0% found this document useful (0 votes)
1K views35 pages

Go Har Computer Science Key Book 07

Uploaded by

Tariq Naveed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views35 pages

Go Har Computer Science Key Book 07

Uploaded by

Tariq Naveed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 35

Gohar Computer Science 7

Key Book

Unit 1

Exercise

A. Answer the following questions.


1. What is the system unit?
Ans. A collection of component elements that work together to perform a task
makes a system. We can say that the combination of some components and their
relationship makes a system. Here, system unit is used for a combination of
hardware components. The system unit, in desktop computers, is also called the
system box. It contains the processor, memory, disk drives, power supply, and
communication interfaces. The input devices, output devices, and peripherals are
attached to it.
2. How many shapes does a desktop system box has? Describe them.
Ans. Desktop computers have two shapes of system box:
i. Tower
Towers are upright rectangles. They are usually kept under the desk, or in a
cabinet under the desk. They can also be kept on the floor. A relatively
smaller form is called mini tower.
ii. Desktop
Desktops are flat rectangles. They can be kept on the desk. They are used to save
the space.
3. Name the components of the motherboard.
Ans. Following are the components of a motherboard:
1 PS2 port (Keyboard & Mouse)
2 S/PDIF ports
3 SATA 3 ports
4 IEEE ports
5 USB port 2.0 (Black)
6 USB port 3.0 (blue)
7 Audio ports
8 Heat sink
9 PCI slots
1
10 CMOS battery
11 SATA 3 connectors
12 Power connector
13 Memory slots
14 Processor socket
15 LAN ports

4. Write about the following:


CPU chip
This chip is fixed on the motherboard. It is also called the processor, or
microprocessor. It heats up soon. Therefore, a fan is also fixed on its top.
This fan keeps the processor cool.

CMOS battery
All personal computers require this battery. It provides power to the
Complementary Metal Oxide Semiconductor (CMOS) chip, even while the
computer is turned off. This chip contains information about the system
configuration. The CMOS battery allows the CMOS to preserve the
configuration settings.
Cache memory
Cache (pronounced as cash) memory is placed between CPU and main
memory. Frequently used program code or data are stored in it. It can be
accessed even before the RAM. It increases the performance this way.

5. What do you understand by compatibility of a processor?


Ans. Processors differ from each other by the instruction set. If the same
program can run on two different computer brands they are said to be
compatible. Programs written for IBM compatible computers usually do not run
on Apple computers. It is because the two architectures are not compatible.

6. Describe the parts of a microprocessor.


Ans. The CPU is composed of several units: Control Unit, Arithmetic Logic Unit,
Registers, and Clock Unit.
The control unit directs and controls the activities of the internal and external
devices. It interprets the instructions fetched into the computer, determines what
data, if any, are needed, where it is stored, where to store the results of the
operation, and sends the control signals to the devices involved in the execution
of the instructions.
Arithmetic and logic unit are the units
2
The arithmetic and logic unit (ALU) is the part where actual computations take
place. It consists of circuits which perform arithmetic operations (e.g. addition,
subtraction, multiplication, division) over data received from memory and capable
to compare numbers.

Registers are a temporary memory area inside the CPU. Registers are used for
memory addressing, data manipulation and processing. Some of the registers are
general purpose and some are reserved for certain functions. It is a high-speed
memory which holds only data for immediate processing and results of this
processing. If these results are not needed for the next instruction, they are sent
back to the main memory and registers are occupied by the new data used in the
next instruction.
The clock unit regulates the rate at which instructions are executed. It also
synchronizes all the various computer components. The faster the clock,
the more instructions the CPU or processor can execute per second. The
speed or clock rate is usually measured in gigahertz (GHZ).

7. What is the difference between the primary and secondary memory?


Ans. Primary memory is also called main memory. It holds instructions and data
for rapid and direct access by the computer's central processing unit (CPU).
Primary memory is synonymous with random-access memory (RAM). And
secondary memory is also called auxiliary memory or mass storage. It consists of
devices not directly accessible by the CPU. Hard drives, floppy disks, tapes, and
optical disks are widely used for secondary storage.
8. How many types of secondary memory devices do you know? Name them.
Ans. Names of some secondary memory devices are:
hard drive, tape disk and optical disc.
9. Describe the functions of following expansion cards:
MPEG decoder
It is used by computers to display a video
Sound card
It provides a computer with the ability to produce sound that can be heard by the
user either over speakers or headphones.
Video card
It is alternatively referred to as a graphics card, video card, video board, or a video
controller. It allows a display device such as a monitor to display images from the
computer.

3
10. Write about the following types of slots:
Accelerated Graphics Port (AGP)
AGP is a high-speed point-to-point channel for attaching a video card to a
computer's motherboard. It assists in viewing 3D computer graphics.
PCI Express (PCIe)
PCI Express is the newest standard for expansion cards on personal computers.
PCI Express has replaced older standards like PCI and AGP. PCIe provides
significantly more bandwidth, allowing for higher performance video cards and
network cards.
ISA (Industry Standard Architecture)
ISA is another type of expansion slot you may have heard of. It was the
predecessor to PCI. You will find it only on much older computers.

B. Choose the correct answer.


1. The combination of some components and their relationship makes
a) a system
b) a unit
c) hardware
d) a processor

2. Which is not a name for the motherboard?


a) circuit board
b) mainboard
c) system board
d) logic board

3. CMOS is short for


a) Complementary Metal Oxide Semiconductor
b) Complex Metal Oxide Semiconductor
c) Comprehensive Metal Oxide Semiconductor
d) Complete Metal Oxide Semiconductor

4. ________ memory can be accessed even before the RAM.


a) Cache
b) Primary
c) Secondary
d) USB

5. The part where actual computations take place is


4
a) the ALU
b) the CPU
c) the RAM
d) the motherboard

6. Term "mass storage" is a synonym for


a) secondary memory
b) primary memory
c) tertiary memory
d) USB memory

7. The new standard for expansion cards on personal computers is


a) PCI Express
b) PCI
c) AGP
d) ISA

C. Fill in the blanks with the appropriate words.


1. _____________ are flat rectangles.
2. All the major functional components, like the processor and memory, are
fixed onto the _____________.
3. The fan keeps the _____________ cool.
4. The operations a microprocessor performs are called the _____________ of
the processor.
5. Modern RAM is made of _____________ circuitry.
6. _____________ was the predecessor to PCI.

1. Desktops 2. motherboard 3. processor 4. instruction set


5. semiconductor 6. ISA

D. Name the following storage media.

Hard disk memory card CD Flash drive

5
E. Label the different parts of the motherboard.

(Labeled picture of motherboard)

Lab Activities
1. Open a system unit in the presence of your teacher and recognize the
following:
i. Motherboard ii. Processor iii. RAM iv. Hard disk
Open the system unit. With the help of pictures given in the book, try to find
them in the system unit.
2. First remove and then insert the RAM.
Follow these steps to remove memory modules:
i. Turn the computer off.
ii. Unplug the main power supply to the computer.
iii. Remove power cables from the computer.
iv. Remove the system unit cover.
v. Lay the system unit down so that the motherboard lies parallel to the
ground.
vi. Release the RAM module holding tabs.
vii. Hold the RAM module on both ends with both hands, pull the module up. It
gets removed from the RAM module slot.

Follow these steps to fix a RAM module:

i. Hold the memory module up over the slot.


ii. Align the notch on the memory module with the obstruction on the slot. If
they do not align, try to align the module by holding it on different edges
this time.
iii. Insert the memory module into the slot.
iv. Press it on both the edges. The tabs get in place and the module is fixed.
v. Fix the system unit cover and keep it in place.
vi. Insert the power cables so that the system is ready to start.

3. Recognize expansion cards and expansion slots.


Open the system unit. With the help of pictures given in the book, try to
find them in the system unit.
6
4. First remove and then insert all the extension cards onto the
motherboard.
Follow the same procedure for every extension card:
i. First of all, turn the computer off. Open the computer’s case.
ii. Locate the slot your required extension card is in or the slot your new card is
going in.
iii. Remove your old card. You'll first have to remove a small screw attached to the
back plate before you can take the card out.
iv. Press the card straight and firmly into the slot. Make sure the card is firmly in
the slot; your computer won't start up if the card isn't fully in place.
v. Replace the screw in the back plate
vi. Replace the computer case cover. Plug the computer back in.

5. First remove and then insert the processor.


Follow these steps to uninstall and reinstall the CPU:
i. Find out what type motherboard you have; different motherboards have
different sockets. Make sure your CPU is accepted by your motherboard, power
supply, and cooling components.
ii. Open the case of your computer. This is usually accomplished by a latch,
button, or other release mechanism. If necessary, refer to technical manuals to
find out how to gain access to internal components. Depending on the type and
model of your computer, a screwdriver may be needed to open the case.
iii. Remove any components such as the power supply or heat sink cover that
obstruct access to the motherboard.
iv. Remove the heat sink. This is usually an aluminum block with fins to dissipate
heat. Attached to the heat sink will usually be a fan. Unplug the fan from the
motherboard. Also remove any clips that attach the heat sink to the case or
motherboard. The CPU should now be exposed
v. Lift the latch on the side of the socket which will slightly raise the CPU, then
remove it.
vi. Insert the CPU into the socket so that the corner with fewest pins goes into the
upper right corner of the socket.
vii. Push down the latch of the socket so that the CPU is attached firmly to the
socket and motherboard.
viii. Apply the recommended amount of CPU heat transfer grease to the new
processor so that it covers the top surface.
ix. Replace the heat sink on the newly installed CPU and plug in the fan power
cable to the outlet on the motherboard.
7
x. Replace the components that you removed to give you access to the CPU,
(power supply, various cables, etc.).
xi. Reassemble or close the computer case. Make sure all internal cables are
attached to their original locations.

Unit 2

Exercise

A. Answer the following questions.


1. How is the operating system different from the application software?
Ans. An operating system (OS) is the program that is initially loaded into the
computer by a boot program. It manages all the other programs in a computer
whereas Applications Software is a program designed to perform a specific
function directly for the user.

2. Define utility programs and explain their functions.


Ans. A utility program or utility is a program that performs a specific task
related to the management of computer functions, resources, or files. The
examples of tasks performed by utility programs are such as password
protection, memory management, virus protection, and file compression.
Copying data from one storage location to another is also a utility.
3. Write five functions of Windows operating system briefly.
A. Ans. Five functions of Windows operating system are:
Booting
The process to start or restart a computer is called booting process.
The operating system consists of a supervisor portion and a set of system
programs. When the computer is switched on, the supervisor portion of the
operating system (known as kernel) is loaded in the RAM from the disk. We say
that the system has booted.
User interface:
User interface means how the user interacts with the computer to perform
various tasks. The user runs the application programs, opens the documents,
enters the data, prints the output reports, etc.– all these are examples of user
interfacing. The operating system plays the main role for interfacing between the
user and the computer.
Configuration of devices and software:
8
Windows configure both the software and hardware. Hardware configuration
means the relationship of hardware elements to each other, and the manner in
which they are electronically connected. This configuration enables interaction
between all hardware devices. The configuration is also at work in the software
settings that allow various hardware components of a computer system to
communicate with each other.
Management of programs
The main services that an operating system provides to programs are:
 Saving the data from memory in files on the disk.
 Loading the files from disk into memory.
 Sending the document on the printer.
 To copy or move data from one document to another or from one program
to another.
 The services of hardware.
 To prepare the disk to store data, etc.

Memory Management
The memory unit has very important role for data processing. The processor takes
data and program instructions from RAM during processing. The data and
programs are loaded from disk into RAM. The operating system loads the data
and programs into RAM and allocates the memory areas and manages these
properly. When the program is closed, the operating system clears the memory
area allocated to that program and its data.

4. How does Windows manage different tasks? Explain.


A. Ans. A task is an operation such as storing, printing or calculating etc. A computer
can perform many tasks at a time. For example, in word processing it accepts
input data, stores data on the disk and prints out a document simultaneously.
Some operating systems can handle more than one program at the same time.
The operating systems can perform the following tasks.
i) Multitasking
In multitasking, more than one program can be executed at a time on a single
computer. Some operating systems allow multitasking. In multitasking, you can
run multiple programs concurrently. When multiple programs are running in
different application windows, one is in the foreground called the active window
and others are in the background. You can easily switch between different
application programs running on the computer.
ii) Multiprogramming

9
In multiprogramming, different users can simultaneously run two or more
programs. This type of tasking is controlled by the multi-user operating systems
on mainframe or supercomputer where thousands of users can perform different
tasks at same time.
iii) Multiprocessing
In multiprocessing, multiple programs (more than one programs) are executed on
different processors at same time. This type of processing is very fast. Some
operating systems have features of multiprocessing and can control these types
of tasks.
iv) Time-sharing
In time-sharing, a single computer processes the tasks of multiple users at the
same time. Time-sharing is used when multiple users are connected to a single
computer in a communication network.
v) Multithreading
In multithreading operating systems a running program can start the execution of
another program before the completion of its own execution. The started
program (called child program) in turn can trigger the execution of other
programs and so on. These child programs are called threads and the top most
program is called parent program. Parent program’s execution proceeds on the
completion of execution of all its child programs or threads.
vi) Virtual memory usage
Some operating systems use virtual memory to manage multiple programs
simultaneously. Virtual memory is actually a portion of secondary storage, like a
hard disk, which is linked with actual memory (i.e. RAM). Thus a greater memory
space becomes available to running programs. This increases the speed of
computer and the user can run programs, which are larger than actual RAM
space.
vii) Spooling
Spooling is a technique in which an operating system uses buffers (a segment of
memory) to place data before transferring it from or to input/output devices. This
is done because sometime earlier data is being processed while the new data
arrives.

5. How is a new folder created at some specific location using the Computer
folder?
Ans. Do the following to create a folder:
1. In the left pane, click the drive or folder icon where the new folder will
be placed.
2. Right-click in blank area. A menu appears.
10
3. Point at New; then click the Folder.
The new folder will be created at the bottom of the right window
6. Name the photo viewer used in Windows 7. Describe its functions.
Ans. The name of the viewer is ‘Windows Picture and Fax Viewer’.
Its functions are:

 It allows successive viewing of all images in the current folder.


 You can zoom the image in or out.
 It allows basic file management from within the viewer: Delete, Save, Copy
to, Print and Open with.
 You can save/convert an image to a different format using the Copy To
(Save) button.
 You can set an image as the desktop wallpaper/background from the
context menu.
 You can print the image.
 You can view a slideshow of the images.
 Images can be rotated right or left by 90 degrees.
 Any image can be e-mailed by selecting the "Send To" option
 The viewer saves and remembers the window position and size of the
image.

7. What is the educational software? How can it be useful to students?


Ans. Educational software is computer software whose primary purpose is
teaching or self-learning. It ranges from programs for pre-school children to
straightforward typing tutors and programs that teach foreign languages.
Educational software includes programs for child-learning and home learning,
educational material for teachers and trainers, classroom aids, and computer
games for learning.

B. Choose the correct answer and circle it.


A driver acts like a __________ between the device and programs that use the
device.
a) translator
b) narrator
c) teacher
d) cleaner

When computer is switched on, the process of starting it is called

11
a) cold booting
b) surfing
c) warm booting
d) entering

The Microsoft Windows operating system is an example of


a) DOS
b) GUI
c) Command-line interface
d) Mac OS

Some operating systems use the hard disk as memory. It is called


a) the virtual memory
b) spooling
c) sharing
d) networking

In multiprocessing, multiple programs (more than one programs) are executed on


_________________ at same time.
a) different processors
b) the same processor
c) two processors
d) three processors

In the earlier versions of Windows (Windows 3.0 and 3.1), the file manager was
appropriately named "File Manager". Starting with Windows 95 and NT 4.0, it
became________________.
a) Internet Explorer
b) Windows Explorer
c) Files Explorer
d) Folders Tree

Ab Bad sector is an area on a disk that cannot_______________.


a) store data
b) read data
c) read and store data
d) play movies

C. Fill in the blanks with appropriate words.


12
1. The driver accepts ___________________ from a program and then
translates them into specialized commands for the device.
2. A utility program or utility is a program that performs a specific task related
to the _________________________, resources, or files.
3. Windows configure both the ___________________ and _____________.
4. The CD-ROM drive has the first available letter following the ____________
letters.
5. The child programs are called threads and the top most program is called
___________________ program.
6. To select a single icon, just ___________________ it with the left mouse
button.
7. The ___________________is also called the end-user application.

1. generic commands 2. management of computer functions 3.


software, hardware 4. hard drive(s) 5. parent 6. click
7. application software

D. Tick T for true and F for false statements.


1. Graphics design and editing software is a productivity software.
2. NTFS is short for New Testing File System.
3. The photo viewer allows to retrieve the deleted image files.
4. Spooling is a technique in which an operating system uses buffers.
5. The operating system loads the data and programs into RAM and
allocates the memory areas and manages them properly.
6. The configuration does not work in the software settings.
7. When you turn the computer on, the electric signals make the memory
chip active.

1. T 2. F 3. F 4. T 5. T 6. F 7. F

Unit 3

Exercise

A. Answer the following questions.


1. What do you understand by the phrase cutting edge technologies? Can
you name any three not mentioned in your lesson?
13
Ans. A latest technology with all the modern features is called a cutting-
edge technology. Names of three cutting edge technologies are:
1 Holographic TV
2 3D LED
3 Paper-Thin, flexible computers and phones
2. Explain how bar code reader works.
Ans. The bar code reader uses a laser beam that can measure the space thickness
and variation in lines through the reflected light. The reader translates the
reflected light into digital data that is transferred to a computer for immediate
action or storage.

3. Why is the fingerprint reader a better security measure than a password?


Ans. The fingerprint reader is better security because it's quite easy to copy a key
or write down an alarm code and pass it along to unauthorized persons. It's nearly
impossible to duplicate another person's fingerprint in a form that the scanner
will recognize. So this is a more effective security measure than a password.

4. What can robots do for us? Explain.


Ans. Robots perform jobs that humans find dull, dangerous or difficult. In
manufacturing, they are used for welding, riveting, scraping and painting. They
are also deployed for demolition, fire and bomb fighting, nuclear site inspection,
industrial cleaning, laboratory use, medical surgery, agriculture, forestry, office
mail delivery as well as a myriad of other tasks. Increasingly, more artificial
intelligence is being added. For example, some robots can identify objects in a
pile, select the objects in the appropriate sequence and assemble them into a
unit.
In short, robots do only what they are programmed for.

5. What is the structure of a cellphone?


Ans.
Inside your cell phone, there is a compact speaker, a microphone, a keyboard, a
display screen, and a powerful circuit board with microprocessors. They all make
each phone a miniature computer. A cellphone is basically a radio. It sends and
receives radio signals. It uses two frequencies, one for talking and the other for
listening. When connected to a wireless network, you can make phone calls, or
exchange data with other phones or computers around the world.

6. How many parts does a satellite have? Explain the role of control system.

14
Ans. A satellite usually has the following components:

1 Communication antennae
2 Power source
3 Control system
Control system:
specialized systems accomplish the tasks assigned to the satellite. Many satellites
carry cameras and scientific sensors. They may gather information about Earth's
land, air and water. Or they may collect data from the solar system and universe.
While some of the images form space look like photographs on the computer
screen, some don't. Bright colors (false colors) are often added to enhance the
contrast to make details stand out. In this way, we can see what was recorded
beyond our visual range. False colors do not correspond to the colors we normally
see. For example, a field of wheat might look pink; clear water may appear black.

7. How do you define a position through GPS?


Ans. This is a collection of 24 satellites that orbit the Earth. The GPS makes it
possible to take exact measurements of the earth surface. In this way, we can
pinpoint any location on the planet with great accuracy. It does this by
measuring the distance between a receiver’s position on Earth and at least
three satellites orbiting the Earth.
8. What is the use of the Bluetooth?
Ans. Bluetooth technology interconnects certain types of mobile phones,
computers, and other devices using a short-range wireless network. The
technology is also used for wireless keyboards, mice and similar pointing and
input devices.

B. Choose the correct answer and circle it.


Number of digits in a bar code is
8
9
10
12

The first digitally operated robot was


Anthill
Esther
Unimate
Robotoy

15
A cell phone is basically a
radio
T.V.
landline phone
satellite

Bright colors added to the images obtained through a satellite are called
power colors
true colors
real colors
false colors

Bluetooth is based on
x-rays
magnetic waves
radio waves
solar rays

C. Fill in the blanks with appropriate words.


A. The bar code reader uses a __________ beam.
B. Robots cannot solve a __________ like human beings.
C. Newer phones also provide Internet services such as __________ and
__________.
D. GPS is a collection of __________ satellites.
E. Bluetooth works efficiently within a range of __________ feet.

A. laser 2. problem 3. web browsing, email 4. 24


5. 30

D. Label the diagram of a communication satellite.

E. Tick T for true and F for false statements.


1 The 12-digit number below the bar code is called URL.
2 Robots function only on command.
3 Cellphone is a miniature computer.
16
4 Most of the satellites use dry cells for energy.
5 GPS data cannot show whether the position being measured is moving.

Ans: 1. F 2. T 3. T 4. F 5. F

Unit 4
Exercise

A. Answer the following questions.

1. What is a multimedia presentation?


Ans. . A multimedia presentation is a message that uses multimedia. It is an
instructional message consisting of multimedia designed to help in meaningful
learning, and presented to the audience.
2. Define slide and slide show?
Ans. A PowerPoint presentation consists of many slides. Each slide is single page
of a presentation created with software such as PowerPoint. These slides can be
viewed then as a slideshow. A slideshow is the presentation of all the digital slides
created in programs such as PowerPoint and shown one after the other.

3. What types of presentations can be made using PowerPoint?


Ans. The kinds of presentations that fit into this group include business and sales
presentations, workshop and conference sessions, academic lectures, in-class
reports, courtroom summations, and church choir programs.
4. What is the ribbon tab? What do you see after clicking a ribbon tab?
Ans. When you click a Ribbon Tab, it displays a wider band below it called Ribbon.
This band has many tools on it–all the tools arranged in groups, and each group is
called a Tool Group. The name of each Tool Group is displayed at its bottom. For
example, if you click the View Ribbon Tab, there will appear the following Tool
Groups: Presentation Views tool group, Show/Hide tool group, Zoom tool group,
Color/Grayscale tool group, Window tool group, and Macros tool group.
5. Name and differentiate among different fill styles.
Ans. There are three types of color fill styles:
 Solid fill: It is an even color not shaded or variegated.
17
 Gradient fill: It is a fill that is composed of two or more colors. In between
the colors is a smooth blending. You are able to rotate the angle of the fill
(linear) or have the blend radiate from a central point (radial).
 Picture or texture fill: It fills an area with some pattern.
When you select the solid fill, you can also select a fill color from the Color button
in the dialog box. When you select the gradient fill, you can also apply a
combination of colors from Preset colors. In the same way, you can choose from
the gradient Type, Direction, and Angle as well. In the same way, you can select a
background pattern of your choice from Textures.
6. Describe the process for adding a drawing to a slide.
Ans. In order to insert a drawing in a placeholder, do the following step by step:
Click Home ribbon tab. → Click Shapes on the Drawing. A number of shapes
appear. → Click the one you want to apply. The shape gets inserted shortly. →
Double-click the shape. Format ribbon appears. → Apply any formats you want.
7. How do you run a presentation?
Ans. In order to run a presentation, click the Slide show button { } on the status
bar. The slide starts. Either click or use the scroll wheel to move from on slide to
the other.

B. Choose the correct answer and circle it.


1. Multimedia uses
a) text
b) audio
c) graphics and animation
d) several different media

2. The File tab is on


a) top-left corner
b) top right corner
c) bottom right corner
d) bottom left corner

3. Dialog box launcher is a part of


a) tool groups
b) File tab
c) placeholders
d) status bar

18
4. The arrangement of all the items that make up your slide, such as title, graphics
or text boxes is called
a) slide layout
b) slide
c) presentation
d) template

5. The name of the program and the presentation displayed on


a) title bar
b) status bar
c) scroll bar
d) Home ribbon

C. Fill in the blanks with appropriate words.

1 A presentation is an instructional message consisting of


__________________.

2 __________________ fill fills an area with a pattern.

3 Slide transitions are __________________ that appear between slides.

4 In order to run a presentation, click the __________________button on the


status bar.

5 You can save your presentation by clicking the __________________ button


on the Quick Access toolbar.

Ans: 1. multimedia 2. Picture or texture 3. animation effects 4.


Slide show 5. Save

D. Label the components of the PowerPoint window.

Pic from book

E. Tick T for true and F for false.


19
1 PowerPoint is a presentation program by Open Office.org.
2 Notes Pane is a pane above the status bar.
3 Zoom Slider lets you zoom your slide in only.
4 Solid fill is an even color, not shaded or variegated.
5 The Custom animation panel appears on the left-hand side of the current
slide.

1. F 2. T 3. F 4. T 5. T

Lab Activities.
1. Prepare a presentation on the topic Parts of a Computer. The
presentation should be template based. It must include relevant pictures
also.
a. Follow all the steps described above to open a new blank presentation →
Click the Office button → Click New. A New Presentation dialog box opens.
→ Click Installed Templates/ Installed Themes in the left pane → Click the
Template or Theme you want to use → Click create. A new PowerPoint
application window opens using your selected template or theme.
b. On the first slide, write the title Parts of a Computer. On next slides, write
down text about different parts of computer. For text and pictures, go to
Google.com and search both. Copy text from any website or you’re your
book and download relevant pictures.
c. In order to add a picture from your computer, do the following:
Click Insert ribbon tab → Click the Picture button { } in the Images tool
group. An Insert Picture window opens. → Find and click the picture you
want to insert. → Click OK. The selected picture gets inserted in the current
slide.

2. Run the slide in your computer lab in the presence of your classmates and
your instructor.
In order to run a presentation, click the Slide show button { } on the
status bar. The slide starts. Either click or use the scroll wheel to move from
on slide to the other.

Unit 5

20
Exercise

A. Answer the following questions.


1. How is the email different from the traditional mail?
Ans. The traditional mail takes time, it needs a post office and a post box, it
is not secure and reliable whereas email is quick, easy and reliable, and in
some cases it is cheaper as well.
2. Define an email.
Ans. Email is the system for sending messages and other data from one
individual, or computer, to another over the Internet.
3. Write five advantages of an email.
Ans. Five advantages of an email are:
1) Email is instantly delivered. You do not have to wait for days.
2) Compared to telephone calls, faxes, or overnight courier service,
email is far less expensive.
3) Transmission through email is secure and reliable. Mostly, you receive
a failure message if your mail is not delivered to the recipient.
4) An email is rather easier than sending an ordinary envelope. You do
not have to go to a stationary shop or to buy an envelope. A
computer with internet facility is the only tool.
5) Through an email, you can send text messages, voice, or any type of
digital document or file. It is not possible through ordinary mail.

4. What is necessary to gain the advantages of email?


Ans. You must have an email account to benefit from the email facility.
5. Which email service provider do you use? Name two more other than
that.
Ans. I use Gmail. The names of the other three are:
1. Yahoo Mail
2. Hotmail
3. Hushmail

6. What is junk mail?


Ans. Junk mail means unsolicited, usually commercial, emails sent to a large
number of recipients. Actually, spam is a copy of the same message sent to many
recipients at the same time.

21
B. Choose the correct answer and circle it.
An email delivers
instantly
in an hour
overnight
after a week

User name or ID is
unique
shared
the same for two users
shared by four users

Emails are received in which folder?


Inbox
Junk
Sent
Inbox and Junk/Spam

Cc is short for
carbon paper
create contact
carbon copy
clear customer

To quit from your open email account, click


Close button
Sign out
Inbox
Sent

C. Fill in the blanks with appropriate words.


1 Electronic mail is shortly called ________________.
2 One email message can be sent to multiple ________________ at the same
time.
3 The email address is provided to you by the ________________.
4 By clicking the ________________, you can see the emails received by you.
5 Bcc is short for ________________.
22
6 To quit from your account, please do not click the ______________button
on the Title Bar.

1. email 2. redepients 3. ESP 4. Inbox 5.


carbon copy 6. close

D. Tick T for true and F for false statements.


1 It took the courier some time, almost always an hour, to deliver the
mail.
2 The part of the email address before the ‘@’ sign is the local part of the
address.
3 Spam is a copy of the same message sent to many recipients at different
times.
4 Click the Reply button. A new message box opens.
5 Signing out means you close your inbox to view other folders.

Ans:
1. F 2. T 3. T 4. T 5. F

Lab Activites
1. Create an email account on Yahoo! Mail.
Go to www.yahoomail.com → Click the Sign Up link. A fill in form
appears. → Fill in the details asked and, in the end, click Create
My Account link. Another window opens with your email account
details. → Note these details for future use.

2. Open your email account to read the emails you have received.
Access www.yahoomail.come, fill in your ID and Password, and then click
the Sign In button. Your email account is open.
3. Compose an email and send it to your friend.

4. Reply an email sent to you from your teacher.

23
Open the message you want to reply. When the message opens, click the
Reply button. A new message box opens. Here, you can reply the message
by typing it and then sending it.

Unit 6

Exercise

A. Answer the following questions.

1. How is vulnerability different from a threat?


Ans. A point where a computer is susceptible to attack is called
vulnerability. A threat is a possible danger to a system: the danger might be
a natural disasters, fire, accidents, vandalism, theft or destruction of data,
industrial espionage, and hackers.
2. What do you know about the host?
Ans. A virus is a piece of code that copies itself in another larger program
and modifies that program. This other program is called the host.
3. What is a trigger? Explain with an example.
Ans. Viruses become active when a certain activity is done. This activity or
condition is called a trigger. Most viruses remain dormant until triggered by
some activity. For example, a virus called Jerusalem B activates itself every
Friday the 13th and proceeds to erase any file you may try to load from
your disk
4. Where do viruses come from?
ans. Viruses and worms are not something falling onto the computers from the
sky. They are programmed and spread by man. The programmer first prepares a
virus or a worm. Then he has many ways to spread it. These ways include:
 through infected files on any type of storage devices
 through a network to all the computers connected by the network
 running or installing infected programs
 opening a website that distributes a virus
 opening email attachment(s) that contains a virus.

5. Why is spyware malicious?

24
Ans. Spyware transmits secret information e.g. passwords, email addresses,
credit card numbers, pictures and other sensitive information, that is why
they are called malicious.
6. What precautionary measures can be taken to keep away from viruses?
Ans. Some precautionary measures are as follows:
 If you know that a storage device is infected, do not use that.
 If there is some virus in your network, unplug the wire that connects you to
the network.
 Do not use pirated software. Buy registered ones since pirated software are
often infected.
 If the web browser alerts you about some kind of phishing activity, do not
open the website anymore.
 Do not download or open unknown email attachments if not expected.
 Avoid opening an e-mail attachment from someone you know until you
know exactly what the attachment is. The sender may be unaware that it
contains a virus.
 Keep your computer software current with the latest Microsoft updates. If
you’re running Windows XP Service Pack 2 (SP2), turn on automatic
updates.
 Use an Internet firewall.

B. Choose the correct answer and circle it.


1. Techniques for protecting your system are called
a) countermeasures
b) antivirus activation
c) scanning
d) spam

2. Jerusalem B activates itself every


a) Friday the 13th
b) Friday the 18th
c) Friday the 17th
d) Friday the 12th

3. The software used to detect security holes in a computer, server, network, etc.
are called
25
a) vulnerability scanners
b) threat scanners
c) virus scanners
d) email scanners

4. A virus definition is also called


a) virus signature
b) malware
c) printware
d) firewall

5. Which one is more harmful?


a) Virus
b) Adware
c) Worm
d) Spyware

C. Fill in the blanks with appropriate words.


1 The ______________ virus refuses to let you save your document after you
have made changes.
2 The biggest danger with a worm is its capability to ______________ itself.
3 Some adware also transmit secret information. This type of detective adware
is called ______________.
4 Buy registered software, since pirated software are often ______________.
5 Keep Windows Firewall ______________.
Ans:
1. Concept 2. replicate 3. spyware 4. infected 5. on

D. Tick T for true and F for false statements.


1 A threat is a possible danger to a system.
2 A virus may infect a CD-ROM drive.
3 Some viruses become active without a trigger.
4 The key difference between a virus and a worm is the manner in which they
reproduce and spread.
5 Some websites distribute viruses.
6 When a single system is hacked, it becomes possible to hack the network.
7 If the web browser alerts you about some kind of phishing activity, do not care
and open the website.

26
Ans: 1. T 2. F 3. F 4. T 5. T 6. T 7. F

Lab Activities

1. Watch your teacher downloading from the internet and installing Avast
antivirus.
Ask your teacher to download Avast antivirus. After download completes,
your teacher will install it. You should watch every step carefully and try to
remember everything.

2. Watch your teacher performing the system scan.


After installing Avast Antivirus, you can scan your whole computer or its
specific files, folders or drives. Ask your teacher to scan and observe it.

3. Learn how to schedule your system for scanning.


Open Avast Antivirus, click on Scan Computer. At the bottom you will see
Create Custom Scan. Click that, Set your scan to whatever settings you like.
And to the left you will see a tab that's labeled Scheduling. Click that and
schedule it.

Unit 7

Exercise

A. Answer the following questions.


1. How is data arranged in a spreadsheet?
Ans. Data is arranged in a grid of rows and columns in a spreadsheet.
2. Why are spreadsheet made on computers advantageous?
Ans. The spreadsheets made on computer are advantageous because they
take lesser time. They are easier to make. They are error-free and if any
error remains, it is easy to eliminate. They are easy to copy or carry. They
can be fun.
3. What is the difference between a cell and a row?
27
Ans. A cell is the area where a row and column join one another. These cells
are divided into horizontal and vertical lines. A horizontal line in a
worksheet is called a Row.
4. What auto fill options are available in the Excel? How to use them?
Ans. Two main available auto fill options are Fill series and Copy cells. There
appears an Auto Fill Options button at the end of automatically filled data.
It helps you fill the cells the way you want. Just click the drop-down arrow
of the button and then again click an option of your desire, the cells get
filled accordingly.
5. What types of charts can be inserted in the Excel? Describe the method of
inserting a chart in a spreadsheet.
Ans. Column, line or pie charts can be inserted in Excel spreadsheets.
In order to draw a chart, follow the following:
I. Arrange the data either in rows or columns with labels.
II. Click Insert ribbon tab.
III. Select all the cells you want to display in a chart. Include the row and
column labels also in the selection.
IV. Go to the Charts tool group.
V. Click the chart type of your choice, for example Column, Line, Pie, etc. A
Chart Tools ribbon also appears.
VI. Click the chart style of your choice. Excel creates a chart of your selected
type.

6. Write Excel formulas for summation, square and average.


Ans.
Summation: =SUM(A1:A8) To calculate sum of a range of
cells in a column

Square: =POWER(19,2) This formula is used to


calculate the power or exponent of a number.

Average: =AVERAGE(A1:A10) This formula is used to


determine the average of any range of cells.

B. Choose the correct answer.


1. Manually constructing spreadsheets was
easier
impossible
28
time consuming
interesting

2. The Name Box is on the left of the


formula bar
scroll bar
status bar
Home ribbon

3. Which key is pressed to open the Go To dialog box?


F5
F7
F8
F12

4. * is the sign of
multiplication
addition
division
decimal point

5. =SQRT(A8) is the formula that determines the


square root
square
quarter
percentage

6. =MAX(15,18,22,6,4) determines in a series the


number of values
highest value
lowest value
middle value

7. Before inserting a column, the data is arranged in


rows
columns
either in rows or in columns
in a single cell

29
C. Fill in the blanks with appropriate words.
1. A spreadsheet aids _____________ decisions.
2. _____________ is a button in the upper left corner of the Excel window.
3. Ctrl+G opens the _____________ dialog box.
4. Click G9, the cell gets _____________.
5. Wrap Text button is in the _____________ tool group.
6. The Fill Color button is used to apply _____________ to the selected cells.
7. The key to the chart is called the _____________.

Ans: 1. managerial 2. Office button 3. Go to 4.


active 5. Alignment 6. background color 7. Legend

D. Tick T for the true and F for the false statement.


1. Non-financial or even non-numeric data can be analyzed in a spreadsheet
format.
2. Gnumeric is not a spreadsheet program.
3. The combination of the name of a column and the name of a row make up
a row address.
4. Press the F8 key. This anchors the cursor.
5. = is the answer sign in the Excel.

Ans: 1. T 2. F 3. F 4. T 5. F

E. Match the formula signs with their purposes.


Sign Purpose
^ the formula sign
* the addition sign
- the subtraction sign
+ the multiplication sign
/ the division sign
= the exponent sign

F. Label the components of the Excel window.

30
(Copy figure from the book)

Lab Activities.
1. Practice moving to and selecting different cells using different methods.
Ans.
The following are shortcuts for moving quickly from one cell in a worksheet to a
cell in a different part of the worksheet:
a. The F5 function key: The F5 function key is the "Go To" key. If you press the
F5 key, you are prompted for the cell to which you wish to go. Enter the cell
address, and the cursor jumps to that cell. For example:
i. Press F5. The Go To dialog box opens.
ii. Type J10 in the Reference field.
iii. Press Enter or click OK. Excel moves to cell J10.
b. Ctrl+G: Press Ctrl+G. This is another way to open the Go To dialog box.
c. The Name Box: You can also use the Name box to go to a specific cell. Just
type the cell you want to go to in the Name box and then press Enter.

Selecting cells
If you wish to perform a function on a group of cells, you must first select those
cells by highlighting them. The exercises that follow teach you how to select.
To select cells A1 to E1, for example:
i. Go to cell A1.
ii. Press the F8 key. This anchors the cursor.
iii. Note that "Extend Selection" appears on the Status bar in the lower-left
corner of the window. You are in the Extend mode.
iv. Click in cell E7. Excel highlights cells A1 to E7.

31
v. Press Esc and click anywhere on the worksheet to clear the highlighting.

You can also select an area by holding down the left mouse button and dragging
the mouse over the area. In addition, you can select noncontiguous areas of the
worksheet by doing the following, for example:

i. Go to cell A1.
ii. Hold down the Ctrl key. You won't release it until step 9. Holding down
the Ctrl key enables you to select noncontiguous areas of the
worksheet.
iii. Press the left mouse button.
iv. While holding down the left mouse button, use the mouse to move from
cell A1 to C5.
v. Continue to hold down the Ctrl key, but release the left mouse button.
vi. Using the mouse, place the cursor in cell D7.
vii. Press the left mouse button.
viii. While holding down the left mouse button, move to cell F10. Release
the left mouse button.
ix. Release the Ctrl key. Cells A1 to C5 and cells D7 to F10 are selected.
x. Press Esc and click anywhere on the worksheet to remove the
highlighting.

2. Prepare a spreadsheet to show the monthly expenses of your home.

Ans. In A1, write down the title of your spreadsheet. In A2, write ‘Items’. In
B2, write ‘Rs.’. Now write the names of the items and amount as written in the
figure given below. Click B16, type =SUM(B3:B14) and press Enter key. The
amounts given in the cell from B3 to B14 will automatically be added up.

32
3. Apply different background colors to column labels and the contents of
each column.
Ans. To make a section of your worksheet stand out, you can add
background color to a cell or group of cells. For this, first select the cells and
then click the drop-down arrow by the Fill Color button. Click the color you
want to fill the selected cells with; the cells get filled with the color. This is
the background color.
4. Change the spreadsheet font to Cambria.
Ans. First of all, select the text. Go to Home tab, there is a drop-down menu
on Font button. Click on the drop-down arrow, and then click on the font
Cambria.
5. Change the font size to 14 points.
33
Ans. First of all, select the text. Go to Home tab, there is a drop-down menu
on Font Size button. Click on the drop-down arrow, and then click on the
font size 14.
6. Apply the summation formula to calculate the total expenses.
Ans. Click the cell where you want to sum up the expenses. Type the formula
of summation there. Suppose you want to calculate the sum of all cells
from A1 to A8. You will get the sum by typing the following formula:
=SUM(A1:A8)
When the formula for sum is typed, press the Enter key. The result gets
displayed.
7. Edit different numerical and non-numerical cells in the spreadsheet.
Ans. Open the file in which you made the spreadsheet of monthly
expenses. Now edit the names of items (non-numerical) and their amounts
(numerical).
8. Change the spreadsheet into a column chart.
Ans. In order to draw a chart, follow the following:
i. Arrange the data either in rows or columns with labels.
ii. Click Insert ribbon tab.
iii. Select all the cells you want to display in a chart. Include the row and
column labels also in the selection.
iv. Go to the Charts tool group.
v. Click the chart type of your choice, for example Column, Line, Pie, etc. A
Chart Tools ribbon also appears.
vi. Click the chart style of your choice. Excel creates a chart of your selected
type.

9. Print your worksheet.


Ans. In order to print a worksheet, do the following:
1. Click File tab.
2. Click print button. A Print window opens.
3. Select the printer from Name area.
4. Click Properties button and choose properties of paper.
5. Click OK. The properties window closes.
6. Click Entire workbook.
7. Click OK in the Print window. The whole workbook gets printed.

34
Unit 8
Exercise

A. Answer the following questions.


1. What is the main design aim of Windows 10?
2. What’s new in Windows 10? Write about any five new features.
3. What are the system requirements of Windows 10?
4. Explain any five touch screen gestures.
5. Write a short note on the Taskbar.
6. What is a Virtual Desktop?

B. Fill in the blanks with appropriate words.


1. Windows 10 returns the _____________to its position at the lower
left-hand corner of the desktop.
2. ______________is a personal assistant that finds information for you.
3. Windows 10 has been designed for use with ____________as well as
the traditional ______________.
4. _____________is same as clicking with a mouse.
5. Click anywhere on the lock screen to access the _____________
screen.

C. Tick ‘T’ for the true and ‘F’ for the false statement.
1. The purpose of the desktop is to provide an easily accessible location
where you can put shortcuts to programs and features you use often.
2. The taskbar is the long horizontal bar at the top of your screen.
3. When Windows 10 starts for the first time, you are taken to the
shutdown screen.
4. We can’t move, remove or add tiles on the Start menu.
5. Windows key + Ctrl + D creates a new virtual desktop.

Lab Activities

1. Open a folder by tapping on it.


2. Open a picture, now pinch and stretch it.
3. Make a virtual desktop.
4. Search Calculator using Cortana.

35

You might also like