0% found this document useful (0 votes)
217 views90 pages

CM Level-8 Question Bank

Uploaded by

neeraj bujh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
217 views90 pages

CM Level-8 Question Bank

Uploaded by

neeraj bujh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 90

Question Bank

Name:

Class:  Section:

CM_Level-1_TeacherManual_Prefacepages.indd 1 12-01-2017 11:03:27


Acknowledgements
Content Advisor Production
Prof. Sridhar Iyer Creative Director
Vinod Raj
Content Programme Manager
Subject Matter Experts Team Mohan KVK
Rati Arora, Shivani Arab, Chandrani Dasgupta Project Manager
Thapaswini Sathya Prathistha
Instructional Designers
Rifka Bose, Mayura Arya Creative Managers
Renjith Kumar C, Sajesh S, Ganapathi Rao R
Edit Review Team
Oindrilla Dutta, Hrishita Chowdhury, Jayita Sen Gupta, Disha Nilesh Sampat, Graphic Designers
Sreelal K, Anoop Kumar P, Anoop Muthalayil, Arun Kumar Muthalayil, Bharath Babu B, Heeral Desai, Joseph Libin T J, Kanaka Rao K,
Mini Sivashankar, Prableen Kaur Jubbal, Wedetso, Arunashis Bhattacharjee
Maria Devanesan A, Mohammed Shafeek Areekkaden, Murali Mohan S, Nagaraju Tadepalli, Nikhil Rajan, Ramakrishna Ch, Thushal R,
Vipin Kanaran, Venkataramana Kokkirala
Print Designers
Amol Gavasane, Romel Lymon Budala, Santoshi G, Srikanth Dara, Srinivasa Rao Dongala, Subbarao Anusuri, Sudheer Jangam,
Sunil Kumar B, Umashankar Akkinepalli, Venkata Narsareddy Ch, Venkatapathi Raju Rudraraju

This series is based on the original Computer Masti series created by Prof. Sridhar Iyer, Dr. Farida Khan, Vijayalakshmi Chitta, Usha Viswanathan, Malati Baru and Kaumudi
Sahasrabudhe.
The Next Curriculum Series is an initiative of Next Education India Private Limited.
Next Education acknowledges the contribution of all the authors and reviewers in the creation of this book.
Copyright © Next Education India Private Limited.
All rights reserved.
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or
otherwise, without prior written permission of Next Education.
The authors and the publisher shall be neither liable nor responsible to any person or entity with respect to any loss or damage arising from the information contained in the
book and any associated material whether physical, electronic or mechanical.
Every effort has been made to trace the copyright holders and to obtain their permission for the use of copyrighted material. The publisher apologises for any errors or
omissions and would be grateful for notification of any corrections that should be incorporated in future reprints or editions.
Computer Masti Teacher Manual 1
ISBN: 978-93-86356-39-0
Published 2017

NEIPL/NB/CM-V4/AK17 :

Published by Next Education India Private Limited


Sri Nilaya Cyber Spazio, Road No. 2, Banjara Hills, Hyderabad - 500034, Telangana, India.
www.NextEducation.in | [email protected]

CM_Level-1_TeacherManual_Prefacepages.indd 2 12-01-2017 11:03:27


Preface
• The book is based on a detailed Computer Science syllabus that has been reviewed by many experts. This syllabus is available for download at http://
www.cse.iitb.ac.in/~sri/papers/CMC-curriculum-03June2013.pdf.
• The main objective of this series is to develop computer fluency and thinking process skills of students.
• Fun is an important element of learning. The books in this series explicitly integrate playfulness as a basis for learning activities.
• The lesson contents are woven around the two conversations between an imaginary facilitator and two students. The facilitator mostly asks
questions that guide the students to discover and learn topics on their own. It is not necessary that the facilitator does a role play to recreate the
story in every class. Rather, the narrative style is adopted to facilitate reading and consequently learning by the student.
• Each lesson focuses on specific concepts and associated skills. These concepts are selected such that: (i) They lay a strong foundation for learning
computers. (ii) They contribute towards general intellectual development, and (iii) They are age appropriate.
• The Worksheets and Activities are designed in such a way that they supplement topics being covered in other subjects, as much as possible. Group
activities are included in each lesson to encourage collaborative learning. Projects are also suggested to reinforce the learning across multiple lessons.
• 21st century skills of critical thinking, collaboration, communication and creativity are addressed in the lesson content and supplementary activities.
• Tips to healthy computer practices are included in the lesson content and supplementary activities.
• The lessons and activities are based on many free and open source software as well.
• The book includes child-friendly illustrations that are sensitive to body image and gender issues.
• Each lesson has a Facilitator’s Corner section, which gives a lesson plan outline, some dos and don’ts, and pointers for when each worksheet has to be
given to students. Any facilitator (teachers/parents/others) can refer to the Facilitator’s Corner.
• Each book has a Glossary page at the end explaining all the key technical terms covered in the book.
• The book meets the standards suggested for Continuous and Comprehensive Evaluation
(Right to Education).

Computer Masti has been designed and created at Computer Science and Engineering Department at IIT Bombay.
Contents
2. Inside Internet ........................................................................................ 01

3. Social Networking ................................................................................ 16

4. Writing Blogs and Creating Websites ........................................... 33

6. Binary Number System ....................................................................... 43

7. SystemConfigurationandTroubleshooting................................. 55

8. BASIC Programming ............................................................................ 69

9. Introduction to Database and DBMS............................................... 80

CM_Level-1_TeacherManual_Prefacepages.indd 5 12-01-2017 11:03:28


Inside Internet
Level 8 | Lesson 2

Terminal and Enabling Learning Outcomes covered in the Lesson

Themes Terminal Learning Outcomes Enabling Learning Outcomes Bloom’s Level

Explain different types of network and Explain the term LAN. Understanding
its components/ Explain what
LAN,WLAN, WAN, packet and packet-
switching is
Explain the term WAN. Understanding
Explain the term WLAN. Understanding
Applications
Explain the term router. Understanding

State what is a router and its function? State what is a router and its function. Understanding
Explain the term packet. Understanding

Computer Masti ::::1


Explain the term packet switching. Understanding

State the function of a Switch. State the function of a Switch. Understanding


Explain the term TCP/IP. Understanding
Explain the terms Server, Client, UPS Explain the term server-client with respect to Understanding
and Firewall. Internet network.
Describe the function of a web server. Understanding
Define a firewall. Remembering
Define UPS. Remembering
List different ways of connecting single Explain the process of exchange of information Understanding
user and multi-user to the Internet. through Internet networks.
Identify the type of connection based on the Analysing
network service.
Select the type of internet connection based Analysing
on the necessity.
Explain the types of firewall and their Explain the types of firewall and their Understanding
functions. functions.
Identify the presence type of firewall while Analysing
using a computer.
Recognize and use features of data Explain data security enforced to secure Understanding
security. information in Internet.

Computer Masti ::::2


Question Bank Level 8 Lesson 2
Bloom’s Corresponding Difficulty Level Question Type Question Solution
Level LO (Easy/Difficult) (Objective/Subj
ective and Long
Answer/Short
Answer)
Understanding Explain E O - SA 1. Circle the different terminologies for networking (horizontal,
different types vertical, diagonal, forward and backward)
of network and
its components.

Understanding Explain the E O - SA 2. Fill in the blanks. d


types of firewall i. A firewall needs to be ______ so that it can grow with the
and their network it protects.
functions. a. Robust
b. Expensive
c. Fast
d. Scalable

Understanding Explain the D O - SA 3. Choose the correct option. i–b


term router. i. A home network Router- Ii – b
a. Makes home computers runs faster 4. Router
b. Enables safe sharing of resources among network devices in
the home
c. help people build web Sites
d. Connects a computer to a television so that the video can
be shared

Computer Masti ::::3


ii. What does a router do in a network
a. Forwards a packet to all outgoing links
b. Forwards a packet to the next free outgoing Link
c. Determines on which outing link a packet is to be
forwarded
d. Forwards a packet to all outgoing links except the
originated link

4. Fill in the blanks.


i. A _____ is a device that forwards packets between networks by
processing the routing information included in the packet.
Understanding Explain the D O - SA 5. Fill in the blanks. 5. network adapter
term TCP/IP. i. An IP address is a numeric quantity that uniquely identifies 6.
a __________ to other devices on the network. i –d
Ii -d
6. Choose a correct option.
i. A computer must have an IP address when?
a. Connecting to a home network router
b. Connecting to a Wi-Fi hotspot
c. Communicating with another computer using TCP
d. All of the above

ii. What does the port number in a TCP connection Specify?


a. It specifies the communication process on the two end
systems
b. It specifies the quality of the data and connection
c. It specifies the size of data
d. All of the above

Understanding Explain the E O - SA 7. Choose a correct option. iv


term TCP/IP. A computer must have an IP address when–
i. connecting to a home network router
ii. connecting to a Wi-Fi hotspot
iii. communicating with another computer using TCP
iv. all of the above

Understanding Explain the E O - SA 8. Choose a correct option. I–a


term LAN. i. A home Computer Network is a Type of: Ii – a
a. LAN Iii –a
b. MAN Iv -a
c. WAN
d. SAN

ii. It connects computers in office building so that staff can


share files and printers.
a. LAN
b. WWW

Computer Masti ::::4


c. FTP
d. HTTP

iii. Which network would you use to share information inside


the school premises?
a. LAN
b. FTP
c. WAN
d. WWW

iv. What is connected in a LAN?


a. Computers in one office
b. Computer in two cities
c. Computers on the internet
d. Computer on one site

Understanding Explain the E O - SA 9. Choose a correct option. a


types of firewall i. The purpose of a firewall on Computer Networks is to- ing
and their a. prevent unwanted network connections from being made.
functions. b. allow more than 4 computers to share the same Internet
connection
c. allow pictures and video to be downloaded from a camera to
a computer

Understanding Explain the E O - SA 10. Fill in the blanks. Firewall


types of firewall i. A system that monitors traffic into and out of a network
and their and automatically alerts personnel when suspicious traffic
functions. pattern occur, indicating a possible unauthorized intrusion
attempt is called a(n)_______

Understanding Explain the D O - SA 11. Fill in the blanks.


process of i. A PC which is not connected to any other computer is i. A PC which is not connected to any other computer is called
exchange of called a ___________. a Stand Alone Computer.
information ii. Individual machines in a network are called _____. ii. Individual machines in a network are called Node.
through iii. Electronic Communication System Linking Computers, iii. Electronic Communication System Linking Computers,
Internet Computer Systems and peripherals such as File Servers Computer Systems and peripherals such as File Servers and
networks. and Printers __________. Printers is called as Network.
iv. A __________ is a networking device that filters and iv. A switch is a networking device that filters and forwards data
forwards data packets between LAN segments. packets between LAN segments.
v. Type of communication in which small units of data are v. Type of communication in which small units of data are
routed through a network based on the destination routed through a network based on the destination address
address contained with each packet is called contained with each packet is called packet switching.
____________. vi. A packet consists of two kinds of data that are data control
vi. A packet consists of two kinds of data that are information and user data.
__________and __________. vii. Header provides the information the network needs to

Computer Masti ::::5


vii. __________ provides the information the network deliver the user data.
needs to deliver the user data. viii. Control information is found in packet headers and trailers
viii. Control information is found in packet headers and with payload data in between them.
trailers with _________ in between them. ix. A Hub is a networking device that provides a common
ix. A __________is a networking device that provides a connection point for multiple computers in the network.
common connection point for multiple computers in the x. A network address serves as a unique identifier for a
network. computer on a network.
x. A ___________serves as a unique identifier for a
computer on a network.

Understanding Explain the E S - LA 12. What is the difference between Client/Server Network and A peer to peer network makes use of a group of computers to
terms server- Peer to Peer Network? share information. The information is stored on the different
client with computers connected within the network instead of a central
respect to location. The information in such a network is difficult to track as
Internet users need to remember the exact location of the resources.
network.
In a client-server network the server is the central location from
where information is accessed by the users or clients. The
information is easier to access as it is stored in a single location.
Understanding Explain the E S - LA 13. Answer the following in brief. i. LAN, or local area network, and WAN, or wide area network, are
terms LAN and i. What is the difference between LAN and WAN. Give Example two types of networks that enable interconnectivity between
WAN. of each. computers. LANs are used where the number of users is less such
ii. What is meant by single user internet connection with as in a home, office or school. WANs are used on a much larger
examples? scale such as in cities or across countries, a popular example being
iii. What is meant by multi user internet with example? the Internet. LANs are faster and more secure while WANs provide
coverage over a large area. LANs are often privately owned by a
single constituent while WANs are often owned by multiple
constituents.

ii. As the name suggests, a single user Internet connection provides


connectivity to a limited number of devices. Such a connection
cannot support multiple users and data transfer speed gets
reduced if shared by more than one user. Some examples of single
user Internet connection are given below.

DSL (digital subscriber line) Modem: It is a device used to connect a


computer or router to the internet through a telephone circuit.
Broadband Modem: Uses DSL or a cable Internet service to connect
to the Internet. Here, the DSL line connects to your phone jack and
the USB line or Ethernet to your computer.
Mobile broadband: Uses a wireless Internet card, such as a USB
dongle, to connect to the Internet. This dongle can be used
(wherever the ISP provides coverage) by plugging it into the USB
port on a net book, PC or laptop.
Portable Internet Devices: Smart phones, tablets etc. use a variety
of wireless technologies such as 3G, WiFi and WiMAX technology
to connect to the Internet.

Computer Masti ::::6


iii. Multi user Internet connections can be used by a large number
of people spread across a wide area and using different devices to
connect to the Internet.

WiFi router at home: Extension of single user by connecting WiFi


access switch to Broadband Modem.
Fiber-to-the-building Broadband (FTTH): Uses fiber optic cables to
connect to the Internet. Such optics-based systems can deliver
digital information very efficiently.
Wireless mesh networks: In these, the network connection is
spread out among dozens or even hundreds of wireless mesh
nodes that 'talk' to each other to provide the network connection
across a large geographical area.
Satellite Connections: Internet connection through a satellite dish
to upload and download data communications, is often used for
areas that are geographically difficult, such as mountains.

Understanding Explain the E O - SA 14. Choose a correct option. I –d


process of i. What is the benefit of networking? Ii –a
exchange of a. File Sharing Iii –b
information b. Easier access to Resources Iv – a
through c. Easier Backups V-d
Internet d. All of the above
networks.
ii. What do you mean by broadcasting in networking?
a. It means addressing a packet to all machine
b. It means addressing a packet to some machines
c. It means addressing a packet to except a particular
machine

iii. Which of the following is not a Networking Device


a. Gateways
b. Linux
c. Routers
d. Firewalls

iv. Two devices are in network if


a. a process in one device is able to
exchange information with a process in another device
b. a process is running on both devices
c. PIDs of the processes running of different devices are
same

Computer Masti ::::7


d. none of the mentioned

v. Which of this is not a network edge device?


a. PC
b. Smartphones
c. Servers
d. Switch

Analysing Select the type E O - SA 15. Fill in the blanks. 15.


of Internet i. A local telephone network is an example of a i. A local telephone network is an example of a packet network
connection ______________. ii. In _packet switching resources are allocated on demand.
based on ii. In __________ resources are allocated on demand.
necessity.
Analysing Select the type E O - SA 16. Choose a correct option. b
of Internet i. Most Switches use the Principal of
connection a. Stop and wait
based on b. Store and forward
necessity. c. Both of the mentioned
d. None of the mentioned

Analysing Identify the E O - SA 17. Choose a correct option. b


type of i. Device needed for communication between computers
connection using telephone network
based on the a. Printer
network b. Modem
service. c. Plotter
d. CD ROM

Understanding Explain the E O - SA 18. Choose a correct option. 18.


term server- i. An Internet is an example of i. An Internet is an example of
client with a. Cell Switched Network a. Cell Switched Network
respect to b. Circuit Switched Network b. Circuit Switched Network
Internet c. Packet Switched Network c. Packet Switched Network
network. d. All of the above d. All of the above

ii. An Intranet is: ii. An Intranet is


a. A private company network that includes external a. A private company network that includes external specified
specified users users
b. A private Company Network b. A private Company Network
c. A Network Filling System c. A Network Filling System
d. A Network Operating system d. A Network Operating system

19. Fill in the blanks. 19.


i. The computer we use to access internet applications is i. The computer we use to access internet applications is
Called a ____________. Called a client computer.

Computer Masti ::::8


Understanding Explain E S - LA 20. Answer the following in brief. i. A LAN is a Local Area Network which connects computers in a
different types I. Explain the term LAN. limited area such as home, school, computer laboratory, or office
of network and II. Explain the term WAN. building. Cables (wires) or low-power radio (wireless) are used to
its components. III. Explain the term WLAN. provide connections in a LAN.
IV. Explain the term router.
V. Explain the term packet. ii. A Network which is geographically spread over large areas with
VI. Explain the term packet switching. links between computers is called a WAN (wide area network). The
VII. Explain the term TCP/IP. long distance connections are established using technologies such
as optical fibre cables, satellite radio links or microwave radio links.

iii. A LAN that uses radio signals to connect computers is called


WLAN (wireless local area network). One commonly used type of
radio signals is called WiFi.
A wireless switch with one or two antennas usually sticking out the
back of the switch, is used for sending and receiving data to and
from the computers in WLAN.
The range of wireless connection is around 50 meters. Computers
and other devices capable of sending and receiving data wirelessly
can become part of a WLAN, when they are within range.

iv. A router is a network device that connects together two or more


networks. A common use of a router is to join a home or business
network (LAN) to the Internet (WAN). The router will typically have
the Internet cable plugged into it, as well as a cable, or cables to
computers or switch on the LAN. Some routers are also wireless
capable.

v. A packet is a formatted unit of data. A packet consists of two


kinds of data: control information (header) and user data (also
known as payload). The header provides the information the
network needs to deliver the user data. For example: source and
destination addresses, error detection codes like check sums, and
sequencing information. Typically, control information is found in
packet headers and trailers, with payload data in between.

vi. A message from one computer on the Internet to another gets


divided into packets before being sent. Each packet is then
transmitted individually and can even follow different routes to the
destination. Once all the packets forming a message arrive at the
destination, they are recompiled into the original message. Such
type of communication in which small units of data (or packets) are
routed through a network, based on the destination address
contained within each packet, is called packet switching.

vii. Transmission Control Protocol/ Internet Protocol (TCP/IP) is a


set of rules used to interconnect computers and communicate data

Computer Masti ::::9


on the Internet. TCP/IP specifies how packets are transmitted
based on IP addresses and then routed to and received at the
correct destination.

Understanding Explain E O - SA 21. Choose a correct option. 21.


different types i. Bluetooth is an example of: i. Bluetooth is an example of
of network and a. personal area network a. personal area network
its components. b. local area network b. local area network
c. virtual private network c. virtual private network
d. none of the mentioned d. none of the mentioned

Understanding Explain data D O - SA 22. Choose a correct option. 22.


security i. In cryptography, what is cipher? i. In cryptography, what is cipher?
enforced to
secure a. algorithm for performing encryption and decryption a. algorithm for performing encryption and decryption
information in b. encrypted message b. encrypted message
Internet. c. both (a) and (b) c. both (a) and (b)
d. none of the mentioned d. none of the mentioned

ii. Using which of the below option can the receiver be sure ii. In which the receiver needs to be sure of the sender's identity
of the sender's identity and that an imposter has not sent and that an imposter has not sent the message.
the message.
a. Message Authentication
a. Message Authentication b. Entity Authentication
b. Entity Authentication c. Message Nonrepudiation
c. Message Nonrepudiation d. Message Integrity
d. Message Integrity
23.
23. State True or False. i. In digital Signature, we use the private and public Key to the
i. In digital Signature, we use the private and public Key to sender A.TrueB. False
the sender
A. True B. False 24.
i. This process of building a secret code by transforming
24. Fill in the blanks. information Using an algorithm is called encryption.
i. This process of building a secret code by transforming ii. The process of getting the plain text from the ciphertext is
information Using an algorithm is called ___________. called Decryption.
ii. The process of getting the plain text from the ciphertext is iii. Cipher is the code or the algorithm used in the encryption
called and decryption of data.
____________. iv. Key is the secret of the cipher, known only to the
iii. _________ is the code or the algorithm used in the authorized people.
encryption and decryption of data.
iv. _______ is the secret of the cipher, known only to the
authorized people.

Understanding Explain the E O - SA 25. Choose a correct option. 25.


process of i. DNS is the abbreviation of i. DNS is the abbreviation of
exchange of

Computer Masti ::::10


information a. Dynamic Name System a. Dynamic Name System
through b. Dynamic Network System b. Dynamic Network System
Internet c. Domain Name System c. Domain Name System
networks. d. Domain Network Service d. Domain Network Service

Understanding Explain the E O - SA 26.Connect the Blocks in order to form a proper Network
process of Diagram.
exchange of
information
through Internet Internet
Internet
networks.
Switch Switch

IP Phone IP Phone

Desktop PC Desktop PC
Router Router

Printer Printer

Server Server

Understanding Explain the E S - LA 27. Answer the following in brief. i. A firewall secures a network from unauthorized access and
types of firewall i. What are the different Types of Firewall and their functions? communication. A firewall can be of two types - software and
and their ii. Explain with the help of diagram the operation of Firewall hardware.
functions. Software Firewall: A software firewall is usually installed on
desktops and laptops along with the OS. It monitors the
applications that access the Internet and allows only those that are
approved by the user.
Hardware Firewall: A hardware firewall router passes data
between networks and also contains hardware firewall
components. Its actions are similar to the software firewall but it
has many more options.

ii. A firewall blocks unauthorised connections being made to a


computer or LAN. Normal data is allowed through the firewall (e.g.
emails or web pages) but other data is blocked, unless specifically
allowed by the user. To protect an individual computer, a software
firewall is built into the OS of the computer.
Several settings can be made in the firewall software to protect the
computers from unauthorized access and communication. To
protect whole LAN from people (who access a computer system by

Computer Masti ::::11


circumventing its security system) on the Internet, a hardware
firewall device (similar to a router) is placed between the LAN and
the Internet connection.

Understanding Explain the E O - SA 28. Choose a correct option. a


types of firewall i. An attempt to make a computer resource unavailable to its
and their intended users is called
functions.
a. denial-of-service attack
b. virus attack
c. worms attack
d. botnet process

Computer Masti ::::12


Analysing Identify the E O - SA 29.Choose a correct option. I–b
type of i. Which hardware does each computer need to communicate Ii - b
connection on an Intranet?
based on the a. Speakers
network b. LAN Cards
service. c. Modem
d. Printers

ii. An Intranet is
a. A private company network that includes external
specified users
b. A private Company Network
c. A Network Filling System
d. A Network Operating system

Understanding Explain WAN E O - SA 30. Choose a correct option. How are the Computers in a WAN iii
Connected?
i. Cables
ii. Intranet
iii. Telephonic Lines
iv. Internet

Remembering Define UPS E O - SA 31. Fill in the blanks. Uninterrupted power supply (UPS)
i. _____________ is an electrical equipment used to
protect the servers from power disruptions

Analysing Select the type D O - SA 32. Help Rohan figure out the missing component in the iii
of internet following illustration.
connection
based on the
necessity.

i. CD
ii. Modem
iii. 3G
iv. Dongle

Understanding Explain the D O - SA 33. Guess the missing component. iii


term server-
client with
respect to
Internet
network.

Computer Masti ::::13


i. Firewall
ii. Satellite Connection
iii. Server
iv. Radio Waves

Understanding Explain data E O - SA 34. Sonal has sent a message to Reena. She has used a i. Encryption
security messaging service which ensures user privacy. Which of the
enforced to below process does the messaging service use to guarantee
secure privacy?
information in
Internet.

i. Encryption
ii. Identification
iii. Decryption
iv. Conversion

Analysing Identify the D O - SA 35. Find the missing component from the following illustration. iii
type of
connection
based on the
network
service.

i. Switch
ii. Keyboard
iii. Modem
iv. Router

Computer Masti ::::14


Understanding Explain the E O - SA 36. You have shared some photos with your friends who are iii
process of based in the US. Which device is used to communicate data
exchange of over long distances?
information i. UPS
through ii. Ethernet
Internet iii. Router
networks. iv. Internet

Understanding Explain the D O - SA 37. Find the missing component in the following figure. iv
term server-
client with
respect to
Internet
network.

i. Dongle
ii. UPS
iii. Router
iv. Server

Analysing Select the type D O - SA 38. Rajesh uses a laptop while working in the office. He has to i
of internet coordinate with his colleagues due to which he works from
connection different locations. Which of the below type of Internet
based on the connections would be suitable for him?
necessity. i. Wi-Fi
ii. Broadband Modem
iii. USB Dongle
iv. DSL

Computer Masti ::::15


Social Networking
Level 8 | Lesson 3

Terminal and Enabling Learning Outcomes covered in the Lesson

Themes Terminal Learning Enabling Learning Outcomes Bloom’s Level


Outcomes
List examples of social networking List examples of social networking Understanding
websites along with the purpose of websites along with the purpose.
use.
Describe features of social Describe features of social networking. Understanding
networking.
List pros and cons of social List pros and cons of social networking. Understanding
Internet
networking.
List uses of social networking sites List uses of social networking sites for Understanding
for educational purposes. educational purposes.
Apply healthy practices while using Apply healthy practices (SMART PLUS Applying
Internet for social interaction. rules) while using Internet for social
interaction.

Computer Masti ::::16


Question Bank Level 8 Lesson 3
Bloom’s Corresponding Difficulty Level Question Type Long Question Solution
Level LO (Easy/Difficult (Objective/Su Answer/
) bjective and Short
Long Answer/ Answer
Short Answer)
Understanding Describe E O SA 1. Fill in the blanks. i. Social Networking involves
features of i. Social Networking involves communication between ___________ communication between _Two and
social ii. The use of online and offline promotion techniques to increase the audience of a more people_.
networking. site is known as__________________. ii. The use of online and offline
iii. ________________ are websites that allow individual users to create, share and to promotion techniques to increase
communicate with other users on the site. the audience of a site is known as
iv. __________ describes outsourcing tasks using SNS which can be performed by _Search Engine Optimization _.
individual across the globe. iii. Social Networking Sites are
v. __________ refers to combining different elements such as content and websites that allow individual users
application interfaces to create a new service. to create, share and to
vi. SNS for Education is now termed __________. communicate with other users on
vii. Social Networks are considered _________. the site.
iv. Crowdsourcing describes
outsourcing to tasks using SNS which
can be performed by individual
across the globe.
v. _Mashups__ refers to combining
different elements such as content
and application interfaces to create
a new service.
vi. SNS for Education is now termed
_Educational Networking.
vii. Social Networks are considered Web
2.0 Sites ___.

Understanding List examples E O SA 2. Choose a correct option. 2.


of social i. When was the term social Networking coined i. When was the term social Networking
networking a.1994 coined
websites along b.1954 a. 1994
with the c.2004 b. 1954
purpose. d.1974 c. 2004
d. 1974
ii. Which of the following is the most popular
ii. Which of the following is the most popular
site on the internet?
social networking site on the internet?
a. Myspace

Computer Masti ::::17


a. Myspace b. Facebook
b. Facebook c. Orkut
c. Orkut d. Friendster
d. Friendster
iii. Who founded Facebook
iii. Who founded Facebook? a. Mark Zuckerberg
a. Mark Zuckerberg b. Matt Mullenweg
b. Matt Mullenweg c. Bill Gates
c. Bill Gates d. Steve Chen
d. Steve Chen
iv. Who founded Myspace?
iv. Who founded Myspace? a. Tom Anderson
a. Tom Anderson b. Rupert Murdoch
b. Rupert Murdoch c. Will Dewolfe
c. Will Dewolfe d. Mac Andressen
d. Mac Andressen
v. When did online Social Networking first
v. When did online Social Networking first become popular? become popular?
a. 1977 a. 1977
b. 1999 b. 1999
c. 2003 c. 2003
d. 1988 d. 1988

vi.Facebook and Myspace are all examples of what type of vi. Facebook and Myspace are all examples of
services? services?
a. E- Learning a. E- Learning
b. Social Networking b. Social Networking
c. Web Portal c. Web Portal
d. Wiki d. Wiki

vii.Twitter is an Example of what type of service? vii. Twitter is an Example of what type of serv
a. Blogging a. Blogging
b. Programming b. Programming
c. Gaming c. Gaming
d. Microblogging d. Microblogging

viii. In a relation to mobile digital devices, what does the viii. In a relation to mobile digital devices, wha
term ‘app’ mean? ‘app’ mean?
a. An abbreviation of apple, the technology corporation a. An abbreviation of apple, the technology c
b. An application designed to run on the Apple iPhone b. An application designed to run on the Apple
c. An application designed to run on the Apple iPod c. An application designed to run on the Apple
d. An application designed to run on a mobile device d. An application designed to run on a mobile

Computer Masti ::::18


ix. WordPress, Typepad and Expression Engine can all be ix. WordPress, Typepad and Expression Engine c
used for what? for what?
a. Blogging a. Blogging
b. Word Processing b. Word Processing
c. Content Management c. Content Management
d. Peer to Peer file Sharing d. Peer to Peer file Sharing

x. What is this Icon, often seen on websites, used for ? x. What is this Icon, often seen on websites, use
a. Sending Content to your mobile device
b. Bookmarking sites in your websites a. Sending Content to your mobile device
c. Peer-to-peer File Sharing b. Bookmarking sites in your websites
d. Sharing web content via Social Networking Social News c. Peer-to-peer File Sharing
and bookmarking sites d. Sharing web content via Social Networking S
and bookmarking sites
xi.What does this icon mean when seen on a website, and
what is it used for ?
xi. What does this icon mean when seen on a w
a. News, click to show the most recently uploaded content
b. Wireless connection, click to link to wireless devices what is it used for
c. RSS feed, click to subscribe to updates (e.g. blog posts) a.News, click to show the most recently uploade
d. Share, click to share content via social networks and b.Wireless connection, click to link to wireless d
Social news sites c.RSS feed, click to subscribe to updates (e.g. b
d.Share, click to share content via social networ
xii. Which of the below media are used by Social news sites
Networking Sites for communication?
a. Audio xii. Social Network Sites use which media for co
b. Video a. Audio
c. Text b. Video
d. All of the above c. Text
d. All of the above
xiii. Which phrase best describes what people do at social
Networking sites. Choose your correct answers xiii. Which phrase best describes what people d
a. They interact with countries Networking sites? Choose your correct answers
b. They browse articles and other content a. They interact with countries
c. They code pages in HTML b. They browse articles and other content
d. They interact with each other c. They code pages in HTML
d. They interact with each other
xiv. Twitter was founded in the year _________.
a.2005 xiv. Twitter was founded in the year _________
b.2006 a.2005
c.2003 b.2006

Computer Masti ::::19


d. 2004 c.2003
d. 2004
xv. Facebook was founded in the year __________.
a. 2004 xv. Facebook was founded in the year ________
b.2002 a. 2004
c.2000 b.2002
d.2003 c.2000
d.2003

Understanding List examples E O SA 3. Match the icons on the left with Social Networking Sites given on the right. 3. Match the icons on the left with Social
of social Networking Sites given on the right.
networking I. 1. Twitter
websites. I. 3. Blogger

II. 2. Skype
II. 5. Facebook

III. 3. Blogger
III. 10. Google Plus

IV. 4. Youtube
IV. 9. Hike

V. 5. Facebook
V. 8. Linkedin

VI. 6. Whatsapp
VI. 6. Skype

VII. 7. Instagram

VII. 1. Twitter
VIII. 8. Linkedin

VIII. 6. Whatsapp
IX. 9. Hike

IX. 4. You Tube

Computer Masti ::::20


X. 10. Google Plus
X. 7. Instagram

Applying Apply healthy E O SA 4. State if it is Do or Don’t for Social Networking Sites. Do’s - i, iii, iv, vii
practices
(SMART PLUS i. Ankita sets privacy setting to the most secure setting available. Don’ts – ii, v, vi
rules) while ii. Vaibhav likes to post information that would let everyone know about a vacation
using Internet or whether he is out of town for few days.
for social iii. Prachi makes unique password for every social media site.
interaction. iv. Riddhi is selective about accepting request from a friend or follower on a social
media account.
v. Priya clicks on the link even though it appears to be unusual or suspicious because
it is sent by friends.
vi. Ruchita posted online something personal and gave permission to everyone to
access it.
vii. Archit unfriends someone who is offending him and is not liking what they are
posting.

Understanding List pros and E S LA 5. Answer the following in brief. i.


cons of social i. List advantages and disadvantages of social Networking Sites Advantages
networking. ii. State the Impact of Social Media in our Daily life x Instant communication
iii. What are social networking sites and user- interactive services x Collaboration
iv. Classify different types of SNS and give two example of each. x Creative expression
v. When you “friend” someone on a social Networking Site, what does this allow x Online marketing
them to see? Disadvantages
vi. What is a messaging system on a social Networking Site do? x Addictive
vii. What are the purposes for using social Networking Site? x Lack of monitoring
viii. How can social Networking Sites such as twitter, Facebook and Skype can be used x Security
in your classrooms? x Lack of face-to-face interaction
ix. Write a report on: Pros and Cons of Social Networking
ii. Social media has impacted several areas
of our life
Communication – Quicker and in real time
Shopping – Direct Business to Customer
Entertainment – Online videos and music,
games, photo sharing
Education – MOOCs and distance learning
Business and Marketing – Feedback and
tracking, records maintenance

Computer Masti ::::21


Interactive user services are applications
that are designed to run unattended or with
update from a user. Examples include
update services and
SNS enable the user to register on an online
platform and make use of different
applications for various purposes such as
communication as well as interactive user
services.

iii. Types
Bookmarking, Sharing, Blogging, Forums,
News, Profile Updates

v. Allows them to view your profile details,


other friends, wall info and favorites list

vi. Allows users to communicate in real-


time and post messages. Also can be used
to share files.

vii. To stay in touch with family, friends and


acquaintances who are staying in different
places. Share information.

viii. To create study groups, special interest


groups, online teaching sessions.

ix.Same as i

Applying Apply healthy E S LA 6. Answer in brief. i.SMART PLUS rules


practices i. Enlist some safety tips while using social Networking Sites. Keep Safe
(SMART PLUS ii. What are different types of privacy and Security Settings Do Not Meet Up
rules) while iii. What should you watch out for when posting things on a Social Networking Site? Do Not Accept
using Internet Check for Reliability
for social Tell
interaction. Be Polite
Think Before You link
U are responsible
Share selectively

Computer Masti ::::22


ii. Friends list
Edit your profile
Tags
Facebook Ads
View

iii.Relevance, authenticity, safe to be shared

Computer Masti ::::23


Applying Apply healthy E S SA 7. Choose a correct option. i–b
practices i. Sunil gets a request what should he consider? Ii -b
(SMART PLUS a. Request? What’s a Request Iii -b
rules) while b. Do I know this person?
using Internet c. Let me just add who cares
for social d. None of the above
interaction.
ii. Aditi has signed up on a social Networking site, and decided to post something,
which of the following is safe to post on a social Networking site?
a. Your Location
b. An alias
c picture of you with your friends
d.I don’t know.

iii. You are playing a game online, and the person you’re playing against starts talking
to you. ‘Hey, you’re really good at this game. Would you like to come my house and
show me how to get to the next level’? What do you say back?
a. Hold on while I ask my mum
b. No and tell someone about it
c. Yes please, but once I’ve done my homework
d. I’m not sure, do I know you?

Computer Masti ::::24


8. Choose correct options. I –b
i. You are using your favorite app to talk to other people, someone you don’t know sends you a Ii –c,d,e
picture. Would you open it?

a. Yes- it could be a funny image


b. I’m not sure, I think I’d ask a trusted adult first
c. I’d block the person who sent it to me- because on some messaging services you
have to add the stranger as a contact first so you can see the image. I don’t want to
add strangers into my contact lists.
d. No, when accepting pictures from strangers it can often contain a virus
e. No, the picture which is from a stranger might be rude or upset me.
ii. Someone at School has given you a great Wikipedia link to help you with your history
homework. What you do to get reliable information?
a. Use Wikipedia, it is always right!
b. Check one other website to see if what Wikipedia has written is correct
c. Look in a book to find out a bit more information
d. You must check at least 3 websites to see if information is reliable online
e. Ask your teacher

Computer Masti ::::25


Applying Apply healthy D S Lab Activity 9. Set up a new Twitter for your class – you will possibly want to ‘protect’ your updates.
practices Invite parents to ‘Follow’ you, and they can see what the class are up to from any
(SMART PLUS computer (home, work…) at any time of the day or night. They might even tweet back
rules) while now and again!
using Internet
for social
interaction.

Applying Apply healthy D S Lab Activity 10. Create a twitter account of your class and sent out a word and let your friends give
practices synonym, antonyms and examples to foster stronger and more descriptive writing.
(SMART PLUS
rules) while
using Internet
for social
interaction.

Applying Apply healthy D S Lab Activity 11. Conduct a mock interview round on Skype where one students will play a
practices interviewer and the other student as interviewee. Share your experience about the
(SMART PLUS interview with your friends by blogging the details on the whole experience on blogger.
rules) while Describe features of social networking.
using Internet
for social
interaction.

Understanding List uses of D S Lab Activity 12. Explore these Social Networking Sites and state how they can help you in education-
social i. DoResearch4me
networking ii. Hey Math! Challenge
sites for iii. Class Notes
educational iv. QuoteURL
purposes. v. CourseFeed
vi. PollDaddy

Understanding List examples E O SA 13. Which Social Networking sites would you suggest for the following: i. Flipkart, Amazon
of social i. Riya wants to buy new clothes and she doesn’t have time to go and shop- ii. Wikipedia, About.com
networking ii. Mohan’s teacher has given him a project to look for information about India’s iii. IRCTC
websites along
Prime Minister- iv. Twitter, Facebook
with the
purpose. iii. Radha is planning to trip to Mumbai and she wants to book train ticket v. Quora, techspot
iv. Anita’s friend shifted to New Jersey and Anita doesn’t have her Phone number and
wants to reach her to wish her Happy Birthday-

Computer Masti ::::26


v. Vasu wants to buy a New Mobile Phone, but he is not sure which one has the latest
features , how cost effective it is and experiences of other people, he plans to put
up queries to obtain the information-

Applying Apply healthy E S LA 14. Answer the following in your own words: i. not in all the cases
practices i. Is it safe to play games and have fun on the internet? ii. 13 years
(SMART PLUS ii. How old do you have to be to have your own account on Facebook? iii. It is strongly recommended that a
rules) while iii. What kind of password should you use? password must be a combination of Upper
using Internet iv. Who should you go or report to when you feel unsafe or uncomfortable while on & Lower case alphabets, and atleast one
for social internet? number and special character
interaction. iv. to a trusted adult
Understanding Describe D S LA 15. Write a report on: Register/Create profile: Each user fills an
features of i. Features of Social Networking Sites online form with details about age,
social education, location, likes, dislikes and
networking.
hobbies. The user can add friends,
categorize them into groups, decide how
his/her profile is viewed and by whom it is
viewed.
Security settings: The user can configure
settings where she decides which content
on her page is public or private. The user
can block content from being viewed by a
list of users, can report SPAM and flag
content.
Networking features: Activities that the
user can perform:
Chat or use instant messaging services to
communicate with other online users.
Upload photos and videos so that they can
be viewed by others.
Play games.
Enter comments on content generated by
other users.
Send email.
Search and support: The user can search for
content based on keywords, interests,
schools. The user also has support in the

Computer Masti ::::27


form of FAQs and forums.
Applying Apply healthy D S LA 17. Create your own rules of using Internet and SNS. Give these rules a cool acronym.
practices
(SMART PLUS
rules) while
using Internet
for social
interaction.
Understanding List examples E S Lab Activity 18. Post a question on the website “Quora”. Find out ways for other users to answer
of social your questions quickly and meaningfully. List out those ways.
networking
websites along
with the
purpose.
Understanding List examples E S Lab Activity 19. Follow three blogs of your choice on “WordPress”. Comment on three articles and
of social share them with your friends and family.
networking
websites along
with the
purpose.
Understanding List examples E S Lab Activity 20. Create your own blog and integrate the following on different posts:
of social i. Instagram
networking ii. Youtube
websites along iii. Flickr
with the iv. Twitter
purpose.
Understanding Describe D S Lab Activity 21. Help your parents find at least three of their old friends with whom they have lost
features of touch.
social You can use any SNS to help them connect.
networking.
Understanding Describe D S LA 22. Compare the following features across the given SNS:
features of Profile Content Content
social Creation Uploading Sharing
networking. Twitter
Picasa
Pinterest
Facebook
LinkedIn
Wikipedia
Tumblr
IRCTC

Computer Masti ::::28


Skype
Amazon

Applying Apply healthy E S LA 23. List the steps to create a profile on “CNET”.
practices
(SMART PLUS
rules) while
using Internet
for social
interaction.
Understanding Describe E S LA 24. Compare the security and privacy features available in Facebook and Twitter.
features of
social
networking.
Understanding Describe D S LA 25. In a group of five, create a quiz of 10 questions on the topic “Search features
features of available in WordPress”.
social
networking.
Understanding Describe E S Lab Activity 26. Create a collage of 5 of your friends using Photobucket. List three of the features you
features of liked the most.
social
networking.
Understanding Describe D S LA 27. Develop an advertisement on how crowdsourcing can help in improving quality of
features of products.
social
networking.
Applying Apply healthy D S Lab Activity 28. Map your own territory! – Using Google Maps/ Yahoo maps, tag your own residence
practices on the map.
(SMART PLUS
rules) while
using Internet
for social
interaction.
Understanding Describe D S Lab Activity 29. Create your own tour map of your favorite places on Google Map.
features of
social
networking.
Understanding List uses of E S LA 30. Write a short essay on “Evolution of location based services”.
social
networking
sites.

Computer Masti ::::29


Understanding List examples E O SA 31. Match the following: i-d
of social Purpose Example ii-a
networking i. Online Movie Reviews a. http://delicious.com/ iii-e
websites along ii. Social Bookmarking b. www.freelancer.com iv-c
with the iii. User Forums c. www.ebay.com
purpose. v-b
iv. Online Shopping d. IMDb
v. Outsource Services e. www.quora.com

Understanding Describe E S Lab Activity 32. Compare the storage space offered by various SNS: Google Drive, DropBox, etc.
features of
social
networking.
Understanding List uses of D S LA 33. Write a short essay on “MOOCS” with examples.
social
networking
sites for
educational
purposes.
Understanding List pros and E S LA 34. In pairs, discuss the pros and cons of SNS being used in education.
cons of social
networking.
Understanding List examples D S Lab Activity 35. Create a list for the following.
of social i. SNS for booklovers and features they offer
networking ii. SNS for educators and activities they can do through these sites.
websites along iii. SNS for artists and tools that these sites offer.
with the
purpose.
Understanding Describe D S Lab Activity 36. Populate a spreadsheet with links of SNS that might be useful for grandparents. Also
features of list the purpose of each website.
social
networking.
Understanding Describe D S Lab Activity 37. Conduct a survey to find out which SNS are being used by:
features of i. Age group of 8 to 16 years
social ii. Age group of 30 to 45 years
networking. iii. Teachers in your school
iv. Management in your school

Understanding Describe D S LA 38. Create a campaign strategy for “Clean Nation Mission” in groups of five.
features of
social

Computer Masti ::::30


networking.
Understanding List uses of E O SA 39. Select the correct option. i -c
social i. You have seen your mother writing beautiful poems. She is looking for a variety of ii – a,b,c,d
networking ideas. What would you suggest her from the following?
sites. a. To search on Google for a variety of poems and duplicate ideas
b. To write an email to her friends and ask for ideas
c. To open a blog, post her poems, interact with fellow bloggers and take ideas
d. To upload a video on YouTube asking for ideas

ii. Which of the following are the networking features of an SNS? You could choose
more than one option.
a. Import photos from other SNS
b. Instant messaging
c. Play games
d. Report abuse

Applying Apply healthy E O SA 40. Select the correct option. i-c


practices i. While using a Social Networking Site (SNS), if you observe a friend posting disrespectful
(SMART PLUS comments on your photo a couple of times, what would be your action?
rules) while
using Internet a. Call and threaten your friend
for social b. Reply to the comment disrespectfully
interaction. c. Limit the viewers of the picture using SNS security settings
d. Post impolite comments about your friend

Understanding List examples E O SA 41. Select the correct option. i-b


of social i. Find the odd one out from the following
networking
websites along a. Ebay
with the b. Flickr
purpose. c. Flipkart
d. Amazon

Understanding Describe E O SA 42. Select the correct option(s). i - a,c


features of i. Which of the following are the advantages of SNS? You could choose more than one
social option.

Computer Masti ::::31


networking. a. Online Marketing
b. Addiction
c. Creative Expression
d. Security

Computer Masti ::::32


Writing Blogs and Creating Websites
Level 8 | Lesson 4

Terminal and Enabling Learning Outcomes covered in the Lesson

Themes Terminal Learning Enabling Learning Outcomes Bloom’s Level


Outcomes
Explain what a blog is. Explain the term blogging with Understanding
examples.
List down the purpose of blogging. Understanding
List some blogging websites. List some blogging websites. Understanding
Create a blog (using Google Create a blogging account with a Applying
Blogger). website or blogger.
Write a blog on any topic. Applying
Create a blog using HTML tags. Applying
Applications
Create website (using Google Create a website using Google apps. Applying
Sites).
Apply guidelines while creating Apply the guidelines of designing a Applying
websites. website while planning for it.
Explain the ticket booking transactions Understanding
using a website.
Explain the buying and selling of Understanding
products through websites.

Computer Masti ::::33


Question Bank Level 8 Lesson 4
Question Type
Difficulty Level
Bloom’s level Corresponding LO (Objective/Subjective and Long Question Solution
(Easy/Difficult)
Answer/Short Answer)
1. What do you call an online account of an individual's ideas, activities,
opinions and advice?
Explain what a blog
Understanding E O - SA i. email account ii
is.
ii. Web Log
iii. Data storage
iv. Spread sheet

Explain what a blog 2. Fill in the blank:


Understanding E O - SA Blog
is. i. Short form of web log is _________

3. Sequence the below given steps to create a blog using google blogger.
i. Publish and view the blog
ii. Name your blog and choose a template
iii. Start blogging
Create a blogging
iv. Sign in
Understanding account with a E O - SA c
website or blogger.
a. IV-III-II-I
b. IV-III-I-II
c. IV-II-III-I
d. IV-I-II-III

4. State whether the following statement is true or false.


Explain the term i – FALSE
i. Readers can not post responses and comments on a blog.
Understanding blogging with E O - SA ii - True
ii. Famous people like Amitabh Bachchan can keep in touch with their
examples.
fans by celebrity blogs.

5. Which of the following cannot be shared on a blog.


List down the a. Hobby (story writing, article writing)
Understanding purpose of E O - SA b. Information d
blogging. c. Videos and Pictures
d. None of the above

Computer Masti ::::34


Remembering Explain the term E O - SA 6. Read the following statements if you agree tick on ‘yes’ or else ‘no’. i - Yes
blogging with i. Is it possible to make money by advertising on a Blog.
examples. (Yes/No)

Understanding List down the E O - SA 7. What is the purpose of blogging? Option d: All of the above
purpose of a. Sharing information
blogging. b. Making money by offering consultancy
c. Uploading videos and pictures of favourite stars
d. All of the above

Applying Create a blogging D Lab activity 8. Write down a blog of 100 words about your favourite teacher. Publish
account with a it and share it with your friends.
website or blogger.

Understanding List down the E S - LA 9. Write down 3 different purposes of blogging. 1. Sharing
purpose of information/opinions
blogging. 2. Providing consultation
3. To keep in touch with
friends and family
Remembering List some blogging E O - SA 10.Which of these is not a blogging website? Option c: Yahoo
websites. a. Wordpress
b. Google Blogger
c. Yahoo
d. Tumblr
Understanding Explain the term E O - SA 11. Read the following statements if you agree tick on ‘yes’ or else i - Yes
blogging with ‘no’.
examples. i. Is it possible to insert a hyperlink within the content of the blog.
(Yes/No)
Remembering List some blogging E O - SA 12. _________ and _________ are the examples of blogging websites. Wordpress, Tumblr
websites. (Wordpress / Linkedin / Tumblr / Yahoo / Facebook)

Computer Masti ::::35


Understanding List some blogging E S - LA 13. Write down any five features of a blogging website. Any five of the following
websites. 1. Choose blog template
2. Post a blog
3. Edit a blog
4. Post pictures, videos
5. Hyperlink blog content
6. Archive blogs
7. Filter comments
8. Use advertisements on
blogs
9. Post blogs on other SNS
10. Send auto updates to
subscribers
11. View blog statistics
(number of views or
comments)
Understanding List some blogging E O – SA 14. A blogging website allows a guest user to edit the blog of the blog FALSE
websites. owner. True or False

Understanding Create a blogging E O – SA 15. Read the following statements if you agree tick on ‘yes’ or else i - No
account with a ‘no’. ii- Yes
website or blogger. i. Prakash does not have a gmail account. Can he create his blog
using google blogger without creating an account? (Yes/No)
ii. Ethen is not familiar with HTML syntax. Can she create a blog?

Remembering Create a blog using E O - SA 16. HTML is a: b.Markup Language


HTML tags. i. Programming Language
ii. Markup Language
iii. Madeup Language
iv. Must use Language
Applying Create a website E O - SA 17. Neha wants to create a web page for her school. Which language d. HTML
using Google apps. should she use?
i. Java
ii. SQL
iii. Oracle
iv. HTML

Remembering Create a blog using E O - SA 18. _____ is used to create web pages HTML
HTML tags.

Computer Masti ::::36


Remembering Create a blog using E O - SA 19. Fill in the blanks: iii
HTML tags. HTML stands for ______

i. Hypotextmarkup language
ii. Heterotextmadeup language
iii. Hypertext Markup language
iv. Homotextmadeup language

Remembering Create a blog using E O - SA 20. _____ or _____ on a HTML page helps in formatting/editing the Tags, Elements
HTML tags. text.

(Tags / Hyperlink / elemnets / Compounds)

Remembering Create a blog using D O - SA 21. The opening and closing tags in HTML are: i
HTML tags. i. <>&</> respectively
ii. </>&<>respectively
iii. <>&<-> respectively
iv. <->&<> respectively

Understanding Create a blog using D O - SA 22. How are command texts distinguished from a normal text? iii
HTML tags. i. By making the command text as Bold.
ii. By using different font size for normal text.
iii. By giving a special marking to command texts
iv. Keywords are distinguished automatically by HTML.

Remembering Create a blog using E O - SA 23. Command texts are also called as _____ Tags
HTML tags.
Remembering Create a blog using E O - SA 24. _____ is a system of distinguishing command text from normal iv
HTML tags. text.

i. Markout Language
ii. Markin Language
iii. Markdown Language
iv. Markup Language
Applying Create a blog using E Lab activity 25. Akbar wants to see the HTML code of his school's website.
HTML tags. - Help him in doing the same.
- Write down atleast 5 different tags used.

Computer Masti ::::37


Applying Create a blog using D Lab activity i. Create blog on 'how to create a blog'. Now do the following
HTML tags. changes using the HTML code.
i. Change font size of Title to 16
ii. Change font size of body to 10
iii. Colour of Heading to Red
iv. Colour of body to Black
v. Change the Title to "My First Blog".
vi. Make the title Bold and Italic.

Applying Create a blog using D Lab activity 26. Write the HTML code for the following:
HTML tags. Welcome to my cookery blog
Tody we will discuss how to prepare indian tea!
Follow the following simple steps:
1. Collection of ingredients
Indian tea
Sugar
Milk
Ginger
Pot
Tea strainer
2. Crush ginger and boil water
3. Add sugar and tea
4.Add milk
5. Pour using tea strainer
Enjoy 'Chai'!

Remembering Create a website E O - SA 27. Read the following statements if you agree tick on ‘yes’ or else Yes
using Google apps. ‘no’.
i. Is it possible to create a simple website without coding in
HTML? (Yes/No)
Understanding Create a website E O - SA 28. Tools like Google sites (http://www.sites.google.com) and Wix creating simple websites
using Google apps. (http://www.wix.com) are used for ________________. without coding in HTML

Remembering Create a website D O - SA 29. Pick the odd one out. iii
using Google apps. i. Drupal
ii. Joomla
iii. Wix
iv. Tinyurl

Computer Masti ::::38


Understanding Create a website E S - LA 30. List down the various basic and premium services available in the Free: Creating HTML
using Google apps. tools used for designing websites. webpages, search, templates,
storage space, hosting

Paid : Customized templates,


specific domain names,
Website support and
management
Applying Apply the E O - SA 31. Tejas wants to create a website to share his learnings to his friends iii
guidelines of about the Computer Masti program. Which two things Tejas should
designing a website take care to ensure 'ease of use' of his website.
while planning for
it. i. Look & Colour
ii. Design & Contrast
iii. Look and Feel
iv. Feel and Graphics

Applying Apply the E O - SA 32. Why are the different texts of different sizes in a website? iii
guidelines of
designing a website i. It looks good
while planning for ii. It is a design flaw
it. iii. To communicate importance of topics
iv. None of these

Understanding Apply the D O - SA 33. Which of the following statement is TRUE? i


guidelines of i. Use less (3-4) colours to avoid visual clutter.
designing a website ii. Use more than (3-4) colours to avoid visual clutter.
while planning for iii. Use less (3-4) colours to have visual clutter.
it. iv. Visual clutter cannot be avoided.

Computer Masti ::::39


Applying Apply the E O - SA 34. Jyoti had designed a website for her school. She wants to allow a ii
guidelines of user to navigate between pages easily. For e.g a user can go
designing a website directly to home page from anywhere on the webiste. Which
while planning for feature CANNOT be used by Jyoti for the said purpose.
it. i. Button
ii. Hyperlink
iii. Superlink
iv. Site map
Applying Apply the D Lab-Excerise: 35. Create a website of your family tree (Grand-parents, Parents, you
guidelines of and your siblings).
designing a website - Mention the details of each member on a differnet web-page.
while planning for - A user should be able to navigate from each page to any other
it. page.
- Take care of design guidelines to make sure it is easy to use and
visually appealing.
Applying Apply the E O - SA 36. Write down the correct order for designing a website using google d
guidelines of website creator.
designing a website i. Edit content using the edit icon
while planning for ii. Choose a theme and click create
it. iii. Name your site
iv.. Publish website with a default content which can be edited.
v. Login with google account

a. V-III-II-I-IV
b. V-II-III-I-IV
c. V-II-III-IV-I
d. V-III-II-IV-I
Applying Explain the ticket E Lab activity 37. Go to www.makemytrip.com. Search for the cheapest flight rates
booking available on Delhi-Mumbai and Mumbai-Delhi route. Book tickets
transactions using (go till payment window) for today, 7th day from today and 30th
a website. day from today.
Applying Explain the buying E Lab activity 38. Go to at least 3 different e-commerce websites (Amazon, flipkart,
and selling of e-commerce) and find the "Samsung Galaxy 6" prices. Make sure
products through that the specifications are same on each e-commerce websites.
websites. Which website have the least prices?

Computer Masti ::::40


Remembering Apply the E O - SA 39. Which of the following is NOT a front end technology? iii
guidelines of i. HTML
designing a website ii. Java
while planning for iii. PHP
it. iv. Visual Basic

Remembering Apply the E O - SA 40. Which of the following is NOT a back end technology i
guidelines of i. Flash
designing a website ii. MySQL
while planning for iii. Oracle
it. iv. ASP.NET

Understanding Apply the E O - SA 41. Match the following: d


guidelines of i) Java ii) Oracle iii) HTML iv) WordPress
designing a website
while planning for 1) Blog 2) Front-end 3) Back-end 4) Website
it.
a. i-3, ii-2, iii-4, iv-1
b. i-2, ii-3, iii-1, iv-4
c. i-3, ii-2, iii-1, iv-4
d. i-2, ii-3, iii-4, iv-1

Remembering Explain the term D S - SA 42. RSS stands for ________________. Really Simple Syndication
blogging with or Rich Site Summary (RSS
examples. 0.91)
or RDF Site Summary (RSS 0.9
and 1.0)
or Real-time Simple
Syndication (RSS 2.0)
Understanding Explain the term D S - LA 43. Why and where is RSS used? RSS takes the latest headlines
blogging with from different web sites, and
examples. pushes those headlines down
to your computer for quick
scanning.

Computer Masti ::::41


Applying Create a blog using D S - SA 44. Correct the HTML code to get the below given output. <body>
HTML tag.
Output Required: <h1>Hi <i>There!</i></h1>
Hi There! <p>I am <b>feeling</b> happy
I am feeling happy today. <u>today</u>.</p>

<body> </body>
<h1>Hi There!</h1>
<p>I am feeling happy today.</p>
</body>

Remembering Create a blog using E O – SA 45. State true or false for the below given HTML tags and their effects c
HTML tags. on the web pages.

i. <i> Italic
ii.<b> make the font size big
iii. <ul> unordered list
iv.<ol> hyperlink content

a. TFTT
b. TFFF
c. TFTF
d. FTFT

Remembering Apply the E O - SA 46. Identify the below given front end website designing tool from the ii
guidelines of given logo.
designing a website
while planning for
it.
i. Flash
ii. Java
iii. Visual Basic
iv. Ajax

Computer Masti ::::42


Binary Number System
Level 8 | Lesson 6

Terminal and Enabling Learning Outcomes covered in the Lesson

Themes Terminal Learning Enabling Learning Outcomes Bloom’s Level


Outcomes
Explain what binary number Explain what binary number system is. Understanding
system is.
Identify various units of List the units of binary numbers. Remembering
measurement.
Convert numbers from one number Convert numbers from one number Understanding
Thinking Skills
system to another. system to another.
Identify and differentiate between Identify and differentiate between Understanding
different number systems. different number systems.
Convert words into Binary code. Convert alphabets to binary numbers Applying
and vice-versa.

Computer Masti ::::43


Question Bank Level 8 Lesson 6
Bloom’s Corresponding Difficulty Question Question Solution
Level LO Level Type
(Easy/Diff (Objective
icult) /Subjectiv
e and Long
Answer/S
hort
Answer)
Understanding Explain what is E O - SA 1.Strike out the wrong option. i. Computer stores all data in the form of (Alphabets / Numbers).
binary number i. Computer stores all data in the form of ii. Data to be processed by the computer should be in the form of
system. (Alphabets/Numbers). (binary/decimal)numbers
ii. Data to be processed by the computer should be in the iii. (2/8) bits makes one byte.
form of (binary/decimal)numbers iv. A bit can have (two/eight) values.
iii. (2/8) bits makes one byte.
iv. A bit can have (two/eight) values.

Understanding Identify and E O - SA 2. Match the columns


differentiate Binary 16 Binary 2
between Octal 10 Octal 8
different Hexadecimal 2 Hexadecimal 16
number Decimal 8 Decimal 10
systems.

Remembering List the units of E O - SA 3. Replace the question marks to form a meaningful conversion.
binary
numbers.

Understanding Explain what is E O - SA 4. Fill in the blanks. i. One


binary number i. Each letter of alphabet has a length of _______ byte. ii. Decimal, decimal
system. ii. While converting a letter to binary, we have to convert iii. Codes
each letter to its _______ equivalent and then from iv. 011
________ number to binary number.
iii. Different _______ are used to distinguish between
uppercase and lowercase.

Computer Masti ::::44


iv. If we want to write the letter in lowercase,
the code will be _____.

Understanding Convert 5. Fill in the blanks. i. Base


numbers from E O - SA i. While converting any number system to decimal number ii. Position, zero (0)
one number system, multiply each bit by xn, where n is the ‘weight’ of
system to the bit. So, x is _____.
another. ii. 'Weight' of the bit is the _______ of the bit, starting from
_____ on the right.

Understanding Identify and E O - SA 6. Match the columns


differentiate Binary 0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F Binary 0,1
between Octal 0,1,2,3,4,5,6,7,8,9 Octal 0,1,2,3,4,5,6,7
different Hexadeci 0,1,2,3,4,5,6,7 Hexadecimal 0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F
number mal Decimal 0,1,2,3,4,5,6,7,8,9
systems. Decimal 0,1

Remembering List the units of E O - SA 7. State True or False for the following.
binary i. 1 Gigabyte(GB)= 1024 Megabyte(MB) i. True
numbers. ii. 10 Megabyte(MB)= 1024 Kilobyte(KB) ii. False
iii.1024 Gigabyte(GB)= 1 Terabyte(TB) iv. True

Understanding Explain what is E O - SA 8. State True or False for the following.


binary number i. The computer is storing images .For that it is converting i. False
system. the images into alphabets. ii. True
ii. We want to work with binary number system. So, we
can only use 0 and 1 as the digits.
Understanding Convert 9. State True or False for the following.
numbers from E O - SA i. Dipika wants to convert octal number system to i. True
one number decimal number system, so she multiplies each bit by ii. False
system to 8n, where n is the ‘weight’ of the bit. v. True
another. ii. Priya wants to convert octal number system to binary vi. True
number system, so she converts each octal digit to a 4-
bit equivalent binary representation.
iii. Vaibhav wants to convert hexadecimal number system
to binary number system, so he converts each
hexadecimal digit to a 4-bit equivalent binary
representation.
iv. (39)16 can also be written as(39)h

Remembering List the units of E O - SA 10. Answer in one or two words. i. 1000
binary i. For converting a number Kilobytes to Megabytes, Sonam ii. 1024
numbers. should multiple the number by? iii.1024
ii. Rehan wants to convert 3 TB to Gigabytes so he will have to iv.1 MB folder size
multiply 3 by?
iii. How many times Joseph will have to add 3 KB to get the

Computer Masti ::::45


value converted to bytes
iv. If a folder size on your computer is 1 MB and another folder
size is 100KB, which folder will take longer to copy?
Understanding Explain what is E O - SA 11. Answer in one word.
binary number i. Rahim is toggling the switch on and off, this can be related i. Binary
system. to which number system? ii. Binary
ii. Raksha is using only 0 and 1 in her number system. Which iii. Binary
number system is she working upon?
iii. Daniel wants to store images, text and sound in his
computer. Which number system should he use?
Understanding Explain what is E O - SA 12. Choose correct answer. iii
binary number Rajesh wants to store the message “Hello World” in the
system. computer. Which number system will the computer convert
the message to?
i. Decimal
ii. Octal
iii. Binary
iv. Hexadecimal
Applying Convert E O - SA 13. Convert the following. 1.(12BC)16 = (0001 0010 1011 1100)2
numbers from 1.(12BC)16 = ?2 2.(521)10=(1011)8
one number 2.(521)10=?8 3.(31)8=(19)16
system to 3.(31)8=?16
another.
Applying Convert E O - SA 14. Calculate and fill in the blanks. i. ‘D’ (01000100) and ‘d’ (01100100) have different codes to distinguish between the
alphabets to i. ‘D’ (01000100) and ‘d’ (_______) have different codes to uppercase and lowercase.
binary numbers distinguish between the uppercase and lowercase.
and vice-versa.
Applying Convert E O - SA 15. Answer the following in one word. i. 27
alphabets to i. Each alphabet is one byte long, so how many bytes do you
binary numbers think the following sentence has?
and vice-versa. “Monitor is an output device”

Understanding Convert E O - SA 16. Convert the filled numbers to their corresponding number 1
numbers from systems in the space given in the table. Decimal Binary Octal Hexadecimal
one number Decimal Binary Octal Hexadecimal 170 10101010 252 AA
system to 10101010 342 101010110 526 156
another. 342 97 01100001 141 61
61

Understanding Convert E S - SA 17. Write down the steps for converting (116)16 to octal. i. Convert hexadecimal to binary
numbers from (116)16 =(000100010110)2
one number ii. Convert binary to octal
system to (000100010110)2=(426)8
another.

Understanding Convert E S - SA 18. Write down the steps to convert(104)10 to hexadecimal. 18.Write down the steps to convert(104)10 to hexadecimal

Computer Masti ::::46


numbers from
one number Solution:
system to 1.Divide by 16
another. 16|104
16|006 8
16|000 6

2. Keep track of reminders


=68
Hence (104)10=(68)16
Understanding Convert E O - SA 19. Deepa wants to know the steps to be used right from
numbers from conversion of octal number system to hexadecimal. Arrange i. Convert each octal digit to a 3-bit equivalent binary representation.
one number them in a correct sequence by writing a number in the box ii. Group bits in fours, starting on right.
system to next to it. Write 1 for the first step, 2 for the second step iii. Convert to hexadecimal digits.
another. and 3 for the third step.
Convert to hexadecimal digits.
Group bits in fours, starting on right.
Convert each octal digit to a 3-bit equivalent binary
representation.
Applying Convert E O - SA SOPHIE-01010011 01001111 01010000 01001000 01001001 01000101
alphabets to 20. If A=01000001.Then help Sophie write her name in
binary numbers uppercase in binary number system.
and vice-versa.

Understanding Convert E O - SA 21. Rehan wants to know the steps to be used right from i. Divide by 2, keep track of the remainder.
numbers from conversion of decimal number system to binary. Arrange ii. First remainder is bit 0 (LSB, least significant bit).Second remainder is bit 1.
one number them in a correct sequence by writing a number in the box iii. Continue the process till the quotient becomes zero.
system to next to it. Write 1 for the first step, 2 for the second step iv. Write the reminders from bottom to up in left to right order as shown.
another. and 3 for the third step.
i. Write the reminders from bottom to up in left to right
order as shown.
ii. First remainder is bit 0 (LSB, least significant
bit).Second remainder is bit 1.
iii. Divide by 2, keep track of the remainder.
iv. Continue the process till the quotient becomes zero.

Applying Convert E O - SA 22. Suresh sends a message to his friend in binary form. The “Hello”
alphabets to message reads as “01001000 01100101 01101100 01101100
binary numbers 01101111”. Write down the message that his Friend Rizwan
and vice-versa.
gets to read after decoding the binary code.

Understanding Convert E O - SA 23. Calculate the hexadecimal values that correspond to the
numbers from decimal values from 140 to 150. 140 8C
one number 141 8D
system to

Computer Masti ::::47


another. 142 8E
143 8F
144 90
145 91
146 92
147 93
148 94
149 95
150 96

Remembering List the units of D S - Lab 24. Form a group of 4 students and assign them one computer
binary exercise in lab each. Distribute the task in such a way that one
numbers. student finds out the size of RAM in GB and hard disk and
others convert it into KB,MB and TB respectively.

Applying Convert E O - SA 25. Each alphabet is one byte long. How many bytes do you 25.
alphabets to think the following statement has? “The word binary means 21 bytes
binary numbers two”.
and vice-versa. i. 20 bytes
ii. 19 bytes
iii. 22 bytes
iv. 21 bytes
Understanding Convert D S - Lab 26. Form a team of two student, go to the url:
numbers from exercise http://forums.cisco.com/CertCom/game/binary_game_pag
one number e.htm and play the binary game. Find out which team
system to
finishes the game at the earliest.
another.
Understand Explain what is E S - LA 27. Describe the binary number system. Computers store all data, like information, instructions, files, images, sound and video as
binary number numbers.All the data has to be converted to numbers in binary form to be processed by the
system. computer.
The word binary means two. The binary form code is formed by using only two values ‘0’ and
‘1’.
This is called the binary number system, or the base-2 system. Each digit in a binary number
is called as bit. A sequence of 8 bits is called byte.
Bit -0 1
A bit is the smallest unit of data in computer processing. Bit is derived from the words Binary
digit. A bit represents a digit in the binary system. A bit can only have the value 0 or 1.
An example: 1101 is a binary number and is 4 bits long.
Byte - 1 1 1 0 1 1 1 0
A Byte is a group of 8 bits. Bytes are the standard unit of storage in a computer.
An example: 10110111 is a byte and can represent data like text, pixels or sound in a
computer.
Understanding Identify and E S - LA 28. State and explain the different number systems with Decimal - The decimal numeral system has 10 as its base. It is the most widely used number
differentiate respect to the base and the digits used to represent the system.
between numbers.

Computer Masti ::::48


different Binary - The binary numeral system has 2 as its base. It represents numeric values using two
number symbols - 0 and 1.
systems.
Octal - The octal numeral system has 8 as its base and uses the digits 0 to 7 to represent the
number.

Hexadecimal - The Hexadecimal numeral system has 16 as its base. It uses sixteen distinct
symbols, digits 0–9 to represent values from zero to nine, and A, B, C, D, E, F to represent
values ten to fifteen.
Understanding Explain what is E S – LA 27. Explain the steps in which the computer stores a text file. The computer uses alphabet to binary conversion for the same.
binary number Alphabets to Binary Conversion:
system.
Each letter has a length of 8 bits or 1 byte.
Different codes are used to distinguish between uppercase and lowercase.
For uppercase code will be 010 and for lowercase it will be 011.
Convert each letter to its decimal equivalent i.e. 1 - a , 2 - b, .....26 – Z
Convert decimal number to binary number.
Understanding Explain what is D S - LA 29. Decide and explain which number system should be used in Solution-In most modern computing devices, a bit is usually represented by an electrical
binary number modern computing and electric devices. voltage or current pulse, or by the ON – OFF state of a switch in a circuit. Thus the computer
system. uses the base-2 system i.e binary number system because it makes it a lot easier to
implement programs and data with current electronic technology. Bits can be implemented
in many forms. Here the ON state is denoted by ‘1’ and OFF by ‘0’ in binary number system.
Understanding Identify and E O - SA 28. With the help of a diagram interpret all possible inter-
differentiate conversions in different number systems (octal, decimal, The inter-conversion from one system to another involves 12 possible combinations
between binary, hexadecimal).
different
number
systems.

Applying Convert D S - SA 30. Write a message to your friend and ask him/her to decode
alphabets to it using the given figure.
binary numbers
and vice-versa.

Figure for new question

Computer Masti ::::49


Understanding Identify and E O - SA 31. Fill in the blank boxes.
differentiate
between
different
number
systems.

Understanding Convert E O - SA 32. Help Raju complete the blanks to get a meaningful
numbers from conversion.
one number
system to
another.

Understanding Explain what is E O - SA 33. Fill in the blanks. i. 8, byte


binary number i. Most computers store data in strings of ________ bits
system. called a ________.

Computer Masti ::::50


Understanding Identify and E O - SA 36.Fill in the blanks. hexadecimal
differentiate i. The ________ number system has a base of sixteen.
between
different
number
systems.
Understanding Convert E O - SA 34. State whether True or false. 35. State whether True or false
numbers from i. Hexadecimal 44 is 67 in decimal iii.False-68
one number
system to
another.

Understanding Convert E O - SA 38.Choose the correct option.While converting a number from eight
numbers from decimal to octal we have to keep on dividing the number and
one number then the quotient obtained in each step by ______ till we get
system to zero in quotient.(ten/two/sixteen/eight)
another.
Understanding Explain what is E O - SA 39.Find the odd one out. i. Bit
binary number i. Bit, Byte, Terabyte, Gigabyte ii. 1000
system. ii.0100,0110,0011,1000
Understanding Identify and E O - SA 40.Find the odd one out: Unary
differentiate i. Binary, Unary, Decimal, Hexadecimal
between
different
number
systems.
Understanding Identify and E O - SA 41.Find the error if any and correct it. i. Eight symbols are needed to represent all digits in octal number system.
differentiate ii. 1024 Gigabytes makes one Terabyte
between i. Sixteen symbols are needed to represent all digits in iii. Correct
different octal number system.
number ii. 1000 Gigabytes makes one Terabyte
systems. iii. (91)8 is not possible

Computer Masti ::::51


Understanding Convert E S - SA 42.Explain the steps to convert (426)8 to hexadecimal. i. First convert octal to binary.
numbers from
one number
system to (426)8=(10010110)2
another.
ii. Then convert binary to hexadecimal.

(10010110)2=(96)16

Applying Convert E S - SA 43.Explain the steps to convert “Computer”to binary 43.Explain the steps to convert “Computer”to binary
alphabets to
binary numbers Solution-
and vice-versa.
i. Different codes are used to distinguish between uppercase and lowercase. For uppercase
code will be 010 and for lowercase it will be 011.

So, first three bits of the given letter

C-010,o-011,m-011,p-011,u-011,t-011,e-011,r-011

ii. Convert each letter to its decimal equivalent i.e. 1 - a , 2 - b, .....26 – Z.

C-3,o-15,m-13-,p-16,u-21,t-20,e-5,r-18

iii. Convert decimal number to binary number..

C-01000011

o-01101111

m-01101101

p-01110000

u-01110101

t-01110100

e-01100101

r-01110010

So binary equivalent of the given letter is

Computer Masti ::::52


(01000011 01101111 01101101 01110000 01110101 01110100 011001010111001

Understanding Convert E Lab 44.Form groups of two and convert from binary to decimal and
numbers from exercise decimal to binary using the following link.
one number http://easycalculation.com/binary-converter.php.
system to
another.
Understanding Explain what is E O – SA 45.State whether incorrect or correct. .Correct
binary number ii. Incorrect- (correct:bit)
system. i. Bits are abbreviated by ‘b’ and bytes are abbreviated by ‘B’. iii. Incorrect-(correct:binary form)
ii.Each digit in a binary number is called as byte iv. Incorrect-(correct:binary digit)
iii. All the data has to be converted to numbers in decimal form to
be processed by the computer.
iv. Bit is derived from Base Digit

Understanding Explain what is E O - SA 46.Choose the correct alternative. i. Numers


binary number ii. 00000110
system. i. You transfer an audio file to laptop via Bluetooth. The iii. d
computer stores it in the form of _________

a. Pictures
b. JPEG
c. Numbers
d. Alphabets

ii.Identify 1 byte from the following:

a. 111101010
b. 1010101
c. 00000110
d. 111111111

iii.Which of the following statements is true?


a. A sequence of 9 bits is called a byte
b. A bit can only have the value 0
c. A binary number is formed by the combination of 0 and 0
d. A bit is the smallest unit of data in computer processing

Computer Masti ::::53


Applying Convert D S - SA 47. Write the first names of your five classmates in binary code.
alphabets to
binary numbers
and vice-versa.
Applying Convert D O - SA 48.Answer in one word. i. Computer
alphabets to ii. 25 bytes
binary numbers i. Decode the following binary code. iii. 64 bits
and vice-versa.
01000011 01101111 01101101 01110000 01110101 01110100
01100101 01110010

ii.Each alphabet is one byte long. How many bytes do you think
the following statement has?
“Eight bits makes one byte ”

iii.Each alphabet is 1 byte long. How many bits does the word
“Computer” have?

Computer Masti ::::54


System Configuration and Troubleshooting
Level 8 | Lesson 7

Terminal and Enabling Learning Outcomes covered in the Lesson

Themes Terminal Learning Enabling Learning Outcomes Bloom’s Level


Outcomes
Identify the basic components of a Identify the basic components of a Remembering
desktop. desktop.
Install an application. Install an application. Applying
Distinguish between user and Distinguish between user and system Analysing
system administrator privileges administrator privileges and backup.
and backup.
Decide the user privileges as per the Analysing
Familiarity with requirement.
Computers Explain the importance of maintaining Understanding
backup of files.
Distinguish between the system backup Analysing
and user backup.
Set permissions to share files and Set permissions to share files and Remembering
folders. folders.
Perform basic troubleshooting for Perform basic troubleshooting for Applying
devices and troubleshooting. devices and troubleshooting.

Computer Masti ::::55


Question Bank Level 8 Lesson 7
Bloom’s Corresponding Difficulty Question Type Question Solution
Level LO Level (Objective/Subjectiv
(Easy/Dif e and Long
ficult) Answer/Short
Answer)
Remembering Identify the E O - SA 1. Match the columns.
basic Application launcher Area to save and access files Application launcher Launch commonly used
components of Menu bar Launch commonly used applications
a desktop. applications Menu bar Date and time
Workspace Operating system settings and
power supply settings Workspace Area to save and access files
System Menu Date and time System Menu Operating system settings and
power supply settings

Remembering Identify the E O - SA 2. Find the odd one.. i. Scratch


basic i. Windows XP, Linux, Window 8, Scratch ii. Troubleshoot
components of ii. Icons, System Menu, Workspace, Troubleshooting iii. Plug
a desktop. iii. Files, Plug, Folders, Icons

Applying Install an E S - LA 3. Tejas wants to use VLC media player on his operating system. List
application. down the steps to download and install the application in order to Solutions-
help Tejas. x Download the package for your particular Operating System (OS),
keeping in mind the right version.
x Ensure that the repository is a reliable site before downloading and
installing an application.
x On Window OS install virus protection on your system and scan the
downloaded package before installing it.
x For Ubuntu, download .deb package which is used by Ubuntu Software
Center (USC) to install software.
x Provide the path of the downloaded and extracted files .dir to the
installer.
x Update yourself about the latest developments in the OS that is being
used and details of software that you are using.

Applying Install an E O - SA 4. Rehan is trying to configure his system in such a way that he can
application. find an application as soon as he logs in. He is confused about the
order of steps to be followed. Help him in sequencing the steps. i. Select any application from startup applications in system menu,
click on add.
i. The application is added. ii. Enter name, enter comment and then click on browse
ii. Select application (required), click on add. iii. Select application (required), click on add.

Computer Masti ::::56


iii. Enter name, enter comment and then click on browse. iv. The application is added.
iv. Select any application from startup applications in system
menu, click on add.
Applying Install an 5. Deepa wants to create shortcut of an application on her desktop. i. Click on Dash(Home)
application. E O - SA Help her sequence the steps for the same. ii. Write name of the application.
i. Select icon of the Application iii. Select icon of the Application
ii. Click on Dash(Home) iv. Drag and Drop the icon to Desktop
iii. Drag and Drop the icon to Desktop
iv. Write name of the application.

Analysing Distinguish E O - SA 6. Choose correct answer: 6. Choose correct answer:


between user i. A person who is not a normal user is a _____________. i. A person who is not a normal user is a System administrator.
and system a. System Operator ii. A privilege is a set of permissions to perform some actions on the
administrator b. System administrator computer
privileges. iii.System administrator has all the permissions for performing any
ii. A ________is a set of permissions to perform some actions actions and changes on the computer.
on the computer
a. Actions
b. Privilege
c. Commands

iii. __________has all the permissions for performing any


actions and changes on the computer.
a. System administrator
b. User
c. System Operator

Analysing Distinguish E S - LA 7. Explain the concept of privileges with examples. Solution-


between user A privilegeis a set of permissions to perform some actions on the
and system computer. These are configured by the special user, called the system
administrator administrator, who has all the permissions for performing any actions and
privileges. changes on the computer.

Examples of various privileges include the ability to create a file in a


directory, or to read or delete a file, access and use devices like printer and
scanner.

Analysing Distinguish E O - SA 8. State whether true or false. 8. State whether true or false.
between user i. Users cannot install new applications. Only a system administrator i. True
and system can install the applications. ii. True
administrator ii. If a user deletes some system file inadvertently, then the system iii. True
privileges. may crash.
iii. To keep the system in a consistent and secure state for all the
users, it is always a good idea to work as a user even if you own the
system.

Analysing Distinguish E O - SA 9.Ankit is a normal user. State whether the following actions taken i. Incorrect-Because this application may be required by another user.

Computer Masti ::::57


between user by him are correct/incorrect? Give reasons. ii. Correct
and system i. He does not need an application so he might remove the iii. Correct
administrator application.
privileges. ii. He has the privileges to set configurations of some devices
and applications.
iii. He needs to first have a login and password to access the
compute.
Analysing Distinguish O - SA 10. Ankit is a normal user. State which actions can be done by him i. Cannot be done
between user E andwhich cannot be done? ii. Can be done
and system i. Configuring network settings iii. Can be done
administrator ii. Change ‘screen saver’. iv. Cannot be done
privileges. iii. Change ‘printer settings’. v. Cannot be done
iv. Adding users vi. Can be done
v. Changing OS settings and configurations vii. Cannot be done
vi. Change the ‘appearance’ of the desktop viii. Can be done
vii. Installing OS software
viii. Change resolution of a ‘monitor’.

Remembering Identify the E O - SA 11.Choose the correct alternative.


basic i. Mr. Ram wants to check for the time for his next meeting with the a
components of clients. b
a Where can he refer to the time on the desktop?
desktop.
a. Menu Bar
b. Workspace
c. Home
d. System Menu

ii. Divyang wants to copy a folder on desktop. Where can he copy


the folder?
a. Menu Bar
b. Workspace
c. Home
d. System Menu

Computer Masti ::::58


Remembering Set permissions E O - SA 12. Replace the question mark to obtain a meaningful figure.
to share files
and folders.

Remembering Set permissions E O - SA 13. Match the pairs.


to share files List files only The users can see the items
and folders. List files only Users can access items in the in the folder, but not open
folder, (either read-only or any of them.
read-write), depending on the
permissions of each item.
None No access to the folder is
None The user can create new files possible, for users other
and delete files in the folder, than the owner.
in addition to being able to
access existing files. Access files Users can access items in
the folder, (either read-only
Access files No access to the folder is or read-write), depending on
possible, for users other than the permissions of each
the owner. item.

Create and delete files Create and delete files The user can create new
The users can see the items in files and delete files in the
the folder, but not open any folder, in addition to being
of them. able to access existing files.

Understanding Explain the E O - SA 14. Amruta’s computer had to be formatted due to some virus issues. Solution-She should take a backup of her files by copying the same in an
importance of She is not able to retrieve her presentation file. Suggest her the external device like CD or pendrive in future for preventing the loss of data in
maintaining measure that she can take in order to avoid similar problems in computer due to any reason. She can also create a backup of her files by
backup of files future. copying it on an internet storage server.

Computer Masti ::::59


Analysing Distinguish E O - LA 15. Differentiate between User Level Backup and System Level User Level Backup System Level Backup
between the Backup. A user level backup is usually A system level backup is
system backup done on an external device usually done on external
and user like pen-drive or, Internet hard-disks, or duplicated on
backup. storage server. another server (Also called a
'Mirror site').

User level backup can be system level backup is done


done by users by the system administrator

Reasons for User Level Reasons for System Level


Backup Backup
x The documents and x user information and
content that they directories
create on a x configuration of the
computer. system
x Important emails. x configuration of
applications
x databases

Applying Install an E S - LA 16. Explain the concept of plug and play with an example. The ability of a computer to automatically configure and make a newly
application. connected device available to the user, is called plug and play. For example a
pendrive is connected through USB to the computer. Almost immediately the
user can read content from the pen drive and write to it. After plugging the
device to the computer it almost immediately starts ‘playing’ or using it,
without having to restart the computer.

Applying Install an E O - SA 17. Mr. Parag is downloading an application for the first time, which 17. Mr.Parag is downloading an application for the first time, which of the
application. of the following options would be of the best help to him? following options would be of the best help to him?

i. Buy a book about downloading an application a. Buy a book about downloading an application
ii. Call his office and ask the administrator b. Call his office and ask the administrator
iii. Look into the ‘Help’ option in the application
c. Look into the ‘Help’ option in the application
iv. Ask his friend
d. Ask his friend

Analysing Distinguish E O - SA 18. John is a normal user. He is currently using Windows. He wants to 18. John is a normal user. He is currently using Windows. He wants to add a
between user add a new OS-Linux to his system for a project. Which of the new OS-Linux to his system for a project. Which of the following options
and system following options would be of the best help to him. would be of the best help to him..
administrator
privileges and a. Download and install a. Download and install
backup. b. Send a request to the System Administrator to do the same. b. Send a request to the System Administrator to do the same.
c. Ask a technician c. Ask a technician
d. iv. None of the above d. None of the above
Applying Install an E O - SA 19. Strike out the wrong option. 19.Strike out the wrong option
application. i. (Internet/Storage Repository) is a location from which applications 1. (Internet/Storage Repository)is a storage location from which applications

Computer Masti ::::60


may be retrieved and installed on a computer. may be retrieved and installed on a computer.

Remembering Identify the E O - SA 2.(Privilege/Permission) specify how a file or directory is accessed and the
basic ii.(Privilege/Permission) specifies how a file or directory is accessed actions that can be performed on the file by users on the computer.
components of and the actions that can be performed on the file by users on the
a computer. 3. (Home/Menu bar) is an important icon on desktop which helps us find
desktop. applications and settings.

Remembering Set permissions E O - SA iii. (Home/Menu bar) is an important icon on desktop which helps
to share files us find applications and settings.
and folders.

Applying Perform basic E S - LA 20. Mohak is trying to use the mouse after connecting it to his laptop. 20. Mohak is trying to use the mouse after connecting it to his laptop. But it is
troubleshooting But it is not working. What steps should he take to troubleshoot? not working. What steps should he take to troubleshoot?
for devices and
applications. Solution-

USB mouse

If he is using a USBmouse, disconnect the mouse cable and then reconnect to a


different USB port. If the mouse is connected to aUSB hub, unplug the mouse
cable and the connect it to a USB port on the back of the computer. Check if
the drivers are installed.

PS/2 mouse

If he is using a mouse with a PS/2connection, check the back of the computer


to verify that it is plugged into the PS/2 mouse port and not the PS/2 keyboard.
If the mouse has worked properly in the past (I.E. this is not a new mouse), turn
off the computer, then disconnect and reconnect the mouse. Check if the
drivers are installed.

Wireless mouse

1. Make sure the mouse is receiving power by checking for some


indication of power (usually a light). If your mouse has a power switch, it
is often located on the bottom side.
2. If the mouse does not appear to be on, replace the batteries.
3. Make sure the wireless receiver is within range and is not blocked by
another object.
4. Disconnect the wireless USB adapter and try plugging it into a different
port
5. Check if the drivers are installed.

Applying Perform basic E S - LA 21. Your web browser is not working right. What steps would you Solution-

Computer Masti ::::61


troubleshooting take to troubleshoot? Running a real-time antivirus utility is the best way to stay safe. If your browser
for devices and has already been hijacked, uninstall the browser and use your antivirus
applications. program .Re-install and try using
Applying Perform basic E S - SA 22. Rustam cannot hear the sound while watching a tutorial on Solution-
troubleshooting YouTube. How would you help him? Write down the basic steps Check if all the audio drivers are installed
for devices and that you would take to troubleshoot? Check if the volume is on mute
applications.
Remembering Identify the E O - SA 23.Answer in one word.
basic i. What is the location, where the software gets stored on your PC i. Downloads folder
components of called? ii. GUI
a ii. Through what does Desktop provides the basic components to
desktop. a user.

Remembering Set permissions D Lab exercise


to share files 24. Open any word document on the computer and edit any two
and folders. security options.

Remembering Identify the E Lab exercise 25.Try to change a few settings of your system like brightness,
basic screensaver etc.
components of
a
desktop.
Applying Install an D Lab exercise 27. Download a software for an educational game from
application. sourceforge.net. Install the same and use it.

Understanding Explain the E Lab exercise 28. Create a presentation for binary numbers and backup the same
importance of by uploading a copy of the same on Google Drive.
maintaining
backup of files

Remembering Identify the E S - SA


basic 29. Chandan has to leave the computer briefly. He does not want to Solution-He can lock the screen for some time and later on can unlock when he
components of logout. What should he do? wishes to resume his work.
a
desktop.
Remembering Identify the E S - LA 30.List down the steps to lock a screen in Ubuntu and in Windows.
basic
components of
a Solution-
desktop. For Ubuntu:
i. Click on System Menu --> lock. screen.
ii. The screen is locked. To unlock enter password --> Click on Unlock.

For Windows

Computer Masti ::::62


1. Click the profile picture.
2. Select lock.
3. You can also lock the screen using the shortcut: Windows key + L.
Applying Perform basic D S - SA 31. John mistakenly switched on the sticky keys. Write down the Solution-Press shift key again for five times to switch off the sticky keys .
troubleshooting basic steps that you would take to troubleshoot?
for devices and
applications.

Applying Install an E O - SA 32. Ankita wants the Tux Paint application installed on her desktop on 32. Ankita wants the Tux Paint application on desktop. Guide her with the
application. Windows OS. Guide her with the steps. steps.

Solution-
1. Right click the Tux Paint icon.
2. Select the option 'Create Shortcut'.

Remembering Identify the E O - SA


basic 33.Replace the question marks and find the missing component in the
components of following picture:
a
desktop.

Remembering Identify the E O - SA 34.Rakhi got stuck while adding an application. Guide her by
basic replacing question marks and find the missing component in the
components of following picture:
a
desktop.

Computer Masti ::::63


Remembering Identify the E O - SA 35.Fill in the blanks: 35.Fill in the blanks
basic i.In Windows you can also lock the screen using the shortcut: i.In Windows you can also lock the screen using the shortcut: Windows key + L.
components of _______ ii. In Ubuntu, the ‘Basic’ tab gives many details of the file, like type of file, size
a ii.In Ubuntu, the ________ tab gives many details of the file, like of file in bytes, the directory in which it is located, and when it was accessed
desktop. type of file, size of file in bytes, the directory in which it is located, and modified.
and when it was accessed and modified.

Applying Install an E S - SA 36.Explain a few actions that can be performed on a file. 36.Explain a few actions on file
application. Solution-
Actions on the file:
Execute: Allow the file to be run as a program. Example: Application file like
Open Office, games.
Open with: Choose an application with which the file can be opened.
Applying Perform basic E O - SA 37.Complete the passage for Troubleshooting using Stepwise Thinking 37.Complete the passage for Troubleshooting using Stepwise Thinking
troubleshooting
for devices and First write the _______ or ___ that you wish to resolve. Then write the First write the problem or issue that you wish to resolve. Then write the steps
applications. _______ that you need to take. This will help you to remember the that you need to take. This will help you to remember the actions that you will
actions that you will be taking, avoid repetition of the same steps and be taking, avoid repetition of the same steps and to better understand the
to better understand the problem and its possible solution problem and its possible solution
Applying Perform basic E O - SA 38. Shantanu is facing issues in working of a device. He is using the 38. Shantanu is facing issues in working of a device .He using following
troubleshooting following techniques to troubleshoot. Say which one is correct? techniques to troubleshoot. Say which one is correct?
for devices and
applications. 1.Correct
i. Check configuration and settings (whichever is relevant to that
particular device). 2.Incorrect

ii. Checking for loose connections is not required.

Applying Perform basic E O - SA 39.Complete the passage for Troubleshooting using Information n
troubleshooting Gathering Remember to gather any information such as screenshots of error messages,
for devices and the screen going blank, software freezing or any peripheral devices beeping.
Remember to _________such as screenshots of error messages, the
applications. You can make use of this information to properly convey the problem to a
screen going blank, software freezing or any peripheral devices beeping.
system administrator in case you need help.
You can make use of this information to properly convey the problem to
a __________ in case you need help.
Applying Perform basic E O - SA 40. Complete the passage for Troubleshooting using Logical Thinking
troubleshooting Once you have listed the steps and gathered the necessary information you can
for devices and Once you have listed the____ and gathered the necessary information begin to resolve the issue. Begin with simple solutions such as checking the
applications. you can begin to resolve the issue. Begin with ____ such as checking connections, restarting the computer or closing and re-launching an
the connections, restarting the computer or closing and re-launching application. Use the technique of elimination by testing each step and checking
an application. Use the technique of _________ by testing each step to see if it gives the desired result. This will help you to narrow down to the
and checking to see if it gives the desired result. This will help you to possible source.
______to the possible source.

Computer Masti ::::64


Applying Perform basic E O - SA 41.Sequence the measures that you can use while system startup
troubleshooting i. Check that the power cable is connected and the power switch is on.
for devices and i. Check that the computer is switched on. ii. Check that the computer is switched on.
applications. ii. If there are any error messages on the screen report to the iii. If there are any error messages on the screen report to the system
system administrator. administrator.
iii. Check that the power cable is connected and the power switch
is on.

Applying Perform basic E O - SA 42. Sequence the measures that you can use while troubleshooting
troubleshooting network connectivity issues. i. For wired network, check if the network cable is connected and the
for devices and indicator LED is blinking. And for wireless network, check if the wireless is
applications. i. Inform the system administrator if there are any network error ON. Also check if the wireless switch in the vicinity is working.
messages. ii. Check if network has been enabled.
ii. For wired network, check if the network cable is connected and iii. Inform the system administrator if there are any network error
the indicator LED is blinking. And for wireless network, check if messages.
the wireless is ON. Also check if the wireless switch in the
vicinity is working.
iii. Check if network has been enabled.

Applying Perform basic E O - SA 43. Shantanu is facing issues in working of an application .He using i. 1.Correct
troubleshooting following techniques to troubleshoot. Say which one is correct? ii. 2.Correct
for devices and iii. 3.Incorrect
applications. i. Check if the application is installed on the computer.
ii. Check if the user has permission to use the software.
iii.Ask the administrator to change permissions if required is not a
good option

Applying Perform basic E S - LA 44. Juhi is facing a problem with Libre Office as it is working very
troubleshooting slowly. Help Juhi with the best steps to troubleshoot her problem. 1. Close and re-launch the application.
for devices and 2: Update the application to the latest version. You may need to use a CD or
applications. connect to the Internet to check for any updates.
3: If the application freezes, use the task manager to close the application and
then launch it again.
4. Restart the computer
5. Scan the computer using an anti-virus software. A malware may be slowing
things down.
6. Check available disk space. If your hard drive is out of space you will need to
delete any files or programs that you don’t need.

Computer Masti ::::65


Applying Perform basic E S - LA 45.Rohan is facing problems in installation and usage of an
troubleshooting application even after taking help from the system administrator. Solution-
for devices and Help him by explaining about the User Forums. User forums are websites where users can post a message or comment on a
applications. message that is already posted. Sometimes users may have to register to post
and comment on the forum.
In some of the forums like Wikipedia, the posted message or comment, might
need to be approved by a moderator before it becomes visible to all.
User forums of both hardware and software usually have tutorials, beginner’s
guides, discussions of problems, troubleshooting tips and solutions. Here you
can find a lot of information about installation, configuration and
troubleshooting. You can post your problem and often some user will post a
solution.

Applying Perform basic E O - SA 46.View the screenshot and identify what is displayed? User Forum
troubleshooting
for devices and
applications.

Applying Perform basic D O - SA 47.Sequence the three screenshots by replacing the question mark to
troubleshooting form a meaningful order of ending a process.
for devices and
applications.

Computer Masti ::::66


Understanding Explain the E O - SA 48.Identify what is given in the screenshot. Solution-
importance of
maintaining It shows the system resources. It shows details of CPU, Memory and Network
backup of files. usage

Understanding Explain the E O - SA 49. Give examples of the backup options possible. Solution-
importance of
maintaining 1,Copy the files in an external device like pendrive or CD.
backup of files.
2.Upload the files on an internet storage server(maybe Google Drive)

Computer Masti ::::67


Applying Perform basic E S - SA 50.Rizwan downloaded a file with .xps extension.He gave that file to
troubleshooting his friend in a pendrive. His friend doesn’t have XPS viewer. How
for devices and can he view that file without installing xps viewer? Solution-
applications.
He can convert his file with .xps extension to .pdf or .doc on online converters
or on any pdf converter software.Then he can view the pdf file in Adobe reader
or doc file in word/wordpad or gedit.

Computer Masti ::::68


BASIC Programming
Level 8 | Lesson 8

Terminal and Enabling Learning Outcomes covered in the Lesson

Themes Terminal Learning Enabling Learning Outcomes Bloom’s Level


Outcomes
Write a program to control the Write a program to so something while Applying
repetition of a sequence of the condition remains true.
instructions with a condition.
Define subroutines and use them in Define subroutines and use them in the Applying
Programming
the program. program.
Explain the importance of subroutines Understanding
while writing programs.
Use string functions. Write a program using string function. Applying

Computer Masti ::::69


Question Bank Level 8 Lesson 8
Bloom’s Corresponding Difficulty Level Question Type Question Solution
Level LO (Easy/Difficult) (Objective/Su
bjective and
Long Answer/
Short Answer)
Applying Write a program E O - SA 1. Fill in the blanks 3. Fill in the blanks
to control the i. Repetitive statements such as ‘for’ and ‘while’ are called ______
repetition of a ii. The _____ statement is used in BASIC 256 to read a statement i. Repetitive statements such as ‘for’ and ‘while’ are called
sequence of aloud. Loops.
instructions with
ii. The say statement is used in BASIC 256 to read a statement
a condition.
aloud.
2. State True or False
i. “For loop” is used when we know the number of times the loop is
to be repeated. State True or False
ii. The statements in the “do while” loop will be repeated once or
more times i. For loop is used when we know the number of times the loop
iii. The speak statement is used in BASIC 256 to read an expression is to be repeated. True
aloud ii. The statements in the do while loop will be repeated once or
more times. False
iii. The speak statement is used in BASIC 256 to read an
expression aloud. False

Computer Masti ::::70


Applying Write a program D O - SA 3. Complete the below program.
to control the Generate a Fibonacci series upto a given number
repetition of a Generate a Fibonacci series upto a given number
sequence of input “Enter a number”, num
instructions with
input “Enter a number”, num print “Fibonacci series upto”+num
a condition.
print “Fibonacci series upto”+num print
print a=0
a=0 b=1
b=1 while b<num
while _____ print b+“;”
print b+“;” c=a+b
c=___ a=b
a=b b=c
b=c end while
end while

4. The output of a certain program is given. Write the program using for The output of a certain program is given. Write the program using
statementOutput – for statement
10 Output –
9 10
8 9
7 8
6 7
5 6
4 5
3 4
2 3
1 2
0 1
0

Solution –
for i = 10 to 0 step -1
print i
next i

Applying Write a program E S - LA 5. Answer the below questions. Write the syntax for ‘if’ statement
to control the Answer – The syntax for ‘if’ statement is
repetition of a i. Write the syntax for ‘if’ statement if condition then
sequence of ii. Write the syntax for ‘for’ statement statement(s) to execute when true
instructions with end if
iii. Write the syntax for ‘while’ statement
a condition.
iv. How does a ‘for’ statement works?
Write the syntax for ‘for’ statement

Computer Masti ::::71


Answer - The syntax for ‘for’ statement is
for var = exp1 to exp2 step exp3 statement(s)
next var

Write the syntax for ‘while’ statement


Answer – The syntax for ‘while’ statement is
while condition
statement(s)
end while

How does a ‘for’ statement works?


Answer- For statement executes a specified block of codes
specified number of times and keeps track of the value of variable.

Applying Write a program D O - SA 6. Write a program in BASIC 256 to find the squares of numbers less than Write a program in BASIC 256 to find the squares of numbers less
to control the 1000. than 1000
repetition of a Answer –
sequence of #square of numbers less than 1000
instructions with
n=1
a condition.
while n<1000
print n*n
pause 0.5
n = n+1
endwhile

Applying Write a program D O - LA 7. Write algorithm to generate a Fibonacci series. Write algorithm to generate a Fibonacci series
to control the Answer –
repetition of a #Generate a Fibonacci series upto a given number
sequence of input “Enter a number”,num
instructions with
print “Fibonacci series upto” +num
a condition.
print
a=0
b=1
while b<num
print b+“;”
c=a+b
a=b
b=c
end while

Understanding Explain the E O - SA 8. Fill in the blanks. Fill in the blanks


importance of i. ________ help in understanding the flow of the program and i. Comment statements (Rem and #) help in understanding the
subroutines debugging the program. flow of the program and debugging the program.

Computer Masti ::::72


while writing ii. _____ is used to covert text to speech. ii. Say is used to covert text to speech.
programs. iii. A _______ is used to repeat a block of code at different places in a iii. A Subroutine is used to repeat a block of code at different
program. places in a program.
iv. When a subroutine is called, the program ________of the program, iv. When a subroutine is called, the program execution/control
moves into the subroutine flow of the program, moves into the subroutine
v. A subroutine has a _____ followed by sequence of statements and v. A subroutine has a label followed by sequence of statements
ends with a _______ and ends with a return statement
vi. When a call is made to the subroutine using a _____ statement, the vi. When a call is made to the subroutine using a gosub
program control is transferred to the subroutine. statement, the program control is transferred to the
vii. The _______ statement of the subroutine sends the control back to subroutine.
where the ______ was called from. vii. The return statement of the subroutine sends the control
back to where the subroutine was called from.
9. State True or False.

i. A Subroutine is used to repeat a block of code at different places in a


program. State True or False
ii. When a call is made to the subroutine using return statement, the
program control is transferred to the subroutine. i. A Subroutine is used to repeat a block of code at different
iii. The return statement of the subroutine sends the control back to places in a program. True
where the subroutine was called from. ii. When a call is made to the subroutine using return
statement, the program control is transferred to the
subroutine. False
iii. The return statement of the subroutine sends the control
back to where the subroutine was called from. True

Understanding Explain the E S - LA 10. Answer the below questions. Define subroutine
importance of Answer - A Subroutine is used to repeat a block of code at different
subroutines i. Define a subroutine places in a program.
while writing ii. List down the advantages of using subroutines
programs. List down the advantages of using subroutines
Answer -
Advantages of using a subroutine:
x Multiple calls to a block of code are possible, at different
times in the program.
x They reduce the chances of typing errors when the same
code has to be used in multiple places in the program.
x A program is easy to read, since the main steps can be easily
followed.
x Programs are easier to design, since the main steps are
written. The subroutines contain the details of these steps.
x When more than one programmer works on a program, each
programmer can choose a subroutine to write independently
and also test it. Then the subroutines can be called in the
desired sequence.

Computer Masti ::::73


Applying Define D O - LA 11. Write down Syntax to define and call subroutines.
subroutines and Write down Syntax to define and call subroutines
use them in the Answer -
program. Syntax (to define a subroutine)
label:
statement(s)
return
Syntax (to call a subroutine)
gosub label

Write a program for a simple calculator


12. Write a program for a simple calculator.
Answer -
#rem A simple calculator sss
print "Enter your choice of mathematical operation"
print "1- Additon"
print "2- Subtraction"
print "3- Multiplication"
print "4- Division"
input "Choice>" , choice
input "Enter number1>" , num1
input "Enter number2>" , num2
if choice=1 then gosub addition
if choice=2 then gosub subtract
if choice=3 then gosub mult
if choice=4 then gosub division
end
addition:
result = num1 + num2
print num1 +"+"+ num2+ "="+ result
return

subtract
result = num1 - num2
print num1 +"-"+ num2+ "="+ result
return

mult
result = num1 * num2
print num1 +"*"+ num2+ "="+ result
return

division
result = num1 / num2
print num1 +"/"+ num2+ "="+ result
return

Computer Masti ::::74


Applying Write a program E O - SA 13. Write the functions of the following string functions. Write the functions of the following string functions
using string i. length Answer -
function. ii. right 1) length
iii. left Returns the length of a string.
iv. mid 2) right
v. upper Returns a string of length characters starting from the left.
vi. lower 3) left
Returns a string of length characters starting from the right.
14. Write the syntax of the following string functions. 4) mid
i. length Returns a string of length characters starting from the middle
ii. right of a string.
iii. left 5) upper
iv. mid Returns an upper case string.
v. upper 6) lower
vi. lower Returns a lower case string.

Write the syntax of the following string functions


15. Write the operations for the following. Answer –
i. < 1) length (string)
ii. <= 2) left (string, length)
iii. > 3) right (string, length)
iv. <> 4) mid (string,length, length)
v. >= 5) upper (string)
vi. = 6) lower (string)

Write the operations for the following

Operators Operations
< Less than
expression1<expression2
Return true if expression1 is
less than expression2, else
return false.
<= Less Than or Equal
expression1 <= expression2
Return true if expression1 is
less than or equal to
expression2, else return false.
> Greater Than
expression1 > expression2
Return true if expression1 is

Computer Masti ::::75


greater than expression2, else
return false.
<> Not Equal
Expression1 <> expression2
Return true if expression1 is
not equal to expression2, else
return false.
>= Greater Than or Equal
expression1 >= expression2
Return true if expression1 is
greater than or equal to
expression2, else return false.
= Equal
expression1 = expression2
Return true if expression1 is
equal to expression2, else
return
false.

Computer Masti ::::76


Applying Write a program D S - LA 16. You and your best friend are of different age. Draw a flowchart to
using string compare your ages.
function.

Computer Masti ::::77


Applying Write a program D O - LA 17. To complete the following program to find numbers whose cube is less b
to control the than 1000 which of the following options would be the correct one?
repetition of a
sequence of N=1
instructions with
cube_of_N = N*N*N
a condition.
While cube_of_N< 1000
if _________ then
Print N
N=N+1
cube_of_N = N*N*N
end if
End while

a. N < 1000
b. N < N + 1
c. N > 1
d. N > 1000

Computer Masti ::::78


Applying Write a program E O - LA 18.Select the correct option. 18.
using string
function. i. In the below program, what would be the output? i. d
ii. c
# left,mid,right,upper,lower
a$=Triangle
print right (a$,3)

a. Tri
b. angle
c. ang
d. gle

ii. What is the output of the below program?

# print length of string


print length (Hello! How are you, today?)

a. 22
b. 25
c. 26
d. 28

Computer Masti ::::79


Introduction to Database and DBMS
Level 8 | Lesson 9

Terminal and Enabling Learning Outcomes covered in the Lesson

Themes Terminal Learning Enabling Learning Outcomes Bloom’s Level


Outcomes
Define the term commonly used in Define database. Understanding
database management system/
Define database, data base
management system and query.
Define data base management system. Understanding
Define query. Understanding
Application
Create and use database system. Create a database system. Applying
Design a database table. Applying
Identify the steps to create a database. Remembering
Use a database system. Applying
Query database for information. Query database for information. Applying
Create Forms and Reports. Create Forms and Reports. Applying

Computer Masti ::::80


Question Bank Level 8 Lesson 9
Bloom’s Level Corresponding LO Difficulty Level Question Type Question Solution
(Easy/Difficult) (Objective/Subjective
and Long
Answer/Short Answer)
Understanding Define database. E O - SA 1. A _________ is a collection of data that is Database
organized for easy access, retrieval and
management of its contents.
Understanding Define database. E O - SA 2. Select the correct option.
i. A database has ________ related tables of Qi. Option c: One or more
data. Qii. Option d: All of the above
i. Zero
ii. One
iii. One or more
iv. Only two
ii. Data can be of in which format?
a. text and numeric
b. images
c. audio and video
d. All of the above

Understanding Define database. E S - SA 3. What does control mean in a database? Control means to restrict the users to access and modify the
tables or data in the database

Understanding Define data base E O - SA 4. _____________ is a software package that DBMS


management system. provides software programs to control the
creation, maintenance and use of a database.
Understanding Define data base E S - SA 5. List types of DBMS packages. Oracle, Microsoft Access, MySQL, PostgreSQL,
management system. LibreOffice database

Understanding Define data base E O - SA 6. Select the correct option. Qi. Option c:Microsoft Access
management system. i. Identify the DBMS Package.
a. Microsoft Word
b. Microsoft Powerpoint
c. Microsoft Access
d. Microsoft Excel
Understanding Define data base E S - SA 7. What is a primary key ? The unique column which uniquely identifies a record is called
management system. the primary key

Computer Masti ::::81


Applying Create Forms and D O - SA 8. State whether the following statements are true Qi. False
Reports. or false.
i. In LibreOffice Base, you can create a report
manually using drag-and-drop in the Report
Wizard.
Applying Create Forms and D O - SA 9. A ________ is a Writer text document that can ii
Reports. show your data in an organized manner.
i. MS Word
ii. Report
iii. MS Excel
iv. MS Access
Applying Create Forms and D Lab Activity 10. Create a form for students to enter their details .
Reports. The fields needs to be filled are:
Name :
Grade :
Roll No :
Age :
Gender :
Email ID :
Address :
Applying Create Forms and D Lab Activity 11. Create a report using report wizard to show
Reports. students's details in Grade VIII.
I. Table Name: Student_details
Student_i Name Place
d

801 Abdul Mumbai


802 Rohit Mumbai
803 Sweta Mumbai
804 Jyoti Mumbai
805 Tejas Pune
806 Kyle Nasik

II. Table Name: Student_Score


Studen Maths Science English
t_id

801 56 79 74
802 77 66 86
803 72 75 62
804 83 85 91

Computer Masti ::::82


805 79 82 87
806 65 61 69

Applying Query database for E Lab Question 12. For the queries given below, write the names i. Table : Student_details
information. of tables that will be used for the query(refer Condition : Place LIKE 'Mumbai'
to the tables of previous question), the Result: Abdul, rohit, shweta, jyoti only from mumbai
condition and the result that will be displayed ii. Table : Student_details , Student_Score
for the query: Condition : Science > 80
Result: Only Jyoti and tejas have got above 80 in
i. Students Name from Mumbai science
ii. Students Name who scored more than 80 in iii. Table : Student_details , Student_Score
Science Condition : Science > 75 and Maths > 75
iii. Students Name who scored more than 75 in Result: Only Jyoti and tejas have got above 75 in both
Science and Maths math and science
iv. Students Name who scored more than 80 in iv. Table : Student_details , Student_Score
Science,Maths and English Condition : Science > 80 and Maths > 80 and English
v. Students Name from Pune who scored more > 80
than 80 in Science or Maths or English Result: Jyoti
v. Table : Student_details , Student_Score
Condition : Place LIKE 'Pune' and Science > 80 or Maths
> 80 or English > 80
Result for the query will be tejas, he only is the student
from pune, not rohit.
Understanding Define query. E O – SA 13. A _______ is a special view of a table Query
corresponding to some desired information to be
extracted.
Understanding Define query. E O – SA 14. A ____________ helps in extracting correct Primary key
information from a table.
Understanding Define query. E O – SA 15. State whether the following statements are true i. FALSE
or false.
i. A query applied on multiple tables may or may
not contain a common data field.
Remembering Identify the steps to E O - SA 16. State whether the following statements are true i. FALSE
create a database. or false.
i. Assigning aliases to the fields names is required
while extracting information from the tables
Remembering Identify the steps to E O - SA 17. Select the correct sequence of steps to be iii
create a database. followed while creating a database:
i. Register a database -> Select Create a new
database -> Name the database
ii. Select Create a new database -> Name a
database -> Register a database

Computer Masti ::::83


iii. Select Create a new database - > Register a
database -> Name a database
iv. Name a database -> Register a database ->
Select Create a new database
Remembering Identify the steps to E O - SA 18. In TOOLS tab, ________option is selected to Relationship
create a database. create a relation between two tables
Applying Create a database D O - SA 19. Match the following data types with the Name - VARCHAR
system. corresponding fields: DOB – DATE
Field Data type Weight – DECIMAL
Age - NUMBER
I. Name i. Decimal
II. Date of birth ii. Number
III. Weight iii. Date
IV. Age iv. Varchar
Understanding Define data base E O - SA 20. Select the odd one out. Column
management system. i. Float, Double, Column, Date
Understanding Use a database D O - SA 21. Ajay and Ritu are using a database system. They i. Correct
system. need to enter their marks corresponding to their ii. Incorrect
roll numbers. State whether the following iii. Correct
statements are correct or incorrect: iv. Incorrect
i. A primary key uniquely identifies a record.
ii. A primary key should not be specified to edit
the table contents
iii. Primary key is defined in the design phase of
creating a table.
iv. A primary key can contain duplicate values.
Applying Design a database D O - SA 22. Data can be entered which of the following ways: iv
table. i. Using a form
ii. Using a spreadsheet
iii. Using another database
iv. All of the above
Understanding Query database for D O - SA 23. Which of the following option is required to iii
information. create a query in the database to extract
student’s details (Roll Number, Name, Gender,
and Age)?
i. Create Query in SQL view
ii. Create Query in Design View
iii. Use Wizard to Create Query
iv. None of the above
Applying Create a database D O - SA 24. Identify the missing step in the creation of a table Select a primary key
system. Create table using design view -> Define field

Computer Masti ::::84


names with datatype -> Description of each field ->
Field properties -> Name to the table and save

Applying Design a database D O - SA 25. In a school, there are 35 students that includes 20 Delete Cascade
table. boys and 15 girls. Out of the 15 girls, two girls
have left the school and their records need to be
deleted from the master table School_data and
Girls_Data
Which option can be used in order to deleted
records from the both tables?
Applying Design a database D O - SA 26. Tejas is studying in Vidhyaniketan School in Update Cascade
table. Mumbai. Her father has been transferred to a
different location in Mumbai. She wants her
address to updated in the school database tables.
Which option can used for it?
Applying Design a database D O - SA 27. What option can Megha use during creation of a Alias
table. query to give user friendly names to field names
like ‘Date of Birth’ for DOB column?

Applying Design a database D Lab Activity 28. Using a DBMS, design a database table for books
table. you are studying in class. Below mentioned
details are required.
(Book_Title , Author Name , Publisher)
Applying Design a database D Lab Activity 29. Using a DBMS, design a database table for
table. students studying in your class. Below mentioned
details are required.
(Roll number , Name , Age, Gender, Address)
Applying Design a database D Lab Activity 30. Create a primary key for the following table.
table. Table Name : Book_Details
Columns : Title ,Book_ID, Descriptions, Author,
Publisher
Applying Design a database D Lab Activity 31. Create two tables in Microsoft Access. Enter
table. details of 10 students and their marks in each
subject.
Table1: Students_details( Student_Id , Name ,
Age, Gender)
Table2: Annual_exam ( Student_Id ,
Maths,Science,English)

Applying Design a database D Lab Activity 32. Create a relationship between two tables. Table1:
table. Students_details( Student_Id , Name , Age,
Gender)

Computer Masti ::::85


Table2 : Annual_exam ( Student_Id ,
Maths,Science,English)
Applying Query database for D Lab Activity 33. A) Find out the students’ details who scored more
information. than 80 in Maths exam.
B) Find out the students’ details who scored more
than 80 in Science exam.
C) Find out the students’ details who scored more
than 80 in English exam.
Applying Design a database D Lab Activity 34. Modify the table Annual_exam ( Student_Id,
table. Maths, Science, English)
i. Add new column ‘Second Language’.
ii. Enter second language details of each student
Applying Query database for D Lab Activity 35. A) Find out the students whose second language is
information. ‘Marathi’.
B) Find out the students whose second language is
‘Hindi’.

Computer Masti ::::86

You might also like