0% found this document useful (0 votes)
39 views58 pages

Computer Worksheet Viva

This document contains a worksheet on creating charts in Microsoft Excel. It includes multiple choice questions about chart components like data series, legends, and axis titles. It also has fill in the blank, true/false, and short answer questions about charts. Long answer questions ask about the differences between area and bar charts, modifying chart data and labels, and describing chart tools and components.

Uploaded by

pksing
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views58 pages

Computer Worksheet Viva

This document contains a worksheet on creating charts in Microsoft Excel. It includes multiple choice questions about chart components like data series, legends, and axis titles. It also has fill in the blank, true/false, and short answer questions about charts. Long answer questions ask about the differences between area and bar charts, modifying chart data and labels, and describing chart tools and components.

Uploaded by

pksing
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 58

Book 7

Worksheets
Worksheets

1. Creating Charts in MS Excel

A. Tick [] the correct option.


1. Which of the following components of a chart refers to the data entries from which a chart is
derived?
(a) Data Series (b) X-axis
(c) Chart Title (d) Axis Title
2. Which of the following identifies each data series?
(a) Chart Title (b) Legend
(c) Plot Area (d) Data Label
3. Which of the following charts compares trends in data at equal intervals?
(a) Line Chart (b) Column Chart
(c) Pie Chart (d) Bar Chart
4. Which of the following charts are used to represent sales and production figures of
companies?
(a) Column chart and Line chart (b) Line chart and Pie chart
(c) Bar chart and Area chart (d) Line chart and Area chart
5. The Move Chart button is present in the _____________ group of the ______________ tab.
(a) Images, Design (b) Data, Design
(c) Location, Design (d) Chart Layouts, Home
B. Fill in the blanks.
1. A unique _____________ or _____________ is assigned to each data series.
2. _________________ are organized vertically and _____________ horizontally in the bar
charts.
3. The Switch Row/Column button is present in the __________________ group of the
____________ tab of the Ribbon.
4. The __________________ appear on the Ribbon when we click on the chart.
5. The Paste button is present in the _______________ group of the ___________ tab.
C. Write true (T) for a correct statement and false (F) for an incorrect statement.
1. A chart helps us to see the relationship between different parts of data.
2. Plot area is the rectangular area bounded by the four axes.

1
3. Each data point is represented by one slice of a circular pie chart.
4. An area chart is similar to a bar chart.
5. The Background option is present on the Layout tab of the Ribbon.
D. Short answer questions
1. What is data series?
2. What is data label?
3. Name the most commonly used charts.
4. How is line chart useful?
5. Name the tabs on which Chart Tools are present.
E. Long answer questions
1. How is an area chart different from a bar chart?
2. How can you change the data included in a chart?
3. How will you modify the labels and titles?
4. Write a note on Chart Tools.
5. Describe the given terms.
(a) Chart area
(b) Data series
(c) Gridlines
(d) X-axis

2
2. MS Excel: Formulae and Functions

A. Tick [] the correct option.


1. Which of the following errors displays that the formula contains an invalid operation?
(a) #DIV/O! (b) #####
(c) #N/A (d) ####
2. ________________________ includes functions for searching and reference purposes.
(a) Financial (b) Lookup and Reference
(c) Text (d) Logical
3. Where is the Insert Function button present?
(a) Formulas tab (b) Insert tab
(c) Page Layout tab (d) View tab
4. Which of the following is not an error?
(a) ##### (b) =A1/A2
(c) #DIV/O! (d) #N/A
5. ____________ save us from writing lengthy formulae.
(a) Quotes (b) Remarks
(c) Statements (d) Functions
B. Fill in the blanks.
1. A ___________ produces new values from existing values.
2. _______________ are enclosed within parentheses ( ).
3. ________ function finds the maximum value of the selected document.
4. The ____________ is a short cut feature for using MS Excel’s SUM function.
5. _________________ is a cell’s location in a spreadsheet.
C. Match the following columns.
Column A Column B
(i) # N/A (a) Function with one argument
(ii) = A1/A2 (b) Function with more than one argument
(iii) D15 (c) Function name
(iv) Function (d) Division
(v) = SUM (B3 : B10) (e) List of logical functions
(vi) SUM or AVG (f ) Data not available
(vii) = AVERAGE (B3 : B10, C3 : C10) (g) Built-in formula in MS Excel
(viii) Logical (h) Cell reference

3
D. Short answer questions
1. What does a formula produce?
2. How can we enter formulae?
3. What is a function? How is it helpful?
4. Name the various categories present in the Function Library.
5. Write about the Financial feature of the Function Library.

E. Long answer questions


1. Write the steps to write a formula in MS Excel.
2. List three errors displayed in MS Excel. Also, state their possible reasons.
3. Describe the various predefined functions used in MS Excel.
4. Write the steps to use a function in MS Excel.
5. Write the steps to apply AutoSum feature in MS Excel.

4
3. More on QBASIC

A. Tick [] the correct option.


1. Which of the following is used to type in the codes required for a program?
(a) Programming Window (b) Status Bar
(c) Menu Bar (d) Immediate Window
2. Which of the following step(s) is/are involved in programming in QBASIC?
(a) Writing a program (b) Running a program
(c) Saving a program (d) All of these
3. What does a character set consist of?
(a) Digits (b) Letters
(c) Special Characters (d) All of these
4. Which of the following is an invalid string constant?
(a) 30/4/95 (b) “I am good.”
(c) “246-A, Saket” (d) “Ria, DOJ:1/4/92”
5. Which of the following is a suffix for string data type?
(a) % (b) $
(c) & (d) !

B. Fill in the blanks.


1. We press __________ or click on the __________ menu and select __________ option to
execute commands in QBASIC.
2. A program in QBASIC is made up of __________ basic elements.
3. A set of characters is called a __________.
4. The name of a numeric variable ends with the character __________.
5. The name of an alphanumeric variable ends with the character __________.
C. Write true (T) for a correct statement and false (F) for an incorrect statement.
1. A window with a welcome message appears in QBASIC 7.1.
2. Every programming language has its own set of commands and syntax.
3. Like constants and variables, operators are also the building blocks of a program.
4. Logical operators are used to compare two values.
5. Syntax is the way in which a statement is written.

D. Short answer questions


1. What is the function of the Immediate window?
2. Name the basic elements that make a program in QBASIC.

5
3. What do you understand by data type?
4. What is arithmetic operator?
5. Why do we use greater than or equal to operator?

E. Long answer questions


1. Differentiate between numeric variables and alphanumeric variables.
2. Write a note on expressions.
3. What is the difference between REM command and CLS command?
4. What do you understand by looping? How is it different from iteration?
5. Differentiate between FOR...NEXT loop and Do loop.

6
4. Editing in Flash

A. Tick [] the correct option.


1. Which of the following can be created using Flash?
(a) Animations (b) Games
(c) Cartoons (d) All of these
2. Which of the following components helps to manage the layers?
(a) Property Inspector Window (b) Timeline Panel
(c) Layers Panel (d) Stage
3. Which of the following tools is used to select irregular or smaller parts of an object?
(a) Selection tool (b) Lasso tool
(c) Ink Bottle tool (d) Text tool
4. Which of the following actions can be performed in the Property Inspector?
(a) Selecting the Stroke colour (b) Selecting the Stroke height
(c) Selecting the Stroke style (d) All of these
5. Which of the following properties can be set in the Property Inspector?
(a) Font (b) Alignment
(c) Letter Spacing (d) All of these
B. Fill in the blanks.
1. Flash incorporates the use of ______________ graphics.
2. _______________ refers to the light grey area around the Stage.
3. Text tool helps us to type the text on the _______________.
4. When an object is drawn, the _______________ and _______________ properties are
separate.
5. An object can be ________________ with its parts.
C. Match the following columns.
Column A Column B
(i) Font (a) Increases/Decreases the spacing between
characters or words
(ii) Font Size (b) Simplest symbol to use
(iii) Font Style (c) Have both symbols and graphics
(iv) Alignment (d) Copy of the symbol
(v) Letter spacing (e) Makes the text bold or italic
(vi) Graphics (f ) Makes the text size bigger or smaller
(vii) Movie clips (g) Changes the alignment
(viii) Instance (h) Selects the Font type

7
D. Short answer questions

1. What is Flash?
2. Name the parts of a Flash window.
3. How is Stage different from Work Area in Flash?
4. Why do we use Group command in Flash?
5. Name the three types of symbols.

E. Long answer questions


1. How can you transform an object?
2. Write the steps to use Lasso tool.
3. How will you type text on the Stage?
4. Describe the three types of symbols.
5. How will you use the created symbol in a movie?

8
5. Animation and Layers in Flash

A. Tick [] the correct option.


1. The animation effect is caused due to the phenomenon of _________________________.
(a) persistence of vision (b) reflection
(c) dispersion (d) refraction
2. The Timeline is made up of ________________________.
(a) frames (b) layers
(c) frames and layers (d) symbols
3. _____________ gradient changes colour in an outward direction starting from the focal
point.
(a) Radial (b) Linear
(c) Circular (d) Rectangular
4. Which of the following is not a type of layer?
(a) Normal layer (b) Guide and Guided layer
(c) Refined layer (d) Mask layer
5. We can _______________ a layer.
(a) rename (b) hide
(c) delete (d) all of these
B. Fill in the blanks.

1. The __________________ can be used to create realistic shadows.


2. Layers help in organizing ________________ or ______________.
3. The active layer is highlighted in the ____________ and is indicated with a ____________
icon.
4. ________________ is a process of hiding and displaying content on a layer.
5. _________________ refers to rapid display of a sequence of images to create optical illusion.

C. Write true (T) for a correct statement and false (F) for an incorrect statement.
1. Animation is a series of still images.
2. Every fifth frame of the Timeline is blue in colour.
3. We can select a portion of an image on the Stage and fill a linear gradient colour in it.
4. An object cannot be added or edited on a layer without affecting the objects on other layers.
5. Tint tweening is used to change the colour of an object.

9
D. Short answer questions
1. What happens on viewing an animation?
2. What are gradients?
3. What are layers?
4. How can you make a layer active?
5. What is Motion tween?

E. Long answer questions


1. How will you create a new gradient?
2. Describe the types of layers.
3. How can you lock a layer?
4. Write the steps to create Motion tween animation.
5. Write the steps to create Shape tween animation.

10
6. Working with Web Browsers

A. Tick [] the correct option.


1. Which of the following web browsers was first released in the year 1995?
(a) Google Chrome (b) Internet Explorer
(c) Mozilla Firefox (d) Safari
2. Safari is available for _______________.
(a) Macintosh (b) iPhone
(c) iPad (d) all of these
3. Which of the following is not a graphical browser?
(a) Gopher (b) Windows
(c) Apple (d) Linux
4. _________________ is/are plug-in(s).
(a) QuickTime Player (b) Flash Player
(c) QuickTime Player and Flash Player (d) None of these
5. Which of the following is/are part(s) of a web address?
(a) The protocol (b) The server name
(c) The file name (d) All of these
B. Fill in the blanks.
1. Most of the web browsers are __________ browsers.
2. __________ allows the users to use in-built tools such as Firebug.
3. __________ is a popular text browser.
4. The __________ are software on the web that help us to search specific information.
5. We can use the __________ button to tell the browser to load the page again.
C. Match the following columns.
Column A Column B
(i) Graphical and Text browsers (a) Offers sharing of tabs between Mac
and iOS devices
(ii) Graphical User Interface (GUI) (b) Navigation buttons
(iii) Search engines (c) HTTP
(iv) Bookmarks (d) Example of plug-in
(v) QuickTime Player (e) Called ‘Favorites’ in Internet Explorer
(vi) Web protocol (f ) Searching information on the web
(vii) Back and Forward (g) Navigating by pointing and clicking
with a mouse
(viii) Safari (h) Types of browsers

11
D. Short answer questions

1. Write a short note on Internet Explorer.


2. What is important in order to get the most out of the web?
3. What is the use of address bar?
4. How can we browse history on web?
5. How can we delete the web history?

E. Long answer questions


1. Write short notes on any three major popular web browsers.
2. Discuss the use of Navigation buttons.
3. Write a note on tabbed browsing.
4. Write a note on plug-ins.
5. How can we open a web page?

12
7. Introduction to E-mail

A. Tick [] the correct option.


1. Which of the following is not an advantage of an e-mail?
(a) Cheap (b) Lack of personal touch
(c) Easy to store (d) Easy to use
2. Which of the following components is used to write and send new messages to others?
(a) Inbox (b) Attachment (c) Compose Mail (d) Address Book
3. Which option is clicked to log out from an e-mail account?
(a) Reply (b) Sign out (c) Close (d) Sign in
4. What do we call the people who are new to the Internet?
(a) Newbies (b) New users (c) New people (d) New group
5. When was the word ‘weblog’ coined?
(a) December 13, 1996 (b) December 17, 1997
(c) December 18, 1997 (d) December 17, 1996
B. Fill in the blanks.
1. An _____________________ functions like the postal address.
2. _____________ contains the received mails.
3. We should always use a ___________________________ before opening any attachment.
4. The word ‘weblog’ was coined by __________________________.
5. Contents we see on web page are protected by _____________________________.
C. Write true (T) for a correct statement and false (F) for an incorrect statement.
1. E-mail is by far the fastest means of verbal communication.
2. A virus can seriously affect our computer.
3. An e-mail address usually consists of five parts.
4. The at sign (@) is a part of every e-mail address.
5. The word ‘blog’ was coined by Peter Merholz.
D. Short answer questions
1. Write any two advantages of an e-mail.
2. Write any two disadvantages of an e-mail.
3. Name the various components of an e-mail window.
4. What is the use of Sign out option?
5. What is a blog?
E. Long answer questions
1. Write the steps to create an e-mail account with Gmail.
2. Describe the various components of an e-mail window.
3. List the important points to be taken care of while sending and receiving e-mails.
4. List the various rules you should follow when you are online.
5. Write a note on blogging.

13
8. Introduction to HTML

A. Tick [] the correct option.


1. Which of the following are the most commonly used HTML editors?
(a) WYSIWYG editors (b) Text editors
(c) WYSIWYG editors and text editors (d) None of these
2. What should an HTML document have?
(a) HTML element (b) HEAD element
(c) TITLE element (d) All of these
3. Which of the following is the highest level of all headings?
(a) H1 (b) H2
(c) H3 (d) H4
4. Which of the following elements indicates that the enclosed text should be displayed in an
italic typeface?
(a) I Element (b) IE Element
(c) IL Element (d) II Element
5. Which of the following elements indicates that the enclosed text should be displayed with an
underline?
(a) UV Element (b) U Element
(c) UL Element (d) UI Element
B. Fill in the blanks.
1. HTML is a set of __________________ given to a web browser.
2. The instructions in the form of text characters are called _____________ in HTML.
3. By default, all headings in HTML are aligned to the _______________.
4. The head element contains general information, also called __________________________.
5. <BR>, an empty element is used to give a _____________________.
C. Match the following columns.
Column A Column B
(i) Container element (a) Platform independent language
(ii) Empty element (b) Knowledge of HTML not required
(iii) Tags (c) Contains the document title
(iv) HTML (d) Lowest and the smallest heading level
(v) WYSIWYG editors (e) Enclosed text displayed in bold face
(vi) TITLE element (f ) Instructions given in HTML
(vii) H6 (g) Element having only start tag
(viii) B element (h) Element having both starting and ending tags

14
D. Short answer questions

1. List any three benefits of HTML.


2. What are WYSIWYG editors?
3. Name any two popular WYSIWYG editors.
4. How will you create a web page?
5. What is BODY element?

E. Long answer questions

1. Differentiate between WYSIWYG editors and text editors.


2. How will you save a web page?
3. Write a note on HTML elements.
4. How is HTML element different from HEAD element?
5. Write a note on B, I and U elements.

15
9. Computer Viruses

A. Tick [] the correct option.


1. Which of the following cannot be done by a computer virus?
(a) Infecting the executable program files
(b) Infecting any file before it is attached to an e-mail message
(c) Infecting computer hardware
(d) Affecting normal functioning of a computer
2. In which of the following way(s) can computer viruses spread?
(a) From removable media (b) From downloaded files from the Internet
(c) From e-mail attachments (d) All of these
3. Which of the following viruses are the common PC viruses designed to affect executable files
and application programs?
(a) Directory Viruses (b) File Infectors
(c) Worms (d) Trojans
4. Which of the following antivirus software is well-known for its high detection rate?
(a) Kaspersky (b) Norton
(c) AVG (d) Avast
5. Which of the following viruses affect the documents in the folder or directory and replicate
them again in the same place where they are located?
(a) Resident Viruses (b) Direct Action Viruses
(c) Overwrite Viruses (d) Boot Viruses

B. Fill in the blanks.

1. A virus cannot infect files written on a _______________________.


2. A __________________ is a computer program that tricks the user by acting as an original
file.
3. An ____________ is a software program that detects the virus and removes it immediately.
4. A virus-infected file will have double _______________.
5. ___________ must be taken while we browse the Internet.

C. Write true (T) for a correct statement and false (F) for an incorrect statement.
1. A computer virus can copy itself, attach itself to other applications or files.
2. A virus cannot infect a computer hardware.
3. A virus cannot infect the executable programs.
4. A few signs can indicate the presence of a virus in our computer.
5. Antivirus cannot remove the virus from a computer system.

16
D. Short answer questions

1. List the actions performed by a computer virus.


2. How does a virus enter a computer?
3. When do viruses become active?
4. Name some popular antivirus software.
5. What can be done to prevent attack of a virus?

E. Long answer questions

1. Write a note on computer virus.


2. Write a note on spreading of a computer virus.
3. Write a note on antivirus software.
4. List the various signs of a virus attack.
5. Describe the following terms.
(a) Direct Action Viruses
(b) Overwrite Viruses
(c) Boot Viruses
(d) File Infectors

17
10. Computer Security

A. Tick [] the correct option.


1. Which of the following danger(s) is/are faced while using computers?
(a) Damage to computer hardware and software
(b) Data loss
(c) Computer fraud and theft
(d) All of these
2. Which of the following mechanisms involves analyzis of facial features by scanning a person’s
face?
(a) Face Recognition (b) Faceprint Recognition
(c) Fingerprint Recognition (d) Iris Recognition
3. Which of the following is the most effective way to achieve data security?
(a) Data backup (b) Data protection (c) Encryption (d) Authentication
4. Which of the following is/are well known antivirus program(s)?
(a) Norton (b) AVG (c) McAfee (d) All of these
5. Important data can be lost due to ___________________.
(a) hardware failure (b) human error (c) sabotage (d) all of these
B. Fill in the blanks.
1. _____________________ refers to the protection of computer-based hardware and software
resources.
2. A fingerprint sensor is used to create a ______________ image of the fingerprint.
3. _________________ is the process of converting encrypted data back into readable form.
4. One area where encryption is widely used is ______________________.
5. Trojans and worms are some types of _______________.
C. Match the following columns.
Column A Column B
(i) Computer fraud (a) Can be done using hand geometry
(ii) Password protection (b) Effective way to achieve data security
(iii) Iris recognition (c) Malware
(iv) Biometric authentication (d) Antivirus programs
(v) Encryption (e) Special security program
(vi) Trojans and worms (f ) Authentication mechanism
(vii) McAfee and Symantec (g) Best way of authentication in high risk
situations
(viii) Firewall (h) Damage to computer

18
D. Short answer questions

1. List the dangers we face while using computers.


2. What do you understand by the term authentication?
3. What is the disadvantage of a password-protected system?
4. What is biometric authentication?
5. Differentiate between face recognition and iris recognition.

E. Long answer questions

1. Why do we need to secure our computer?


2. List the points to be taken care of while creating a password.
3. Write a note on encryption.
4. Define the following terms.
(a) Biometrics
(b) Decryption
(c) Logging in
5. What is data backup? Why is it important? How is it different from firewall?

19
Answers to Worksheets

1. Creating Charts in MS Excel

A. Tick [] the correct option.


1. (a) 2. (b) 3. (a) 4. (d) 5. (c)
B. Fill in the blanks.
1. colour, pattern 2. Categories, values 3. Data, Design
4. Chart Tools 5. Clipboard, Home
C. Write true (T) for a correct statement and false (F) for an incorrect statement.
1. True 2. False 3. True 4. False 5. True
D. Short answer type questions.
1. Data Series refers to the data entries from which a chart is derived. A chart can have one or
more than one data series.
2. Data Label is a label that provides additional information about a data marker which
represents a single data item or value coming from a worksheet cell.
3. Some of the most commonly used charts are listed below.
• Column chart • Line chart • Pie chart • Bar chart • Area chart • XY Scatter chart
4. A line chart is useful for depicting the changes in the data over a period of time. It is useful
when we have many points to plot or when data trends are important. Line charts are used
by people in production and sales departments.
5. The Chart Tools are located on three tabs: Design, Layout and Format.
E. Long answer type questions.
1. Area Chart: An area chart emphasises the magnitude of change in data overtime. It is similar
to a line. It is used to emphasize differences between several sets of data over a period of
time. This chart is mainly used for representing sales and production figures of a company.
Bar Chart: A bar chart illustrates comparisons among individual items through a cluster of
bars. Categories are organized vertically and values horizontally in the bar charts. It is very
similar to a column chart. A bar chart can be described as a column chart drawn sideways. It
is used for comparing multiple values through horizontal and vertical bars.
2. The various steps to change the data included in the chart are listed below.
(i) First, click on the chart to select it.
(ii) Then, click on the Select Data button from the Data group of the Design tab of the
Ribbon. A Select Data Source dialog box appears. Make the required changes in it.
(iii) Click on the OK button. Changes are reflected in the chart.
3. The various steps to modify the labels and titles are listed below.
(i) Click on the chart to select it.

20
(ii) On the Layout tab, click on the Chart Title or the Data Labels button from the Labels group.
A drop-down menu appears. Select the appropriate option from the drop-down menu.
(iii) Change the Chart Title or the Data Labels and press the Enter key.
4. The Chart Tools appear on the Ribbon when we click on the chart. The tools are located on
three tabs: Design, Layout and Format.
• From the Design tab, we can choose the Chart Type, Chart Layout, Styles and Location.
• On the Layout tab, we have many options to choose from and select for the chart. We can
insert Pictures, Shapes, Text Boxes, Labels or Background to our chart.
• Under the Format tab, we will find many options to modify the Shape Styles, WordArt
Styles or Size of the chart.
5. (a) Chart area is the area within which all the chart components are found.
(b) Data series is collection of entries from which a chart is derived.
(c) Gridlines are lines running from X and Y axes separately.
(d) X-axis is the horizontal axis of a chart.

2. MS Excel: Formulae and Functions

A. Tick [] the correct option.


1. (a) 2. (b) 3. (a) 4. (b) 5. (d)
B. Fill in the blanks.
1. formula 2. Arguments 3. Max 4. AutoSum 5. Cell reference
C. Match the following columns.
(i) (f ) (ii) (d) (iii) (h) (iv) (g) (v) (a) (vi) (c)
(vii) (b) (viii) (e)
D. Short answer questions
1. A formula produces new values from existing values.
2. Formulae can be entered into the Formula bar or inside a cell.
3. A function is a built-in formula in MS Excel that is used to carry out common mathematical
calculations. Functions save us from writing lengthy formulae.
4. AutoSum, Recently Used, Financial, Logical, Text, Data & Time, Lookup & Reference, and Math
& Trig are the various categories present in the Function Library.
5. The Financial feature of the Function Library is a list of financial functions such as accrued
interest, cash flow return rates, additional financial functions and others.
E. Long answer questions
1. The various steps to write a formula are listed below.
(i) Select the cell in which the result is to be displayed.
(ii) Type the equal (=) sign in the Formula bar. It will automatically appear in the selected
cell.
(iii) Type the reference of the cell whose result is to be calculated and the operator sign (+).

21
(iv) Press the Enter key.
(v) The result will appear in the selected cell.
2. The errors that MS Excel shows are listed in the table given below.
Errors Possible reasons
##### The column is not wide enough to display the numbers.
#DIV/0! The formula contains an invalid operation – division by 0.
#N/A Data are not available.

3. There are various predefined functions in MS Excel which we can use.


Sum: Adds all cells in the argument
Average: Calculates the average of the cells in the argument
Max: Finds the maximum value of the selected argument
Count: Finds the number of cells that contain a numerical value within a range of the
argument
4. The various steps to use a function in MS Excel are listed below.
(i) Click on the cell where a function is to be applied.
(ii) Click on the Insert Function button from the Function Library group of the Formulas tab
of the Ribbon.
(iii) An Insert Function dialog box appears.
(iv) Choose the function and click OK.
(v) A Function Arguments box appears on the screen.
(vi) Fill in the Number1 box for the first range that is to be calculated.
(vii) Fill in the Number2 box with the second range (if any) to be calculated.
(viii) Click on the OK button. The result will appear in the selected cell.
5. The various steps to apply AutoSum in MS Excel feature are listed below.
(i) Enter the following data into cells C1 to C6: 11, 12, 13, 14, 15, 16. Make sure that the cell
C7, the location where the result will be displayed, is blank.
(ii) Click on the Home tab to select the AutoSum button from the Editing group on the
Ribbon to enter the SUM function into cell C7.
(iii) The range of data entered is selected automatically and the function appears in the cell
C7.
(iv) Press the Enter key to get the result. The answer 81 appears in the cell C7.
(v) Click on cell C7 and the complete function =SUM(C1:C6) appears in the Formula bar
above the worksheet.

3. More on QBASIC

A. Tick [] the correct option.


1. (a) 2. (d) 3. (d) 4. (a) 5. (b)

22
B. Fill in the blanks.
1. F5, RUN, Start 2. Four 3. string 4. 7. % 5. $
C. Write true (T) for a correct statement and false (F) for an incorrect statement.
1. False 2. True 3. True 4. False 5. True
D. Short answer questions
1. The Immediate window shows the immediate execution and output of the PRINT command.
2. A program in QBASIC is made up of four basic elements: Characters, Data Types, Operators
and Statements.
3. Data type means the kind or type of data to be stored in a memory location. Data are always
stored in a named memory location. In QBASIC, data can be constant data (constants) or
variable data (variables). Both constants and variables can further be classified as string
(alphanumeric) or numeric.
4. The operator which operates on a numeric constant and variable is called the arithmetic
operator. It always gives a numeric output.
5. We use greater than or equal to operator to check if the first value is greater than or equal to
the second value.
E. Long answer questions
1. In QBASIC, variables are also of two types: Numeric and Alphanumeric.
(i) Numeric Variables: A numeric variable is always used to represent a numeric value. The
name of a numeric variable must start with a letter but can have letters or numbers or
both as the rest of the characters. It ends with the character %.
(ii) Alphanumeric or String Variables: The name of an alphanumeric or string variable always
begins with a letter, but can include special characters as well as digits. It ends with the
character $.
2. An expression refers to a combination of constants and variables along with operators in a
particular format that is evaluated to obtain the desired result. The result that we get can be
in the form of string, numeric or logical value (True or False). The result can be stored in a
variable.
For example,
(A + B) < C
CUBOIDVOLUME = L*B*H
There can be more than one operator in an arithmetic expression.
In QBASIC, a hierarchy is maintained in all the operators.
The table given below shows the hierarchies for all the operators.
Arithmetic operators Relational operators Logical operators
Parentheses () = NOT
Exponent ^ > AND
Multiplication and division *, / < OR
Integer division \ <>
Modulus (Remainder) MOD <=
Addition and subtraction +, – >=

23
It is important to note that the algebraic expressions have to be converted into QBASIC
expressions before using them in programming.
The following table shows the conversion of some algebraic expressions into QBASIC
expressions.

Algebraic expression QBASIC expression


A=L×B A=L*B
V=L×L×L V=L*L*L
P = 2(L + B) P = 2 * (L + B)

3. REM Command: REM stands for ‘Remark’. REM is used at the beginning of a program to give
it a name, a comment line or an instruction for the program. It is used to give important
information about the program such as the name of the person who wrote the program or
the purpose of the program, etc. REM statements do not affect the way a program runs.
CLS Command: CLS is a command used to clear the output screen. It makes the screen
completely black. However, when we run our program without clearing the screen before it
starts, it shows the remains of the program running previously.
4. Looping: Repetitive constructs allow a specified group of statements to be executed a certain
number of times. This repeated execution of a group of program statements is known as
looping.
Iteration: Every repetition of a loop is known as iteration. Iteration means to repeat something
over and over again.
5. FOR...NEXT LOOP: It is generally used as a counter loop when we know exactly how many
times we need to execute the loop.
DO LOOP: It is a block of commands where the program does not have to loop a certain
number of times like in FOR...NEXT loop. It can loop indefinitely. The DO LOOP has two forms
in QBASIC: DO WHILE...LOOP and DO UNTIL...LOOP.
The DO WHILE…LOOP executes until the condition becomes false. The DO UNTIL…LOOP
executes until the condition becomes true.

4. Editing in Flash

A. Tick [] the correct option.


1. (d) 2. (c) 3. (b) 4. (d) 5. (d)
B. Fill in the blanks.
1. vector 2. Work Area 3. Stage 4. fill, stroke 5. grouped
C. Match the following columns.
(i) (h) (ii) (f ) (iii) (e) (iv) (g) (v) (a) (vi) (b)
(vii) (c) (viii) (d)

24
D. Short answer questions
1. Flash is a multimedia graphic program used for creating animations, games, cartoons, text,
graphics and other special effects. Flash is a powerful designing tool. It allows effective
animation and programming to create animations and web pages.
2. Menu Bar, Tool Palette, Layers Panel, Title Bar, Timeline Panel, Info Panel, Work Area and
Property Inspector Window are the various components of a Flash window.
3. Stage: Stage is the rectangular area where graphics, text and video clips are drawn or placed
and animation is created.
Work Area: Work Area refers to the light grey area around the Stage. We can place objects
here until we want them to appear on the Stage.
4. When an object is drawn, the fill and stroke portions are separate. It means the border area is
independent of the content portion of the object. It may cause a problem while transforming
or moving the object. A drawing may consist of many objects of different shapes and sizes
with borders and outlines. It is difficult to move or transform these objects together on the
Stage. While selecting an object, a part of it could be left, which means the object with its
parts needs to be grouped into one object. Hence, we use Group command in Flash.
5. There are basically three types of symbols: Graphics, Buttons and Movie clips.
E. Long answer questions
1. The various steps to transform an object are listed below.
(i) Select the Selection tool from the Tool box.
(ii) Position the mouse pointer over the object to be selected.
(iii) Select the Transform tool from the toolbar.
(iv) Click and drag the handles to transform the object.
2. The various steps to use Lasso tool are listed below.
(i) Click on the Lasso tool from the Tool box. The mouse pointer changes to Lasso.
(ii) Click and drag the mouse and select the portion of the object.
(iii) Release the mouse button. Everything inside the Lasso shape gets highlighted.
3. Follow the steps given below to type text on the Stage.
(i) Click on the Text tool to select it.
(ii) Click on the Stage area. The mouse pointer turns into a crosshair with a letter A in the
bottom-right corner.
(iii) Type the text.
4. There are basically three types of symbols.
(i) Graphics: A graphic symbol is well-suited for repeated use of static images, or for creating
animations associated with the main Timeline. This is the simplest symbol to use.
(ii) Buttons: The button symbols add interactivity to the animation and respond to mouse
actions (like click, etc).
(iii) Movie Clips: These are Flash movie clips having both symbols and graphics. They have
their own non-restricted Timeline that plays independent of the main movie’s Timeline.
5. Follow the given steps to use the created symbol in a movie.
(i) Choose Library option in the Window menu to display the Library window.

25
(ii) Library window allows us to scroll through the various symbols, listed in the lower
portion of the window. The upper portion displays the symbol selected in the list.
(iii) Drag the item from the Library window on to the Stage. The item is added to the current
layer of the movie.

5. Animation and Layers in Flash

A. Tick [] the correct option.


1. (a) 2. (c) 3. (a) 4. (c) 5. (d)
B. Fill in the blanks.
1. gradients 2. artwork, animation 3. Timeline, Pencil
4. Masking 5. Animation
C. Write true (T) for a correct statement and false (F) for an incorrect statement.
1. True 2. False 3. True 4. False 5. True
D. Short answer questions
1. When an animation is viewed, the viewer will see the frames in a sequence, starting at
Frame 1. Flash will automatically play the animation from Frame 1 and continue along the
Timeline until it reaches the last active Frame.
2. Gradients are the combinations of two or more colours that gradually fade into each other.
Flash uses gradients to give different paint effects. The gradients can be used to create
realistic shadows. A gradient acts like any other fill or stroke.
3. Layers are divisions within a project’s Timeline. They are useful for organizing work. They are
like sheets of transparent paper placed one above the other. They help in organizing artwork
or animation.
4. To make a layer active, we either select the layer in the Timeline or select a Stage object in the
layer. The active layer is highlighted in the Timeline and is indicated with a Pencil icon.
5. Motion tween refers to any object that travels from one point to another and involves no
change in the shape or size of the object over a period of time. However, changes may occur
in colour, texture or distance of the objects.
E. Long answer questions
1. Follow the given steps to create a new gradient.
(i) Select the triangle.
(ii) Choose Window → Color Mixer to display the Color Mixer panel.
(iii) Click the drop-down arrow of Fill Style box and select Linear or Radial.
(iv) Double-click on the left colour marker. The colour palette appears. Select the blue colour.
(v) Select the Paint Bucket tool and click on the triangle.
(vi) Double-click on the right colour marker and select the white colour.
(vii) Click the drop-down arrow below the Free Transform tool and select the Gradient
Transform tool from the Tools panel. Click on the triangle filled with a gradient fill. The
Gradient Transform controls the appearance on the Stage around the object.

26
(viii) To rotate the gradient fill, drag the Gradient Rotate handle to rotate the linear gradient
clockwise.
(ix) A bounding box with editing handles appears.
2. There are three types of layers which can be created in Flash: Normal, Guide and Guided, and
Mask and Masked.
(i) Normal Layer: It is the layer shown by default in Flash wherein we can draw and animate
an object.
(ii) Guide and Guided Layer: As the name suggests this layer guides the path to the other
layers. We may draw on this layer any object of any shape and guide it to follow a certain
path as in the case of a bouncing ball. We may create a ball in one layer and make it
follow a bounce path in another layer.
(iii) Mask Layer and Masked Layer: We may place a shape or symbol on a layer and select it
as a mask layer by choosing the Selection Mask option. The layer below the mask layer is
the masked layer. It lets us define the visible or non-visible portion of the layer below the
mask layer.
3. We can lock a layer so that any further changes in the content can be avoided. To do so, follow
the given steps.
(i) Click the layer to make it active.
(ii) In the Timeline, click the black dot under the Lock column.
(iii) A Padlock icon appears, indicating the layer is now locked.
(iv) Try to drag the logo that appears on the Stage using the Selection tool. This cannot be
done because the layer is locked.
4. The various steps to create Motion Tween animation are listed below.
(i) Open a new Flash file and draw the object on the Stage.
(ii) Convert it into a symbol by choosing Modify → Convert to Symbol buttons on the Flash
window or press F8.
(iii) A Convert to Symbol box appears. Click OK to convert the object into a symbol.
(iv) Now, create the first and the final stages of animation. The Timeline contains a keyframe
on Frame 1. To create the animation, it is needed to insert a second keyframe further
along the Timeline. Click on Frame 20 of the Timeline. Select Insert → Timeline →
Keyframe options.
(v) Make sure that the keyframe at Frame 20 selected. Move the object to another location
on the Stage.
(vi) Select any frame between 2 to 19.
(vii) Select Motion from the tween pop-up menu in the Property Inspector.
(viii) Select Control → Test Movie to see the object moving gradually from one location to
another on the Stage.
(ix) Select Control → Play option to play the movie.
5. The various steps to create Shape Tween animation are listed below.
(i) Open a new Flash file. Select the first frame and draw the object to be animated on the
Stage.
(ii) Select Frame 20 and press F6 to insert a new keyframe.

27
(iii) Still keeping playhead on Frame 20, delete the object present in the working area. Now
draw a different object.
(iv) Select any frame between 2 to 19.
(v) Select Shape from the tween pop-up menu in the Property Inspector.
(vi) Now press the keys Ctrl + Enter together to view the Shape tween.

6. Working with Web Browsers

A. Tick [] the correct option.


1. (b) 2. (d) 3. (a) 4. (c) 5. (d)
B. Fill in the blanks.
1. graphical 2. Firefox 3. Gopher 4. search engines
5. Refresh
C. Match the following columns.
(i) (h) (ii) (g) (iii) (f ) (iv) (e) (v) (d) (vi) (c)
(vii) (b) (viii) (a)
D. Short answer questions
1. Internet Explorer is a web browser that was developed by Microsoft and was first released in
the year 1995. It is one of the most popular and widely used web browsers. It allows the users
to view and access information on the Internet.
2. In order to get the most out of the web, it is important to be familiar with the various parts
and features of a browser.
3. Browsers have an address bar which shows the web address (also called a URL) of the page
we are on. To go to a different page, we can type an address in the address bar and then press
Enter key.
4. Suppose we visited a page a few days ago, but forgot to bookmark it. We can find the page
again by using the History, which is a list of websites we have visited. Usually pages will stay
in the History for a certain number of days.
5. In Internet Explorer, we click on Tools and then on Internet Options. From there, we will be
able to control the settings on our own. We can delete the web history by clicking on the
relevant option.
E. Long answer questions
1. Mozilla Firefox: Mozilla Firefox is a popular web browser for Windows, Mac OS X and Linux. It
was developed by Mozilla Foundation and was introduced in 2004. Firefox allows the users to
use in-built tools such as Firebug. The Firefox was originally called Phoenix, then it was given
the title Firebird and finally it became Mozilla Firefox.
Google Chrome: Google Chrome is yet another popular web browser that was developed
by Google. It was released on December 11, 2008. It allows the users to quickly access web
pages and make local desktop short cuts to open the web application in the browser. Google
Chrome is extensively used by the users due to its stability and simplicity.

28
Safari: Safari is a web browser developed by Apple Inc. It was initially released on January 7,
2003. It is available for Macintosh, Windows operating systems, iPhone, iPod Touch and iPad.
It supports private browsing (a mode in which the record of user’s web activity is automatically
deleted). It offers features like searching bookmarks, sharing tabs between Macs and iOs
devices, and archiving web content in WebArchive format.
2. Navigation buttons help us to move around while working with the web browsers.
Sometimes, after we click on a link, we might want to go back to the previous page. We can
do this using our browser’s Back button. Once we have pressed the Back button, we can press
the Forward button to follow the link again. When we use the Back and Forward buttons, our
browser may use its web cache to display the page. The web cache stores recently viewed
web pages so that they do not need to be downloaded again. We can use the Refresh button
(sometimes called Reload) to tell the browser to load the page again. If a page is taking too
long to load, or if we have typed in the wrong URL, we use the Stop button to stop the page
from loading.
3. Many browsers allow us to open a link in a new tab. Tabs are designed to make browsing more
convenient. We can open as many links as we want and they will stay in the same browser
window instead of cluttering up our desktop’s taskbar with multiple windows.
To open a link in a new tab, we right-click the link and click on Open in New Tab.
To close a tab, we click on on the tab.
4. Plug-ins are programs that are installed in our browser to enable it to play various types of
media. Examples of plug-ins include QuickTime Player and Flash Player. Our browser may
have come with some plug-ins already installed. Once we have the necessary plug-ins, we
will be able to enjoy watching videos and playing games on websites.
5. When we enter a web address (URL) in our browser, the browser actually sends an HTTP
command to the web server. The browser directs the server to fetch and transmit the
requested web page and display the information in our browser. All web servers serving
websites and web pages support the HTTP protocol. If we know the URL of the web page we
want to open, enter the URL, for example, (http://www.mapsofindia.com/maps/delhi/) onto
the address bar. The browser will read the web address as three distinct parts.
(i) The protocol: “http”
(ii) The server name: (www.mapsofindia.com)
(iii) The file name: (maps/delhi)
The file will open on our computer. This is a shorter way to open a web page directly.

7. Introduction to E-mail

A. Tick [] the correct option.


1. (b) 2. (c) 3. (b) 4. (a) 5. (b)

B. Fill in the blanks.


1. e-mail address 2. Inbox 3. virus scanner 4. Jorn Barger 5. copyright laws

29
C. Write true (T) for a correct statement and false (F) for an incorrect statement.
1. False 2. True 3. False 4. True 5. True
D. Short answer questions
1. The advantages of an e-mail are listed below.
(i) Easy to Store: Sent and received messages and attachments can be stored safely, logically
and reliably.
(ii) Easy to Use: Sending and receiving messages is simple. Using an address book of e-mail
service, contacts can be accessed easily and quickly.
2. An e-mail service has certain drawbacks.
(i) Emotional Responses: Some e-mails may upset us or cause anger and discomfort.
(ii) Lack of Personal Touch: E-mails lack that personal touch that a handwritten card or letter
gives when it comes to relationships.
3. The various components of an e-mail window are Inbox, Compose Mail (To, Cc, Bcc, Subject,
Body of the Mail, Attachment, Reply) and Address Book.
4. We can log out from our account by clicking on Sign out option and our account will be
closed safely.
5. A blog is a website that can be created easily by any user for himself to share his thoughts and
ideas with the world. There are personal blogs, corporate and organizational blogs, political
blogs, travel blogs and many other types of blogs.
E. Long answer questions
1. An e-mail address can be created easily through an e-mail client website. The mail servers
in such websites assign every user with a unique e-mail address. Some of the websites that
provide free e-mail accounts are www.gmail.com, www.yahoomail.com and www.hotmail.
com.
The various steps to create an e-mail account with Gmail are listed below.
(i) Connect to the Internet by double-clicking the Internet Explorer or the Google Chrome.
(ii) Type gmail.com in the address bar and go to the Gmail site.
(iii) Click on the link Create an account present at the bottom.
(iv) (a) We will get a form where we have to fill in all the information that has been asked
for. We need to answer questions like our name, e-mail address we prefer, password
and date of birth. We should be very careful while creating our password. We should
make sure that we remember it. We should keep changing our password periodically
and never save our password in our Internet browser to maintain the security of
password.
(b) There is a section in the form that includes security questions which makes it
possible for us to retrieve the password in case we forget it. The question that we
choose to answer in the form is asked by Google to verify our identity.
(c) In the next section of the form, we have to type the code shown in the box for
security reasons.
(d) At the end we have to agree to the Terms of Service. After reading the text properly,
we click on I Agree.

30
(v) After completing the form and agreeing to the terms and conditions, our e-mail account
is created and we receive a new e-mail address and a password.
2. On successfully logging into an e-mail account, several options like Inbox, Drafts, Compose
and Sent Mail are visible on the screen.
Inbox: It contains the received mails.
Compose Mail: This option is used to write and send new messages to others. On clicking this
option, we get a window to fill in the following details.
• To: Enter the e-mail address of the recipient in this box. Without filling the details of the
recipient, the e-mail cannot be sent.
• Cc: Cc is the short form of Carbon Copy. In this box, we can enter the e-mail address of the
person to whom we would like to send the copy of our mail. This is optional.
• Bcc: Bcc is the short form of Blind Carbon Copy. In this box, we can enter the e-mail address
of another recipient who receives the copy of the mail but whose name and address are
hidden from all other recipients. This is also optional.
• Subject: We write the subject of the message in this box. Recipients see the subject of the
mail in the summary of their incoming messages.
• Body of the Mail: This box is for typing the main content of the message. This message can
be of any length.
• Attachment: Any type of attachment in the form of a document, photo, audio or video can
be sent along with a mail. Names of the files that we send are displayed in the attachment
box.
• Reply: When we receive a message, we may want to respond to it. For this, the e-mail
window has a Reply option. We click on this option to open a new window. We will see that
Subject line will automatically appear in the message.
Address Book: The at sign (@) is part of every e-mail address. E-mail programs have an
address book feature where we can record the e-mail addresses and other information of
people we frequently keep in touch. This saves time and avoids mistakes in typing those
e-mail addresses again and again.
3. It is important to be careful while sending and receiving e-mails. Take care of the given points
while doing the same.
• Keep the e-mail address as private as possible. Spammers will send lots of unsolicited
e-mails if they get hold of it.
• If a website requests the e-mail address, try to avoid giving it unless absolutely necessary.
It’s a good idea to set up an alternate e-mail account for such communications, as this will
help to reduce the risk of spam in the personal account.
• Send images, sound, music, animations and even videos via e-mail as attachments.
• While sending attachment, try and use file formats that can be read by many types of
computers, such as text files and jpeg images. If the two computers use different operating
systems, such as Apple and PC, compatibility can sometimes be an issue. While sending a
text, paste it into the body of the e-mail and this will be readable on any computer.
• Always use a virus scanner before opening any attachment, even from known people.
Spammers and virus writers can spoof or hijack genuine e-mail names and addresses to
conceal their true origins.

31
• Track an e-mail to its original location. If Microsoft Outlook is used, for example, right-click
on the message and then select Option from the pop-up menu. Scroll down the text and
find the name of the original sender.
• Always scan outgoing e-mails thus not sending anyone a virus or some other computer
nasty.
• Before sending an e-mail, check and re-check the address. Remember, even if it’s just one
character out, it will not be received. Clicking the Reply box in an e-mail and then writing
the message will ensure the correct address.
• Never ever reply to spam. It will simply generate more spam.
• Spam filters can help, but they are not infallible. Complain to Internet service provider if
lots of spam from the same source are received.
4. Some of the rules that should be followed when we are online are listed below.
• Be courteous and respectful to others who are online.
• Use emoticons while communicating. These are small icons showing different emotions.
By using emoticons, we can convey our emotions clearly to the recipient.
• Avoid capital letters. Words in capitals draw unnecessary attention and can be considered
as being rude.
• Do not abuse others while participating in a discussion forum or message boards.
• Before posting any question, do some research on the topic. Do not ask inappropriate
questions.
• Keep personal information private and do not share with anyone.
• Contents we see on web pages are protected by copyright laws. We should not steal or use
them as own.
• People who are new to the Internet are called newbies. We should be patient and helpful
to newbies, and teach them what we have learnt.
5. The word ‘blog’ comes from the word ‘weblog’ coined by Jorn Barger on 17 December 1997.
The short form ‘blog’ was coined by Peter Merholz, who jokingly broke the word ‘weblog’ into
the phrase ‘we blog’. A blog is a website that can be created easily by any user for himself
to share his thoughts and ideas with the world. There are many different types of blogs,
differing not only in the type of content, but also in the way that content is delivered. There
are personal blogs, corporate and organizational blogs, political blogs, travel blogs and many
other types of blogs. The topic of the blog can be anything – personal, professional, social,
political or any topic on any subject. Most good quality blogs are interactive, allowing visitors
to leave comments to a blogger’s postings.

8. Introduction to HTML

A. Tick [] the correct option.


1. (c) 2. (d) 3. (a) 4. (a) 5. (b)
B. Fill in the blanks.
1. instructions 2. tags 3. left 4. Meta-information
5. line break

32
C. Match the following columns.
(i) (h) (ii) (g) (iii) (f ) (iv) (a) (v) (b) (vi) (c)
(vii) (d) (viii) (e)
D. Short answer questions
1. HTML provides us with the following benefits.
(i) HTML is easy to learn and execute. It executes commands in very less time.
(ii) We can create a structured document using different tags in HTML.
(iii) HTML is an interpreter-based language as its commands are executed instruction by
instruction.
2. WYSIWYG (What You See Is What You Get) editors allow the users to do editing directly within
the web browser. It is not important to have the knowledge of HTML while working with
WYSIWYG editors. These editors allow the users to see how the page will be displayed in a
web browser. They are easier to work with even for a novice computer user.
3. Adobe Dreamweaver and Microsoft FrontPage are two popular WYSIWYG editors.
4. To create a web page in HTML, follow the steps given below.
(i) Click on the Start button.
(ii) Choose Accessories option from the All Programs menu.
(iii) Click on Notepad option to open the Notepad editor.
(iv) In the Notepad, type the program.
5. The <BODY> tag encloses all the tags, attributes and information that we want the visitor’s
browser to display. It forms the body of an HTML page.
E. Long answer questions
1. WYSIWYG editors: WYSIWYG (What You See Is What You Get) editors allow the users to do
editing directly within the web browser. It is not important to have the knowledge of HTML
while working with WYSIWYG editors. These editors allow the users to see how the page
will be displayed in a web browser. They are easier to work with even for a novice computer
user. These editors are equipped with graphical interfaces and tools for developing web
pages and inserting images, tables, lists, hyperlinks, etc. The WYSIWYG editors help to create
the websites quickly. Some of the popular WYSIWYG editors are Adobe Dreamweaver and
Microsoft FrontPage.
Text editors: Text editors incorporate the use of HTML. Text editors like WordPad and Notepad
can be used to create HTML documents. Text editors provide a variety of features like HTML
validator, auto-completion of coding, FTP, syntax highlighting, table generator and URL
highlighting.
These editors can only be used by the users who have some knowledge of HTML.
2. For saving a web page, follow the steps given below.
(i) Click on the File menu and select Save option.
(ii) Select All Files option from the Save as type box.
(iii) In the Save As dialog box, type the file name, e.g., My First Page.html.
(iv) Click on the Save button to save the web page.

33
3. There are various HTML elements that can be listed to construct a web page. An HTML tag
comprises of a left angular bracket or a less than symbol (<) followed by the name of the tag
and closed by a right angular bracket or a greater than symbol (>). Various essential document
structure elements are <HTML>…</HTML>, <HEAD>…</HEAD> and <BODY>…</BODY>.

HTML elements are of two types: Container Elements and Empty Elements.
(i) Container Elements: The element that has both the tags, i.e., the starting tag as well as
the ending tag is known as a Container Element. So, the Container Elements include
both ON tag (Starting Tag) and OFF tag (Ending Tag). The OFF tag is same as the ON tag
except for the / used after < sign. For example, to define a text as a first level heading, we
use H1 tags as shown below.
<H1> Computer Fundamentals </H1>
The following code illustrates the Container Elements.
<HTML>
<BODY>
<H1> Computer Fundamentals </H1>
</BODY>
</HTML>
(ii) Empty Elements: The elements that have the starting tag (i.e., ON tag) only and have no
end tag (i.e., OFF tag) are called Empty Elements. For example, <BR> is an Empty Element
which is used to give a line break as illustrated in the following code.
<HTML>
<BODY>
<H1> Computer Fundamentals </H1>
RAVI ARORA <BR>
RIA BANSAL <BR>
Viva Books
</BODY>
</HTML>
4. • HTML Element: HTML document must begin with the <HTML> tag. It is a Container
Element that identifies the document as HTML document. This tag indicates that the
content of a file is in HTML. This element is not visible when displayed on the browser, but
gives a hint to the browser that the document is an HTML document.
• HEAD Element: The <HEAD> tag contains information about the document, indicating
its title, scripts used, style definitions and document descriptions. All the browsers do not
require this tag, but most browsers find any available additional information about the
document within the <HEAD> tag. The head element contains general information, also
called Meta-information (Meta means information about something) about a document
or a web page. According to the HTML standard, only a few tags such as <BASE>, <LINK>,
<META>, <TITLE>, <STYLE> and <SCRIPT> are used under the <HEAD> element.
5. We can make the text bold, italicized and/or underlined using <B>, <I> and <U> tags as
discussed below.

34
• B Element: It indicates that the enclosed text should be displayed in bold face. The
following code displays the text ‘ANNA HAZARE’ in bold face.
<HTML>
<BODY>
<B> ANNA HAZARE </B>
</BODY>
</HTML>
• I Element: It indicates that the enclosed text should be displayed in an italic typeface. To
display the text ‘Jan Lokpal’ in italic typeface, give the following command and obtain the
output.
<HTML>
<BODY>
<I> Jan Lokpal </I>
</BODY>
</HTML>
• U Element: The text enclosed within the <U> and the </U> tags is displayed with an
underline. The blank spaces between the words are also underlined. To display the text
‘India Against Corruption’ with an underline, give the following command to obtain the
desired output.
<HTML>
<BODY>
<U> India Against Corruption </U>
</BODY>
</HTML>

9. Computer Viruses

A. Tick [] the correct option.


1. (c) 2. (d) 3. (b) 4. (a) 5. (b)
B. Fill in the blanks.
1. protected disk 2. Trojan horse 3. antivirus 4. extensions 5. care
C. Write true (T) for a correct statement and false (F) for an incorrect statement.
1. True 2. True 3. False 4. True 5. False
D. Short answer questions
1. A computer virus performs the following actions.
• It can infect the executable program files like Microsoft Word and operating system
programs.

35
• It can infect the file before it is attached to an e-mail message or transferred to a disk. Thus,
the virus spreads from one computer to another.
2. A virus enters a computer mostly through e-mails, instant messages and risky websites.
The virus software attaches to programs such as word processor or spreadsheet. Every time
we open the original file, the virus multiplies and spreads to other programs. Some viruses
multiply or replicate faster and corrupt every file we store in the computer.
3. Viruses become active when we start an infected application or start the computer from
the disk that contains virus. Once the virus is in the computer memory, it usually affects any
application we run.
4. Some popular antivirus software are listed below.
• Norton
• AVG
• Avast
• Kaspersky
• McAfee
• Symantec
• SmartDog
5. To avoid viruses from entering our computer, we must update information about recent
viruses in the antivirus program. Care must be taken while we browse the Internet, download
files or open an e-mail attachment. By doing these things, we can keep our computer free
from harmful virus programs.

E. Long answer questions


1. A computer virus is a program or a set of programs designed specially to affect the normal
functioning of a computer. It is created by a programmer to harm memory, processing speed,
essential data and programs of a computer system. It can copy itself, attach itself to other
applications or files and infect a computer. It can enter the computer through an infected
floppy, CD, pen drive or the Internet. It is usually intended to affect a computer adversely,
without the user’s knowledge.
Computer viruses find and attach themselves to an item in the computer system such as the
start-up memory area or executable file. Most viruses stay active in the computer memory
until we turn off the computer.
2. A virus enters a computer mostly through e-mails, instant messages and risky websites. The
virus software attaches to programs such as word processor or spreadsheet.
Every time we open the original file, the virus multiplies and spreads to other programs.
Some viruses multiply or replicate faster and corrupt every file we store in the computer. The
performance of our computer system will be severely lowered and maintenance will become
difficult.
Computer viruses usually spread in one of the three ways.
(i) From removable media
(ii) From files downloaded from the Internet and
(iii) From e-mail attachments

36
Although the Internet gets a bad name as a source of viruses, we are more likely to get a
virus from a pirated software. To protect our files, we should scan everything that we have
downloaded from the Internet and update our antivirus software regularly.
E-mail is not the breeding ground for virus, rather it is made out to be. In fact, it is nearly
impossible for a virus to be transmitted through plain-text e-mail. Most viruses can only
spread via attachments – either text-rich e-mail or attached applications.
Viruses become active when we start an infected application or start the computer from
the disk that contains virus. Once the virus is in the computer memory, it usually affects any
application we run.
3. Any virus should never be thought harmless and ignored. There are many virus removal tools
that one can use to detect and remove viruses. The tool that is used to remove viruses from a
computer is called an antivirus. An antivirus is also a software program that detects the virus
and removes it immediately. Antivirus software are application software designed to detect
and remove the virus from the computer system. Whenever the computer system is started,
antivirus starts automatically. It checks for virus in all the directories and files of computer
system. When the virus is detected, it removes that virus. Some popular antivirus software are
listed below.
• Norton
• AVG
• Avast
• Kaspersky (It is well-known for its high detection rate.)
• McAfee
• Symantec
• SmartDog
4. Most viruses are designed to avoid detection by the computer user. But there are a few signs
that indicate the presence of a virus in our computer.
• The computer begins to operate slower than normal.
• The computer does not respond to our instructions and shuts down frequently.
• The computer restarts often on its own.
• Applications we store in the computer do not work as usual.
• Some or the whole part of disk drives becomes difficult to access.
• Strange error messages might show up on the screen.
• A virus-infected file will have double extensions such as image.jpg.vbs or image.jpg.exe.
• Strange icons appear on our desktop that are not related to any program.
5. (a) Direct Action Viruses affect the documents in the folder or directory and replicate them
again in the same place where they are located. The execution of these viruses is triggered
when the system is booted every time.
(b) Overwrite Viruses damage or remove the data present in those documents that they
infect, thus making them useless at last. The only option left is to delete this useless file.
(c) Boot Viruses infect a part of a hard disk or a floppy drive. It is the crucial part of a disk
where the operating system and boot programs will be stored. The boot sector viruses
are executed when the computer is restarted. These viruses are almost extinct as floppy
disks are outdated now.

37
(d) File Infectors are the common PC viruses that are designed to affect executable files and
application programs. Usually, these viruses accompany the free stuff downloaded from
the Internet.

10. Computer Security

A. Tick [] the correct option.


1. (d) 2. (a) 3. (c) 4. (d) 5. (d)
B. Fill in the blanks.
1. Computer security 2. digital 3. Decryption
4. Internet banking 5. malware

C. Match the following columns.


(i) (h) (ii) (f ) (iii) (g) (iv) (a) (v) (b) (vi) (c)
(vii) (d) (viii) (e)

D. Short answer questions


1. Damage to computer hardware and software, data loss, computer fraud and theft, and
invasion of privacy are some of the common dangers we face while using computers.
2. The process of verifying a user’s identity and his/her right to access a system is known as
authentication.
3. The disadvantage of a password-protected system is that it gives access to anybody who
can provide the password, without being able to verify the source of the password. Hence, if
someone else gets to know the password of a user, he/she can login to the system.
4. Biometric authentication refers to the process of identifying individuals by using their
physiological and behavioural characteristics. In more advanced and critical systems, unique
biometric attributes are used as keys. Since they are unique and cannot be stolen, these
authentication mechanisms provide greater security.
5. Face Recognition: The analyzis of facial features is done by scanning a person’s face. It helps
to authenticate an individual’s identity.
Iris Recognition: The structure of the iris is very distinctive. Iris identification is done by
scanning the iris of the eye. Iris recognition is one of the best ways of authentication in high
risk situations.

E. Long answer questions


1. We secure our computer to prevent the following.
• Theft of hardware
• Interruption of services
• Piracy of information
• Damage to hardware or information

38
• Unauthorized modification of information
• Illegal confining of information or resources
2. The following points should be kept in mind while creating a password.
• Do not use personal information like last name or date of birth as a part of password.
These can be easily guessed.
• Create a password by mixing different character types to make it difficult to guess.
• Avoid using a password with repetitive letters or numbers.
• Try using a unique phrase as a password.
• Always set up password recovery options which can be of help in case the password is
forgotten.
3. Encryption is the process of converting data and information into a form that is not readable
by anyone. It is the most effective way to achieve data security. Encryption is a common
technique used to protect data from misuse. Data can be encrypted when they are stored
or when being transferred over a network from one computer to another. One area where
encryption is widely used is Internet banking. In Internet banking, sensitive information like
passwords, information about bank balances, instructions for transfer of funds, etc. are sent
across the Internet, making it vulnerable to the possibility that somebody might tap it. The
data are encrypted at the point of origin and decrypted only at the destination computer. So,
even if someone gets access to them, he/she will not be able to decipher them.
4. (a) Biometrics is the science of measuring and analyzing characteristics of the human body.
(b) Decryption is the process of converting encrypted data back into a readable form.
(c) Logging in is the process of gaining entry into a system by virtue of providing a valid
username and password.
5. Important data can be lost due to several factors – hardware failure, human error, sabotage
or malicious software. One way to lessen this risk is to take regular backup of critical data.
Taking a backup refers to the process of making one or more copies of important data to
fall back on in the event of the loss of the original data. A personal computer user can take a
backup by simply copying important files onto an external storage device like a CD, floppy
disk or pen drive. Bigger systems need more elaborate backup strategies.
Firewall is a special security program that acts like a gatekeeper and prevents unauthorized
access to a computer network system. A firewall inspects every data packet that arrives at a
network and decides, on the basis of a set of predefined rules, whether to let it pass or not.

39
Viva Dot Com 7
Assessment Sheets
Assessment Sheets

Assessment Sheet 1

A. Tick (P) the right option.


1. A _________________ chart is used to plot the data for a single data series.
Column Line

Pie Bar
2. ___________________ calculates the sum of a range of numbers.
AutoSum Date & Time

Average Max
3. __________________ is/are a logical operator(s).
AND OR

NOT All of these


4. ____________________ is the rectangular area where graphics, text and video clips are
drawn or placed.
Title bar Stage

Timeline panel Layer panel


5. The short cut command to insert a keyframe in Flash window is _______________.
Ctrl + Enter F8

F6 F12

B. Define the following terms.


1. Chart Area 2. Functions 3. Expressions
4. Layers 5. Animation

C. Match the following columns.


Column A Column B
1. X-axis (a) Converts to symbol
2. Y-axis (b) Groups an object
3. Ctrl + G (c) Plays a movie in Flash
4. Ctrl + Enter (d) Vertical axis of a chart
5. F8 (e) Horizontal axis of a chart

41
D. Write true (T) or false (F).

1. Flash is a tool used to create animations for the web pages.

2. Tint tweening is used to change the colour of an object.

3. The Input command prints the output.

4. We can relocate a chart from MS Excel to MS Word.

5. Text tool helps us to copy the text on the stage.

E. Give two examples of each of the following.

1. Components of a chart

____________________________________  ____________________________________

2. Types of chart

____________________________________  ____________________________________

3. Basic selection tools in Flash

____________________________________  ____________________________________

4. Short cut command in Flash

____________________________________  ____________________________________

5. Types of operation in QBASIC

____________________________________  ____________________________________

F. Answer the following questions.

1. What is the use of Ink Bottle tool? Write the steps to use it.
2. What do you mean by Motion Guide? Write the steps to create it.
3. What are the different types of operators? Explain any one of them.
4. What is the use of Input command in QBASIC?
5. What are the different components of a chart? Describe any three of them.

42
Assessment Sheet 2

A. Tick (P) the right option.

1. _____________________ is/are arithmetic operator(s).


Addition Division

Multiplication All of these


2. ______________ command is used to clear the screen.
REM CLS

INPUT PRINT
3. The layer shown by default in Flash is _______________________________.
Normal layer Guide and Guided layer

Mask layer None of these


4. An image in a movie is called ______________________.
Stage Motion tween

Frame Layer
5. ____________________ key is used to play the movie.
F5 Ctrl + Enter

Shift + Enter F12

B. Fill in the blanks.


1. _________________________ is the movement of an object or change in its size in an
animation.
2. The _________________ command is written at the end of program.
3. The _________________________ loop executes until the condition becomes false.
4. ______________________ is a list of mathematical and trigonometric functions.
5. The __________________________ statement tests a particular condition and asks the
computer true or false questions only.

C. Write true (T) or false (F).


1. The repeated execution of a group of program statements is known
as looping.

2. Symbol is a component of Flash window.

3. Masking can be used to hide objects under a mask.

43
4. Relational operators are used to perform logical operations on numerical
values.

5. XY Scatter chart is used for comparing a pair of values.

D. Give one word for the following.

1. The type of chart which emphasizes the magnitude


of change in data over time. _______________________
2. A large group of functions on the Formulas tab of
the Ribbon. _______________________
3. The command used to assign a numeric or string
constant to variables. _______________________
4. Used to select irregular or smaller parts of an
object in Flash window. _______________________
5. Made up of frames and layers. _______________________

E. Differentiate between the following.

1. Bar chart and Pie chart


2. Max function and Count function
3. Numeric constants and String constants
4. REM and LET
5. FOR…NEXT LOOP and DO…LOOP

F. Answer the following questions.

1. Write the steps to start Adobe Flash CS3.


2. Write the steps to rotate an object.
3. Differentiate between DO WHILE…LOOP and DO UNTIL…LOOP.
4. Write a program in QBASIC to accept any two numbers and print their sum.
5. Write the steps to change the data included in a chart.

44
Assessment Sheet 3

A. Tick (P) the right option.

1. Safari web browser is developed by ___________________.


Apple Inc Opera

MS Office Google
2. __________________ is/are search engines.
Google Yahoo

Rediff All of these


3. A ___________________ element has both the starting and the ending tags.
Container Empty

Both of these None of these


4. ______________________ is a popular text editor in MS Windows.
MS Word MS Access

Notepad MS PowerPoint
5. ____________ editors allow the users to do editing directly within the web browser.
WYSIWYG YWSIWYG

WSIWYG YWSIWGY

B. Define the following terms.

1. Web browser 2. Plug-ins 3. E-mail address


4. HTML editors 5. Boot sector viruses

C. Match the following columns.

Column A Column B

1. Google (a) Address of the web page
2. URL (b) Adobe Dreamweaver
3. Bcc (c) Search engine
4. WYSIWYG editor (d) Symantec
5. Antivirus software (e) Blind carbon copy

D. Write true (T) or false (F).

1. Mozilla Firefox is a search engine.

45
2. HTML is an interpreter-based language.

3. An HTML document must begin with the HEAD tag.

4. Firewall is a security program.

5. A password is usually a series of alphanumeric characters.

E. Give two examples of each of the following.

1. Web browser
____________________________________  ____________________________________
2. Search engine
____________________________________  ____________________________________
3. Computer virus
____________________________________  ____________________________________
4. HTML tag
____________________________________  ____________________________________
5. Antivirus software
____________________________________  ____________________________________

F. Answer the following questions.

1. Explain the two types of web browser.


2. How can you download a file?
3. Write the steps to attach files to an e-mail.
4. What are HTML editors?
5. What are worms?

46
Assessment Sheet 4

A. Tick (P) the right option.

1. An attribute that determines the font size is ______________.


SIZE COLOR

FACE none of these

2. Bcc stands for __________________________________.

blind carbon control basic carbon copy

basic copy blind carbon copy

3. ____________________ is a text browser.

Gopher Mozilla Firefox

Safari Google Chrome

4. To close our account, we have to click on __________________ option.

Sign in Sign out

Send Compose

5. The tag used to make the text italicized is __________.

<ITAL> <IU>

<I> <U>

B. Fill in the blanks.

1. _________________ are the people who are new to the Internet.

2. E-mail is sent and received through a ____________________.

3. _________________________ was originally called Phoenix.

4. We use ___________________________ for searching information on the web.

5. Opera is a _____________________________ developed by Opera Software.

C. Write true (T) or false (F).

1. Browsers have address bar which shows the web address of the page.

2. Compose Mail option is used to write a new message.

3. The <HEAD> tag encloses all the tags.

47
4. The FACE attribute sets the typeface or font style.

5. Symantec is a computer virus.

D. Give one word for the following.

1. An element that has both the starting and


the ending tags ________________________

2. A website to share ideas and thoughts ________________________

3. A type of memory for accessing the data quickly ________________________

4. The process of converting encrypted data back


into a readable form ________________________

5. The process of gaining entry into a system by


virtue of providing a valid username and password ________________________

E. Differentiate between the following.

1. TITLE element and BODY element


2. Computer Virus and Antivirus
3. Boot virus and Directory virus
4. Encryption and Decryption
5. Bcc and Cc

F. Answer the following questions.

1. What are the advantages of an e-mail?


2. List some rules that you should follow when you are online.
3. Write a note on blog.
4. What do you mean by authentication? List some common ways of authentication.
5. Write the HTML code for displaying the web page shown below.

48
Answers to Assessment Sheets

Assessment Sheet 1

A. 1. Pie 2. AutoSum 3. All of these 4. Stage 5. F6


B. 1. Chart Area refers to the area within which all chart components are found.
2. A function is a built-in formula in MS Excel that is used to carry out common mathematical
calculations. Functions save us from writing lengthy formulae.
3. An expression refers to a combination of constants and variables along with operators in a
particular format that is evaluated to obtain the desired result. The result that we get can be
in the form of string, numeric or logical value (True or False). The result can be stored in a
variable.
4. Layers are like multiple film strips stacked on top of the other, each containing a different
image that appears on the Stage.
5. Animation is the rapid display of a sequence of 2D or 3D images in order to create an optical
illusion of movement.
C. 1. (e) 2. (d) 3. (b) 4. (c) 5. (a)
D. 1. T 2. T 3. F 4. T 5. F
E. 1. Data series and Chart title 2. Line chart and Column chart
3. Selection tools and Lasso tools 4. Ctrl + Enter and F6
5. Arithmetic and Logical
F. 1. Using the Ink Bottle tool, we can select the stroke colour and change the colour, width and
style of the outlines and lines drawn.
The various steps to use the Ink Bottle tool are listed below.
(i) Click on the Ink Bottle tool to select it.
(ii) In the Property Inspector perform the following actions.
(a) Select the Stroke colour.
(b) Select the Stroke height.
(c) Select the Stroke style.
(iii) Click on the object whose stroke properties are to be changed. The new stroke properties
will get applied to the object.
2. Motion Guide is nothing but moving a symbol in a predefined path such as a curve or circle
and thus creating an animation effect.
The various steps to create Motion Guide in Flash are listed below.
(i) Create a graphic symbol or drag a pre-existing graphic symbol from Library onto the
Stage. Name the layer as Graphic. We can also take a picture from MS Word Clip Art and
paste it in Flash.
(ii) Right-click on the Graphic label and select Add Motion Guide from the pop-up window.
(iii) A new layer will appear on the top of the Graphic layer with the label Guide: Graphic
along with the guide icon.
(iv) Draw the path for the symbol in this new layer using Pencil or Line tool.
(v) Right-click on the object and click on Break Apart to define the path.
(vi) Select Frame 50 of Guide layer and press F5 to insert frames.

49
(vii) Now, go to Frame 1 of Graphic layer and drag the symbol to one end of the path. While
dragging, a bubble on the symbol will be seen. That bubble should go right below the
path.
(viii) Now, go to Frame 50 of Graphic layer and press F6 to insert a new keyframe.
(ix) Then, drag the symbol to the other end of the path. Again, the bubble should go right
below the path.
(x) Select any frame from 1 to 50 of the Graphic layer.
(xi) Right-click and select Create Motion Tween from the pop-up menu.
(xii) Press the keys Ctrl + Enter together to view the work. Save the work by pressing
Ctrl + S keys and test the movie by pressing the keys Ctrl + Enter.
3. There are three types of operators in QBASIC: Arithmetic, Relational and Logical.
Arithmetic Operators: The operator which operates on a numeric constant and variable is
called an arithmetic operator. It always gives a numeric output. Following are the arithmetic
operators in QBASIC.

Operator Arithmetic symbol Example


Addition + x+y
Subtraction – x–y
Multiplication * x*y
Division / x/y
Exponential ^ x^y
Parentheses () x + (y * z)

4. The INPUT command takes data from the user of a program during its execution. The user
gives the data that are assigned to a variable.
5. The various components of a chart are Data series, X-axis, Y-axis, Chart title, Axis title, Chart
area, Plot area, Legend, Gridlines and Data label.
Data Series: It refers to the data entries from which a chart is derived. A chart can have one or
more than one data series.
X-Axis: It is the horizontal axis of a chart. It is also known as the category axis.
Y-Axis: It is the vertical axis of a chart. It is also known as the value axis. The value of each data
point is plotted on this axis.
Chart Title: It is usually placed at the top of a chart which helps the users to understand what
the chart represents.
Chart Area: It refers to the area within which all chart components are found.

Assessment Sheet 2
A. 1. All of these 2. CLS 3. Normal layer 4. Frame 5. Ctrl + Enter
B. 1. Tweening 2. END 3. Do While...Loop
4. Math & Trig 5. IF...THEN...ELSE
C. 1. T 2. F 3. T 4. F 5. T
D. 1. Area chart 2. Function library 3. LET 4. Lasso tool 5. Timeline
E. 1. Bar Chart: A bar chart illustrates comparisons among individual items through a cluster of
bars.

50
Pie Chart: A pie chart is used to plot the data for a single data series. Each data point is
represented by one slice of the circular pie chart.
2. Max: It finds the maximum value of the selected argument.
Count: It finds the number of cells that contain a numerical value within a range of the
argument.
3. Numeric Constant: Any numeric value, an integer or a real number, positive or negative, is
called a numeric constant. Numeric constants are used for mathematical operations such as
addition, subtraction, multiplication and division.
String Constant: Alphanumeric or string constants contain a sequence of characters (letters,
numbers and symbols) enclosed within double quotation marks. String constants are used to
represent non-numeric qualities such as names and addresses.
4. REM: REM stands for ‘Remark’. REM is used at the beginning of a program to give it a name,
a comment line or an instruction for the program. It is used to give important information
about the program such as the name of the person who wrote the program or the purpose
of the program, etc.
LET: LET command is used to assign a numeric or string constant to variables. However, the
use of word LET is optional.
5. FOR...NEXT LOOP: It is generally used as a counter loop when we know exactly how many
times we need to execute the loop.
DO LOOP: It is a block of commands where the program does not have to loop a certain
number of times like in FOR...NEXT loop. It can loop indefinitely. The DO LOOP has two forms
in QBASIC: DO WHILE...LOOP and DO UNTIL...LOOP.
F. 1. The various steps to start Adobe Flash CS3 are listed below.
(i) Click on the Start button to select All Programs.
(ii) From the sub-menu, select Adobe.
(iii) Click on Adobe Flash CS3 to open it.
2. The various steps to rotate an object are listed below.
(i) Select Selection tool from the Tool box.
(ii) Position the mouse pointer over the object to be selected.
(iii) Select the Free Transform tool from the toolbar.
(iv) Click and drag the rotation handle to rotate the object.
(v) An outline of the object appears on rotation.
(vi) Release the mouse button. The object is rotated.
3. The DO WHILE…LOOP executes until the condition becomes false. The syntax is:
DO WHILE <conditions>
<statements>
LOOP
The DO UNTIL…LOOP executes until the condition becomes true. The syntax is:
DO UNTIL <condition>
<statements>
LOOP
4. CLS
INPUT “ENTER A NUMBER”; N1
INPUT “ENTER A NUMBER”; N2
LET RESULT = N1 + N2
PRINT N1; “+”; N2; “=”; RESULT
END

51
5. The various steps to change the data included in the chart are listed below.
(i) Click on the chart to select it.
(ii) Click on the Select Data button from the Data group of the Design tab of the Ribbon.
A Select Data Source dialog box appears. Make the required changes in it.
(iii) Click on the OK button. Changes are reflected in the chart.

Assessment Sheet 3

A. 1. Apple Inc 2. All of these 3. Container 4. Notepad 5. WYSIWYG


B. 1. A web browser is a software application used to access web pages on the Internet. It locates
and displays web pages on the World Wide Web.
2. Plug-ins are programs that are installed in a browser to enable it to play various types of
media. Examples of plug-ins include QuickTime Player and Flash Player.
3. To send or receive e-mails, we need to have an address called the e-mail address. An e-mail
address functions like the postal address. It denotes the location on the Internet where a
message has to be sent. An e-mail address usually consists of three parts: the username, the
@ symbol and the domain name.
4. HTML editors are programs used for creating web pages. They make HTML formatting faster
and easier.
5. The virus that infects a part of a hard disk or a floppy drive is referred to as boot sector virus. It
is the crucial part of a disk where the operating system and boot programs will be stored. The
boot sector viruses are executed when the computer is restarted. These viruses are almost
extinct as floppy disks are outdated now.
C. 1. (c) 2. (a) 3. (e) 4. (b) 5. (d)
D. 1. F 2. T 3. F 4. T 5. T
E. 1. Google Chrome and Mozilla Firefox 2. Google and Yahoo
3. Boot sector virus and Trojans 4. HTML tag and HEAD tag
5. Symantec and Norton
F. 1. Browsers are mainly of two types: Graphical and Text.
Graphical browsers such as Internet Explorer, Mozilla Firefox, Netscape, Opera and Google
Chrome can display text, images, and audio and video files. They are available for operating
systems like Windows, Apple and Linux. We can even download and install a graphical
browser on our computer.
A text browser shows web pages with only text and no graphics or animation. So, it provides
access to the web in text mode only. Gopher is a popular text browser.
2. When we click on a link to open a file, it may download automatically. But sometimes it just
opens within a browser instead of downloading. To prevent it from opening in the browser,
we can right-click the link and select Save Target As... We will be able to choose the folder to
save the file.
3. The various steps to attach a file to an e-mail are listed below.
(i) Click on the Attach option in the New Message box. An Insert Attachment dialog box
appears.
(ii) Locate and select the files to be attached, and then click on Attach. Repeat this step for
each file to be added.
(iii) The attached file information appears in the New Message box.

52
(iv) Click on the Send button after typing the e-mail address of the recipient. We may type
the subject of the mail and the message as well. The copy of the sent message is stored
in the Sent folder.
4. HTML editors are programs used for creating web pages. They make HTML formatting faster
and easier. The two most commonly used HTML editors are WYSIWYG editors and text editors.
5. A worm is a small software program that uses computer networks and takes advantage of
security weaknesses to replicate. The worm sends its files through the cables that connect
many computers.

Assessment Sheet 4

A. 1.
SIZE 2. blind carbon copy 3. Gopher 4. Sign out 5. <I>
B. 1.
Newbies 2. mail server 3. Mozilla Firefox
4.
search engine 5. web browser
C. 1.
T 2. T 3. F 4. T 5. F
D. 1.
Container element 2. Blog 3. Cache memory
4.
Decryption 5. Logging in
E. 1.
TITLE Element: The <TITLE> element contains the document title. This title is displayed on the
topmost bar of the browser. This element is used in the <HEAD> tag.
BODY Element: The <BODY> tag encloses all the tags, attributes and information that we
want the visitor’s browser to display. It forms the body of an HTML page.
2. Computer Virus: A computer virus is a program or a set of programs designed specially to
affect the normal functioning of a computer. It is created by a programmer to harm memory,
processing speed, essential data and programs of a computer system.
Antivirus: Antivirus software are application software designed to detect and remove the
virus from the computer system.
3. Boot Virus: The virus that infects a part of a hard disk or a floppy drive is referred to as boot
sector virus. It is the crucial part of a disk where the operating system and boot programs
will be stored. The boot sector viruses are executed when the computer is restarted. These
viruses are almost extinct as floppy disks are outdated now.
Directory Virus: These viruses are designed to change the location of the infected file. So
when we execute it, we will never know that we have run a virus.
4. Encryption is the process of converting data and information into a form that is not readable
by anyone. It is the most effective way to achieve data security.
Decryption is the process of converting encrypted data back into readable form.
5. Bcc: Bcc is the short form of Blind Carbon Copy. In this box, we can enter the e-mail address of
another recipient who receives the copy of the mail, but whose name and address are hidden
from all other recipients.
Cc: Cc is the short form of Carbon Copy. In this box, we can enter the e-mail address of the
person to whom we would like to send the copy of our mail.
F. 1. An e-mail offers the following benefits to the user.
(i) Cheap: Once we are online, there is no further expense we need to incur to send our
mails. Nothing is charged for sending and receiving e-mails even though the message is
sent across the world.
(ii) Easy to Store: Sent and received messages and attachments can be stored safely, logically
and reliably.

53
(iii) Easy to Use: Sending and receiving messages is simple. Using an address book of e-mail
service, contacts can be accessed easily and quickly.
(iv) Easy to Prioritize: Incoming messages have subject line that means we can delete them
without opening.
(v) Fast: E-mail is by far the fastest means of written communication. A message can reach
to any part of the world in a fraction of a second.
(vi) Global: Web based e-mail means we can access our messages anywhere when we are
online.
2. Some of the rules that we should follow when we are online are listed below.
• Be courteous and respectful to others who are online.
• Use emoticons while communicating. These are small icons showing different emotions.
By using emoticons, we can convey our emotions clearly to the recipient.
• Avoid capital letters. Words in capitals draw unnecessary attention and can be considered
as being rude.
• Do not abuse others while participating in a discussion forum or message boards.
• Before posting any question, do some research on the topic. Do not ask inappropriate
questions.
• Keep personal information private and do not share with anyone.
• Contents we see on web pages are protected by copyright laws. We should not steal or
use them as our own.
3. The word ‘blog’ comes from the word ‘weblog’ coined by Jorn Barger on 17 December 1997.
The short form ‘blog’ was coined by Peter Merholz. A blog is a website that can be created
easily by any user for himself/herself to share his/her thoughts and ideas with the world.
There are many different types of blogs, differing not only in the type of content, but also in
the way that content is delivered.
4. The process of verifying a user’s identity and his/her right to access a system is known as
authentication. Password protection, biometric authentication and encryption are the
common ways of authentication.
5. <HTML>
<HEAD>
<TITLE> Antivirus software </TITLE>
</HEAD>
<BODY>
<FONT SIZE=5 COLOR=“BLUE” FACE=“Times New Roman”, “Arial”, “Lucida Sans”>
<H1> Antivirus Software </H1>
AVG <BR>
SmartDog <BR>
McAfee <BR>
Norton <BR>
Symantec
</BODY>
</HTML>

54
Additional Lab Activities
and Projects
Additional Lab Activities and Projects
Lab Activities

1. Generate a bill for the given items in MS Excel. Get the total amount to be paid using AutoSum
feature.

S. No. Item Price in ` Quantity

1. Notebook 30 2

2. Pen 10 5

3. Eraser 5 5

4. Scale 15 2

5. Book 150 1

2. Type and run a program to print numbers from 200 to 250 using repetition construct.
3. Draw an aeroplane and animate it in Flash window.
4. Send an e-mail to any five of your friends informing them about the Sports Day function in
your school.
5. In Notepad, type the HTML code for creating a web page that displays list of some popular
web browsers and search engines.
6. Draw a train and animate it in Flash window.
7. Send an e-mail to your friend telling him about your summer vacations.
8. Create an MS Word document on the topic ‘The Delhi Sultanate’. Use the Internet for searching
the related information and pictures.
9. Collect information on the topic ‘Major Landforms’ using the Internet and create a PowerPoint
presentation on the same. Also, insert related pictures.
10. Using the Internet, collect information on the topic ‘Kings and Kingdoms of the Early Medieval
Period’ and create a PowerPoint presentation on the same. Also insert related pictures.

Projects

1. Using the Internet, collect information about different types of computer virus and antivirus
software and prepare a report.

56
2. Divide the class into groups and hold a discussion on the topic of ‘Importance of Netiquettes
while using the Internet’.
3. Using the Internet, collect information on ‘Weather, Climate and Adaptations of Animals’ and
create a PowerPoint presentation on the same.
4. Type a QBASIC program to accept any two numbers and print the greater of the two numbers.
5. Create a PowerPoint presentation on ‘Types of Charts and their Uses’.
6. Create a PowerPoint presentation on ‘Tools used in Flash Window’.
7. Using the Internet, collect information on the topic ‘Respiration in Organisms’ and create a
PowerPoint presentation on the same.
8. Using the Internet, collect information on the topic ‘Electric Current and Its Effects’ and
prepare a project report.
9. Create a project report on the topic ‘Heat’. Use the Internet for searching information. Also,
insert related pictures.
10. Find the names of tools available in Tool Palette of Flash window.

M P L A S S O K A D G H R B

I N K B O T T L E Y O O L R

K V S E L E C T I O N G F U

F R E E T R A N S F O R M A

R E C T A N G L E W T F N H

W E N A T E X T T O O L D E

Answer:

Lasso, Ink Bottle, Selection, Free Transform, Rectangle, Text

57

You might also like