Class 7 Computer Solution
Class 7 Computer Solution
Part-7
CHAPTER 1
A. 1. b 2. c 3. a 4. c 5. c
B. 1. × 2. 9 3. 9 4. × 5. ×
C. 1. Storage 2. Primary 3. Secondary 4. database 5. record.
D. 1. Input device : Input devices help us to enter data into a computer.
Some input devices are scanner, mouse, keyboard, MICR, Web
Cam, digital camera.
Output devices : Output devices help us to access the desired out-
put and information. Monitor, speakers, printers, plotters, LCD pro-
jector are some output devices.
2. CPU stands for Central Processing Unit. It is the processor or brain
of the computer. It makes calculations and processes data into in-
formation. The CPU controls all inputs and output devices and
consists of 3 units. They are :
(i) ALU – Arithmetic Logic Unit performs the tasks of arithmetic
calculations and logical operations.
(ii) CU – Control Unit controls all the operations of the computer.
(iii) MU – Memory Unit is used to receive, hold and deliver data
as per the instructions from the control unit.
3. System Software and Application Software are the two types of
softwares of a computer system.
4. In a computer database, the data is stored in the form of bits and
bytes.
(i) Bit : A bit is the short form of Binary Digit which indicates
whether the computer circuits are ON or OFF ( 1 or 0).
(ii) Byte : A byte is a unit of data that is eight bits long and is used
to represent a character such as letter, number or typographic
symbol. A byte is stored by using some bits in a predefined
combination called bit patterns.
(iii) Field : A field refers to a collection of bytes that includes
information about a thing. For example : name of friends, their
addresses and phone number etc.
(iv) Database : A database refers to the collection of all files in an
organisation. For example : files of clients and staff of a bank
make the bank’s database.
26 | Teacher Manual
5. Problem Solution
(i) Mouse/ keyboard is not (i) Check to ensure that mouse/
functioning. keyboard connections are pro-
perly connected. Check if the
keyboard has got stuck.
(ii) Computer is not turning ON. (ii) Check all the power supply
plugs. Keep the monitor switch
ON.
(iii) Keyboard is typing in capital (iii) Check if the shift key has got
letters only. stuck or the Caps Lock Key is
ON.
6. Drawing tablet is an input device which has a board and a special
pen to write over it and is connected to a computer.
7. ASCII stands for American Standard Code for Information Inter-
change.
8. (i) Drum plotter
(ii) Flatbed plotter
CHAPTER 2
A. 1. c 2. b 3. b 4. a
B. 1. 9 2. × 3. 9 4. ×
C. 1. Get help 2. Badges 3. Title 4. Quick Access
D. 1. Steps to create a Shortcut on the desktop :
(i) Right click on the desktop.
(ii) Click on New.
(iii) Select Shortcut. The Create Shortcut dialog box appears.
(iv) Click on the ‘Browse’ button. The browse for files or folders
dialog box appears.
(v) Click the program in which you want to add as a shortcut.
(vi) Click on OK.
(vii) In the create shortcut dialog box, click on Next.
(viii) Click on Finish.
The Shortcut of the selected program is created on the Desk-
top.
2. Steps to change the Time in Windows 8 :
(i) Display the PC settings window and tap or click General.
(ii) In the Time zone area, tap or click the time zone arrow to
Computer Book | 27
display a list of available time zones and choose the zone you
want to use.
(iii) Leave the Adjust Clock for Daylight Saving Time automati-
cally turned on.
3. Steps to add the Badgets :
(i) Display the PC settings window and tap or click personalize.
(ii) Choose Lock Screen.
(iii) In the Lock Screen Apps area, tap or click a + in the apps area.
Choose an App and pop-up window will appears.
(iv) Tap or click the app you want to add as a badge on your Lock
screen.
Windows 8 will display the information related to that app on
the Lock Screen.
4. Steps to choose a New Lock screen are :
(i) On the Windows 8 start screen, move the mouse to the lower
right corner of the screen to display the Charms bar.
(ii) Tap or click Settings and the bar expands to display a number
of setting icons.
(iii) Tap or click Change PC settings. The PC settings window
appears, with the personalize category selected.
(iv) Tap or click one of the thumbnail pictures.
(v) Tap or click Browse if you want to use one of your own im-
ages for your Lock screen. The files window appears, display-
ing pictures and folders in your Pictures folder.
(vi) Click the photo you want to use. A small checkmark appears
in the upper-right corner of the image you selected.
(vii) Tap or click Choose Picture.
The new image is added to the preview area in Personalize
settings.
5. We can add apps on a task bar by the following steps :
(i) Open the desktop app.
(ii) Right-click the app icon in the taskbar or tap and hold the icon
until a square appears around it. A list of options appears.
(iii) Tap or click Pin this program to taskbar.
6. (i) Location bar : The Location bar shows the library, folder and
any sub-folders that contain the currently selected file.
(ii) Refresh button : The Refresh button updates the display to
show the files in the current folder.
28 | Teacher Manual
(iii) Search box : You can use the search box to find folders, files
and libraries in File Explorer.
(iv) Preview pane : The Preview pane displays a preview of the
contents of the file.
CHAPTER 3
A. 1. b 2. c 3. c 4. c 5. a
B. 1. × 2. × 3. × 4. × 5. 9
C. 1. Bomb 2. AVG 3. files 4. speed 5. pen drive
D. 1. Harms caused by Computer viruses – Most of the virus programs
are applied to confuse and irritate the operators. But other harmful
viruses can modify or corrupt files, delete data, steal passwords etc.
Routes of Virus attack – Some of the routes from which a virus can
attack a computer system are :
(i) E-mail
(ii) Infected pen drives and CDs
(iii) Downloading infected files
(iv) Starting an infected application.
2. Types of Computer virus with their effect are :
(i) Bombs – These viruses get activated after a particular time and
cause damage to the computer system.
(ii) Boot Sector Viruses – These viruses are very risky as they
damage the boot sector part of a hard disk or floppy disk,
where data is stored.
(iii) E-mail Viruses – These viruses enter the computer system,
when an infected e-mail or its attachment is opened.
(iv) Trojans – These viruses can destroy data of a computer system
and appear in the form of infected computer videos, games etc.
(v) Worms – These viruses make a copy of themselves and spread
everywhere to affect the speed of a computer system.
3. Anti-virus is a software that is used to detect and delete viruses
present in a computer system.
4. (i) Norton (ii) AVG (iii) Avast (iv) Kaspersky
5. Keyboard and monitor
CHAPTER 4
A. 1. b 2. a 3. a 4. b 5. c
B. 1. × 2. 9 3. × 4. × 5. 9
C. 1. Octal 2. 10 3. 0 4. 16 5. bits
Computer Book | 29
D. 1. We can convert any decimal number into binary equivalent by di-
vide the number by 2.
2. Number system is a system of reprocessing numbers in various
ways. It denotes a group of characters, which denote various nu-
merical quantities. There are various kinds of number systems for
example decimal, hexadecimal, octal and binary system.
3. 2 69 Remainder 1
2 34 Remainder 0
2 17 Remainder 1
2 08 Remainder 0
2 04 Remainder 0
2 02 Remainder 0
1 Remainder 1
Remainder 69 = 1000101
4. Add 10101 and 1101
10101
+ 1101
100010
= 1 × 25 + 0 × 24 + 0 × 23 + 0 × 22 + 1 × 21 + 0 × 20
= 32 + 0 + 0 + 0 + 2 + 0
= 34
5. Multiply (1111)2 and (1001)2.
1111
× 1001
1111
0000×
0000××
1111×××
10000111
= 1 × 27 + 0 × 26 + 0 × 25 + 0 × 24 + 0 × 23 + 1 × 22 + 1 × 21
+ 1 × 20
= 128 + 0 + 0 + 0 + 0 + 4 + 2 + 1
= 135
CHAPTER 5
A. 1. c 2. b 3. a 4. d 5. b
B. 1. 9 2. × 3. 9 4. × 5. ×
C. 1. range 2. relative 3. arguments 4. Auto Sum 5. two
30 | Teacher Manual
D. 1. Cell referencing is used to identify the behaviour of a cell ad-
dressed in a formula, when it is copied from one cell to another.
2. Sorting data refers to the arrangement of data in either ascending
or descending order.
3. Count Number is used for counting the number of cells in a range
of cells in a containing only numerical values.
4. (i) Auto Sum
(ii) Financial
(iii) Date & Time
(iv) Maths & Trig
(v) Logical
5. Steps to apply custom filtering :
(i) Click on Data tab filter.
(ii) Click the arrow in the column heading.
(iii) Select Number Filters from the list.
(iv) Click on Custom Filter from the sub menu.
(v) Select desired option and enter a number on the right in Cus-
tom Auto Filter dialog box.
(vi) To add another condition, click on AND or OR.
(vii) Apply the second condition in the same format.
(viii) Click on the OK button.
CHAPTER 6
A. 1. c 2. c 3. a 4. d 5. a
B. 1. × 2. × 3. × 4. 9 5. 9
C. 1. items 2. interconnected 3. chart 4. two
5. Ctrl + P
D. 1. The main components of a chart are Plot Area, Value Axis, Category
Axis, Data Points, Chart Area and Legend.
2. (i) Pie chart (ii) Bar chart (iii) Line chart
3. Ctrl + P
4. A chart can be used for representing data in an attractive manner and
in a understanding way.
5. Ctrl + F2
CHAPTER 7
A. 1. d 2. b 3. b 4. a 5. d
B. 1. 9 2. 9 3. × 4. × 5. 9
Computer Book | 31
C. 1. counting 2. decisions 3. flow 4. Read-Data 5. initialise
D. 1. Counter means counting. Counters help us in counting the number
of times a program has been executed.
2. Two control statements in Q Basic are – (i) The READ-DATA
statements (ii) FOR-NEXT statement.
3. Example : We decided to proceed on a journey by train and if the
tickets are not available , we might have to travel by air. The syntax
for the statement is as follows :
IF (condition checking)
THEN (Instruction 1) ELSE (Instruction 2)
When the condition is true then follow instruction 1.
When the condition is false then follow instruction 2.
4. In order to set the counter in operation, we have to first initialise
the counter.
5. Control statements are used to control the flow of the programs
according to your choice.
CHAPTER 8
A. 1. b 2. a 3. c 4. a 5. d
B. 1. × 2. 9 3. 9 4. 9 5. ×
C. 1. Google 2. Facebook 3. intel info 4. save 5. pipl
D. 1. Internet helps us to grow socially, politically and economically all
around the world and influences most of our routine activities.
2. Search engines are used to search information on the net. Steps to
search information :
(i) Open a search engine.
(ii) Type the thing or term required to be searched.
(iii) Click on the search button. We see that a number of links
appear.
(iv) Choose a link out of many choices and click on it to open the
web page.
3. An internet is a world wide system of interconnected network of
computers. It contains many networks connected to each other to
form a global network.
4. Steps to copy the text from a web page :
(i) To select the text from a web page, drag the mouse on the text.
(ii) Right click to select copy.
(iii) Open the document required to be pasted in e.g. MS Word.
(iv) Right click to select Paste.
32 | Teacher Manual
5. Steps to save an image from a web page :
(i) Open a search engine and click on the Image.
(ii) Type the name of the image required to be searched.
(iii) Click on the Search Images button. Many images will appear
on the screen.
(iv) Open and right-click on the desired image and select Save
Image As Option.
(v) Select the folder location in the Save Picture dialog box and
type a file name.
(vi) Click on the Save button.
CHAPTER 9
A. 1. b 2. b 3. d 4. d 5. a
B. 1. 9 2. × 3. 9 4. × 5. 9
C. 1. height 2. name 3. commands 4. pencil tool 5. two
D. 1. The flash interface has the following screen elements :
(i) Title Bar – It shows the name of the currently opened file.
(ii) Stage – It is the white center part, which shows the work done.
(iii) Menu Bar – It carries all the commands, in Flash.
(iv) Color Pallette – It has a variety of colours to work with.
(v) Work Area – Objects can be placed here till they are required
to be displayed on the stage.
(vi) Timeline Panel – It controls the organised file content overtime
in layers and frames.
(vii)Tools Panel – It contains different tools to choose from.
(viii) Property Inspector – It can organise and modify the properties
of current selection.
2. Brush tool enables the user to draw thick strokes of lines.
To use Brush tool :
(i) Click on the Brush tool.
(ii) Adjust the brush size and the shape from the Tools panel.
(iii) On the stage, drag the mouse which behaves like the strokes of
a brush, to make your drawing.
3. Color Palette is used to paint with a selected set of colors and used
to form the color maps of indexed images.
4. (i) Distort
(ii) Scale
(iii) Rotate and Skew
(iv) Envelope are the four ways in which Free Transform tool works.
Computer Book | 33
5. Text tool enables the user to add text.
Steps to add the text :
(i) Click on the Text tool.
(ii) Adjust the Text Color, Font and Font size on the Property
Inspector.
(iii) Type the desired text on the stage.
CHAPTER 10
A. 1. a 2. b 3. a 4. c 5. b
B. 1. 9 2. 9 3. 9 4. × 5. ×
C. 1. Text 2. Server 3. Web Browser 4. Document
5. Web Pages
D. 1. HTML is a programming language used for describing web pages.
HTML stands for Hyper Text Markup Language.
2. Features of HTML :
(i) HTML documents are simple text files.
(ii) Compiling is not required in HTML.
3. Steps to create an HTML document using Notepad :
(i) Open the Notepad. Type the HTML code.
(ii) Click on the save option in the File menu. We see the Save As
dialog box.
(iii) Type a file name followed by extension. htm or .html.
(iv) Click on the Save button.
4. (i) Text editor
(ii) Web browser
(iii) Optional Web Server
5. Web Browser is used to view and display the HTML documents.
Internet Explorer, Mozilla Firefox and Opera are few examples of
web browsers.