Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
95 views
138 pages
Class 8 Book
jdfhuesihreiuhridfiuuyfiehfe8u
Uploaded by
Waniya Noman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save Class 8 Book For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
95 views
138 pages
Class 8 Book
jdfhuesihreiuhridfiuuyfiehfe8u
Uploaded by
Waniya Noman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save Class 8 Book For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 138
Search
Fullscreen
_ ie °: Brag re Digital Citizen Cece Pore en feta ady Second Edition ICTECH Computing x Dra at EdTech Department ) 2D 7 AAcknowledgements Project Lead General Manager Education Technology Project Team EDTECH Department & Regional Computing Curriculum Leaders Group Head Office: 31 - Industrial Area, Guru Mangat Road, Gulberg Ill, Lahore, Pakistan. Ph: +92 (42) 111 444 123 Fax: +92 (42) 35773065 Website: www.thecityschooledu.pk The entire computing curriculum is mapped with the attainment levels of the UK National Curriculum, ICDL and ISTE Student Standards 2017-2018. BB en © | C D L ISTE for Education The City School All rights reserved. No part of this publication may be reproduced or transmitted in any part by any means at any time.Table of Contents Internet Search Techniques & e-Safety.. u 12, 15 uw 15 16 . 18 19 v0. im 12 Adi 21 22. 23, 24. 25. 26, 27. 28. 29. 210, am, 212, 218, 214, 25, 216, 2a. 218, ‘What Is a Seorch Engine?... How do Search Engines Work? wu Internet Searching Strategies, Ethical Citation. Digital Citizenship. Digital Resilience Cyber Bullying. Fake News... Pop-up Blocking, Live Streaming. Password Protection, Privacy Protection Introduction ‘What are Raster Graphies?. Adobe Photoshop Interface. Understanding Leyers in Phatashop.. Selection Tools in Photoshop. Resolution, Calor Mode and Color Adjustment. Resizing Image, Enlarging, and Compressing... Image Adjustments ond Enhancements... Gradient Fil. Border, Shodow, Bevel and Emboss.. Scale ond Rotate. Layer Opacity and Blending Layer Blending. Hue ond Saturation... Perspective crop tool Retouch Tools. Saving Images for Print Media... Saving Images for Web. nT enn Fy 26 a)Table of Contents Handling Databases with Research... BA What is @ Datab0$€? ven -nnesnnn 3.2. Introduction to MS Access. 33. Datatypes in MS ACCESS nes 34, Understanding Tables in MS Access. 35. Creating Relationships Between Tables.. 36. Constraints in Database vein 37. Creating Relationships in MS Access... 38. Simple and Complex Queries in MS Access. 39. Forms and Reports in MS ACCESS w-n0m 310. Import and Export Data in MS Access. 3.1 Microsoft Forms. Developing Application: 41, What is User Interface Design. 42. Characteristics of Good User Interface. 43. Bad User Interfaces 44, Getting Started with Visual Studio. 45. Basle GUI Controls in Visual Basic. 46. Varlables. 47. Date Types 48. Conditional Statements -ves-enn 49. Conditional Operators, 410, Looping Statements ..0-—e—ene— 4M. Event Handling... 412. Functions and Subroutines. enn ANB, MOdUIES snennnnnnnnns 414, Program Debugging and Error Handling. 8S 87 88Table of Contents Programming Robots & Single Board Computers... 5A 52 53 54 55 56 57. 58 59 510 sn 52 505, 5M Appendix... Glossary. Single-Board ComPUtETS me—mnennn Introduction to Raspberry Plime Raspberry PI Architecture. Python Basics... Variables in Python oe nen UST in Python, Conditional Statements in Python n= Conditional and Logical Operators. Looping Statement In Python nen Python FURCHIONS eee wenn Getting Started with Python and Raspberry Pi. Interfacing with SONAR SensoF 2. Interfacing with Servo Motor xen Building Smart Robotic Cor. 10 m m 2 m6 m6What is ICTECH Computing? The ICTech (Innovation in Curriculum through Technology) Curriculum is based on the best practices in learning and teaching with technology to improve higher order thinking skills of students to prepare them for their future in a competitive global Job market. In this curriculum, technology is used as a tool to integrate 21st century competencies and expertise such as communication, leadership, critical thinking, complex problem solving and collaboration in different subjects. Structure of the Book + Internet Search Techniques and e-Safety: techniques to surf internet and staying safe in online world + Advanced imaging: working with photo editing and manipulation and creating graphics for digital and print media + Handling Database with Research: working with data using database software + Developing Applications: designing and building desktop applications + Programming Robots and Single-Board Computers: using python programming to program robots. Book Features Student Learning Outcomes These appear at the start of each chapter and define the skills students will be equipped with after completing the lesson. ISTE Student Standard Coverage These represent the ISTE student standards covered in each chapter. A complete description of ISTE student standard can be found here. Chapter Opener These appear at the start of every chapter and are designed to grasp learners attention related to the topic. Chapter openers consist of useful bits of information related to the topic.Checkpoint Checkpoints are learning bits that appear within the chapter at different stages to reinforce the important learning concepts. Food for Neurons Food for neurons consist of fun facts or trending news about the topic. These appear within each chapter. Let's Review Each chapter ends with the key learning points that provide a complete overview of the chapter. Chapter Highlights Key terms appearing throughout the chapter are highlighted to draw learner’s attention. My Notes My Notes section appears at the end of the chapter: Here learners can write important learning points or reflect on their learning Glossary Contains the important terminology covered in the book.- a Stay Online...Stay Safe Stay safe... Do not give out your personal information Do not meet anyone who you have only become friends online with Do not accept messages and friend requests from people who are strangers Check the authenticity of any news or person from reliable sources Tell your parents or teachers if someone or something makes you uncomfortableAfter going through this chapter, students will be able to: Understand what search engines are Identify how search engines work and gather information Use keywords to specify search Use boolean and arithmetic operators to search a 2. 3 4 5. Extract information from different websites to create a report 6. Understand the ethical purpose of citing sources 7. Understand how to protect personal information and private life on the Internet 8. Understand digital resilience Identify bullying and how to avoid it 10. Identify fake news, pop-up blocking and live streaming 1. Understand password protection and privacy protection Empowered fh PoC Peg PT aCe Pan) Pre earl) PEE) ILEE ee OA ed 1.1. What is a Search Engine? A search engine is designed to search for information on the World Wide Web by using specified keywords. The search results are usually presented in a list commonly called hits. The information may consist of web pages, images, information and other types of files. Below are some of the most common search engines: Sea ad tue google.com For generally searching anything images.google.com For image searching scholargoogle.com For educational and research searches books. google.com For searching books online yahoo.com! For generally searching anything duckduckgocom For organic searching 1.2. How do Search Engines Work? Internet search engines are special sites on the web that are designed to help people find information stored in other sites. There are differences in the ways various search engines work, but they all perform three basic tasks: They search the They keep an index They allow users to internet or select of the words they look for words or pieces of the internet | | find, and where they | | Combinations of words based on Important find them, found In the index of words. words. Early search engines held an index of a few hundred thousand pages and documents and received maybe one or two thousand inquiries each day, Today, a top search engine will index hundreds of millions of pages, and respond to tens of millions of queries per day,eee OA rd Google receives over 63,000 searches per second on any given day, That's the average figure of how many people use Google a day, which translates into at least 2 trillion searches per year, 38 million searches per minute, 228 million searches per hour, and 5.6 billion searches per day. Search engines are very different from subject directories. While humans organize and catalogue subject directories, search engines Fexd for Neurons rely on computer programs called spiders or Pere eee oan cr tek ar robots to crawl the Web and log the words on Dies Ree) each page. With a search engine, keywords Saatone ue ca eget esti tr fee eo me) related to a topic are typed into a search box. The search engine scans its database and returns a file with links to websites containing the word or words specified, Because these databases are very large, search engines often return thousands of results. Without search strategies or techniques, finding what you need can be like finding a needle in a haystack. 1.3. Internet Searching Strategies Nowadays keywords search on search engines based on Improper or slang language which also results in improper outcomes. To use search engines effectively, it is essential to apply techniques that narrow results and push the most relevant pages to the top of the results list. Below are several strategies for boosting search engine performance. 1. Identify Keywords When performing a search, break down the topic into key concepts. For example, to find information on what the FCC has said about the wireless communications industry, the keywords might be: FCC Wireless Communication 2. Boolean AND Connecting search terms with AND tells the search engine to retrieve web pages containing ALL the keywords: FCC AND wireless and communication Internet Search Techniques and e-safetyPEE ee ere) The search engine will not return pages with just the word FCC. Neither will it return pages with the word FCC and the word wireless. The search engine will only return pages where the words FCC, wireless, and communication all appear somewhere on the page. Thus, AND helps to narrow your search results as it limits results to pages where all the keywords appear. 3. Boolean OR Linking search terms with OR tells the search engine to retrieve web pages containing ANY and ALL keywords. For example, FCC OR wireless OR communication. When OR is used, the search engine returns pages with a single keyword, several keywords, ond all keywords. The boolean OR does the following: The OR expands your search results. Use OR when you have common synonums for a keyword Surround OR statements with parentheses for best results AYN To narrow results as much as possible, combine OR statements with AND statements. For example, the dollowing search statement locates information on purchasing a used car (Car OR automobile) AND (buy OR purchase) AND used 4, Boolean AND NOT AND NOT tells the search engine to retrieve web pages containing one keyword but not the other. For example, Dolphins AND NOT Miami. The above example instructs the search engine to return web pages about dolphins but not web pages about the “Miami Dolphins” football team. Use AND NOT when you have a keyword that has multiple meanings. The need for AND NOT often becomes apparent after you perform an tial search, If your search results contain irrelevant results (e.g,, Saturn the car rather than Saturn the planet), consider using AND NOT to filter out the undesired websites. 5. Implied Boolean Plus and Minus (+ & -) in many search engines, the plus and minus symbols can be used as alternatives to full Boolean AND and AND NOT. The plus sign (+) is the equivalent of AND, and the minus sign (-) is the equivalent of AND NOT. There is no space between the plus or minus signeee OA rd and the keyword. For example; +welding process, +Saturn -car, couch sofa NOTE: AltaVista’s Simple Search requires the use of plus and minus rather than AND, OR, and AND NOT. 1.4. Ethical Citation It is important to cite sources you used In your research for several reasons 5 ae Internet Search Techniques and e-safety To avoid plagiarism by quoting To be a responsible scholar by giving credit to words and ideas used by other other researchers and acknowledging their authors. ideas. < . {e) To allow your reader to track down To show your reader you've done proper the sources you used by citing them research by listing sources you used to accurately in your paper by way of get your information footnotes, a bibliography or reference list. 1.5. Digital Citizenship If you are a citizen, this means you belong to a group of people. You could be a citizen of your classroom or your neighbourhood. Being a digital citizen means you are a part of the group of people that use technology to communicate. There are rules that you need to follow when you are a digital citizen, to protect yourself and to protect others ©TE eRe eey 1.6. Digital Resilience A digitally resilient person will be able to: Se 9 © Understand when Know what to do to Leorn from their Recover when things they are at risk online. seek help, experiences. go wrong. 1.7. Cyber Bullying Cyber bullying is bullying that occurs online, often through instant messaging, text messages, emails, a A and social networks. If someone is repeatedly unkind or harasses another person online, then they are a cyberbully, Cyber bullying usually involves people you know. It is often accompanied by traditional, offline, bullying. Examples of Cyber Bullying & RA & £ ‘writing hurtful things through) Posting derogatory messages Posting or sharing Creating foke profile of instant messaging. text” | on soci media tohumaiste a embaosing videos or photos| someane ta humllate or hut messaging or online games, person or community ‘ver the social media, ‘them. How to Avoid Cyber Bullying? ® ff Do not reply tothe Block al the messages from | __ Keep all the e-mails and Report the bulluing tothe rmessoges sent by bully the bul messages thot the bully sends, porent ora trusted edulteee OA rd 1.8. Fake News You may have heard of the term fake Checkpoint /) news talked about in the media or between friends. There are different arch engine is designed to search for eee types of fake news. Some fake news is deliberately made up stories or images to make people believe something that isn't true. Others have some truth to them, but may be misleading, including some false information that hasn't been checked properly or with facts that have been exaggerated by the author. + Has the story been repeated elsewhere? Check other reputable sites * Does the image look believable? Is it used elsewhere? For example, an edited photo of a pink giraffe fiying across the moon is a big clue that the story Isn't real! + Does the web address (URL) look strange? Or is it from a trusted site? * Do you know who the author is? Have you heard of the organization reporting it? * Are you familiar with the organization or company? Are they reputable? Anybody can make mistakes online. Even if you are careful, accidents can happen You may feel unsafe and people can be unkind, Sometimes bad things happen. Don't worry, it isn’t your fault. The most important thing is that you know how to get help and recover. Thinking about what you do online, and getting support, will help you to recover - from whatever has happened. You can even learn from your experience and become more resilient. What will you do when things go wrong online? 1.9. Pop-up Blocking ‘Sometimes messages pop up in a small window on the screen when you open certain websites. Often the popups are adverts for products and services and other times they are phishing scams asking you to enter personal details to claim an unbelievable prize. You should avoid clicking on the Internet Search Techniques and e-safetyPEE ee ere) popup links just in case they are unreliable or a scam. This term in the online world Is also called Click-Bait. You can just close them by clicking the only the small x on the top right-hand corner of the popup box. 1.10. Live Streaming Live streaming is the broadcasting of real-time, live, video to an audience over the internet. All you need is an internet-enabled device, such as a smartphone or tablet, and a platform to broadcast on Some Risks of Live Streaming + Younever know who's watching - if your live stream is popular with loads of viewers, it might be promoted so people who don’t follow you can tune in too if your profile is public. + You never know what you're going to see - when \ watching someone else's live stream, you can never tell \ what’s about to happen. This can be part of the fun of live streaming, But you might be exposed to harmful or upsetting content by other users. + Not all viewers are friendly - viewers can comment on your live stream as it happens, and their comments might be mean, rude or inappropriate and can make you feel sad or scared, + Letting people know where you are - you should be mindful of what you're revealing in your live stream. If youre in your school uniform or close to your house, you could be letting strangers know where you go to school and where you live, even if you don't verbally say iteee OA rd 1.1. Password Protection A password is a secret word, phrase or combination of characters that allows you access to protected information ‘or an account. A strong password is one that is secure and not easy to guess. It can be used to help protect your information online, keeping it private. Following are some “s tips to create strong and protective passwords: 1. Create different passwords for different accounts.Choose a password that is not easy to guess. 2. Use a mixture of numbers, characters and lower and upper-case letters. 3. Avoid obvious words such as your name or your pet's name. 4, Avoid obvious numbers such as your date of birth, age or phone number. 5. Instead of just one word, think of a short phrase that nobody would guess. 6. Keep your passwords secret, even from your best friend. 1.12. Privacy Protection Itis important to protect your information when you're online and think carefully about ‘what it is ok to shore and make public for everyone to see and what it is best to keep private. Shoring too much personal information such as your full date of birth or your full name and address could leave you vulnerable for several reasons: Checkpoint /) 1. There are identity thieves who may try to steal your personal information to create an identity 2. Identity thieves may use your information to pretend to be you online. 3. There are some people who want to harm and harass others online. Internet Search Techniques and e-safetyeC Asearch engine is designed to search for information on the World Wide Web by using specified keywords. Search engines rely on computer programs called spiders or robots to crawl the Web and log the words on each page. . Ethical citation involves avoiding plagiarism, by giving credit to work of other scholars, allow your reader to track down the sources cited. |. Digital citizen refers to the group of people that use technology to communicate. . Cyberbullying is bullying that occurs online, often through instant messaging, text messages, emails, and social networks. . Fake news is deliberately made up stories or images to make people believe something that isn’t true. , Popups are adverts for products and services and other times they are phishing scams. . Live streaming is the broadcasting of real-time, live, video to an audience cover the internet. A password is a secret word, phrase or combination of characters that allows you access to protected information or an account. My Notes!Photo Editing T Deere Brochures and Flyers 3D Text Photo Editing MockupsAfter going through this chapter, students will be able to: Develop an understanding of what graphics are, Learn the difference between roster and vector graphics Familiarise with the interface of Adobe Photoshop |. Understanding of resolution, colour depth and colour mode i 2 3. 4 5. Understand layers, text layers and layer styles in Photoshop 6. Apply adjustments, filters and effects on an image 7. Apply gradient, stroke borders, drop shadow, bevel and emboss 8 Use Scale and rotate 9. Manage the Layer opacity 10. Apply Blend modes Tl. Use of Prospective crop tool 12. Use of retouch tools 13. Saving images for web and print media TCL ees is RTS Innovative pee urd 4a 4b2.1. Introduction Adobe Photoshop CC 2018 is a popular image editing software that provides a work environment consistent with Adobe Illustrator, Adobe InDesign, Adobe Photoshop, and other products in the Adobe i Creative Suite although Adobe Photoshop is raster-based graphic software. kd wi wi 2.2. What are Raster Graphics? In computer graphics, a raster graphics or bitmap image is a dot matrix data structure @ mo that represents a generally rectangular grid of pixels (points of colour), viewable via a monitor, yA paper, or other display media. Raster images are stored in image files with varying formats. ‘a ad bitmap Is a rectangular grid of pixels, with each pixel's colour being specified by a number of bits. A bitmap might be created for storage in the display’s video memory or as a device- independent bitmap file. A raster is technically characterized by the width and height of the image in pixels and by the number of bits per pixel (or colour depth, which determines the number of colours it can represent) Mt dam Sy Fact Toon Plt oi reG_Phiostop File Et Image Layer Type Select Fier 3D View Window Help Cee + IF you look at the top of the screen you will see the Menu bar, which contains all the main functions of Photoshop, such as File, Edit, Image, Layer, Type, Select, Filter, Analysis, 3D, View, indow, and Help. Most of the major tools are located in the Toolbar for easy access The image will appear in its own window once you open a file.The name of any image that you open will be at the top of the image window os shown above Options bar which changes constantly depending on what tool you have selected, The palette displays the current foreground and background colours and RGB values for these colours. You can use the sliders to change the foreground and background colours in different colour modes. You can also choose a colour from the spectrum of colours displayed in the colour ramp at the bottom of the palette, Inthe palette, you can choose a foreground or background colour and add a customized colour to the library. The palette allows you to view, select, and apply pre-set layer styles. By defauit, a pre-set style replaces the current layer style. You can use the styles in the palette or add your own using the Create New Style icon, Press the Tab key on your keyboard to show or hide all active panels.let you organize your work into distinct levels that can be edited and viewed as individual units Every Photoshop CC document contains at least one layer. Creating multiple layers lets you easily control how your artwork is printed, displayed, and edited You will use the Layers palette often while creating a document, so it is crucial to understand what it does and how to use it. 1 the eye shows that the selected layer is visible. Click on or off to see or to hide a layer. 2 click the chequered square icon to lock Transparency, click the brush icon to lock the Image, click the arrow icon to lock the Position, and click the lock icon to lock all options. 3. defines how the layer's pixels blend with underlying pixels in the image. By choosing a particular blending mode from the drop-down menu you can create a variety of special effects 4, Fill: by typing in a valve or dragging the slider you can specify the transparency. 5 by typing in a value or dragging the slider, you can specify the transparency of the entire layer. 6. allows you to hide certain parts of the layer, which can then be revealed by using the paintbrush and the white paint colour to expose portions of the layer. 7. have the same opacity and blending mode options as image layers and can be rearranged, deleted, hidden and duplicated in the same manner as image layers. Click the icon and select an option to create a new fill or adjustment layer.Ee eee eed 8 Create New Lauer: click this icon to create a new layer. 9. Layer Lock: the icon shows when the layer is locked and disappears when it is unlocked, Double-click the icon to unlock the layer. 10. Link Layers: can be used to link layers together. 11. Layer Styles: fa layer has a style, an F icon shows at the bottom of the Layers palette. Click the little black triangle to see style options. 2.5. Selection Tools in Photoshop +f Move Used to select and move objects on the page. Click the tool button, then click on any object on the page you wish to move. |_! Marquee Selects an object by drawing a rectangle or an ellipse around it. Click the tool button, choose a rectangular or an elliptical marquee. Drag the marquee over the area of the image you wish to select, G- Lasso Selects an object by drawing o freehand border around it. Click the tool button, drag to draw a freehand border around the area of the image you wish to select. A Magic Wand Selects all objects in a document with the same or similar fill colour, stroke weight, stroke colour, opacity or blending mode. By specifying the colour range or tolerance, you can control what the Magic Wand tool selects. Advance ImagingTransformation Tool Select the area of your image which you want to transform and press Cirl+T to enable the transformation tool on that selection. You will see a familiar transformation tool around your object. Horizontal Transofem corner Transofem 2.6. Resolution, Color Mode and Color Adjustment Resolution PPI & DPI (Pixel per inch and Dots per inch respectively) are the standard units for measuring image size. Resolution is the number of pixels on a printed area of an image. The higher the resolution, the more pixels there are on the page, the better the quality of the image. However, high resolution increases the size of the file, The standard recommended resolution for printed images is 150-300 dpi, for Web images itis 72 dpiChoose a colour mode that will best fit your project. For example, when making a graphic for a web site, choose RGB. When making an image for print choose CMYK. Colour adjustment options in Photoshop CC 2018 can help you to make your digital photos look more natural. To colour correct your images, follow these steps: 1 2. Open the image you wish to correct. In the main menu, go to . You will see a dialogue box displaying a diagram of the colours in your image. Make sure the Preview box is checked off. In the Channels dropdown menu, you can choose between RGB, These indicate whether your changes affect all the colours, or just one (red, green, or blue). Choose the channel you wish to change and drag the triangles. The black triangle is for shadows, the grey is for mid-tones, the white is for highlights. Dragging the black triangle to the right will make the shadows in your photo darker. Dragging the grey triangle to the left will make the mid-tones in your photo lighter. Dragging it to the right will make the mid-tones darker.FE eee eed 7. You will be able to see the changes in your image. (underexposed image) shows a photo which is underexposed. By correcting the highlights and making the image lighter, we can make the photo appear much brighter (corrected image). Underexposed image Levels window Corrected Image 2.7. Resizing Image, Enlarging, and Compressing To resize your image to different size: 1. Inthe main menu, go to Image > Image Size, 2. Inthe Image Size dialogue box, you can readjust your image by typing in the width ond height that is needed for your resizing 3. An important reminder Is that if your document is not already 300ppi or a high- resolution photo, making your image drastically larger than what it already is can distort the document, thus the same for making a large document smaller. Photoshop measures in pixels, so altering sizes of a photo can reduce the quality. 5, It is best to adjust size first before doing any editing You can alter the following parameters to change the image size: 1. Under Dimensions, you can see your original document size. If you use the drop- down arrow, you can see different units of measurements for your document. Use the original size to determine the proportions for your resizing. 2. Adjust your new height and width by typing in the desired new proportions.Ee eee eed 3. Type in your desired resolution (150-300 PPI for high-quality prints and 72 PPI is good for web images). 4, Have the resample checked to tell Photoshop to try and keep your pixels together if you are making a drastic change. 5. Click OK. Your document should be now of the desired Advance Imaging proportions, if you are dissatisfied, you can hold Ctrl+Z to undo the sizing adjustment, or you can use the crop tool to get the desired look 2.8. Image Adjustments and Enhancements Filter and Effects A filter can be applied to the active layer or a smart object. Filters applied to a smart object are non-destructive and can be readjusted at any time. Do one of the following: + toapply a filter to an entire layer, make sure the layer is active or selected, + to apply a filter to an area of a layer, select that area. + to apply a filter non-destructively so you can change your filter settings later, select the Smart Object that contains the image content you want to filter. Filter Gallery The filter gallery provides a preview of many of the special effects & filters, Multiple filters can be applied/used on the same object/image, turn on or off the effect of a filter, reset options for a filter, and change the order in which filters are applied, When You are satisfied with the preview, you can then apply it to your image. Press Ctr|+F to open the filter gallery,A. Preview B. Filter gallery C. Thumbnail of selected filter D. Show/Hide filter thumbnails E, Filters pop up menu F. Options for selected filter. G. List of filter effects to apply or arrange H. Filter effect selected but not applied \ Filter effects applied cumulatively but not selected J. Hidden filter effect Checkpoint 7) The tool creates a gradual transition aoa Ramo pixels on a printed area of an image preset gradient fils or create your own. Gradient | AES anear between multiple colours. You can choose from tool cannot be used with the bitmap or indexed- Aen ame colour images.Ee eee eed a £ a 3 ® g Linear black to Multiple colour Linear colour to Radial colour to iF white gradient linear gradient _ transparency gradient white gradient ES 3 a4 Apply Gradient Fill 1. To fill part of the image, select the desired areo, Otherwise, the gradient fil is applied to the entire active layer. Select the Gradient tool .([f the tool isn't visible, hold down the Paint Bucket tool) In the options bar, choose a fill rom the wide gradient sample: Select an option to determine how the starting point (where the mouse is pressed) and ending point (where the mouse Is released) affect gradient appearance, Linear Gradient Shades from the starting point to the ending point in a straight line. Radial Gradient Shades from the starting point to the ending point in a straight line.y Erered Angular Gradient Shades from the starting point to the ending point in a straight line. Reflected Gradient Mirrors the same linear gradient on either side of the starting point. Diamond Gradient Shades from the middle to the outer corners of a diamond pattern. In Photoshop all layers can be individually customizable in various aspects, for Layer Style option double click on the layer from the layer panel. Layer styles window will pop-up from where you can apply effects, such as colour overlays, drop shadows, glow, or bevel & emboss, to the primary layer. To create a rollover pair, turn the layer style on or off and save the image in each state.A. Loyer effects icon B. Click to expand show layer effects A C. Different layer effects applied on the layer. B Adds a shadow that falls Add glows that emanate Add glows that emanate behind the contents on from the outside edges from the inside edges of the loyer. of the layer’s content. the layer’s content.Bevel and Emboss Color Overlay Gradient Overlay Add various combinations Fills the layer’s content Fills the layer’s content of highlights and shadows with color. with gradient. toa layer. PRABRASA Pattern Overlay Fills the layer’s content with pattern A A Stroke as Gradient Stroke as Pattern Stroke as Colour Outlines the object in current Outlines the object in Outlines the object in current layer using gradient. layer using gradient. current layer using colour.Cee 2.11. Scale and Rotate The free transform command lets you apply transformations (rotate, scale, skew, distort, and perspective) in one continuous operation. You can also apply a warp transformation. Instead of choosing different commands, you simply hold down a key ‘on your keyboard to switch between transformation types. 1. Select what you want to transform. 2, Open Edit Menu > Free Transform (Short Key Ctrl). 3. To scale by dragging, drag a handle. Press Shift as you drag a corner handle to scale proportionately. 5, To rotate by dragging, move the pointer outside the bounding border (it becomes a Advance Imaging curved, two-sided arrow), and then drag. 7. Press Shift to constrain the rotation to 15° . increments. ‘A Original image 8. Layer flipped C Selection border rotated D. Part of object flipped 2.12. Layer Opacity and Blending Layer Opacity 4 layer with 1% opacity appears nearly transparent, whereas one with 100% opacity appears completely opaque. In addition to overall opacity, which affects layer styles and blending modes applied ta layer, you can specify fill opacity. Fill opacity affects only pixels, shapes, or text on a layer without affecting the opacity of layer effects such as drop shadows.By default, the blending mode of a layer is . which means that the layer has no blending properties of its own. When you choose a different blending mode for a layer, you effectively change the order in which the image components are put together. Choose a blending mode other than pass through for the layer.The Hue/Saturation command adjusts the . and of the entire image or individual colour components in an image. Use the Hue slider to add special effects, to colour a black and white image (like a sepia effect), or to change the range of colours in a portion of an image. This adjustment is especially good for finetuning colours in a CMYK image. seats Pret ie oer ea Shdoninshihe HOR Toi fee1. Image . (Short key Ctrl+U) 2. Choose Master to adjust all colours at once. Alternatively, choose one of the other pre-set colour ranges listed for the colour you want to adjust. To modify the colour range. Amuch easier and faster way to correct images that suffer only from perspective distortion is to use the perspective crop tool. 1. In this case, we will be extracting the painting from the wall. 2. Select the Perspective Crop Tool from the Tools panel. 3. Click and drag to create a rectangle that covers your whole image. 4. Drag the corner handles so that the horizontal and vertical lines of Life is file a camera the grid align with the respective lines of your subject 5. Press Enter to crop. ust rs. inl met coy he ged in peer de tot just lake vt stotEe eee eed 2.15. Retouch Tools Retouch with the Healing Brush tool: The healing brush tool lets you correct imperfections, causing them to disappear into the surrounding image. Like the cloning tools, you use the Healing Brush tool to paint with sampled pixels from an Image or pattern. However, the Healing Brush tool also matches the texture, lighting, transparency, and shading of the sampled pixels to the pixels being healed. As a result, the repaired pixels blend seamlessly into the rest of the image. 1. In this example by using the healing tool, we will remove the cell phone. Select the Healing Brush tool Specify the source for repairing pixels by holding the Alt key and left-click and release the Alt key. 4, Use the Healing brush on the effected area i. cell phone, healing tool will use the pixels from the source and adjust on the destination. Before After Retouch with the Clone Stamp Tool: The clone stamp tool paints one part of an image over another part of the same image or over another part of any open document that has the same colour mode. You can also paint part of one layer over another layer. The Clone Stamp tool is useful for duplicating objects or removing a defect in an image. Advance Imagingeee) 1. In this example using the Clone Stamp tool, we will add another paper clip. 2. Select the Clone Stamp tool 3. Specify the source for copying the pixels by holding the Alt key and left-click and release the Alt key, 4, Use the Clone Stamp tool on a similar place where you want to paste the paper clip. 5. Clone Stamp tool will use the pixels from the source and paste it on the destination. After 2.16. Saving Images for Print Media Originally when we are working in Photoshop with layers and objects Photoshop saves the document in PSD format whereas if need to save the picture for print media it is recommended to save images in JPEG format with the resolution up to 200 to 300 DPI, saving the image at this resolution avoids pixelation at a later stage. To save an image in Photoshop follow these steps: 1. Click on File menu. 2. Click Save As (Short Key Ctrl+Shift+S). 3. Type the name for the picture Select a file format for your arcitt image. ‘Close and Goto Bdge. SiteCtteW 5. Click the save button.While saving pictures for the web we have to be careful about the size of the file as on the web we are always keen to keep the file size small, this helps the website load quickly as all the content on the webpage downloads on your computer via the internet. Therefore, it is highly recommended to save files intended for webpages in a smaller size. The recommended format is GIF, PNG and JPEG. 1. Click on File Menu. 2. Click (Short Key Ctrl+Alt+Shift+S), 3. Select Fit on Screen to check the overall look of the image. B Select an appropriate file format. a Set your required quality a Check the estimated file size to meet the desired requirement. Click the Save button to save theae CU Araster graphics or bitmap image is a dot matrix data structure that represents a generally rectangular grid of pixels (points of colour), viewable via, a monitor, paper, or other display media. PP! & DP! (Pixel per inch and Dots per inch respectively) are the standard units for measuring image size. Recommended resolution for printed images is 150-300 dpi, for Web images it Is 72 dpi, Resolution Is the number of pixels on a printed area of an image. In the swatches palette, you can choose a foreground or background colour and add a customized colour to the library. .. The free transform command lets you apply transformations (rotate, scale, skew, distort, and perspective) . The Hue/Saturation command adjusts the Hue (colour), Saturation (purity) and lightness of the entire image, . The gradient tool creates a gradual transition between multiple colours. . The healing brush tool lets you correct Imperfections, causing them to disappear into the surrounding image. My Notes!Practical Uses of Databases beri a else loli rel olay |e Finances Clete) reliesHandling Databases with Research Student Learning Outcomes After going through this chapter, students will be able to: Organize and create tables in MS Access Create relationships between tables Understand use of different data types in the database Identify concept of primary and secondary key Create simple and complex queries Creare forms and reports through wizard feature Import and export data in and out of MS Access en anaAwn Creating, editing and sharing forms in Microsot Forms ISTE Student Standard Coverage Empowered Perel e Tg SU tg arias} TE] TodTER lre) 3.1. What is a Database? A structured set of data held in a computer, especially one that is accessible in various ways is called Database. A database is usually controlled by a Database Management ‘System (DBMS). Together, the data and the DBMS, along with the applications that are associated with them, are referred to as a database system, often shortened simply to database The common language among electronic database is SQL. It works at the backend of most of the user interface in any application. MS Access is one of the software which uses the same structure of SQL. Relational Database Management System (RDBMS). .2. Introduction to MS Access Microsoft Access is a database management system (DBMS) from Microsoft that combines the relational Microsoft Jet Database Engine with a graphical user interface and software-development tools. Access is an easy-to-use tool for creating business applications, either from templates or from scratch. With its rich and intuitive design tools, Access can help in creating appealing and highly functional applications in a minimal amount of time. SLAscendina Ty 7 view Opens All Access... ® « | Tables Bi sew [mora x 3009 |» wal Tanoter eaeTER eee’ 4. Quick Access Toolbar: the quick access toolbar lets you access common commands no matter which tab is selected. You can customize the commands depending on your preference. 2. The Ribbon: the ribbon contains all of the commands you will need to perform common tasks in Access. It has multiple tabs, each with several groups of commands. 3. Tell Me: the tell me box works like a search bar to help you quickly find tools or commands you want to use. 4, Microsoft Account: from here, you can access your Microsoft account information, view your profile, and switch accounts. 5. Navigation Pane: the navigation pane displays all of the objects contained in your database. The objects are grouped by type. Double-click on object to open it. 6. Documents Tab Bar: all open objects are displayed in tabs on the document tabs bar. To view an object, click its tab. 7. Record Navigation Bar: the record navigation bar allows you to navigate records ‘one at a time. Click the arrows to navigate through the records. You can jump to a specific record by typing its ID number into the box. 8 Record Search Box: you can use the record search box to search for any term in the current object. The first result will be selected automatically. To navigate through additional results, press the Enter key on your keyboard. 3.3. Datatypes in MS Access Every field in a table has properties. Properties define the field's characteristics and behaviour. The most important property for a field is its data type. A field’s data type determines what kind of data it can store. MS Access supports different types of data, each with a specific purpose. Here are some of the most commen data types you will find used in a typical Microsoft Access datobose.Eee Oe red ioe) Pesca seul <= Short Text Text or combinations of text and numbers, including numbers 5 that do not require calculating (e.g. phone numbers). M4 Long Text! Lengthy text or combinations of text and numbers. 2 Number Numeric data used in mathematical calculations. r Date/Time Date and time values for the years 100 through 9999. FS Currency Currency values and numeric data used in mathematical 3 calculations involving data with one to four decimal places. 4 AutoNumber A unique sequential (incremented by 1) number or random rs number assigned by Microsoft Access whenever a new 3 record is added to a table. = Yes/No Yes and No values and fields that contain only one of two Fo values (Yes/No, True/False, or On/Off). A es Creating Database in MS Access Follow the steps below to create your first database in MS Access: 1. To create a database from a template, we first need to open MS Access. 2. Select Blank Database. Enter the name and click the Create button. 3. Access will create a new blank database and will open up the table which is also completely blank. 4. After selecting a template related to your requirements, enter a Blank database name in the File name field and Sean @ you can also specify another location for your file if you want and save it with your relevant nome.TER eee’ 3.5. Understanding Tables in MS Access All tables are composed of horizontal rows and vertical columns, with small rectangles called cells in the places where rows and columns intersect. In Access, rows and columns are referred to as records and fields respectively. ‘field is a way of organizing information by type. Whereas, A record is one unit of information. Every cell on a given row is part of that row’s record. 1] FstWame 1 Tracey 2 Lucinda 3 Jerrod Ell Employee Database Navigation Each record has its own ID number. Within a table, each ID number is unique to its record and refers to all of the information within that record. The ID number for a record cannot be changed. Creating Tables in MS Access When you create a database, you store your data in tables. You should always start your design of a database by creating all of its tables and then creating any other object. Before you create tables, carefully consider your requirements and determine all the tables that you need. Create the first table that will store the basic contact information concerning the employees as shown in the following table:Eee Oe red oli Dero) Ss = EmployeelD Autonumber = 8 FirstName Short Text ry LastName Short Text 5 Address-1 Short Text 3 % Address-2 Short Text ‘7 City Short Text 3 3 State Short Text. 3 a Zip Short Text = Phone Short Text A co] Phone Type Short Text. A es The table can be created in two ways: Creating table through Design View tab 1. Right click Table 1 in the navigation pane and select Design View. i Rename Hide in this Group DeleteTER eee’ 2. Access will prompt you to save the table first. Enter a suitable name for your table. 3. Once in Design View, enter the field name and its respective data type. Once we ‘type the field name MS Access will automatically assign the short text data type to the field which can be modified as per our requirement from the drop-down menu, 4, Switch to Datasheet View to have look at your table. It is important to save your table at this stage.Eee Oe red 5, The ID field is created in every table by default. To change the name of the ID field to EmployeelD, click Name and Caption option. Tools Help Fields Table 2 Tellme fe a a Modify Modly Memo {Sea sie [Ta kookups expresion settings” Creating table through Datasheet View You can directly enter table field name from the datasheet view in Access, 1. To add a new field, double click Click to Add button on the table. 2. Once you double click Click to Add, a drop down list will appear, prompting you to select the datatype for your field. For the present example, select Short Text. Handling Databases with Research3. After selecting the data type, enter the required field name. Enter FirstName as the field name for the given example. Employee ID = (New) 4. After entring the field names, you can now enter records in the table. =H] Employee Database Navigation fegories_X | Customers) Employeelt « | LastName | Address 5 1 Tracey Beckham 7 East Walker Dr. = 2 Lucinda George 789 Brewer St. Le 3 Jerrod Smith 211 St. George Ave le 4 Brett Newkirk 47 Hillsborough St. es 5 Chloe Jones 23 Solo Ln. Le 6 Quinton Boyd 4 Cypress Cr. = le Hinton 4011 Hodge Ln, 3.6. Creating Relationships Between Tables MS Access uses table relationships to join tables b when you need to use them in a database object. There are several reasons why you should create table relationships before you create other database objects, such as forms, queries and reports, RCE Neary Peete ee Re E Mac) ee ot tee ale ou ee OSE cco Sele Maret ug tool, used to store and manipulate dataEee Oe red + To work with records from more than one table, you often must create a query that joins the tables. * The query works by matching the values in the primary key field of the first table with a foreign key field in the second table. + When you design a form or report, MS Access uses the information it gathers from the table relationships you have already defined to present you with informed choices and to prepopulate property Handling Databases with Research settings with appropriate default values. Primary Key A primary key, also called a primary keyword, is a key in a database that is unique for each record. It is unique identifier, such as a driver license number, telephone number (including area code), or vehicle identification number (VIN). A relational database must always have one and only one primary key. Primary keys typically appear as columns in relational database tables. Foreign Key A foreign key is a column or group of columns in a relational database table that provides a link between data in two tables. It acts as a cross-reference between tables because it references the primary key of another table, thereby establishing a link between them.TER eee’ When you design a database, you divide your information into tables, each of which has a primary key and then add foreign keys to related tables that reference those primary keys. These foreign key-primary key pairings form the basis for table relationships and multi-table queries. Prenory (5) studentiable x Foreign _ ; -> studentid -| fname =| Lname -| courseiD ¢}—“~ saz sim Black ‘002 0543 James Richard CoO saa Amanda Holland COO 0586 simon McCloud soa2 Falotoreip 3.7. Constraints in Database In a database when we define any field as a Primary Key (PK) there are two rules or constraints applied to that field automatically Not Null: this constraint enforces that this field cannot be left unused. In Database terminology, NOT NULL is not considered as empty or zero, it just defined as the data has not been entered yet. Unique: this constraint enforces that the data entered in this field cannot be repeated or all the values entered should be unique to each other.Eee Oe red 3.8. Creating Relationships in MS Access For creating relationships in our database, | we need another table and will name it tbIHRData using Table Design as shown in the image. Make sure to select the relevant data type according to fields. Now we will work with One-to-One Relationship in MS Access. This relationship is used to relate one record from one table to one and only one record in another table. 1. Go to the Database Tools tab, click on the Relationships option. 2. Select tblEmployee and tbIHRData holding the shift key and then click on the Add button to add them to our view and then close the Show Table dialogue box. 3. To create a relationship between these two tables, use the mouse, and click and hold the EmployeelD field from tblEmployee and drag and drop that field on the field we want to relate by hovering the mouse right over EmployeelD from tbIHRDate. 4, When you release your mouse button, Access will then open the Handling Databases with Research Edit Relationships window.
You might also like
Technology For Success Mod 1
PDF
No ratings yet
Technology For Success Mod 1
28 pages
Click Start Learning Book - 2
PDF
83% (6)
Click Start Learning Book - 2
86 pages
Computing Book 7
PDF
100% (1)
Computing Book 7
176 pages
OUP - Just Click For The Caribbean
PDF
100% (1)
OUP - Just Click For The Caribbean
292 pages
GT101 Meeting 1
PDF
100% (1)
GT101 Meeting 1
41 pages
Computing Book 8
PDF
No ratings yet
Computing Book 8
141 pages
005-001-000-024 Search Engines
PDF
No ratings yet
005-001-000-024 Search Engines
11 pages
The Basic of Computer Science: Dr. Manish Kumar Kamboj Assistant Professor, CSE
PDF
No ratings yet
The Basic of Computer Science: Dr. Manish Kumar Kamboj Assistant Professor, CSE
25 pages
What Is A Computer?: Programmable Data Abacus Slide Rule Input Process Output Storage
PDF
No ratings yet
What Is A Computer?: Programmable Data Abacus Slide Rule Input Process Output Storage
16 pages
Search Engines Information Retrieval in Practice PDF
PDF
No ratings yet
Search Engines Information Retrieval in Practice PDF
542 pages
Cs101 Introduction To Computing Short Notesmidterm and Final Term by TheITeducation - Com D
PDF
100% (1)
Cs101 Introduction To Computing Short Notesmidterm and Final Term by TheITeducation - Com D
53 pages
Computer Science
PDF
No ratings yet
Computer Science
29 pages
Computing Class 7 First Term
PDF
No ratings yet
Computing Class 7 First Term
101 pages
Lecture 01
PDF
No ratings yet
Lecture 01
32 pages
Grade 4 4TH
PDF
No ratings yet
Grade 4 4TH
4 pages
Introduction To The Internet
PDF
No ratings yet
Introduction To The Internet
10 pages
Tisqaad College Amuura
PDF
No ratings yet
Tisqaad College Amuura
21 pages
ICT Chap 1,2,3
PDF
No ratings yet
ICT Chap 1,2,3
18 pages
Effective Use of Popular Search Engine Lecture 4 Week 4
PDF
No ratings yet
Effective Use of Popular Search Engine Lecture 4 Week 4
25 pages
G8-Q2 W6-7 Clean
PDF
No ratings yet
G8-Q2 W6-7 Clean
11 pages
Search Engine Student Documents
PDF
No ratings yet
Search Engine Student Documents
6 pages
Chapter 1 Search Engine 1. Objective
PDF
No ratings yet
Chapter 1 Search Engine 1. Objective
63 pages
Working of Search Engines: Avinash Kumar Widhani, Ankit Tripathi and Rohit Sharma Lnmiit
PDF
No ratings yet
Working of Search Engines: Avinash Kumar Widhani, Ankit Tripathi and Rohit Sharma Lnmiit
13 pages
Meta Search Engines
PDF
No ratings yet
Meta Search Engines
48 pages
Cali) Ngasan - Search Engine
PDF
No ratings yet
Cali) Ngasan - Search Engine
98 pages
JS3 Lesson Note On Search Engine
PDF
No ratings yet
JS3 Lesson Note On Search Engine
3 pages
Cs101 Lecture Wise Short Questions File
PDF
No ratings yet
Cs101 Lecture Wise Short Questions File
44 pages
Information Retrieval QA
PDF
No ratings yet
Information Retrieval QA
8 pages
Chapter 04 Researching and Using The Web
PDF
No ratings yet
Chapter 04 Researching and Using The Web
15 pages
Lab Manual: Web Technology
PDF
No ratings yet
Lab Manual: Web Technology
39 pages
The Dark Secrets of The Search Engines - Find Out What Search Engines Are Hiding From You (PDFDrive)
PDF
100% (1)
The Dark Secrets of The Search Engines - Find Out What Search Engines Are Hiding From You (PDFDrive)
130 pages
Research Methodology
PDF
No ratings yet
Research Methodology
14 pages
Computer - Search Engines
PDF
No ratings yet
Computer - Search Engines
10 pages
02 Topic 4 Database Search Vs Open Web (Kathy) With Lab 5
PDF
No ratings yet
02 Topic 4 Database Search Vs Open Web (Kathy) With Lab 5
8 pages
Lis 220 Computer and Data Processing Main 1
PDF
No ratings yet
Lis 220 Computer and Data Processing Main 1
21 pages
Internet
PDF
No ratings yet
Internet
22 pages
How Do Search Engines Work
PDF
No ratings yet
How Do Search Engines Work
3 pages
Q21 - What Is Search Engine? Give Examples. Discuss Its Features and Working (With Examples) - Ans
PDF
No ratings yet
Q21 - What Is Search Engine? Give Examples. Discuss Its Features and Working (With Examples) - Ans
11 pages
ST. JOSEPH SCHO-WPS Office
PDF
No ratings yet
ST. JOSEPH SCHO-WPS Office
15 pages
Basic Concepts of Computers
PDF
No ratings yet
Basic Concepts of Computers
12 pages
CS101 Midterm Short Handouts Lectures 1-7 (Vusolutionpoint - Com) - 2024-10-16T002039.970
PDF
No ratings yet
CS101 Midterm Short Handouts Lectures 1-7 (Vusolutionpoint - Com) - 2024-10-16T002039.970
20 pages
Comp
PDF
No ratings yet
Comp
18 pages
Gr5 - Comp - Unit 2 - WS - AK
PDF
No ratings yet
Gr5 - Comp - Unit 2 - WS - AK
2 pages
Cha 3
PDF
No ratings yet
Cha 3
22 pages
5 More Notes On Information and Communication
PDF
No ratings yet
5 More Notes On Information and Communication
45 pages
Software Engineering CS#101 Introduction To Computing
PDF
No ratings yet
Software Engineering CS#101 Introduction To Computing
51 pages
Major Project PROPOSAL-BACHELOR OF ENGINEERING
PDF
No ratings yet
Major Project PROPOSAL-BACHELOR OF ENGINEERING
37 pages
Lesson 3 4
PDF
No ratings yet
Lesson 3 4
6 pages
Search Engine and Internet Practical IT System
PDF
No ratings yet
Search Engine and Internet Practical IT System
3 pages
11 - Big Data and Digital Privacy
PDF
No ratings yet
11 - Big Data and Digital Privacy
31 pages
Intro To C&ET PT 1 by Dotcom
PDF
No ratings yet
Intro To C&ET PT 1 by Dotcom
5 pages
Lecture 1 04022025 032642pm
PDF
No ratings yet
Lecture 1 04022025 032642pm
40 pages
Jaff Seminar
PDF
No ratings yet
Jaff Seminar
31 pages
Power Point - Web Searching Techniques
PDF
No ratings yet
Power Point - Web Searching Techniques
27 pages
Introduction To Information & Communication Technology (Ict)
PDF
No ratings yet
Introduction To Information & Communication Technology (Ict)
51 pages