concepts like storage, RAM, CPU, binary, octal, hexadecimal and BCD number systems. The answer key also provides formative assessment questions and answers testing comprehension of additional topics like data types, number systems and MS Word functions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 33

Active TM

Computer
A Coursebook on Computer Science

Part-

Answer Key

Kinderston Publications
(A Unit of Sharda Press)
New Delhi • Chennai • Guwahati
1
Basic Processing

Summative Assessment

Q.A. Tick (3) the correct answer.


Ans. 1. (b) 2. (c) 3. (d) 4. (a)
Q.B. Write ‘T’ for true and ‘F’ for false:
Ans. 1. (T) 2. (F) 3. (F) 4. (T) 5. (F)
Q.C. Answer the following questions:
1. What were the earliest storage devices?
Ans. The earliest storage devices were punched paper cards,
which were used as early as 1804 to control silk weaving
looms.
2. What is the state of data in RAM when the computer is
turned off?
Ans. The data in RAM stays there only as long as your computer
is running. When you turn the computer off, RAM loses its
data. When you turn the computer on again, your operating
system and other files are once again loaded into RAM,
usually from your hard disk.
3. How is mass storage different from memory, which refers
to temporary storage areas?
Ans. Mass storage refers to various techniques and devices for
storing large amounts of data. Mass storage is distinct from
memory, which refers to temporary storage areas within the
computer. Unlike RAM memory, mass storage devices retain
data even when the computer is turned off.
4. What is micro-instruction?
Ans. A micro-instruction is a simple command that makes the
hardware operate properly.

2
Active Computer-8
5. What is the unit to measure mass storage?
Ans. Mass storage is measured in kilobytes KB (1,024 bytes),
megabytes MB (1,024 kilobytes), gigabytes GB (1,024
megabytes) and terabytes TB (1,024 gigabytes).
6. Define Micro-instruction Unit.
Ans. Micro-instruction unit is a simple command that makes the
hardware operate properly. The format is unique to each
computer.
7. Name the key component which is responsible for
executing a program.
Ans. Central Processing Unit (CPU) is the key component in
a digital computer capable of executing a program. It
interprets computer program instructions and processes
data.
8. In which unit can we measure speed?
Ans. The speed of the CPU is determined by the clock speed.
Processor clock speed is measured in megahertz (MHz).

Formative Assessment

Q.A. Fill in the blanks:


Ans. 1. Random Access Memory is the workhorse behind the
performance of your computer system.
2. DRAM needs refreshing and is refreshed hundreds of
times each second in order to retain data.
3. Storage is measured in kilobytes as 1,024 bytes.
4. A basic VGA monitor has a pixel grid of 640 × 480.
5. A super VGA monitor has pixel grid of 1,024 × 768.
Q.B. Explain the following terms:
Ans. SRAM: Static RAM is approximately five times faster. It does
not have to be constantly refreshed.
Sdram: Synchronous Dynamic Ram is the standard
memory offering in the PC industry and is faster than Dram.
Ddr Sdram: Double Data Rate Synchronous Dynamic
RAM takes all the features of ordinary Sdram and increases
3
Active Computer-8
the frequency bandwidth to improve system performance
and speed.
Rd RaM: Rambus Dynamic Ram is able to load a new
stream of data before the previous stream has completed,
resulting in faster access speeds.

2
More on Number Systems

Summative Assessment

Q.A. Tick (3) the correct answer.


Ans. 1. (a) 2. (a) 3. (a) 4. (a)
Q.B. Write ‘T’ for true and ‘F’ for false:
Ans. 1. (T) 2. (T) 3. (T) 4. (T)
Q.C. Answer the following questions:
1. What is the meaning of Octal in computer system?
Ans. The Octal number system uses the numbers 0 to 7. There are
eight bits in a byte which is used very often in the computer
field.
2. What is hexadecimal?
Ans. The Hexadecimal number system uses 0 – 9 and A – F. Since
there are 16 values per place holder, after the ten numbers,
six new numbers have to be created. Those numbers are A,
B, C, D, E and F.
3. What is BCD?
Ans. The Binary Coded Decimal (BCD) is a type of binary code
used to represent a given decimal number in a equivalent
binary form.
4. Explain ASCII Alphanumeric Code.
Ans. The American Standard Code for Information Interchange
(ASCII) is the standard alphanumeric code for keyboards and
a host of other data interchange tasks. Letters, numbers, and
4
Active Computer-8
single keystroke commands are represented by a seven-bit
word.

Formative Assessment

Q.A. Fill in the blanks:


1. There are only two numbers in binary, 0 and 1.
2. Computer use a sequence of switches that can be on or
off, also called a bit.
3. Octal uses the numbers 0 to 7.
4. Math in octal is more complicated than decimal.
5. Computers only display numbers in decimal.
6. Hexadecimal uses the numbers 0 – F.
Q.B. Explain the following terms:
Booth’s Algorithm: It serves two purposes:
(i) Fast multiplication (when there are consecutive 0’s or 1’s
in the multiplier).
(ii) Signed multiplication.
BCD: The Binary Coded Decimal (BCD) is a type of binary
code used to represent a given decimal number in an
equivalent binary form.
Ascii: The American Standard Code for Information
Interchange (ASCII) is the standard alphanumeric code for
keyboards and a host of other data interchange tasks.
Decimal System: It uses the numbers 0 – 9. Computers only
display numbers in decimal, they actually do all their work
in binary.
Hexadecimal System: It uses the numbers 0 – 9 and A –
F. Since there are 16 values per place holder, after the ten
numbers, six new numbers have to be created.
Binary System: It uses two numbers 0 and 1.
Octal System: It uses the numbers 0 to 7. There are eight
bits in a byte which is used very often in the computer field.

5
Active Computer-8
3
More on MS-Word 2010

Summative Assessment

Q.A. Tick (3) the correct answer.


Ans. 1. (a) 2. (c) 3. (a) 4. (b)
Q.B. Write ‘T’ for true and ‘F’ for false:
Ans. 1. (T) 2. (F) 3. (T) 4. (T) 5. (T)
Q.C. Answer the following questions:
1. Write the steps for the component selection and delete
methods.
Ans. Steps for the component selection and delete method are
as follows:
(i) Deleting text between two points: Click at the start of
the block of text, hold down shift, and click at the end
of the block to select the text and finally press either
backspace or delete key.
(ii) Deleting a single word: Simply double click anywhere
on the word you want to delete and finally press either
backspace or delete key.
(iii) Deleting a paragraph: Simply triple click anywhere
on the paragraph you want to delete and finally press
either backspace or delete key.
(iv) Deleting a sentence: Hold down Ctrl key and click
anywhere in the sentence you want to delete and finally
press either backspace or delete key.
(v) Deleting a column of text: Hold down Alt, click and
hold the mouse button, and drag over the column you
want to delete and finally press either backspace or
delete key.
(vi) Deleting a line: Bring your mouse in selection bar area
and click in front of the line you want to delete and
finally press either backspace or delete key.
6
Active Computer-8
(vii) Deleting entire document content: Press Ctrl + A keys
to delete the entire document and finally press either
backspace or delete key.
2. How will you use Backspace and Delete keys?
Ans. The most basic deletion technique is to delete characters
one at a time by pressing either backspace or delete keys.
Following table describes how you can delete single
character or whole word by using either of these two keys:
(i) Backspace: Keep the insertion point just after the
character you want to delete and press backspace key.
Word deletes the character immediately to the left of
the insertion point.
(ii) Ctrl + Backspace: Keep the insertion point just after
the word you want to delete and press Ctrl + backspace
key. Word deletes the whole word immediately to the
left of the insertion point.
(iii) Delete: Keep the insertion point just before the
character you want to delete and press delete key.
Word deletes the character immediately to the right of
the insertion point.
(iv) Ctrl + Delete: Keep the insertion point just before the
word you want to delete the press Ctrl + Delete key.
Word deletes the word immediately to the right of the
insertion point.
3. How will you Insert and Add Text?
Ans. Following are the steps to Insert and Add Text:
Step 1. Click the location where you want to insert text
or you can use the keyboard arrows to locate the
place where you would like to insert the text.
Step 2. Start typing the text you want to insert. Word
inserts the text to the left of the insertion point or
the cursor, moving existing text to the right.
4. Write the steps for saving new changes.
Ans. Following are the steps for saving new changes:
Step 1. Press Ctrl + S keys to save the changes.
7
Active Computer-8
Step 2. Optionally you can click on the floppy icon at the
top left corner in the Quick Acess Toolbar. This
option will also save the changes.
Step 3. You can also save the changes with Save option
available just above the Save As option as shown in
the screen capture on the previous page.
5. How does the Insertion Point move?
Ans. Keyboard commands used for moving around the document
move the insertion point. You can move word by word or
paragraph by paragraph. For this, you have to hold down
the Ctrl key while pressing an arrow key, which moves the
insertion point.

Formative Assessment

Q.A. Fill in the blanks:


Ans. 1. You do not need to press Enter key to start a new line.
2. You can easily move the insertion point by clicking in
your text anywhere on the screen.
3. You can scroll your document by rolling your mouse
wheel.
4. Hold down Ctrl key and click anywhere in the sentence
you want to select.
5. Move downward by one line by clicking the downward-
pointing scroll arrow.
Q.B. Match the following columns:
→ Forward one character
← Back one character
↑ Up one character
↓ Down one character
Page up — To the previous screen
Q.C. Write the functions or results of the following keyboard
shortcuts.
Ans. 1. Ctrl + →: To the next word.
8
Active Computer-8
2. Ctrl + ←: To the previous word.
3. Ctrl + ↑: To the start of the previous
paragraph.
4. Ctrl + ↓: To the start of the next
paragraph.
5. Ctrl + Page Up: To the previous browse
object.
6. Ctrl + Page Down: To the next browse object.
7. Ctrl + Home: To the beginning of the
document.
8. Ctrl + End: To the end of the document.
9. Shift + F5: To the last place you
changed in your document.
10. Ctrl + A: To select the entire
document.
11. Shift + any arrow key: To select the text.
12. F8 + any arrow key: To select the text.
13. Ctrl + shift + F8: To select column of the text.
14. Ctrl + Backspace: To delete the whole word
immediately to the left of
the insertion point.
15. Ctrl + Delete: To delete the word
immediately to the right of
the insertion point.

4
More on QBasic

Summative Assessment

Q.A. Tick (3) the correct answer.


Ans. 1. (a) 2. (a) 3. (b) 4. (a)
9
Active Computer-8
Q.B. Write ‘T’ for true and ‘F’ for false:
Ans. 1. (F) 2. (T) 3. (T) 4. (T) 5. (T)
Q.C. Answer the following questions:
1. What do you mean by QBasic Interface?
Ans. The QBasic interface has various features. The current
program is displayed in the middle of the screen, and
covers most of the QBasic. The menu provides most of the
operations for the QBasic editor. Such as opening a file
pasting text, and searching for a string.
2. Write steps to open a file in QBasic.
Ans. Following are the steps to open a file in QBasic:
Step 1. New – Clears the current program.
Step 2. Open – Loads a program from disk.
Step 3. Save – Saves the current program to disk.
Step 4. Save As – Saves the program, but under a different
name.
Step 5. Print – Prints the selected text, current window, or
entire program.
Step 6. Exit – Closes the QBasic interpreter.
3. What are the different functions under debugging?
Ans. The different functions under debugging are as follows:
(i) Step: Processes the next command.
(ii) Procedure Step: Processes the next command, but
does not show QBasic going inside a subroutine or
function.
(iii) Trace on: Shows the command that is being executed
while the program is running.
(iv) Toggle Breakpoint: Sets or removes a breakpoint. Use
this to have the QBasic interpreter stop when it reaches
a specified line in the program.
(v) Clear All Breakpoints: Removes all breakpoints in the
program.
(vi) Set Next Statement: Allows you to continue execution
at the specified line.

10
Active Computer-8
4. Write the steps to name a program.
Ans. Following are the steps to name a program:
Step 1. The file name of the current program is displayed
near the top of the screen in the centre. You can
change the name by selecting ‘Save As’ on the ‘File’
menu.
Step 2. Execute a command.
QBasic provides a way to execute a command
without running the current program. To do so,
select the bottom window (under ‘immediate’) and
enter a command, then press Enter.
Step 3. Status bar
The status bar is at the bottom of the screen. When
you highlight an item on the menu, the status bar
displays a short description of what the item does.

Formative Assessment

Q.A. Fill in the blanks:


Ans. 1. The Rem command enables you to add comments to
your program without the text being treated like an
instruction.
2. The tool I draws a line segment. Use the spacebar to mark
the two endpoints.
3. The command Preset erases the point at the specified
co-ordinates.
4. Save As saves the program, but under a different name.
5. Toggle Breakpoint sets or removes a breakpoint.
Q.B. Match the following columns:
Ans. 1. (f )  2. (c)  3. (b)  4. (d)
5. (a)  6. (e) 

11
Active Computer-8
5
An Introduction to HTML

Summative Assessment

Q.A. Tick (3) the correct answer.


Ans. 1. (c) 2. (a) 3. (a) 4. (a)
Q.B. Write ‘T’ for true and ‘F’ for false:
Ans. 1. (T) 2. (T) 3. (T) 4. (T) 5. (T)
Q.C. Answer the following questions:
1. What is Html?
Ans. HTML stands for HyperText Markup Language. It is the
‘hidden’ code that helps us communicate with others on
the World Wide Web (WWW). It is written in plain text. That
means you don’t need any fancy software programs like a
word processor to create your Html files.
2. What is container tag? How does it differ from empty
tag?
Ans. The container tag always wraps around text or graphics and
comes in a set with an opening and a closing.
The empty tag stands alone. The tag <br> is one that adds
a line break. Empty tags do not have to be wrapped around
copy and do not require a closing.
3. What do you mean by Attributes in Html?
Ans. Attributes are just special codes placed within the Html
tags that describes how the tags will look.
4. What is the importance of <BR> tag?
Ans. The <BR> tag inserts a single line break. It is an empty tag
which means that it has no end tags. It is useful for writing
addresses or poems.
5. Which tag will you use to make text colourful?
Ans. The tag used to make the text colourful are as follows:
12
Active Computer-8
<html>
<head>
<title> Color Page </title>
</head>
<body bgcolor=“#bee3C2”text=“#ff0000”>
6. What are primary tags? To build any web page how many
primary tags do you need?
Ans. Primary tags are container tags and must appear as pairs
with a beginning and an ending. To build any web page we
will need four primary tags – <html>, <head>, <title> and
<body>.

Formative Assessment

Q.A. Fill in the blanks:


Ans. 1. The words/letters between the two angle brackets are
called elements.
2. Html is the “hidden” code that helps us communicate
with others on the World Wide Web.
3. The <html> tag tells the browser that this is an Html
document.
4. Every Html document begins and ends with the <html>
tag.
5. In Html, bold copy is created by using the headline tag.
Q.B. Explain the following terms:
Ans. Nesting: Part of the web page structure is called nesting.
Html: Html stands for HyperText Markup Language.
WWW: WWW stands for World Wide Web.

Formative Assessment-1 (Chapters 1 to 5)

Q.A. Tick (3) the correct answer.


Ans. 1. (a) 2. (a) 3. (b) 4. (a)
5. (a) 6. (a) 7. (c)
Q.B. Write ‘T’ for true and ‘F’ for false:
Ans. 1. (T) 2. (T) 3. (T) 4. (T) 5. (T)
13
Active Computer-8
6. (T) 7. (T)
Q.C. Answer the following questions:
1. In which unit can we measure speed?
Ans. The speed of the CPU is determined by the clock speed.
Processor clock speed is measured in megahertz (MHz).
2. Name the key component which is responsible for
executing a program.
Ans. Central Processing Unit (CPU) is the key component in
a digital computer capable of executing a program. It
interprets computer program instructions and processes
data.
3. What is BCD?
Ans. The Binary Coded Decimal (BCD) is a type of binary code
used to represent a given decimal number in an equivalent
binary form.
4. Explain Ascii Alphanumeric Code.
Ans. The American Standard Code for Information Interchange
(Ascii) is the standard alphanumeric code for keyboards and
a host of other data interchange tasks. Letters, numbers, and
single keystroke commands are represented by a sevenbit
word.
5. What is container tag? How does it differ from empty
tag?
Ans. The container tag always wraps around text or graphics and
comes in a set with an opening and a closing.
The empty tag stands alone. The tag <br> is one that adds
a line break. Empty tags do not have to be wrapped around
copy and do not require a closing.
6. What do you mean by Attributes in Html?
Ans. Attributes are just special codes placed within the HtmL
tags that describe how the tags will look.
7. How does the Insertion Point move in MS-Word?

14
Active Computer-8
Ans. Keyboard commands used for moving around the document
move the insertion point. You can move word by word or
paragraph by paragraph. For this, you have to hold down
the Ctrl key while pressing an arrow key, which moves the
insertion point.

Summative Assessment-1 (Chapters 1 to 5)

Q.A. Fill in the blanks:


Ans. 1. Random Access Memory is the workhorse behind the
performance of your computer system.
2. Part of the web page structure is called nesting.
3. The steps in the pipeline are often called stage.
4. Dram needs refreshing and is refreshed hundreds of
times each second in order to retain data.
5. New Sub enables you to create a new subroutine
(QBasic).
6. During recharging Dram cannot be accessed by the
CPU.
7. Storage is measured in kilobytes as 1,024 bytes.
8. To create a horizontal line (HTML) on your page you use
the empty tag.
9. Basic VGA is a pixel grid 640 × 480.
10. Super VGA is 1,024 × 768.
Q.B. Explain the following terms:
Ans. 1. Sram: Static Ram is approximately five times faster. It
does not have to be constantly refreshed.
2. Sdram: Synchronous Dynamic Ram is the standard
memory offering in the PC industry and is faster than
Dram.
3. Nesting: Part of the web page structure is called nesting.
4. Html: Html stands for HyperText Markup Language.

15
Active Computer-8
6
Spreadsheet

Summative Assessment

Q.A. Tick (3) the correct answer.


Ans. 1. (d) 2. (c) 3. (a) 4. (a) 5. (c)
Q.B. Write ‘T’ for true and ‘F’ for false:
Ans. 1. (F) 2. (T) 3. (F) 4. (T) 5. (T)
Q.C. Answer the following questions:
1. What are the steps for formatting a chart?
Ans. The steps for formatting a chart are as follows:
Step 1. Move the mouse pointer, which resembles a thick
white plus sign to cell A1 and click.
Step 2. Notice that a black border surrounds the cell. This is
active cell.
You can also type the name of a cell name in the
Name box such as B2. Press Enter and that cell
will become the active cell. Excel recognizes both
upper and lower cases.
2. Write the steps for Renaming Sheets/Adding sheets.
Ans. Following are the steps for renaming sheets/adding sheets:
Step 1. Right click on the tab of the sheet to be renamed
(located on the bottom of the worksheet). Choose
Rename from the shortcut menu.
Step 2. Then type the new worksheet name.
Step 3. Press Enter key to rename it. See the screen capture.
Step 4. To add a worksheet you choose Insert from the
same menu. Other options include deleting the
worksheet, moving the worksheet to another
workbook, making a copy of the worksheet, or
viewing the code.

16
Active Computer-8
Step 5. To move a worksheet in a workbook, click and hold
the left mouse button down on the worksheet’s tab.
Next, drag the worksheet to the desired position
and then release the mouse button. When moving
the worksheet the mouse indicator displays an icon
resembling a worksheet.
3. What are the Print Options for Excel Workbooks?
Ans. Print options include printing the entire workbook or the
current worksheet. The user has the ability to print specific
areas (print area), charts, change layouts (portrait or
landscape), and print to a specific paper width.
To set a Print Area, do the following steps:
Select a cell range to define the area or hold the Ctrl key
to select additional data to include within the area. With
the area still selected, in the page setup group on the Page
Layout tab, click the Print Area list arrow, and choose set
Print Area. This is the only area that will print until you clear
the Print Area.
4. How will you create a chart?
Ans. To create a chart select the cells and categories that will be
used in the chart.
Follow these steps to create a chart:
Step 1. Type the entries as given in the screen capture.
Step 2. Click and hold the mouse button down while
dragging the mouse over the cell range (C5 : H6).
Release the mouse and leave the cells selected.
Step 3. Click the Insert tab on the Ribbon. In the charts
group, review the available chart types before
clicking the chart buttons for Pie. Select the sub-
type Pie with 3-D effect.
Step 4. By default, the chart is created and inserted within
the spreadsheet.
Step 5. Click the Layout tab on the chart tools tab. In the
group Labels click on the icons chart Title and then
Above chart. Next, type Loose change cafe in the
box provided. If the chart is showing a legend, click
17
Active Computer-8
on the button Legend and then select None.
Step 6. In the same group Labels click the icons Data
Labels, choose Outside End, and then choose the
command More Data Label Options. Check the
boxes category Name, show Leader Lines and then
click close.
Step 7. Click and drag the Data labels off the chart with the
mouse pointer to display the leader lines.
Step 8. Place the mouse pointer on the chart, which
changes to a 4-headed arrow and move the chart if
needed. Holding down the mouse button drag the
chart’s right corner diagonally to cell (H14). Release
the mouse button. This is just an example reference
point.
Step 9. Hold the Ctrl key down and drag the chart’s bottom
left hand corner diagonally to cell (C28).
5. How will you insert rows and columns? Write the steps.
Ans. To insert a row or column do the following steps:
Step 1. Right click in a cell to activate the context menu
and choose insert. A context menu opens asking if
you would like to insert an entire row or column.
OR
Step 2. Click the row or column header.
Step 3. Click the Insert cells list arrow in the Cells group
on the Home tab. Upon choosing the desired
command, Excel inserts new columns to the left of
the selection and new rows above the selection.
Step 4. To insert than one column or one row:
(a) First click on a column or row heading, while
holding the mouse button down drag the
white plus sign over the desired number of
column lebels (A, B, C, etc.) or row labels (1, 2,
3, etc.).
(b) Then choose from one of the two methods: (i)
Right click and choose Insert from the context
menu, or (ii) click the Insert cells list arrow in the
18
Active Computer-8
cells group on the Home tab and select Insert
sheet Columns/Rows. Excel inserts the exact
number of columns/rows that were selected.
6. How will you freeze and unfreeze panes in a worksheet?
Ans. There are two easy solutions to freezing panes in a
spreadsheet:
Step 1. To keep columns and rows visible click below the
column label and to the right of the first row label.
For this example, cell (B2).
Step 2. Click the Freeze panes list arrow in the group
window on the view tab and select Freeze Panes.
The column and row headings remain visible when
you scroll up or down and to the left or right.
Step 3. To unfreeze the pane, click Unfreeze Panes.

Formative Assessment

Q.A. Fill in the blanks:


Ans. 1. Formula displays the application name, file name and
various window controls, such as minimize button,
maximize button and close button.
2. Spreadsheet is a computer application that simulates a
paper worksheet.
3. A spreadsheet cell may alternatively contain a formula
that defines how the contents of that cell are to be
calculated.
4. Excel is now considered to have the largest market share
on the Windows and Macintosh platforms.
5. Redo is used to reverse the last undo action performed
on the file.
6. Click the tab Page Layout to change print Orientation,
set the print scale, or paper size.
Q.B. Explain the following terms:
Ans. Sorting: When you enter data into your worksheet it is often
unorganized making it difficult to examine. When analysing
the information in your spreadsheet, you may need to
19
Active Computer-8
rearrange the data in different ways to answer different
questions. Excel’s sorting feature can help you rearrange
your data.
Title Bar: Next to the Quick Access toolbar is the title bar.
On the Title bar, Microsoft Excel displays the name of the
workbook you are currently using.
Menu Bar: It is located directly below the Title Bar. It
contains Menu tabs, File, Edit, View, Insert, Format, Tool,
Data, Window and Help.
Freezing Panes: Freezing panes in Excel keeps the headings
at the top and down the side of the sheet from disappearing
while scrolling.
Formatting Toolbar: The Formatting toolbar has icons
plus drop-down menus that allow you to select a font, font
color, alignments, number formats, border options and
background colors.

7
An Introduction to Java Syntax

Summative Assessment

Q.A. Tick (3) the correct answer.


Ans. 1. (d) 2. (a) 3. (a) 4. (c) 5. (a)
Q.B. Write ‘T’ for true and ‘F’ for false:
Ans. 1. (T) 2. (T) 3. (T) 4. (F) 5. (T)
Q.C. Answer the following questions:
1. Is a reference just another name for a pointer?
Ans. Pointers and references are not part of OO, languages like
Java don’t have pointers. A reference is simply an alternative
identifier for a variable or object.
2. Can we just cast the reference to an int?

20
Active Computer-8
Ans. A compiler won’t let us cast the reference to any numeric
value. Not allowing programmers direct access to memory
is one of the security features of Java, and also leads to more
stability to your program. With pointer it is easy to run off
the end of an or alter memory that you had no business
accessing. These are issues that cannot occur in a java
program.

Formative Assessment

Q.A. Fill in the blanks:


Ans. 1. The keywords const and goto cannot be used in Java.
2. Assert is a new Java Keyword added to the J2SE in
version 1.4.
3. A literal denotes a constant.
4. Character literals are enclosed in single quotes and must
have exactly one character.
5. Data types in Java are categorised into primitive data
type and reference data type.
6. A backlash is used to denote the non-printing character.
Q.B. Explain the following terms:
Ans. Literals: A literal denotes a constant.
Identifiers: Identifiers are those words in your Java code
that you choose. In Java, you will need to identify many
elements in your code, including class names, methods,
fields, variables, and package names.

8
Drawing and Animating with Flash CS6

Summative Assessment

Q.A. Tick (3) the correct answer.


Ans. 1. (a) 2. (b) 3. (a) 4. (d) 5. (d)
Q.B. Write ‘T’ for true and ‘F’ for false:
21
Active Computer-8
Ans. 1. (T) 2. (T) 3. (T) 4. (T) 5. (T)
Q.C. Answer the following questions:
1. How will you draw a circle to create some basic animation?
Ans. To draw a circle to create some basic animation, do the
following steps:
Step 1. Select the Oval tool from the Tools panel. Tools with
a triangle in the bottom left corner contain more
than one option; click and hold the shape tool icon
to select the Oval tool from the list that appears in
the Tools panel.
Step 2. Use the stroke colour swatch in the Property
inspector to select the No colour option (red
diagonal stripe) from the Stroke Color Picker.
Step 3. Select a color of your choice from the Fill color
picker, located directly below the stroke color
picker.
Step 4. Choose a fill color that contrasts well with the stage
color.
Step 5. Click the drawing mode button to select the object
drawing mode at the very bottom of the Tools
panel.
Step 6. With the Oval tool still selected, press and hold the
shift key.
Step 7. Draw a circle on the stage by Shift-dragging on
the stage. The shift key is a modifier key; when
you press and hold the shift key while drawing or
transforming a shape with the Oval tool.
2. How will you create a symbol and add animation?
Ans. Do the following steps to create a symbol:
Step 1. Click the selection tool in the Tools panel.
Step 2. Click the circle on the stage to select it. A bounding
box selection appears around the circle.
Step 3. While the circle is still selected, choose Modify
> Convert to Symbol (or press F8) to access the
convert to symbol dialog box.
22
Active Computer-8
Step 4. Enter the name of the symbol in the Name field.
Step 5. Use the Type menu to select the Movie clip option.
Step 6. Click OK. A square bounding box is displayed
around the circle symbol.
Now, use the symbol in your document to create a basic
animation that moves across the stage. Do the following
steps to add animation:
Step 1. Select the circle on the stage and drag it off the
stage area to the left.
Step 2. Right click the circle instance on the stage and
choose the option to Create Motion Tween in the
menu that appears.
Step 3. In the Timeline, drag the red playhead back and
forth from Frame 1 to Frame 24 to preview the
animation; this is known as scrubbing the Timeline.
Step 4. You can change the circle’s direction in the middle
of the animation.
3. How will you create a simple FLA file?
Ans. To create a simple FLA file, do the following steps:
Step 1. Choose File > New.
Step 2. In the New Document dialog box, the ActionScript
3.0 file type is selected by default. If ActionScript
3.0 is not selected, select it now. Click ok.
Step 3. Use the workspace drop-down menu located on
the upper right of the screen to select the Essentials
workspace layout option.
Step 4. Click the Properties tab in the upper right side of
the user interface to view the Property inspector,
which displays the Stage properties for the file
when no other objects are selected.
Step 5. By default, the Property inspector is vertically
aligned along the right side of the workspace. The
size section displays the current stage size.
Step 6. Choose File < Save.
Step 7. Select the location to save the FLA file on your hard
disk. Name it Simple Flash .fla and then click save.
23
Active Computer-8
4. How will you draw a circle on the stage?
Ans. To draw a circle on the stage, do the following steps:
Step 1. Select the Oval tool from the Tools panel.
Step 2. Use the stroke colour swatch in the Property
inspector to select the No color option from the
Stroke Color Picker.
Step 3. Select a color of your choice from the Fill color
picker, located directly below the stroke color
picker.
Step 4. Choose a fill color that contrasts well with the stage
color.
Step 5. Click the drawing mode button to select the object
drawing mode at the very bottom of the Tools
panel.
Step 5. With the oval tool still selected, press and hold the
shift key.
Step 6. Draw a circle on the stage by shift-dragging on
the stage. The shift key is a modifier key; when
you press and hold the shift key while drawing or
transforming a shape with the oval tool.
5. Write the steps to publish the FLA file.
Ans. To publish the FLA file, do the following steps:
Step 1. Select File > Publish settings, and click the
Professional tab.
Step 2. Select Generate Size Report.
Step 3. Click Publish.

Formative Assessment

Q.A. Fill in the blanks:


Ans. 1. Drawing shapes is a common task in Flash.
2. Tools with a triangle in the bottom left corner contain
more than one option.
3. Draw a circle on the stage by Shift-dragging on the
stage.

24
Active Computer-8
4. The shift key works similarly with other auto shapes.
5. Symbol is a media asset that can be reused anywhere in
your document.
6. A square bounding box is displayed around the circle
symbol.

Q.B. Explain the following terms:


Ans. Animation in Flash: It is an animated medium which is
created by Adobe Flash.
Create Motion Tween: A motion tween is an animation
that is created by specifying different values for an object
property in different frames.
Scrubbing the Timeline: In the Timeline, drag the red
playhead back and forth from Frame 1 to Frame 24 to
preview the animation; this is known as scrubbing the
Timeline.
Creating a New Layer in Flash: Layers are used to organize
the artwork in your movie.

9
IT Security

Summative Assessment

Q.A. Tick (3) the correct answer.


Ans. 1. (d) 2. (b) 3. (c) 4. (b) 5. (a)
Q.B. Write ‘T’ for true and ‘F’ for false:
Ans. 1. (T) 2. (T) 3. (F) 4. (T)
Q.C. Answer the following questions:
1. What is Phreaking?
Ans. Phreaking is the crime committed against telephone
companies by the use of computers with the goal of making
free distance cells, impersonating directory assistance or
25
Active Computer-8
other operator services, diverting calls to numbers of the
perpetrator’s choice, or otherwise disrupting telephone
service for subscribers.
2. What do you mean by Perverse Software?
Ans. Software causing unpredictable behavior such as modifying
or even destructing data without the user’s intentions or
unpredictable behavior in display, print or even sabotaging
the operating system is known as perverse software.
3. What are the types of viruses?
Ans. Companion virus, Macro virus, Polymorphic virus and stealth
virus are some of the types of common viruses.
4. Write the characteristics of Virus.
Ans. Characteristics of virus are as follows:
(i) Making Replicas: A virus can copy itself into another
place, file or another disc. It can prototype through
network connection.
(ii) Autonomous in Nature: A virus may run without
being explicitly called. This is because the code of virus
is executed prior to the code of OS. Thus, it has a degree
of autonomy.
(iii) Malicious Activity: It may cause loss of data. It may
overwrite some of the important files with unrecognised
characters. It may not allow the system to start at all. It
may modify program or software making it unusable. It
may corrupt the OS. It can damage hardware in terms
of monitor and memory.
(iv) Avoid Detection: A virus may take steps to avoid
detection. It can hide itself from scanning.
5. Explain the symptoms of virus infection.
Ans. When a virus is spotted, the virus software will inform you
and allow you to choose what action to take.
Symptoms of Virus Infection: A virus runs first when a
legitimate program is executed. The virus loads itself into
memory and looks to see if it can find any other programs
on the disk. If it can find one, it modifies it to add the virus’s
26
Active Computer-8
code to the new program. Then the virus launches the ‘real
program’. Unfortunately, the virus has now reproduced
itself, so two programs are infected. The next time either of
those programs gets executed, they infect other programs,
and the cycle continues.
6. Discuss the preventive measures of protection and
treatment.
Ans. The preventive measures of protection are as follows:
(i) Avoid using pirated copies of software.
(ii) Provide physical security for your computers.
(iii) Check Pen drives, CDs and hard disk for virus and
remove or clean if infected.
(iv) Keep backup of your data and software.
(v) Verify that an anti-virus program checks the files on the
download site.
(vi) Update your anti-virus software regularly.
(vii) Keep firewall and virus alert while using Internet.
(viii) Do not open any files attached to an e-mail from an
unknown, suspicious or untrustworthy source.
(ix) Delete chain e-mails and junk e-mail. Do not forward or
reply to any of them.
(x) Do not download any files from strangers.
(xi) Never Double-click to open an attachment that contains
an executable that arrives as an e-mail attachment.
Virus Removal: If boot files are corrupted then
overwrite these files from a proper source. The ultimate
method of removing any virus is low level formatting.
Then reload the data after testing for virus.

Formative Assessment

Q.A. Fill in the blanks:


Ans. 1. Stoned is a boot sector virus which produces a message
‘Your PC is stonned’.
2. Computer hacking is the practice of modifying computer
hardware and software.
27
Active Computer-8
3. Shawn Fanning the creator of Napster, is another hacker
well known for his accomplishments outside of computer
hacking.
4. A white hat hacker breaks security for non-malicious
reasons.
5. A black hat hacker is sometimes called a cracker.
6. The word Cryptography in Greek means ‘Secret writing’.
Q.B. Explain the following terms:
Ans. Grey Hat: It is a combination of a Black Hat and a White Hat
Hacker. It may surf the internet and hack into a computer
system for the sole purpose of notifying the administrator
that their system has been hacked.
Elite Hacker: A social status among hackers, elite is used
to describe the most skilled. Elite groups such as Masters of
Deception conferred a kind of credibility on their members.
Script Kiddie: It is a non-expert who breaks into computer
systems by using prepackaged automated tools written by
others, usually with little understanding of the underlying
concept.
Neophyte: A neophyte is someone who is new to hacking
or phreaking and has almost no knowledge or experience
of the workings of technology, and hacking.
Blue Hat: A blue hat hacker is someone outside computer
security consulting firms who is used to bug test a system
prior to its launch, looking for exploits so they can be closed.
Microsoft also uses the term Blue Hat to represent a series of
security briefing events.

Summative Assessment-2 (Chapters 6 to 9)

Q.A. Tick (3) the correct answer.


Ans. 1. (c) 2. (c) 3. (c) 4. (d) 5. (c)
6. (a) 7. (c) 8. (d) 9. (b) 10. (a)
Q.B. Write ‘T’ for true and ‘F’ for false:
Ans. 1. (T) 2. (T) 3. (T) 4. (T) 5. (T)
28
Active Computer-8
6. (T) 7. (T) 8. (T) 9. (F) 10. (T)
Q.C. Answer the following questions:
1. What is the use of Message boxes?
Ans. A message box is a simple pop-up window that displays
a message to the user and is dismissed with the click of a
button.
2. How will you draw a circle on the stage?
Ans. To draw a circle on the stage, do the following steps:
Step 1. Select the Oval tool from the Tools panel.
Step 2. Use the stroke color swatch in the Property
inspector to select the No color option from the
Stroke Color Picker.
Step 3. Select a color of your choice from the Fill color
picker, located directly below the stroke color
picker.
Step 4. Choose a fill color that contrasts well with the stage
color.
Step 5. Click the drawing mode button to select the object
drawing mode at the very bottom of the Tools
panel.
Step 6. With the Oval tool still selected, press and hold the
shift key.
Step 7. Draw a circle on the stage by shift-dragging on
the stage. The shift key is a modifier key; when
you press and hold the shift key while drawing or
transforming a shape with the oval tool.
3. How will you create a simple FLA file?
Ans. To create a simple FLA file, do the following steps:
Step 1. Choose File > New.
Step 2. In the New Document dialog box, the Action Script
3.0 file type is selected by default. If ActionScript
3.0 is not selected, select it now. Click OK.
Step 3. Use the workspace drop-down menu located on
the upper right of the screen to select the Essentials
workspace layout option.
29
Active Computer-8
Step 4. Click the Properties tab in the upper right side of
the user interface to view the Property inspector,
which displays the stage properties for the file
when no other objects are selected.
Step 5. By default, the Property inspector is vertically
aligned along the right side of the workspace. The
size section displays the current stage size.
Step 6. Choose File < Save.
Step 7. Select the location to save the FLA file on your hard
disk. Name it Simple Flash. fla and then click save.
4. How will you create a new layer in Flash?
Ans. To create a new layer in Flash, do the following:
Click the New Layer button (page icon) in the lower left of
the Timeline panel. In an ActionScript 3 file, the ActionScript
code must be added to the Timeline. It is considered best
practice to create a layer named actions at the top of the
layer stack, dedicated to holding the ActionScript code.
5. Write a Java program that converts Celsius to Fahrenheit.
Ans. This Java program is about the temperature conversion
from Celcius to Fahrenheit. The program asks you to enter
a temperature in Celcius and it will show its equivalent in
Fahrenheit temperature.
The formula to convert Celcius to Fahrenheit is:
F = 32 + (9* C/5)
The Java code for the temperature conversion is import
java. util. Scanner;
public class JavaApplication {
public static void main (string [ ] args) {
scanner sc = new scanner (system.in);
double celcius, fahrenheit;
system.out.print (“Enter a temperature in celcius:”);
celcius = sc.next Double ( );
fahrenheit = 32 + (celcius*9/5);
system.out.printIn (celcius+“°C=” + fahrenheit + “°F”);
}
}
30
Active Computer-8
6. Name the two control structures in Java used for making
decisions.
Ans. The two control structures in Java used for making decisions
are as follows:
(i) If statements,
(ii) Switch statements.
7. Explain the symptoms of virus infection.
Ans. When a virus is spotted, the virus software will inform you
and allow you to choose what action to take.
Symptoms of Virus Infection: A virus runs first when a
legitimate program is executed. The virus loads itself into
memory and looks to see if it can find any other programs
on the disk. If it can find one, it modifies it to add the virus’s
code to the new program. Then the virus launches the ‘real
program’. Unfortunately, the virus has now reproduced
itself, so two programs are infected. The next time either of
those programs gets executed, they infect other programs,
and the cycle continues.
8. Discuss the preventive measures of protection from
viruses and treatment.
Ans. The preventive measures of protection are as follows:
(i) Avoid using pirated copies of software.
(ii) Provide physical security for your computers.
(iii) Check Pen drives, CDs and hard disk for virus and
remove or clean if infected.
(iv) Keep backup of your data and software.
(v) Verify that an anti-virus program checks the files on the
download site.
(vi) Update your anti-virus software regularly.
(vii) Keep firewall and virus alert while using Internet.
(viii) Do not open any files attached to an e-mail from an
unknown, suspicious or untrustworthy source.
(ix) Delete chain e-mails and junk e-mail. Do not forward or
reply to any of them.

31
Active Computer-8
(x) Do not download any files from strangers.
(xi) Never Double-click to open an attachment that contains
an executable that arrives as an e-mail attachment.
Virus Removal: If boot files are corrupted then
overwrite these files from a proper source. The ultimate
method of removing any virus is low level formatting.
Then reload the data after testing the virus.

Formative Assessment-2 (Chapters 6 to 9)

Q.A. Fill in the blanks:


Ans. 1. Stoned is a boot sector virus which produces a message
“Your PC is stoned”.
2. Sort Ascending is used to arrange a set of numbers in
ascending (increasing) order.
3. Computer hacking is the practice of modifying computer
hardware and software.
4. Chart Wizard Button is used in creating chart graphs for
a set of numbers.
5. Shawn Fanning, the creator of Napster, is another hacker
well known for his accomplishments outside of computer
hacking.
6. The Java compiler is invoked at the command line on
Unix and DOS shell operating systems.
7. Code comments are placed in source files.
8. A white hat hacker breaks security for non-malicious
reasons.
9. Identifiers are those words in your Java code that you
choose.
10. A black hat hacker is sometimes called a cracker.
11. The word Cryptography in Greek means ‘secret writing’.
12. MS-Excel displays the worksheet in Page Layout view.
Q.B. Explain the following terms:
1. Scroll Bars: They are graphical control element with
which continuous text, pictures or anything else can be
scrolled. They are present in a wide range of electronic
32
Active Computer-8
devices including computers, graphing calculators,
mobile phones, and portable media players.
2. Status Bar: It is a graphical control element which poses
an information area typically found at the window’s
bottom.
3. Combo Box: it is a commonly used graphical user interface
widget or control. Traditionally, it is a combination of
a drop-down list or list box and a single-line editable
textbox, allowing the user to either type a value directly
or select a value from the list.
4. Salami Slicing: It is a form of data diddling that occurs
when a person shaves small amounts from financial
accounts and deposits them in personal account.
5. Carding: It refers to the precipice of stealing credit
numbers online, to be resold or used to charge
merchandise against victim’s account.
6. Freezing Panes: Freezing panes allows you to keep some
of your data in the same place as you scroll through the
rest of your spreadsheet.
7. Literals: A literal denotes a constant. It is a notation for
representing a fixed value in source code.
8. Elite Hacker: A social status among hackers, elite is used
to describe the most skilled. Elite groups such as Masters
of Deception conferred a kind of credibility on their
members.

33
Active Computer-8

You might also like