Computer Worksheet Viva
Computer Worksheet Viva
Worksheets
Worksheets
1
3. Each data point is represented by one slice of a circular pie chart.
4. An area chart is similar to a bar chart.
5. The Background option is present on the Layout tab of the Ribbon.
D. Short answer questions
1. What is data series?
2. What is data label?
3. Name the most commonly used charts.
4. How is line chart useful?
5. Name the tabs on which Chart Tools are present.
E. Long answer questions
1. How is an area chart different from a bar chart?
2. How can you change the data included in a chart?
3. How will you modify the labels and titles?
4. Write a note on Chart Tools.
5. Describe the given terms.
(a) Chart area
(b) Data series
(c) Gridlines
(d) X-axis
2
2. MS Excel: Formulae and Functions
3
D. Short answer questions
1. What does a formula produce?
2. How can we enter formulae?
3. What is a function? How is it helpful?
4. Name the various categories present in the Function Library.
5. Write about the Financial feature of the Function Library.
4
3. More on QBASIC
5
3. What do you understand by data type?
4. What is arithmetic operator?
5. Why do we use greater than or equal to operator?
6
4. Editing in Flash
7
D. Short answer questions
1. What is Flash?
2. Name the parts of a Flash window.
3. How is Stage different from Work Area in Flash?
4. Why do we use Group command in Flash?
5. Name the three types of symbols.
8
5. Animation and Layers in Flash
C. Write true (T) for a correct statement and false (F) for an incorrect statement.
1. Animation is a series of still images.
2. Every fifth frame of the Timeline is blue in colour.
3. We can select a portion of an image on the Stage and fill a linear gradient colour in it.
4. An object cannot be added or edited on a layer without affecting the objects on other layers.
5. Tint tweening is used to change the colour of an object.
9
D. Short answer questions
1. What happens on viewing an animation?
2. What are gradients?
3. What are layers?
4. How can you make a layer active?
5. What is Motion tween?
10
6. Working with Web Browsers
11
D. Short answer questions
12
7. Introduction to E-mail
13
8. Introduction to HTML
14
D. Short answer questions
15
9. Computer Viruses
C. Write true (T) for a correct statement and false (F) for an incorrect statement.
1. A computer virus can copy itself, attach itself to other applications or files.
2. A virus cannot infect a computer hardware.
3. A virus cannot infect the executable programs.
4. A few signs can indicate the presence of a virus in our computer.
5. Antivirus cannot remove the virus from a computer system.
16
D. Short answer questions
17
10. Computer Security
18
D. Short answer questions
19
Answers to Worksheets
20
(ii) On the Layout tab, click on the Chart Title or the Data Labels button from the Labels group.
A drop-down menu appears. Select the appropriate option from the drop-down menu.
(iii) Change the Chart Title or the Data Labels and press the Enter key.
4. The Chart Tools appear on the Ribbon when we click on the chart. The tools are located on
three tabs: Design, Layout and Format.
• From the Design tab, we can choose the Chart Type, Chart Layout, Styles and Location.
• On the Layout tab, we have many options to choose from and select for the chart. We can
insert Pictures, Shapes, Text Boxes, Labels or Background to our chart.
• Under the Format tab, we will find many options to modify the Shape Styles, WordArt
Styles or Size of the chart.
5. (a) Chart area is the area within which all the chart components are found.
(b) Data series is collection of entries from which a chart is derived.
(c) Gridlines are lines running from X and Y axes separately.
(d) X-axis is the horizontal axis of a chart.
21
(iv) Press the Enter key.
(v) The result will appear in the selected cell.
2. The errors that MS Excel shows are listed in the table given below.
Errors Possible reasons
##### The column is not wide enough to display the numbers.
#DIV/0! The formula contains an invalid operation – division by 0.
#N/A Data are not available.
3. More on QBASIC
22
B. Fill in the blanks.
1. F5, RUN, Start 2. Four 3. string 4. 7. % 5. $
C. Write true (T) for a correct statement and false (F) for an incorrect statement.
1. False 2. True 3. True 4. False 5. True
D. Short answer questions
1. The Immediate window shows the immediate execution and output of the PRINT command.
2. A program in QBASIC is made up of four basic elements: Characters, Data Types, Operators
and Statements.
3. Data type means the kind or type of data to be stored in a memory location. Data are always
stored in a named memory location. In QBASIC, data can be constant data (constants) or
variable data (variables). Both constants and variables can further be classified as string
(alphanumeric) or numeric.
4. The operator which operates on a numeric constant and variable is called the arithmetic
operator. It always gives a numeric output.
5. We use greater than or equal to operator to check if the first value is greater than or equal to
the second value.
E. Long answer questions
1. In QBASIC, variables are also of two types: Numeric and Alphanumeric.
(i) Numeric Variables: A numeric variable is always used to represent a numeric value. The
name of a numeric variable must start with a letter but can have letters or numbers or
both as the rest of the characters. It ends with the character %.
(ii) Alphanumeric or String Variables: The name of an alphanumeric or string variable always
begins with a letter, but can include special characters as well as digits. It ends with the
character $.
2. An expression refers to a combination of constants and variables along with operators in a
particular format that is evaluated to obtain the desired result. The result that we get can be
in the form of string, numeric or logical value (True or False). The result can be stored in a
variable.
For example,
(A + B) < C
CUBOIDVOLUME = L*B*H
There can be more than one operator in an arithmetic expression.
In QBASIC, a hierarchy is maintained in all the operators.
The table given below shows the hierarchies for all the operators.
Arithmetic operators Relational operators Logical operators
Parentheses () = NOT
Exponent ^ > AND
Multiplication and division *, / < OR
Integer division \ <>
Modulus (Remainder) MOD <=
Addition and subtraction +, – >=
23
It is important to note that the algebraic expressions have to be converted into QBASIC
expressions before using them in programming.
The following table shows the conversion of some algebraic expressions into QBASIC
expressions.
3. REM Command: REM stands for ‘Remark’. REM is used at the beginning of a program to give
it a name, a comment line or an instruction for the program. It is used to give important
information about the program such as the name of the person who wrote the program or
the purpose of the program, etc. REM statements do not affect the way a program runs.
CLS Command: CLS is a command used to clear the output screen. It makes the screen
completely black. However, when we run our program without clearing the screen before it
starts, it shows the remains of the program running previously.
4. Looping: Repetitive constructs allow a specified group of statements to be executed a certain
number of times. This repeated execution of a group of program statements is known as
looping.
Iteration: Every repetition of a loop is known as iteration. Iteration means to repeat something
over and over again.
5. FOR...NEXT LOOP: It is generally used as a counter loop when we know exactly how many
times we need to execute the loop.
DO LOOP: It is a block of commands where the program does not have to loop a certain
number of times like in FOR...NEXT loop. It can loop indefinitely. The DO LOOP has two forms
in QBASIC: DO WHILE...LOOP and DO UNTIL...LOOP.
The DO WHILE…LOOP executes until the condition becomes false. The DO UNTIL…LOOP
executes until the condition becomes true.
4. Editing in Flash
24
D. Short answer questions
1. Flash is a multimedia graphic program used for creating animations, games, cartoons, text,
graphics and other special effects. Flash is a powerful designing tool. It allows effective
animation and programming to create animations and web pages.
2. Menu Bar, Tool Palette, Layers Panel, Title Bar, Timeline Panel, Info Panel, Work Area and
Property Inspector Window are the various components of a Flash window.
3. Stage: Stage is the rectangular area where graphics, text and video clips are drawn or placed
and animation is created.
Work Area: Work Area refers to the light grey area around the Stage. We can place objects
here until we want them to appear on the Stage.
4. When an object is drawn, the fill and stroke portions are separate. It means the border area is
independent of the content portion of the object. It may cause a problem while transforming
or moving the object. A drawing may consist of many objects of different shapes and sizes
with borders and outlines. It is difficult to move or transform these objects together on the
Stage. While selecting an object, a part of it could be left, which means the object with its
parts needs to be grouped into one object. Hence, we use Group command in Flash.
5. There are basically three types of symbols: Graphics, Buttons and Movie clips.
E. Long answer questions
1. The various steps to transform an object are listed below.
(i) Select the Selection tool from the Tool box.
(ii) Position the mouse pointer over the object to be selected.
(iii) Select the Transform tool from the toolbar.
(iv) Click and drag the handles to transform the object.
2. The various steps to use Lasso tool are listed below.
(i) Click on the Lasso tool from the Tool box. The mouse pointer changes to Lasso.
(ii) Click and drag the mouse and select the portion of the object.
(iii) Release the mouse button. Everything inside the Lasso shape gets highlighted.
3. Follow the steps given below to type text on the Stage.
(i) Click on the Text tool to select it.
(ii) Click on the Stage area. The mouse pointer turns into a crosshair with a letter A in the
bottom-right corner.
(iii) Type the text.
4. There are basically three types of symbols.
(i) Graphics: A graphic symbol is well-suited for repeated use of static images, or for creating
animations associated with the main Timeline. This is the simplest symbol to use.
(ii) Buttons: The button symbols add interactivity to the animation and respond to mouse
actions (like click, etc).
(iii) Movie Clips: These are Flash movie clips having both symbols and graphics. They have
their own non-restricted Timeline that plays independent of the main movie’s Timeline.
5. Follow the given steps to use the created symbol in a movie.
(i) Choose Library option in the Window menu to display the Library window.
25
(ii) Library window allows us to scroll through the various symbols, listed in the lower
portion of the window. The upper portion displays the symbol selected in the list.
(iii) Drag the item from the Library window on to the Stage. The item is added to the current
layer of the movie.
26
(viii) To rotate the gradient fill, drag the Gradient Rotate handle to rotate the linear gradient
clockwise.
(ix) A bounding box with editing handles appears.
2. There are three types of layers which can be created in Flash: Normal, Guide and Guided, and
Mask and Masked.
(i) Normal Layer: It is the layer shown by default in Flash wherein we can draw and animate
an object.
(ii) Guide and Guided Layer: As the name suggests this layer guides the path to the other
layers. We may draw on this layer any object of any shape and guide it to follow a certain
path as in the case of a bouncing ball. We may create a ball in one layer and make it
follow a bounce path in another layer.
(iii) Mask Layer and Masked Layer: We may place a shape or symbol on a layer and select it
as a mask layer by choosing the Selection Mask option. The layer below the mask layer is
the masked layer. It lets us define the visible or non-visible portion of the layer below the
mask layer.
3. We can lock a layer so that any further changes in the content can be avoided. To do so, follow
the given steps.
(i) Click the layer to make it active.
(ii) In the Timeline, click the black dot under the Lock column.
(iii) A Padlock icon appears, indicating the layer is now locked.
(iv) Try to drag the logo that appears on the Stage using the Selection tool. This cannot be
done because the layer is locked.
4. The various steps to create Motion Tween animation are listed below.
(i) Open a new Flash file and draw the object on the Stage.
(ii) Convert it into a symbol by choosing Modify → Convert to Symbol buttons on the Flash
window or press F8.
(iii) A Convert to Symbol box appears. Click OK to convert the object into a symbol.
(iv) Now, create the first and the final stages of animation. The Timeline contains a keyframe
on Frame 1. To create the animation, it is needed to insert a second keyframe further
along the Timeline. Click on Frame 20 of the Timeline. Select Insert → Timeline →
Keyframe options.
(v) Make sure that the keyframe at Frame 20 selected. Move the object to another location
on the Stage.
(vi) Select any frame between 2 to 19.
(vii) Select Motion from the tween pop-up menu in the Property Inspector.
(viii) Select Control → Test Movie to see the object moving gradually from one location to
another on the Stage.
(ix) Select Control → Play option to play the movie.
5. The various steps to create Shape Tween animation are listed below.
(i) Open a new Flash file. Select the first frame and draw the object to be animated on the
Stage.
(ii) Select Frame 20 and press F6 to insert a new keyframe.
27
(iii) Still keeping playhead on Frame 20, delete the object present in the working area. Now
draw a different object.
(iv) Select any frame between 2 to 19.
(v) Select Shape from the tween pop-up menu in the Property Inspector.
(vi) Now press the keys Ctrl + Enter together to view the Shape tween.
28
Safari: Safari is a web browser developed by Apple Inc. It was initially released on January 7,
2003. It is available for Macintosh, Windows operating systems, iPhone, iPod Touch and iPad.
It supports private browsing (a mode in which the record of user’s web activity is automatically
deleted). It offers features like searching bookmarks, sharing tabs between Macs and iOs
devices, and archiving web content in WebArchive format.
2. Navigation buttons help us to move around while working with the web browsers.
Sometimes, after we click on a link, we might want to go back to the previous page. We can
do this using our browser’s Back button. Once we have pressed the Back button, we can press
the Forward button to follow the link again. When we use the Back and Forward buttons, our
browser may use its web cache to display the page. The web cache stores recently viewed
web pages so that they do not need to be downloaded again. We can use the Refresh button
(sometimes called Reload) to tell the browser to load the page again. If a page is taking too
long to load, or if we have typed in the wrong URL, we use the Stop button to stop the page
from loading.
3. Many browsers allow us to open a link in a new tab. Tabs are designed to make browsing more
convenient. We can open as many links as we want and they will stay in the same browser
window instead of cluttering up our desktop’s taskbar with multiple windows.
To open a link in a new tab, we right-click the link and click on Open in New Tab.
To close a tab, we click on on the tab.
4. Plug-ins are programs that are installed in our browser to enable it to play various types of
media. Examples of plug-ins include QuickTime Player and Flash Player. Our browser may
have come with some plug-ins already installed. Once we have the necessary plug-ins, we
will be able to enjoy watching videos and playing games on websites.
5. When we enter a web address (URL) in our browser, the browser actually sends an HTTP
command to the web server. The browser directs the server to fetch and transmit the
requested web page and display the information in our browser. All web servers serving
websites and web pages support the HTTP protocol. If we know the URL of the web page we
want to open, enter the URL, for example, (http://www.mapsofindia.com/maps/delhi/) onto
the address bar. The browser will read the web address as three distinct parts.
(i) The protocol: “http”
(ii) The server name: (www.mapsofindia.com)
(iii) The file name: (maps/delhi)
The file will open on our computer. This is a shorter way to open a web page directly.
7. Introduction to E-mail
29
C. Write true (T) for a correct statement and false (F) for an incorrect statement.
1. False 2. True 3. False 4. True 5. True
D. Short answer questions
1. The advantages of an e-mail are listed below.
(i) Easy to Store: Sent and received messages and attachments can be stored safely, logically
and reliably.
(ii) Easy to Use: Sending and receiving messages is simple. Using an address book of e-mail
service, contacts can be accessed easily and quickly.
2. An e-mail service has certain drawbacks.
(i) Emotional Responses: Some e-mails may upset us or cause anger and discomfort.
(ii) Lack of Personal Touch: E-mails lack that personal touch that a handwritten card or letter
gives when it comes to relationships.
3. The various components of an e-mail window are Inbox, Compose Mail (To, Cc, Bcc, Subject,
Body of the Mail, Attachment, Reply) and Address Book.
4. We can log out from our account by clicking on Sign out option and our account will be
closed safely.
5. A blog is a website that can be created easily by any user for himself to share his thoughts and
ideas with the world. There are personal blogs, corporate and organizational blogs, political
blogs, travel blogs and many other types of blogs.
E. Long answer questions
1. An e-mail address can be created easily through an e-mail client website. The mail servers
in such websites assign every user with a unique e-mail address. Some of the websites that
provide free e-mail accounts are www.gmail.com, www.yahoomail.com and www.hotmail.
com.
The various steps to create an e-mail account with Gmail are listed below.
(i) Connect to the Internet by double-clicking the Internet Explorer or the Google Chrome.
(ii) Type gmail.com in the address bar and go to the Gmail site.
(iii) Click on the link Create an account present at the bottom.
(iv) (a) We will get a form where we have to fill in all the information that has been asked
for. We need to answer questions like our name, e-mail address we prefer, password
and date of birth. We should be very careful while creating our password. We should
make sure that we remember it. We should keep changing our password periodically
and never save our password in our Internet browser to maintain the security of
password.
(b) There is a section in the form that includes security questions which makes it
possible for us to retrieve the password in case we forget it. The question that we
choose to answer in the form is asked by Google to verify our identity.
(c) In the next section of the form, we have to type the code shown in the box for
security reasons.
(d) At the end we have to agree to the Terms of Service. After reading the text properly,
we click on I Agree.
30
(v) After completing the form and agreeing to the terms and conditions, our e-mail account
is created and we receive a new e-mail address and a password.
2. On successfully logging into an e-mail account, several options like Inbox, Drafts, Compose
and Sent Mail are visible on the screen.
Inbox: It contains the received mails.
Compose Mail: This option is used to write and send new messages to others. On clicking this
option, we get a window to fill in the following details.
• To: Enter the e-mail address of the recipient in this box. Without filling the details of the
recipient, the e-mail cannot be sent.
• Cc: Cc is the short form of Carbon Copy. In this box, we can enter the e-mail address of the
person to whom we would like to send the copy of our mail. This is optional.
• Bcc: Bcc is the short form of Blind Carbon Copy. In this box, we can enter the e-mail address
of another recipient who receives the copy of the mail but whose name and address are
hidden from all other recipients. This is also optional.
• Subject: We write the subject of the message in this box. Recipients see the subject of the
mail in the summary of their incoming messages.
• Body of the Mail: This box is for typing the main content of the message. This message can
be of any length.
• Attachment: Any type of attachment in the form of a document, photo, audio or video can
be sent along with a mail. Names of the files that we send are displayed in the attachment
box.
• Reply: When we receive a message, we may want to respond to it. For this, the e-mail
window has a Reply option. We click on this option to open a new window. We will see that
Subject line will automatically appear in the message.
Address Book: The at sign (@) is part of every e-mail address. E-mail programs have an
address book feature where we can record the e-mail addresses and other information of
people we frequently keep in touch. This saves time and avoids mistakes in typing those
e-mail addresses again and again.
3. It is important to be careful while sending and receiving e-mails. Take care of the given points
while doing the same.
• Keep the e-mail address as private as possible. Spammers will send lots of unsolicited
e-mails if they get hold of it.
• If a website requests the e-mail address, try to avoid giving it unless absolutely necessary.
It’s a good idea to set up an alternate e-mail account for such communications, as this will
help to reduce the risk of spam in the personal account.
• Send images, sound, music, animations and even videos via e-mail as attachments.
• While sending attachment, try and use file formats that can be read by many types of
computers, such as text files and jpeg images. If the two computers use different operating
systems, such as Apple and PC, compatibility can sometimes be an issue. While sending a
text, paste it into the body of the e-mail and this will be readable on any computer.
• Always use a virus scanner before opening any attachment, even from known people.
Spammers and virus writers can spoof or hijack genuine e-mail names and addresses to
conceal their true origins.
31
• Track an e-mail to its original location. If Microsoft Outlook is used, for example, right-click
on the message and then select Option from the pop-up menu. Scroll down the text and
find the name of the original sender.
• Always scan outgoing e-mails thus not sending anyone a virus or some other computer
nasty.
• Before sending an e-mail, check and re-check the address. Remember, even if it’s just one
character out, it will not be received. Clicking the Reply box in an e-mail and then writing
the message will ensure the correct address.
• Never ever reply to spam. It will simply generate more spam.
• Spam filters can help, but they are not infallible. Complain to Internet service provider if
lots of spam from the same source are received.
4. Some of the rules that should be followed when we are online are listed below.
• Be courteous and respectful to others who are online.
• Use emoticons while communicating. These are small icons showing different emotions.
By using emoticons, we can convey our emotions clearly to the recipient.
• Avoid capital letters. Words in capitals draw unnecessary attention and can be considered
as being rude.
• Do not abuse others while participating in a discussion forum or message boards.
• Before posting any question, do some research on the topic. Do not ask inappropriate
questions.
• Keep personal information private and do not share with anyone.
• Contents we see on web pages are protected by copyright laws. We should not steal or use
them as own.
• People who are new to the Internet are called newbies. We should be patient and helpful
to newbies, and teach them what we have learnt.
5. The word ‘blog’ comes from the word ‘weblog’ coined by Jorn Barger on 17 December 1997.
The short form ‘blog’ was coined by Peter Merholz, who jokingly broke the word ‘weblog’ into
the phrase ‘we blog’. A blog is a website that can be created easily by any user for himself
to share his thoughts and ideas with the world. There are many different types of blogs,
differing not only in the type of content, but also in the way that content is delivered. There
are personal blogs, corporate and organizational blogs, political blogs, travel blogs and many
other types of blogs. The topic of the blog can be anything – personal, professional, social,
political or any topic on any subject. Most good quality blogs are interactive, allowing visitors
to leave comments to a blogger’s postings.
8. Introduction to HTML
32
C. Match the following columns.
(i) (h) (ii) (g) (iii) (f ) (iv) (a) (v) (b) (vi) (c)
(vii) (d) (viii) (e)
D. Short answer questions
1. HTML provides us with the following benefits.
(i) HTML is easy to learn and execute. It executes commands in very less time.
(ii) We can create a structured document using different tags in HTML.
(iii) HTML is an interpreter-based language as its commands are executed instruction by
instruction.
2. WYSIWYG (What You See Is What You Get) editors allow the users to do editing directly within
the web browser. It is not important to have the knowledge of HTML while working with
WYSIWYG editors. These editors allow the users to see how the page will be displayed in a
web browser. They are easier to work with even for a novice computer user.
3. Adobe Dreamweaver and Microsoft FrontPage are two popular WYSIWYG editors.
4. To create a web page in HTML, follow the steps given below.
(i) Click on the Start button.
(ii) Choose Accessories option from the All Programs menu.
(iii) Click on Notepad option to open the Notepad editor.
(iv) In the Notepad, type the program.
5. The <BODY> tag encloses all the tags, attributes and information that we want the visitor’s
browser to display. It forms the body of an HTML page.
E. Long answer questions
1. WYSIWYG editors: WYSIWYG (What You See Is What You Get) editors allow the users to do
editing directly within the web browser. It is not important to have the knowledge of HTML
while working with WYSIWYG editors. These editors allow the users to see how the page
will be displayed in a web browser. They are easier to work with even for a novice computer
user. These editors are equipped with graphical interfaces and tools for developing web
pages and inserting images, tables, lists, hyperlinks, etc. The WYSIWYG editors help to create
the websites quickly. Some of the popular WYSIWYG editors are Adobe Dreamweaver and
Microsoft FrontPage.
Text editors: Text editors incorporate the use of HTML. Text editors like WordPad and Notepad
can be used to create HTML documents. Text editors provide a variety of features like HTML
validator, auto-completion of coding, FTP, syntax highlighting, table generator and URL
highlighting.
These editors can only be used by the users who have some knowledge of HTML.
2. For saving a web page, follow the steps given below.
(i) Click on the File menu and select Save option.
(ii) Select All Files option from the Save as type box.
(iii) In the Save As dialog box, type the file name, e.g., My First Page.html.
(iv) Click on the Save button to save the web page.
33
3. There are various HTML elements that can be listed to construct a web page. An HTML tag
comprises of a left angular bracket or a less than symbol (<) followed by the name of the tag
and closed by a right angular bracket or a greater than symbol (>). Various essential document
structure elements are <HTML>…</HTML>, <HEAD>…</HEAD> and <BODY>…</BODY>.
HTML elements are of two types: Container Elements and Empty Elements.
(i) Container Elements: The element that has both the tags, i.e., the starting tag as well as
the ending tag is known as a Container Element. So, the Container Elements include
both ON tag (Starting Tag) and OFF tag (Ending Tag). The OFF tag is same as the ON tag
except for the / used after < sign. For example, to define a text as a first level heading, we
use H1 tags as shown below.
<H1> Computer Fundamentals </H1>
The following code illustrates the Container Elements.
<HTML>
<BODY>
<H1> Computer Fundamentals </H1>
</BODY>
</HTML>
(ii) Empty Elements: The elements that have the starting tag (i.e., ON tag) only and have no
end tag (i.e., OFF tag) are called Empty Elements. For example, <BR> is an Empty Element
which is used to give a line break as illustrated in the following code.
<HTML>
<BODY>
<H1> Computer Fundamentals </H1>
RAVI ARORA <BR>
RIA BANSAL <BR>
Viva Books
</BODY>
</HTML>
4. • HTML Element: HTML document must begin with the <HTML> tag. It is a Container
Element that identifies the document as HTML document. This tag indicates that the
content of a file is in HTML. This element is not visible when displayed on the browser, but
gives a hint to the browser that the document is an HTML document.
• HEAD Element: The <HEAD> tag contains information about the document, indicating
its title, scripts used, style definitions and document descriptions. All the browsers do not
require this tag, but most browsers find any available additional information about the
document within the <HEAD> tag. The head element contains general information, also
called Meta-information (Meta means information about something) about a document
or a web page. According to the HTML standard, only a few tags such as <BASE>, <LINK>,
<META>, <TITLE>, <STYLE> and <SCRIPT> are used under the <HEAD> element.
5. We can make the text bold, italicized and/or underlined using <B>, <I> and <U> tags as
discussed below.
34
• B Element: It indicates that the enclosed text should be displayed in bold face. The
following code displays the text ‘ANNA HAZARE’ in bold face.
<HTML>
<BODY>
<B> ANNA HAZARE </B>
</BODY>
</HTML>
• I Element: It indicates that the enclosed text should be displayed in an italic typeface. To
display the text ‘Jan Lokpal’ in italic typeface, give the following command and obtain the
output.
<HTML>
<BODY>
<I> Jan Lokpal </I>
</BODY>
</HTML>
• U Element: The text enclosed within the <U> and the </U> tags is displayed with an
underline. The blank spaces between the words are also underlined. To display the text
‘India Against Corruption’ with an underline, give the following command to obtain the
desired output.
<HTML>
<BODY>
<U> India Against Corruption </U>
</BODY>
</HTML>
9. Computer Viruses
35
• It can infect the file before it is attached to an e-mail message or transferred to a disk. Thus,
the virus spreads from one computer to another.
2. A virus enters a computer mostly through e-mails, instant messages and risky websites.
The virus software attaches to programs such as word processor or spreadsheet. Every time
we open the original file, the virus multiplies and spreads to other programs. Some viruses
multiply or replicate faster and corrupt every file we store in the computer.
3. Viruses become active when we start an infected application or start the computer from
the disk that contains virus. Once the virus is in the computer memory, it usually affects any
application we run.
4. Some popular antivirus software are listed below.
• Norton
• AVG
• Avast
• Kaspersky
• McAfee
• Symantec
• SmartDog
5. To avoid viruses from entering our computer, we must update information about recent
viruses in the antivirus program. Care must be taken while we browse the Internet, download
files or open an e-mail attachment. By doing these things, we can keep our computer free
from harmful virus programs.
36
Although the Internet gets a bad name as a source of viruses, we are more likely to get a
virus from a pirated software. To protect our files, we should scan everything that we have
downloaded from the Internet and update our antivirus software regularly.
E-mail is not the breeding ground for virus, rather it is made out to be. In fact, it is nearly
impossible for a virus to be transmitted through plain-text e-mail. Most viruses can only
spread via attachments – either text-rich e-mail or attached applications.
Viruses become active when we start an infected application or start the computer from
the disk that contains virus. Once the virus is in the computer memory, it usually affects any
application we run.
3. Any virus should never be thought harmless and ignored. There are many virus removal tools
that one can use to detect and remove viruses. The tool that is used to remove viruses from a
computer is called an antivirus. An antivirus is also a software program that detects the virus
and removes it immediately. Antivirus software are application software designed to detect
and remove the virus from the computer system. Whenever the computer system is started,
antivirus starts automatically. It checks for virus in all the directories and files of computer
system. When the virus is detected, it removes that virus. Some popular antivirus software are
listed below.
• Norton
• AVG
• Avast
• Kaspersky (It is well-known for its high detection rate.)
• McAfee
• Symantec
• SmartDog
4. Most viruses are designed to avoid detection by the computer user. But there are a few signs
that indicate the presence of a virus in our computer.
• The computer begins to operate slower than normal.
• The computer does not respond to our instructions and shuts down frequently.
• The computer restarts often on its own.
• Applications we store in the computer do not work as usual.
• Some or the whole part of disk drives becomes difficult to access.
• Strange error messages might show up on the screen.
• A virus-infected file will have double extensions such as image.jpg.vbs or image.jpg.exe.
• Strange icons appear on our desktop that are not related to any program.
5. (a) Direct Action Viruses affect the documents in the folder or directory and replicate them
again in the same place where they are located. The execution of these viruses is triggered
when the system is booted every time.
(b) Overwrite Viruses damage or remove the data present in those documents that they
infect, thus making them useless at last. The only option left is to delete this useless file.
(c) Boot Viruses infect a part of a hard disk or a floppy drive. It is the crucial part of a disk
where the operating system and boot programs will be stored. The boot sector viruses
are executed when the computer is restarted. These viruses are almost extinct as floppy
disks are outdated now.
37
(d) File Infectors are the common PC viruses that are designed to affect executable files and
application programs. Usually, these viruses accompany the free stuff downloaded from
the Internet.
38
• Unauthorized modification of information
• Illegal confining of information or resources
2. The following points should be kept in mind while creating a password.
• Do not use personal information like last name or date of birth as a part of password.
These can be easily guessed.
• Create a password by mixing different character types to make it difficult to guess.
• Avoid using a password with repetitive letters or numbers.
• Try using a unique phrase as a password.
• Always set up password recovery options which can be of help in case the password is
forgotten.
3. Encryption is the process of converting data and information into a form that is not readable
by anyone. It is the most effective way to achieve data security. Encryption is a common
technique used to protect data from misuse. Data can be encrypted when they are stored
or when being transferred over a network from one computer to another. One area where
encryption is widely used is Internet banking. In Internet banking, sensitive information like
passwords, information about bank balances, instructions for transfer of funds, etc. are sent
across the Internet, making it vulnerable to the possibility that somebody might tap it. The
data are encrypted at the point of origin and decrypted only at the destination computer. So,
even if someone gets access to them, he/she will not be able to decipher them.
4. (a) Biometrics is the science of measuring and analyzing characteristics of the human body.
(b) Decryption is the process of converting encrypted data back into a readable form.
(c) Logging in is the process of gaining entry into a system by virtue of providing a valid
username and password.
5. Important data can be lost due to several factors – hardware failure, human error, sabotage
or malicious software. One way to lessen this risk is to take regular backup of critical data.
Taking a backup refers to the process of making one or more copies of important data to
fall back on in the event of the loss of the original data. A personal computer user can take a
backup by simply copying important files onto an external storage device like a CD, floppy
disk or pen drive. Bigger systems need more elaborate backup strategies.
Firewall is a special security program that acts like a gatekeeper and prevents unauthorized
access to a computer network system. A firewall inspects every data packet that arrives at a
network and decides, on the basis of a set of predefined rules, whether to let it pass or not.
39
Viva Dot Com 7
Assessment Sheets
Assessment Sheets
Assessment Sheet 1
Pie Bar
2. ___________________ calculates the sum of a range of numbers.
AutoSum Date & Time
Average Max
3. __________________ is/are a logical operator(s).
AND OR
F6 F12
41
D. Write true (T) or false (F).
1. Components of a chart
____________________________________ ____________________________________
2. Types of chart
____________________________________ ____________________________________
____________________________________ ____________________________________
____________________________________ ____________________________________
____________________________________ ____________________________________
1. What is the use of Ink Bottle tool? Write the steps to use it.
2. What do you mean by Motion Guide? Write the steps to create it.
3. What are the different types of operators? Explain any one of them.
4. What is the use of Input command in QBASIC?
5. What are the different components of a chart? Describe any three of them.
42
Assessment Sheet 2
INPUT PRINT
3. The layer shown by default in Flash is _______________________________.
Normal layer Guide and Guided layer
Frame Layer
5. ____________________ key is used to play the movie.
F5 Ctrl + Enter
43
4. Relational operators are used to perform logical operations on numerical
values.
44
Assessment Sheet 3
MS Office Google
2. __________________ is/are search engines.
Google Yahoo
Notepad MS PowerPoint
5. ____________ editors allow the users to do editing directly within the web browser.
WYSIWYG YWSIWYG
WSIWYG YWSIWGY
Column A Column B
1. Google (a) Address of the web page
2. URL (b) Adobe Dreamweaver
3. Bcc (c) Search engine
4. WYSIWYG editor (d) Symantec
5. Antivirus software (e) Blind carbon copy
45
2. HTML is an interpreter-based language.
1. Web browser
____________________________________ ____________________________________
2. Search engine
____________________________________ ____________________________________
3. Computer virus
____________________________________ ____________________________________
4. HTML tag
____________________________________ ____________________________________
5. Antivirus software
____________________________________ ____________________________________
46
Assessment Sheet 4
Send Compose
<ITAL> <IU>
<I> <U>
1. Browsers have address bar which shows the web address of the page.
47
4. The FACE attribute sets the typeface or font style.
48
Answers to Assessment Sheets
Assessment Sheet 1
49
(vii) Now, go to Frame 1 of Graphic layer and drag the symbol to one end of the path. While
dragging, a bubble on the symbol will be seen. That bubble should go right below the
path.
(viii) Now, go to Frame 50 of Graphic layer and press F6 to insert a new keyframe.
(ix) Then, drag the symbol to the other end of the path. Again, the bubble should go right
below the path.
(x) Select any frame from 1 to 50 of the Graphic layer.
(xi) Right-click and select Create Motion Tween from the pop-up menu.
(xii) Press the keys Ctrl + Enter together to view the work. Save the work by pressing
Ctrl + S keys and test the movie by pressing the keys Ctrl + Enter.
3. There are three types of operators in QBASIC: Arithmetic, Relational and Logical.
Arithmetic Operators: The operator which operates on a numeric constant and variable is
called an arithmetic operator. It always gives a numeric output. Following are the arithmetic
operators in QBASIC.
4. The INPUT command takes data from the user of a program during its execution. The user
gives the data that are assigned to a variable.
5. The various components of a chart are Data series, X-axis, Y-axis, Chart title, Axis title, Chart
area, Plot area, Legend, Gridlines and Data label.
Data Series: It refers to the data entries from which a chart is derived. A chart can have one or
more than one data series.
X-Axis: It is the horizontal axis of a chart. It is also known as the category axis.
Y-Axis: It is the vertical axis of a chart. It is also known as the value axis. The value of each data
point is plotted on this axis.
Chart Title: It is usually placed at the top of a chart which helps the users to understand what
the chart represents.
Chart Area: It refers to the area within which all chart components are found.
Assessment Sheet 2
A. 1. All of these 2. CLS 3. Normal layer 4. Frame 5. Ctrl + Enter
B. 1. Tweening 2. END 3. Do While...Loop
4. Math & Trig 5. IF...THEN...ELSE
C. 1. T 2. F 3. T 4. F 5. T
D. 1. Area chart 2. Function library 3. LET 4. Lasso tool 5. Timeline
E. 1. Bar Chart: A bar chart illustrates comparisons among individual items through a cluster of
bars.
50
Pie Chart: A pie chart is used to plot the data for a single data series. Each data point is
represented by one slice of the circular pie chart.
2. Max: It finds the maximum value of the selected argument.
Count: It finds the number of cells that contain a numerical value within a range of the
argument.
3. Numeric Constant: Any numeric value, an integer or a real number, positive or negative, is
called a numeric constant. Numeric constants are used for mathematical operations such as
addition, subtraction, multiplication and division.
String Constant: Alphanumeric or string constants contain a sequence of characters (letters,
numbers and symbols) enclosed within double quotation marks. String constants are used to
represent non-numeric qualities such as names and addresses.
4. REM: REM stands for ‘Remark’. REM is used at the beginning of a program to give it a name,
a comment line or an instruction for the program. It is used to give important information
about the program such as the name of the person who wrote the program or the purpose
of the program, etc.
LET: LET command is used to assign a numeric or string constant to variables. However, the
use of word LET is optional.
5. FOR...NEXT LOOP: It is generally used as a counter loop when we know exactly how many
times we need to execute the loop.
DO LOOP: It is a block of commands where the program does not have to loop a certain
number of times like in FOR...NEXT loop. It can loop indefinitely. The DO LOOP has two forms
in QBASIC: DO WHILE...LOOP and DO UNTIL...LOOP.
F. 1. The various steps to start Adobe Flash CS3 are listed below.
(i) Click on the Start button to select All Programs.
(ii) From the sub-menu, select Adobe.
(iii) Click on Adobe Flash CS3 to open it.
2. The various steps to rotate an object are listed below.
(i) Select Selection tool from the Tool box.
(ii) Position the mouse pointer over the object to be selected.
(iii) Select the Free Transform tool from the toolbar.
(iv) Click and drag the rotation handle to rotate the object.
(v) An outline of the object appears on rotation.
(vi) Release the mouse button. The object is rotated.
3. The DO WHILE…LOOP executes until the condition becomes false. The syntax is:
DO WHILE <conditions>
<statements>
LOOP
The DO UNTIL…LOOP executes until the condition becomes true. The syntax is:
DO UNTIL <condition>
<statements>
LOOP
4. CLS
INPUT “ENTER A NUMBER”; N1
INPUT “ENTER A NUMBER”; N2
LET RESULT = N1 + N2
PRINT N1; “+”; N2; “=”; RESULT
END
51
5. The various steps to change the data included in the chart are listed below.
(i) Click on the chart to select it.
(ii) Click on the Select Data button from the Data group of the Design tab of the Ribbon.
A Select Data Source dialog box appears. Make the required changes in it.
(iii) Click on the OK button. Changes are reflected in the chart.
Assessment Sheet 3
52
(iv) Click on the Send button after typing the e-mail address of the recipient. We may type
the subject of the mail and the message as well. The copy of the sent message is stored
in the Sent folder.
4. HTML editors are programs used for creating web pages. They make HTML formatting faster
and easier. The two most commonly used HTML editors are WYSIWYG editors and text editors.
5. A worm is a small software program that uses computer networks and takes advantage of
security weaknesses to replicate. The worm sends its files through the cables that connect
many computers.
Assessment Sheet 4
A. 1.
SIZE 2. blind carbon copy 3. Gopher 4. Sign out 5. <I>
B. 1.
Newbies 2. mail server 3. Mozilla Firefox
4.
search engine 5. web browser
C. 1.
T 2. T 3. F 4. T 5. F
D. 1.
Container element 2. Blog 3. Cache memory
4.
Decryption 5. Logging in
E. 1.
TITLE Element: The <TITLE> element contains the document title. This title is displayed on the
topmost bar of the browser. This element is used in the <HEAD> tag.
BODY Element: The <BODY> tag encloses all the tags, attributes and information that we
want the visitor’s browser to display. It forms the body of an HTML page.
2. Computer Virus: A computer virus is a program or a set of programs designed specially to
affect the normal functioning of a computer. It is created by a programmer to harm memory,
processing speed, essential data and programs of a computer system.
Antivirus: Antivirus software are application software designed to detect and remove the
virus from the computer system.
3. Boot Virus: The virus that infects a part of a hard disk or a floppy drive is referred to as boot
sector virus. It is the crucial part of a disk where the operating system and boot programs
will be stored. The boot sector viruses are executed when the computer is restarted. These
viruses are almost extinct as floppy disks are outdated now.
Directory Virus: These viruses are designed to change the location of the infected file. So
when we execute it, we will never know that we have run a virus.
4. Encryption is the process of converting data and information into a form that is not readable
by anyone. It is the most effective way to achieve data security.
Decryption is the process of converting encrypted data back into readable form.
5. Bcc: Bcc is the short form of Blind Carbon Copy. In this box, we can enter the e-mail address of
another recipient who receives the copy of the mail, but whose name and address are hidden
from all other recipients.
Cc: Cc is the short form of Carbon Copy. In this box, we can enter the e-mail address of the
person to whom we would like to send the copy of our mail.
F. 1. An e-mail offers the following benefits to the user.
(i) Cheap: Once we are online, there is no further expense we need to incur to send our
mails. Nothing is charged for sending and receiving e-mails even though the message is
sent across the world.
(ii) Easy to Store: Sent and received messages and attachments can be stored safely, logically
and reliably.
53
(iii) Easy to Use: Sending and receiving messages is simple. Using an address book of e-mail
service, contacts can be accessed easily and quickly.
(iv) Easy to Prioritize: Incoming messages have subject line that means we can delete them
without opening.
(v) Fast: E-mail is by far the fastest means of written communication. A message can reach
to any part of the world in a fraction of a second.
(vi) Global: Web based e-mail means we can access our messages anywhere when we are
online.
2. Some of the rules that we should follow when we are online are listed below.
• Be courteous and respectful to others who are online.
• Use emoticons while communicating. These are small icons showing different emotions.
By using emoticons, we can convey our emotions clearly to the recipient.
• Avoid capital letters. Words in capitals draw unnecessary attention and can be considered
as being rude.
• Do not abuse others while participating in a discussion forum or message boards.
• Before posting any question, do some research on the topic. Do not ask inappropriate
questions.
• Keep personal information private and do not share with anyone.
• Contents we see on web pages are protected by copyright laws. We should not steal or
use them as our own.
3. The word ‘blog’ comes from the word ‘weblog’ coined by Jorn Barger on 17 December 1997.
The short form ‘blog’ was coined by Peter Merholz. A blog is a website that can be created
easily by any user for himself/herself to share his/her thoughts and ideas with the world.
There are many different types of blogs, differing not only in the type of content, but also in
the way that content is delivered.
4. The process of verifying a user’s identity and his/her right to access a system is known as
authentication. Password protection, biometric authentication and encryption are the
common ways of authentication.
5. <HTML>
<HEAD>
<TITLE> Antivirus software </TITLE>
</HEAD>
<BODY>
<FONT SIZE=5 COLOR=“BLUE” FACE=“Times New Roman”, “Arial”, “Lucida Sans”>
<H1> Antivirus Software </H1>
AVG <BR>
SmartDog <BR>
McAfee <BR>
Norton <BR>
Symantec
</BODY>
</HTML>
54
Additional Lab Activities
and Projects
Additional Lab Activities and Projects
Lab Activities
1. Generate a bill for the given items in MS Excel. Get the total amount to be paid using AutoSum
feature.
1. Notebook 30 2
2. Pen 10 5
3. Eraser 5 5
4. Scale 15 2
5. Book 150 1
2. Type and run a program to print numbers from 200 to 250 using repetition construct.
3. Draw an aeroplane and animate it in Flash window.
4. Send an e-mail to any five of your friends informing them about the Sports Day function in
your school.
5. In Notepad, type the HTML code for creating a web page that displays list of some popular
web browsers and search engines.
6. Draw a train and animate it in Flash window.
7. Send an e-mail to your friend telling him about your summer vacations.
8. Create an MS Word document on the topic ‘The Delhi Sultanate’. Use the Internet for searching
the related information and pictures.
9. Collect information on the topic ‘Major Landforms’ using the Internet and create a PowerPoint
presentation on the same. Also, insert related pictures.
10. Using the Internet, collect information on the topic ‘Kings and Kingdoms of the Early Medieval
Period’ and create a PowerPoint presentation on the same. Also insert related pictures.
Projects
1. Using the Internet, collect information about different types of computer virus and antivirus
software and prepare a report.
56
2. Divide the class into groups and hold a discussion on the topic of ‘Importance of Netiquettes
while using the Internet’.
3. Using the Internet, collect information on ‘Weather, Climate and Adaptations of Animals’ and
create a PowerPoint presentation on the same.
4. Type a QBASIC program to accept any two numbers and print the greater of the two numbers.
5. Create a PowerPoint presentation on ‘Types of Charts and their Uses’.
6. Create a PowerPoint presentation on ‘Tools used in Flash Window’.
7. Using the Internet, collect information on the topic ‘Respiration in Organisms’ and create a
PowerPoint presentation on the same.
8. Using the Internet, collect information on the topic ‘Electric Current and Its Effects’ and
prepare a project report.
9. Create a project report on the topic ‘Heat’. Use the Internet for searching information. Also,
insert related pictures.
10. Find the names of tools available in Tool Palette of Flash window.
M P L A S S O K A D G H R B
I N K B O T T L E Y O O L R
K V S E L E C T I O N G F U
F R E E T R A N S F O R M A
R E C T A N G L E W T F N H
W E N A T E X T T O O L D E
Answer:
57