0% found this document useful (0 votes)
267 views

8th Class Computer Booklet

booklet

Uploaded by

Sonia Kundu
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
267 views

8th Class Computer Booklet

booklet

Uploaded by

Sonia Kundu
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 105

Class-8th

Chapter-1 (Networking)

 Communication means the ability to convey thoughts, ideas, and everything else that
needs to be experienced or conveyed.
 A Network is a group of two or more computers or other electronic devices that are
interconnected to exchange data and share resources.
 Networking in computers brings efficiency, economy, and effectiveness
in an organization.
 Each computer has its own keyboard, mouse, scanner, and printer which are called as
Peripheral devices.
 The collection of two or more computers connected in order to communicate and share
data and information are called computer networks.
 The computers that share and receive data from servers are called Clients.
 The Internet is a global (wide area) network connecting millions of computers
 Bluetooth: - Bluetooth is a form of technology in which there is no existence of wires or
cables. This technology makes use of radio frequencies for sending and receiving data or
information over a short distance.
 To establish a wired network in a group of computers, additional components are
required such as network cards, networking cables, modems, hubs, and switches.
 Network security means protecting data and resources from any unauthorized access.
 Personal Area Network makes use of short-range Radio Frequency.

The 1st computer network was introduced in the 1960s and was called
ARPANET. It was designed by the United States Department of Defense’s
Advanced Research Project Agency i.e. ARPA to connect universities and
research institutions across the country.
Internal question answers
Ques1.What is Modem?
Ans. The modem is the device that is used for data transfer from one computer network to
another computer network through telephone lines. The abbreviation of MoDem is
Modulation and Demodulation.
Ques2. What is PAN Network?
Ans. PAN is a computer network that enables communication between computer devices

Within the range of a particular person, often covering an area of 10 meters.


Ques3. Write the advantages of PAN.
Ans. Advantages of PAN are:-
1. Wire Requirement
In PAN type of network, there is no need for extra wires. Therefore, users no need to worry
about cable management and floor space. For establishing a connection between two devices
there should be only bluetooth enabled. Thus, PAN is considered to be highly cost effective.
2. Device Connectivity
Using Personal Area Network you can connect many of the devices to one single device at
the same time. For an example a single mobile phone can be used to connect many
peripherals such as keyboard, mouse and printers or even another mobile so that files can be
shared conveniently.
3. Reliability
PAN networks can be always ensured reliable and stable whenever the connection is
established the 10-meter range.
4. Security
PAN networks are considered to be safer and secure more than any other network since all
the devices and data are authorized.
5. Synchronization
Data synchronization is made easy in the Personal Area Network. This means that data can
get synchronized between different devices. For an example devices connected with the
PAN network can be used to exchange, download, and upload data.
6. Portability
Since PAN is wireless, users can move devices wherever they want and exchange data as
well. This paves the way for portability in the network.
Ques4. Write the Disadvantages of PAN.
Ans. Disadvantages of PAN are:-
 Area Coverage
Since PAN uses short-range Bluetooth communication it won't be working beyond 10
meters range. This can be especially disadvantageous when making long-distance data
sharing.
 Signal Interference
PAN networks use infrared rays for its transmission. Therefore, it can interfere with other
radio signals and experience data droppings. This can severely interrupt the
communication between two devices.
 Data Transfer Rate
Comparing to other types of networks, PAN has relatively slower rate of transmission.
This is mainly due to the usage of bluetooth and infrared those are slower on their nature.
 Health Issues
Since PAN network is wireless, harmful rays such as microwave signals are being
released by them. These signals can severely impact humans as well as animals causing
various health effects. Such issues can include brain damage and heart related problems.
 Infrared Transmissions
Since Infrared signals are being used by PAN, it has limitations of traveling only in
straight lines. This can be noticeable when using a TV remote. A TV remote will only be
working if it is faced toward the Television, otherwise, it will not.
 Cost
Unlike other types of networks, PAN is used only by devices that are high in cost.
Examples of such devices are laptops, smartphones, and digital cameras. Hence, it counts
as another disadvantage of PAN.
Ques5. What is the maximum area of a LAN network?
Ans. A LAN network is limited to between 100-1000 meters coverage.
Ques6 Write the Advantages of LAN.
Ans. The advantages of LAN are:-
 Resource sharing – Computer resources such as printers, scanners, modems,
DVD- ROM drives, and hard discs can be shared within the linked devices using a
LAN. This lowers the cost of hardware and lowers the amount of money spent on it.
 Internet sharing – The ability to share a single internet connection among all LAN users
is provided by a local area network. A single internet connection is used to give internet to
all linked computers in school laboratories and internet cafes.
LAN Network
 Software sharing – Software sharing is another sort of sharing that is made simple here.
Other users on the network can share a single computer with the
licensed software. There is no need to acquire a separate licence for each machine on the
network. All of this can done under a single licence.
 Security – Data may be assured to be secure because it is store on a local server. When
the data on the server is updated, all LAN users have access to it. Furthermore, the host
has the power to restrict or accept users in a specific network, allowing for extra
security measures to be implemented
Ques7. Write the disadvantages of LAN.
Ans. Disadvantages of LAN are:-
 Data security problem:- If the server computer is not set up correctly and there is a leak
in security, then unauthorized users may also access the data.
 Limitation of range:- Local area networks are often devised within a building or
apartment complex and cannot be stretched to a bigger area
 Server breakdown:- The centralized nature of LANs poses a potential risk: a single
point of failure. If a central server or a critical device within the LAN fails, it can
disrupt the entire network’s operation
 Expensive:- Some of the communication tools in LAN networks, like switches, hubs,
routers, etc., are expensive.
Ques8 What is MAN in networking with example?
Ans.A metropolitan area network (MAN) is a computer network that connects computers
within a metropolitan area, which could be a single large city, multiple cities and towns,
or any given large area with multiple buildings. A MAN is larger than a local area
network (LAN) but smaller than a wide area network (WAN).
Ques9. Define WAN network.
Ans. A Wide Area Network is a network that exists over a large geographical area.
A WAN connects different smaller networks, including LANs and MANs. Examples of
WAN are the Internet, and 4G mobile broadband systems.
Ques10. Write Advantages of WAN.
Ans. Advantages of WAN are:-
 Large area coverage:- It covers a large geographical area of 1000 km or more. if your
office has branches in different cities or countries, then you can connect to them through
WAN.
 Higher bandwidth:- You can get a high data transfer rate that can increase your
company’s productivity.
 Centralized data:- Using WAN means that you can share the data connected to all the
devices in the respective network. For example, you can set up a head office server and
share the data among all the office branches.
Ques11. Write the disadvantages of WAN.
Ans. Disadvantages of WAN are:-
 Lower Speeds – One of the main disadvantages of WAN is that it is slower compared to
Local Area Network (LAN). Since WAN covers a larger area, it takes more time to
transmit data from one point to another, and this can cause a delay in communication.
 Security Risks – WAN is more vulnerable to security risks, such as hacking, viruses, and
malware. Since WAN connects devices and computers over a larger area, it can be harder
to secure every point of connection, and this can lead to security breaches.
 Higher Costs – Setting up and maintaining WAN can be expensive. WAN requires
specialized hardware, software, and network devices to operate, and this can result in
higher costs for businesses and organizations that rely on WAN for their operations.
 Distance Limitations – WAN is limited by distance. The farther the connection, the
slower the data transfer speed, and this can affect the quality of communication.
Additionally, WAN is subject to natural barriers such as mountains, oceans, and deserts,
which can make it difficult or impossible to establish connections in certain areas.
Ques12. What is Hub?
Ans. A Hub is a device that splits a network connection among multiple computers.
Ques13.What is a Router?
Ans. A device used to connect a LAN with an Internet connection is called a Router.
Ques14. How many types of Network Interface Card? Name them.
Ans. There are two types of network interface cards:
i) Wired ii) Wireless.
Ques15. Write the differences between LAN and WAN.
Ans.
LAN WAN
1. LAN is restricted to a limited 1. WAN covers greater
geographical area. distances and operates
nationwide
2. In LAN, computer terminals are 2. In WAN, computer
physically connected with wires. terminals are not physically
connected with wires.
3. The data speed is slow. 3. The data speed is fast
4. A few data transmission errors can 4. Larger data transmission
occur. errors can occur.
Ques16.What do you mean by Logging On?
Ans. In order to gain access to the data and resources of a network, one needs to get
connected to the network. This process is known as Logging on.
Ques17. What is Network Card?
Ans. A network card is used to physically attach a computer to a network so that it can
participate in network communication. An Ethernet Network card is the most
commonly used network card.
Ques18. What is Node?
Ans. The computers in a network can communicate with each other as well as work
independently. Each computer in a network is called a node.
Ques19.Define IP address.
Ans.In a network system, an IP address is a unique software address of a computer. It
is 32 bit.
Ques20. What do you understand by DNS?
Ans. There are two types of server/client programs. One is directly used by the user
and the other support application programs. Domain Name system belongs to the
second type as it is used by other programs, for example, to find the IP address of
an e-mail recipient.
Ques21.What is a peer-to-peer process?
Ans. A peer-to-peer process refers to all processes on a machine that communicates at
a given layer.
Ques22.Define network topology.
Ans.Network topology refers to the network's physical structure that defines how nodes
or computers will be connected.
Ques23.Tell us about the advantages of a Modem.

Ans. Some advantages of modem are:

 Its speed depends on the cost


 It is more helpful in connecting LAN with the Internet
 It is the most widely used data communication roadway.

Ques24.What are the characteristics of networking?

Ans.The characteristics of networking are:

 Medium- the channel used by computers for communication


 Topology- the way computers are arranged in the network physically or logically
 Protocols- deals with how computers communicate with one another.
Ques25.What do you understand by TCP?
Ans.Transmission Control Protocol or TCP is a connection-oriented protocol that
maintains an established connection between communicating devices until both are done
exchanging messages. This protocol is used to determine how application data can be
delivered over a network using packets. It also receives and sends packets from and to the
network layer and is in charge of flow control.

Ques26. What is a gateway or Router?


Ans.A node that is connected to two or more networks is commonly called as router or
Gateway. It generally forwards message from one network to another.

Ques27.Name the factors that affect the performance of the network?


Ans. Factors are:-
 Number of Users
 Type of transmission medium
 Hardware
 Software
Ques28. Name the factors that affect the reliability of the network?
Ans.Factors are:-
 Frequency of failure
 Recovery time of a network after a failure
Ques29. Name the factors that affect the security of the network?
Ans. Factors are:-
 Unauthorized Acces
 Viruses
Ques30. What is Protocol?
Ans. A protocol is a set of rules that govern all aspects of information communication.

Textual question answers


Answer the following questions:-
Ques1.Write briefly about MAN.
Ans. MAN or Metropolitan Area network covers a larger area than that
covered by a LAN and a smaller area as compared to WAN. MAN has a range of
5-50km. It connects two or more computers that are apart but reside in the same or
different cities.

Ques2.Differentiate between a hub and a switch.


Ans.
Hub Switch
1. Hub is a broadcast 1. Switch is a Unicast device.
device.
2. It sends data from one PC to 2. It sends data to a particular PC
all. you want.
Ques3.Explain any four advantages of a Network.
Ans. The advantages of a Network are:-
 Resource sharing: - All computers in a network can share resources such as
printers, fax machines, modems and scanners.
 File Sharing: - Instead of using a disk or USB key to carry files from
one computer or office to another, you can share files directly using a
network.
 Cost Effective:- Due to sharing resources and files over a network, cost
automatically goes down.
 Internet Sharing:- By using a proxy server, one computer can be given an
internet connection and others can access the Internet.

Ques4. Mr. Nayar owns a company. His company has different departments that are
spread over two adjoining buildings. He wants to connect computers to all the
departments in both buildings for quick and efficient data transfer. Suggest an
economical method of networking to him.
Ans. Mr. Nayar has to use a LAN network.
Ques5. Differentiate between PAN and LAN.
Ans. PAN LAN

1. PAN stands for personal area 1. LAN stands for local area
network. network.

2. The data transfer rate is slow. 2. The data transfer rate is high.

3. Covering area is 10 meters. 3. Covering area is 1 Km.

Application Based Questions

Question 1
Riya wants to transfer pictures of her recent US trip from her mobile to her computer. Suggest a
wireless mode of transmission that she can use for the same.
Answer
Riya can connect her mobile and computer through Bluetooth wireless networking technology.
As the mobile phone can be brought in close range to the computer the transmission range of
Bluetooth is well suited for this setup.

Question 2
Mr. Nanda is opening a new branch of his office in Noida. He wants to connect the computers
of this branch with the computers of his home branch at Panchkula. Which networking type best
suits his requirements?
Answer
As the branches are located in two different cities so Mr. Nanda should use Wide Area Network
(WAN) to connect the computers of the two branches.

Internet was invented by Vinton Cerf


and
Robert Kahn
Chapter - 2 (More on Photoshop)
Ques1. What is Photoshop?
Ans. Photoshop is an image editing application software that allows users to. Create, edit,
delete, and manipulate various graphics as well as digital artwork.
Ques2. Who invented Photoshop software?
Ans. Photoshop software was invented by Thomas Knoll in 1987.
Ques3.What is the default extension of an Adobe Photoshop file?
Ans. .psd
Ques4.What does PSD stand for?
Ans. Photoshop Document
Ques5.In order to create a new layer via copy, use –
Ans. Ctrl + J
Ques6.Shortcut key to show/hide layers panel –
Ans. F7
Ques7.What is foreground and background color?
Ans. The foreground controls what color your brush or pencil will be, while the background
color erases any added color and replaces it with the background color, which is white by
default.
Que8. What do you mean by pixels?
Ans. The smallest element of a picture is known as a pixel. Pixel is the short for picture
element.
Ques9. How to start Adobe Photoshop?
Ans. There are two ways to start Adobe Photoshop.
They are: Option 1:
STEP 1: Click “Start” and go to “All programs”.
STEP 2: Now, find and click “Adobe Design Premium Cs3”.
STEP 3: Click on “Adobe Photoshop Cs3”.
Option 2: STEP 1: Locate the Photoshop icon on the desktop.
STEP 2: Double-click the icon.
Ques10. Define components of Photoshop window.
Ans. Components of Photoshop window screen are:-
Menu Bar –
This is where you can access most of the commands and features in Photoshop.
Drawing Palette –
where the image being worked on will appear.
Options bar
content-sensitive display of tool options – changes as different tools are selected
display using Window > Options or Click a tool in the toolbox.
Lasso options bar.
Toolbox
for creating and editing images (display or hide using Windows > Tools)

Palettes
To monitor and modify images (there are 5 palettes by default).
Palette Well
To organize palettes in the work area.
Drag a palette’s tab into the palette well to store it in the palette well.
Once in the palette well click on the palette tab to use it.
Ques11. What is a selection tool? Write the names of any three selection tools.
Ans. The selection tool is a fundamental feature that enables users to define and isolate
specific parts of an image for editing, retouching, or manipulation while leaving the
rest unaffected. Three notable selection tools are:

1. Rectangular Marquee Tool: This tool creates rectangular or square selections, useful for
straightforward, geometric areas.
2. Lasso Tool: With variations like the Lasso, Polygonal Lasso, and Magnetic Lasso, it
offers freehand or straight-edged selections, handy for intricate or irregular shapes.
3. Magic Wand Tool: It selects contiguous areas based on color similarity, streamlining the
process when dealing with areas of similar hues.
Ques12. What is the use of a toolbox?
Ans. The toolbox contains selection tools, painting tools, editing tools, foreground and
background colors, selection boxes, and viewing tools.
Ques13.What are the steps involved in using marquee and lasso tools?
Ans. The steps for making a selection using the Marquee tool are-
STEP 1: Open the image and right-click on the Marquee tool icon.
STEP 2: Now, select the required marquee tool from the list such as:
• Rectangular Marquee Tool • Elliptic Marquee Tool • Single row Marquee Tool
• Single column Marquee Tool
STEP 3: Drag the mouse over the selected image.
The steps involved in making a selection using the Lasso tool icon are:
STEP 1: Open the image and right-click on the lasso tool icon.
STEP 2: Now, select the required lasso tool shape from the list such as
• Lasso Tool • Polygonal Lasso Tool • Magnetic Lasso Tool
STEP 3: Place the pointer of the mouse on the image and drag it around the part of the
selected Image.
Ques14. Name few Blending brush combinations of Mixer Brush Tool. Write the steps to use
the Mixer Brush Tool.
Ans. Wet Blend, Dry Brush, Oil Pain, Moist, Very Wet, etc.
Step 1 Open a new document and select the mixer brush tool from the tool panel.
Step 2 Select the desired brush from the brush presets picker in the options bar.
Step 3 Set various options in the options bar according to your preferences.
Step 4 Click on drag the mouse on the image to paint.
Ques15. Define Spot Healing Brush Tool.
Ans. Photoshop offers an advanced retouching palette to correct image imperfections. Spot
healing brush tool is one of the retouching tools available in Photoshop.

Ques16.Define the Healing brush tool.


Ans. Similar to the spot healing brush tool, the healing brush tool allows you to correct the
blemishes, uneven skin tone, and imperfections of the image by taking samples.
Q17. What do you understand by cropping?
Ans. Cropping refers to the removal of unwanted areas of an image. with the help of Crop tool
you can select a specified area in which you want to focus and remove the unwanted parts.
Ques18. Define Pen tool.
Ans. The pen tool is a vital part of Photoshop that is used to create selections and path of
certain area.
Ques19. How can we use the clone stamp tool?
Ans. Clone Stamp Tool is used for making clones a duplicate copy of selected areas of an
image. Steps used are:
STEP 1: Open an image, right-click the clone stamp tool, and select the clone stamp tool.
STEP 2: Hold down the Alt Key and select the part of the image to be cloned.
STEP 3: Place the mouse and drag on the area where a clone is to be created.
Ques20. Define blur and sharpen tool.
Ans. Blur and sharpen tools as the name suggests, are used to blur or sharpen the image pixels.
Using blur tool, you can modify any sharp areas or edges in the image. The sharpen tools
works in the same way. You can use it to highlight certain areas of image .
for example, you can use sharpen tool on certain model to make her/ his eyes and brows
sharp and can use the blur tool on areas like hairs, lips to make them little smoother.
Ques21. Define Dodge and burn tool.
Ans. The Dodge and burn tool is part of image editing palette in Photoshop. You can make
areas dark or light using these tools. They help you to adjust the highlights, shadows and
mid-tones of the image.
,

Ques22. Define the importance of smudge, dodge and sponge tools.


Ans. Smudge Tool: This brings effects such rubbing canvas with fingers.
DODGE TOOL: This makes brighter the part where you scrub with this tool.
SPONGE TOOL: It saturates or desaturases a selected part of an image.

Ques23.What is the use of Painting Tools? Name any five Painting Tools.
Ans. Painting tools are used to make photographs attractive and appealing.
Five painting tools are:- 1)spot healing 2)clone stamp tool 3)eraser tool 4)brush tool

Ques24.Define drawing tools.


Ans. Photoshop provides two tools for drawing (painting) directly to the image: The brush tool
and the pencil tool. Both tools work basically the same way — you left-click and drag your
mouse in the image to draw. The painting uses the currently selected foreground color.

The Brush Tool


The brush tool paints with smooth edges. The options bar looks like this:

Settings:
 Brush: The size of the brush.
 Mode: The blending mode. For most work Normal will be the best option. Experiment
with other modes to see what they do.
 Opacity: Anything less than 100% will allow the underlying image to be seen.
 Flow: Determines how quickly paint is applied. Lower setting produces lighter strokes.
The Airbrush Tool
The airbrush option allows you to apply gradual tones to an image, like a traditional airbrush.

The Pencil Tool


The pencil tool behaves much like the brush except that it has hard edges. The pencil tool
options are the same as the brush tool, except:
 There is no airbrush option.
 There is an Auto Erase option. This paints the background color over areas containing
the foreground color.

Note: To draw a straight line, click a starting point in the image, then hold down the Shift key
and click an ending point.
Ques25.What is the use of the Hue/Saturation dialog box?
Ans. The hue/saturation dialogue box allows us to adjust the Hue (colors)/saturation (intensity
of colors) and lightness of an image.

Ques26.What do you understand by the Warping of text?


Ans. Warping is used to position the letters or text in different shapes. We can you wrap the text
orientation both horizontally and vertically.

Ques27. Defines viewing tool.


Ans. Two types of viewing tools are Zoom Tool and Hand Tool. Zoom Tool is used to zoom in
on an image by clicking on the tool on the canvas to see its magnified view or zoom out
by pressing Alt. The Hand Tool is used to adjust the picture on the screen. Image
Adjustment allows one to set the Color Levels, Contrast, Brightness, and many more
settings of an image.

Ques28. Define Move Tool.


Ans. Move Tools is used for moving images, and layers, handling folders, and getting
Information.

Ques29. Define Shape Tools.


Ans. The Shape tools draw shapes and lines in a normal layer or a shape layer.
• The Shape tools will create a solid color shape of their type.
• The Line tool will create a solid color line.
• The Custom Shape tool makes customized shapes selected from a custom shape list.
Ques30.Define Color Picking and Measuring Tools.
Ans. The Color Picking and Measuring tools do not actually change the document in any way.
• The Eyedropper tool changes the foreground color to the color that is clicked on.
• The Color Sampler tool is an advanced tool.
• The Measure tool measures the distance, location, and angle between to points in the
document.
Ques31. Define Photoshop Eraser Tool.
Ans. Photoshop's eraser tool can be found in the second group of icons in the toolbox. It has
three variations: Eraser, Background Eraser and Magic Eraser.
The eraser is basically a brush that erases pixels as you drag it across the image. Pixels are
erased to transparency, or the background color if the layer is locked.
When you select the eraser tool, you have various options available in the toolbar:
Brush: Options include the size of the eraser, hardness of edges, and various styles. Brush
options are not available in block mode.
Mode: There are three options: brush (soft edges), pencil (hard edges), and block (square
brush size).
Opacity: 100% opacity erases pixels completely, 0% does not erase at all. 50% is semi-
transparent (or colored). Opacity is not available in block mode.
Flow: Determines how quickly the erasure is applied by the brush. Lower settings produce
a more subtle effect. Only available in brush mode.
Airbrush: Use the eraser as an airbrush. Only available in brush mode.
Erase to History: Erases to a saved state or snapshot of the image. To use this feature, click
the left column in the history palette next to the desired state.
Background Eraser Tool-
The background eraser tool allows you to remove the background colour from an image or
layer. When you click the image, the eraser samples the colour at the centre of the brush and
erases this colour as you drag. Options in the toolbar allow you to specify the type of
erasure, colour tolerance and sampling method.

Magic Eraser Tool-


The magic eraser tool erases all colours within a set tolerance. This is essentially the same
as using the magic wand and hitting Delete. Using this tool you don't need to drag — just
click once.
Ques32. Define the Paint Bucket Tool.
Ans. The Paint Bucket Tool in Photoshop fills adjacent pixels that are similar in color in the
image. It fills with either the selected foreground color or with a pattern.

Ques33. Define Text tool.


Ans. The Text tool allows you to add text to your file. You can use text on a variety of projects,
such as adding it to your images to create a poster, holiday card, or invitation. You'll also
be able to customize the text to suit your needs.

Horizontal Type(T):
The Horizontal Type tool is the default Type tool. Click
and drag to make a text box. Type your text with the
keyboard to create text in the foreground color. Use
the Options bar to set the font, size, and other text
properties. Open the Character and or Paragraph palettes for more typography options. •
Vertical Type (T): This tool is similar to the Horizontal Type tool except that the type
stacks vertically, and the text direction goes from right to left for Asian languages.
• Horizontal Type Mask (T): This tool is similar to the Horizontal Type tool, but a
selection area is created rather than actual type. Although you can paint within the type
selection area, adjusting the type options is not allowed after type is created.
• Vertical Type Mask (T): This tool is similar to the Vertical Type tool, but a selection
area is created rather than actual type. Although you can paint within the type selection
area, adjusting the type options are not allowed after type is created.

Q34. Define screen mode.


Ans. Screen modes control how much space your current image occupies on your screen, and
whether you can see other Photoshop documents as well. The Standard Screen mode is the
default screen mode when you open Photoshop for the first time.
Ques35. Define quick mask tool.
Ans. A Quick Mask temporarily turns the area inside your selection a semi-opaque red so that
you can see what part of the image you have and have not selected.

Ques36. What do you mean by a layer?


Ans: Layers are transparent sheets stacked on top of each other.

Ques37. What is Layers panel?


Ans: It contains all the layers present in the Photoshop document. Whenever you add an image
into a Photoshop document, a new layer is created.

Ques38.How to create a new layer?


Ans. To create a layer and specify a name and options, choose Layer > New > Layer, or choose
New Layer from the Layers panel menu.
Specify a name and other options, and then click OK.

Ques39. What are the steps to rename a layer?


Answer: => Open the file in Photoshop CS5 that contains the layer you wish to rename. =>
Click the layer once to highlight it in blue. => Double-click the layer name to open an editing
field, then type in the new name for the layer. You can press Enter on your keyboard when you
are finished.

Ques40.What is a filter in Photoshop?


Ans.A filter in Photoshop is a feature or digital effect that allows users to modify photos, repair
them, create multiple special visual effects, and shift pixels.

 Textual Question Answers:-


Ques1. How does resizing handles work in Photoshop?
Ans. Wherever a picture is selected using the Crop tool, on the corners
of the selection and on midpoints of sides, tiny squares appear.
These are called resizing handles. They can be used to increase/
decrease the size of the area you want to crop.

Ques2. Differentiate between the Dodge and Burn tools of Photoshop.


Ans. Dodging and burning are techniques used to improve the
appearance of photographs. The term ‘Dodging’ refers to lightening
an area of the image while ‘Burning’ is darkening of the image.
The more you paint over an area with the Dodge or Burn tool, the
lighter or darker it becomes.
Ques3. What is the role of fi lters in Photoshop? Explain briefl y with the help
of an example.
Ans. You can use fi lters to clean up or retouch your photos, apply special
art effects that give your image the appearance of a sketch or create
unique transformations using distortions and lighting effects. The
fi lters provided by Photoshop appear in the Filter menu.
Ques4. Write briefl y about the following:
(i) Attributes of the background layer
(ii) Eraser tool
Ans. (i) The following are the attributes of the background layer:
 Stacking order
 Blending mode
 Opacity
To change the above attributes, we first need to convert the background layer into a
regular layer.
(ii) The Eraser tool is basically a brush which erases pixels as you drag it across an image.
Pixels are erased to transparency or the background colour if the layer is locked. It has
three variations: Eraser, Background Eraser and Magic Eraser. When you select the
Eraser tool, you have the following options available in the Options bar:
Brush: Options include the size of the eraser, hardness of the
edges and various styles.
Mode: There are three options: Brush (soft edges), Pencil
(hard edges) and Block (square brush size).
Opacity: 100% opacity erases pixels completely, 50% is semi
transparent (or coloured), 0% does not erase at all.
Living with Computers 8 TRM 251 Flow: This determines how quickly the erasure is
applied by the brush. Lower settings produce a more subtle effect. This option
is available only in the Brush mode.
Airbrush: This option allows you to use the eraser as an airbrush
available only in the Brush mode.
Ques5. Which tool helps you soften an image using Photoshop? How do
we use the tool?
Ans. The Blur tool can be used to soften images, blur out a background
or create a soft tone in a photograph or image. Follow these steps
to use this tool:
1. Open an image.
2. Select the Blur tool.
3. Now, select the Brush size, Mode and Strength values
from the Options bar.
4. Drag the mouse at the required area to get the desired result.

 Application Based Questions:


Ques1.Ali has designed a greeting card in Photoshop CC. He wants to change the color of
flowers from red to pink. Suggest him the suitable tool which will perform the above-
mentioned task.
Ans. Colour Replacement Tool

Ques2.Vikram has inserted an image in a new file. He wants to duplicate the part of an
image on the same layer, Suggest him the tool which will fulfill his requirement.
Ans. Clone Stamp Tool

Important points:-
1. The ALT key is pressed on the keyboard to define the source point while using
the Healing Brush Tool.
2. Spacebar key help us to move the image while the image is zoomed in.
3. Brush tool is used to create smooth strokes of the foreground color.
4. Create Warped Text option is used to position the letters or text to different shapes
5. Hand tool is used to move the zoomed picture within the window.
Chapter-3(More About HTML)
 HTML stands for Hyper Text Markup Language
 HTML is the standard markup language for creating Web pages
 HTML describes the structure of a Web page
 HTML consists of a series of elements
 HTML elements tell the browser how to display the content.
 HTML is Not Case Sensitive.HTML tags are not case sensitive: <P> means the same
as <p>.
 A simple HTML document:-
Example:-
<! DOCTYPE html>
<html>
<head>
<title>Page Title</title>
</head>
<body>
<h1>My First Heading</h1>
<p>My first paragraph</p>
</body>
</html>

Example Explained
 The <!DOCTYPE html> declaration defines that this document is an HTML5 document
 The <html> element is the root element of an HTML page
 The <head> element contains meta information about the HTML page
 The <title> element specifies a title for the HTML page (which is shown in the browser's
title bar or in the page's tab)
 The <body> element defines the document's body, and is a container for all the visible
contents, such as headings, paragraphs, images, hyperlinks, tables, lists, etc.
 The <h1> element defines a large heading
 The <p> element defines a paragraph.
Ques1. Who developed HTML language.
Ans. The first version of HTML was written by Tim Berners-Lee in 1993.
Ques2. What is HTML5?
Ans. HTML5 is the improved HTML version released in 2014 by the World Wide Web
consortium.

Ques3.Which one is the HTML document’s root tag?

Ans. < html >


Ques4.In HTML, the correct way of commenting out something would be using:
Ans. <!– and –>
Ques5. Which of these elements in HTML can be used for making a text bold?
Ans. <b>
Ques6. Which HTML tag do we use to display text along with a scrolling effect?
Ans. <marquee>

Ques7.What is a marquee in HTML?

Ans. Marquee in HTML is used to scroll text or image on a web page. It can scroll up, down,
left, or right automatically. Marquee can be applied by using tags.
Ques8. In HTML, we use the <hr> tag for .

Ans. Horizontal ruler

Ques9. What is the correct way of sending mail in HTML?

Ans. <a href = “mailto: ab@b”>

Ques10.Which tag is used in HTML5 for the initialization of the document type?

Ans. <!DOCTYPE html>

Ques11.. What is the correct way in which we can start an ordered list that has the numeric
value count of 5?

Ans. <ol type = “1” start = “5”

Ques12. Besides <B> which of the following tags can make text bold on a webpage?
Ans. <Strong>

Ques13.In HTML, the text that links the other document is called .
Ans. Hypertext

Ques14.Write components need for developing web page.

Ans. Components need for developing web page.

• Any Text Editor ( Note pad, Note pad++, adobe Dreamweaver)

• Any Web browser (Mozilla Firefox, Google chrome, opera etc.)

Ques15.What are void elements in HTML?

Ans. HTML elements which do not have closing tags or do not need to be closed are Void
elements. For Example <br />, <img />, <hr />, etc.

Ques16.Define Web Browsers.


Ans. The purpose of a web browser (Chrome, Edge, Firefox, Safari) is to read HTML
documents and display them correctly. A browser does not display the HTML tags, but
uses them to determine how to display the document:
Ques17. What is HTML?
Ans. HTML stands for Hyper Text Markup Language and is the language of the internet. It is
the standard text formatting language used for creating and displaying pages on the
Internet.HTML documents are made up of the elements and the tags that format it for
proper display on pages.
Ques18. Mention two features of HTML.
Ans. Two features of HTML are:
a. Compiling is not required in HTML. b. HTML is not case sensitive.
Ques19. Write down the steps to create an HTML document.
Ans. We follow these steps to create an HTML document using notepad:
1.Open notepad; type the HTML code.
2. Click on the file menu .Click save .We see the Save As dialog box.
3. Make the choice of the folder where file is to be saved and type a file name followed
by extension .html or .htm .
4. Click on save button.
Ques20.Write down the steps to View an HTML document.
Ans. We use these steps to view an HTML document using Internet Explorer as the browser
software:
1. Click on the file menu,click open.
2. We can see an open dialog box. Click on browse button.
3. Select a location from the dialog box, choose the HTML file and click on Open button.
4.The Open Dialog box shows the path of the file .The HTML document is now open in a
web browser.
Ques21. What is the difference between HTML & XHTML?
Ans.
HTML XHTML
1. HTML is an abbreviation for Hypertext 1.XHTML is an abbreviation for Extensible
Markup Language Hypertext Markup Language
2.It is derived from SGML (Standard 2.It combines both XML and HTML
Generalized Markup Language) features.
3.HTML is a type of static Web Page language 3.XHTML is a dynamic Web Page
language
4.It employs the document file format 4.It employs markup language
5.HTML is all about showing data 5.XHTML is all about describing the data
6.HTML is not case sensitive 6.XHTML is case sensitive. Each tag &
attribute should be written in lowercase

Ques22. What are HTML tags?


Ans. We use HTML tags for placing the elements in the proper and appropriate format. Tags
use the symbols <, and > to set them apart from the HTML content.

The HTML tags need not be closed always. For example, in the case of images, the
closing tags are not required as <img> tag.,<br> tag.
Ques23. How many types of heading does an HTML contain?

Ans. The HTML contains six types of headings which are defined with the <h1> to <h6> tags.
Each type of heading tag displays a different text size from another. So, <h1> is the
largest heading tag and <h6> is the smallest one. For example:

1. <h1>Heading no. 1</h1>


2. <h2>Heading no. 2</h2>
3. <h3>Heading no. 3</h3>
4. <h4>Heading no. 4</h4>
5. <h5>Heading no. 5</h5>
6. <h6>Heading no. 6</h6>

Output:-
Heading no. 1
Heading no. 2
Heading no. 3
Heading no. 4

Heading no. 5
Heading no. 6

Ques24. Define HTML Attributes.


Ans. HTML attributes provide additional information about HTML elements.
 All HTML elements can have attributes
 Attributes provide additional information about elements
 Attributes are always specified in the start tag
 Attributes usually come in name/value pairs like: name="value

Ques25 .What are some common lists that are used when designing a page?

Ans. There are many common lists which are used to design a page. You can choose any or a
combination of the following list types:

o Ordered list - The ordered list displays elements in numbered format. It is represented by
<ol> tag.
o Unordered list - The unordered list displays elements in bulleted format. It is represented
by <ul> tag.
o Definition list - The definition list displays elements in definition form like in dictionary.
The <dl>, <dt> and <dd> tags are used to define description list.

Ques26. What is semantic HTML?

Ans. Semantic HTML is a coding style. It is the use of HTML markup to reinforce the
semantics or meaning of the content. For example: In semantic HTML <b> </b> tag is
not used for bold statement as well as <i> </i> tag is used for italic. Instead of these we
use <strong></strong> and <em></em> tags.

Ques27. Define HTML Links.


Ans. Links are found on nearly all web pages. Links allow users to click their way from page
to page.
 HTML Links – Hyperlinks
 A Link has two ends, called anchors.
 HTML links are hyperlinks.
 You can click on a link and jump to another document.
 When you move the mouse over a link, the mouse arrow will turn into a little hand.
Note: A link does not have to be text. A link can be an image or any other HTML element!
Ques28.Define HTML Links syntax.

Asn. The HTML <a> tag defines a hyperlink. It has the following syntax:

<a href="url">link text</a>


 The most important attribute of the <a> element is the href attribute, which
indicates the link's destination.
 The link text is the part that will be visible to the reader.
 Clicking on the link text, will send the reader to the specified URL address.
Example

This example shows how to create a link to www.google.com:

<a href="https://www.google.com/">Click to visit Google site</a>


Ques10. Define Local Links.
Ans. A local link is a link to the same website and is specified with a relative URL(Without
http://www…).
Example:-
<!DOCTYPE html>
<html>
<head>
<title>Local links </title>
</head>
<body>
<a href=”india.jpg”>click to view image of INDIA GATE</a>
<body>
</html>
Ques29. Define HTML LINK colours.

Ans. By default, links will appear as follows in all browsers:


 An unvisited link is underlined and blue
 A visited link is underlined and purple
 An active link is underlined and red
 You can change the link state colors, by using CSS:

Example-

 Here, an unvisited link will be green with no underline. A visited link will be pink with
no underline. An active link will be yellow and underlined. In addition, when mousing
over a link (a: hover) it will become red and underlined:
 <style>
a:link {
color: green;
background-color: transparent;
text-decoration: none;
}

a:visited {
color: pink;
background-color: transparent;
text-decoration: none;
}

a:hover {
color: red;
background-color: transparent;
text-decoration: underline;
}

a:active {
color: yellow;
background-color: transparent;
text-decoration: underline;
}
</style>

Ques30. Define creating HTML Links using the Target Attribute.


Ans. By default, the linked page will be displayed in the current browser window. To change
this, you must specify another target for the link.

 The target attribute specifies where to open the linked document.


 The target attribute can have one of the following values:

 _self - Default. Opens the document in the same window/tab as it was clicked
 _blank - Opens the document in a new window or tab
 _parent - Opens the document in the parent frame
 _top - Opens the document in the full body of the window

Example

Use target="_blank" to open the linked document in a new browser window or tab:
<a href="https://www.google.com/" target="_blank">Visit Google</a>
Ques31. How to use an Image as a Link?
Ans. To use an image as a link, just put the <img> tag inside the <a> tag:
Example
<a href="default.asp">
<img src="smiley.gif" alt="HTML tutorial" style="width:42px;height:42px;">
</a>
Ques32 .How to create a Link to an Email Address?
Ans. Use mailto: inside the href attribute to create a link that opens the user's email program
(to let them send a new email):
Example
<a href="mailto:[email protected]">Send email</a>
Ques33. How we can add audio files to web page.

Ans. HTML audio tag is used to define sounds such as music and other audio clips. The
<source> tag or the src attribute is used to indicate the variations of the same audio file.
Currently there are three supported file format for HTML 5 audio tag.
1. Mp3 2.wav 3.ogg

Attributes of HTML Audio Tag

There is given a list of HTML audio tag.

Attribute Description

controls It defines the audio controls which is displayed with play/pause


buttons.

autoplay It specifies that the audio will start playing as soon as it is ready.

loop It specifies that the audio file will start over again, every time when it
is completed.

muted It is used to mute the audio output.

preload It specifies the author view to upload audio file when the page loads.
src It specifies the source URL of the audio file.

Ques34. How we can add video files to web page.

Ans. The <video> tag creates a video player on a web page.

This player support video playback directly inside the HTML page with media controls,
such as, start, stop, volume, and others.When using the <video> tag, you need to ensure
that your sound file is in the proper format. There are three accepted formats:MP4,Ogg
and Web M.

Attributes of HTML video Tag

Attribute Value Description

autoplay autoplay Specifies that the video will start playing as

soon as it is ready

controls controls Specifies that video controls should be

displayed (such as a play/pause button etc).

height pixels Sets the height of the video player

loop loop Specifies that the video will start over again,

every time it is finished


muted muted Specifies that the audio output of the video should
be muted

poster URL Specifies an image to be shown while the video is


downloading, or until the user hits the play button

preload auto Specifies if and how the author thinks the video
metadata should be loaded when the page loads
none

src URL Specifies the URL of the video file

width pixels Sets the width of the video player

A link does not have to be text. It can be an image or any other HTML element.

Answer the following Textual question answers:-

Ques1. Name the three accepted formats of a sound fi le for the <audio> tag.
Ans. Autoplay, controls, loop.
Ques2. Discuss and write about any three attributes of the <video> tag.
Ans. The following table describes three attributes of the <video> tag:

Attribute Description
Autopla It lets the video fi le to be played immediately after
y it loads.

controls It checks what controls are to be displayed with the


video player.

Height It is used to give the height of the video player.

Ques3. Define unvisited, visited and active links.


Ans. Unvisited links are hyperlinks that are not opened yet. They are underlined and blue in
colour, by default.
Visited links are hyperlinks of websites that are already viewed.
They are underlined and purple in colour.
Active links are the hyperlinks that are currently open or active.
They are underlined and red in colour.
Ques4. Write the syntax to add a link on a web page with the help of an example.
Ans. Syntax: <a href = “indiagate.html> India Gate <|a>
In the above example, the text ‘India Gate’ is hyperlinked to the web
page www.indiagate.html. By clicking as this text, a web page with
information about India Gate would open.
Ques5. With the help of an example, write the code in HTML to create an image link on a web
page.
Ans. <a href=“flowers.html”><img src = “flower.jpeg” height = “30” width
= “flower.jpeg” height = “30” width = “30”><|a>
A thumbnail image of flower is converted into an hyperlink which,
when clicked, would open a web page named flowers.html.
Chapter-4(Programming with Python)

 A computer language is a medium of communication between the user and a


computer.Computer language has its own character set, keywords and symbols, which
are used for writing a program.
 Computer programs are instructions to a computer. These instructions tell a
computer to perform the tasks necessary to process the data into information. The
process of writing these instructions (program) is called programming
 The people who can write these programs are called programmers.
 A programming language is a set of words, symbols, and codes that are used to write
a computer program.
 Python is one such programming language.

 Python is a general purpose interpreted interactive object oriented and high level
programming language.
 It was first introduced in 1991 by Guido van Rossum, a Dutch computer programmer.
 The language places strong emphasis on code reliability and simplicity so that
programmers can develop applications rapidly.
 Decision-making statements in programming language decide the direction of flow of
program execution.
 The keyboard shortcut to execute the active script in Python is F5.
 NOP stands for no operation.
Internal question answers:-
Ques1. Write the working of the input() function.
Ans. 1. When the input() function starts its execution ,the program flow stops until the user
gives an input.
2. The text or message displayed on the output screen to ask a user to enter the input
value is optional
3. Whatever you enter as input, the input function converts it into a string. Even if you
enter an integer value, the input () function converts it into a string. You need to
convert it into an integer in your code using a particular command.
Ques2. Define Decision making statements.
Ans. There are situations in real life when we need to make some decisions and based on these
decisions, we decide what is to be done next. Similar situations arise in programming also,
where we need to make some decisions and based on these decisions, we will execute the
next block of code. The following are the decision making statements available in
python :-
1. If statement:- Python supports the usual logical conditions from mathematics:

 Equals: a == b
 Not Equals: a != b
 Less than: a < b
 Less than or equal to: a <= b
 Greater than: a > b
 Greater than or equal to: a >= b

1.In computer programming, we use the if statement to run a block code only when
a certain condition is
met.
For example, assigning grades (A, B, C) based on marks obtained by a student.
 if the percentage is above 90, assign grade A
 if the percentage is above 75, assign grade B
 if the percentage is above 65, assign grade C
Syntax:-
If condition:
# Statements to execute if condition is true
Example:-
number = 10

# check if number is greater


than 0 if number > 0:
print('Number is positive.')

print('The if statement is easy')

output:- Number is positive.


The if statement is easy
2. if- else statement:- We use he else statement with the if statement to execute a block
of code when the condition is false.
Syntax:-
If(condition):
#Execute this block if condition is teur
else:
# Executes this block if condition is false

Example:-
a= 30
b=40
if b>a:
print(“b is greater than a”)
else:
Print(“a is greater than b”)

Output:-
b is greater than a
3. Nested if:-Nested if statement means an if statement insisde another if
statement.Python allows us to nest if statements within if statements.
Syntax:-
If(Condition 1):
# Excecute when condition 1 is true
If(Condition 2):
# Excecute when condition 2 is true
#if block is end here
# if block is end here

Example:-
X=50
If x>30:
Print(“value of x is above 30”)
If x>40
Print(“value of x is above 40 also”)
Output:- value of x is above 30
value of x is above 40 also

4. If –elif-else Statement:-
 A user can decide among multiple options.
 The if statements are eecuted from the top down.
 If one of the conditions controlling the if is true,the statement associated
with that if is executed and the rest of the ladder is bypassed.
 If none of the condition is true,then the final else statement will be executed.

Syntax:-
If(Condition):
Statement
elif(condition):
statement
.
.
Else:
Statement
Example:-
X = 50
If x >40:
Print(“the value of x is above 40”)
If x >70:
Print(“and also above 70!”)
else:
print(“but not above 60”)
Output:-
The value of x is above 40
But not above 60
Ques3. Define loops in python.

Ans. When programmers write a certain piece of code, loops allow them to condense
hundreds of lines of code into a few simple lines. Loop statements allows them to
write the code once and then execute a set of statements multiple times and reuse
it as needed.
Python provides three ways for executing the loops:-

1. For Loop:- The For loop is use for iterating(repeating )over a aequence.
Syntax:- foriterator_varin sequence:
Statement(s)
where,

iterating_var = variable that takes each individual value of seq in each iteration
seq = data structures like lists, strings, tuples, dictionary, set, range
statements = executable code
Example:-
# whole number 0 to 7

for x in range(7):
Print(x)

Output:
0
1
2
3
4
5
6

2. While Loop:-
In python,the while loop is used to execute a block of statements repeatedly until a
given condition is satisfied.And when the condition become false,the line
immeiately after the loop in the program is executed.

Syntax:-
while expression:
Statement(s)

Example:-
#Natural number 1 to 10
i=1
While i<11:
Print(i)
i = i+1

Output:-
1
2
3
4
5
6
7
8
9
10

3. Infinite loop:-
 While using a while loop,if you forget to increment the counter
variable in python or write a faulty logic ,the condition may never become false..
 In such a case the loop will run infinitely,and the condition after the loop will never be
executed.
 To stop execution ,press Ctrl+C.
Example:-
# Example of an infinite loop

While True:
Print (“hello students”)
Output:-
It will show ‘hello students’ for an infinite number of times.
4. Nested FOR loop:-
 You can also nest a loop inside another loop.
 You can put a for loop inside a while,or a while inside a for,or for inside a for,or while
inside a while.You can go far as you want.
Example:-
For i in range (0,5):
For j in range(0, i+1):
Print(“* ”,end=””)
Print()

Output:-
*
**
** *
** * *
** * * *
Ques4. Define Loop control statements.
Ans. Loop control statements change execution from their normal sequence.
Python supports following control statements:-

1. Break statement:- when we put a break statement in the body of a loop,the loop stop
executing and control shifts to the first statement outside it. You can put it in a for or
while loop.
Example:-
For val in “string”:
If val == ‘i’:
break
Print(val)
Print(“The end”)
Output:-
s
t
r
The end

Continue statement:-
 When the program control reaches the continue statement ,it skip the statements after
‘continue’.
 It the shifts to the next item in the sequence and executes the block of code for it.
Example:-
For val in “string”: ‘
If val == ‘i’:
Continue
Print (val)
Print (“The end”)
Output:-
s
t
r
n
g
The end
Pass Statement:-
 It is a null statement, which when executed leads to nothing .
 The interpreter does not ignore it, but it perform a no operation(NOP).

Example:-
For val in “string”: ‘
If val == ‘i’:
pass
Print (val)
Print (“The end”)
Output:-
s
t
r
i
n
g
The end
Textual question answers:-
Ques1. What is the use of pass statement in Python?
Ans. When we need a particular loop, class, or function in our program, but don’t know what
goes in it, we place the pass statement in it. It is a null statement which, when executed, leads to
nothing. The interpreter does not ignore it but performs a no operation (NOP).
Ques2. Name the decision making statements used in Python.
Ans. The decision-making statements in Python are: if, if else, nestled if, and if-else-if.
Ques3. Explain the while loop in Python with an example. Ans. In Python, the while loop is
used to execute a block of statements repeatedly until a given condition is satisfi ed. And when
the condition becomes false, the line immediately after the loop in the program is executed.
Syntax while expression: statement(s) All the statements indented by the same number of
character spaces after a programming construct are considered to be part of a single block of
code. Python uses indentation as its method of grouping statements.
Ques4. Write briefly about the infinite loop.
Ans. Infinite Loop: While using a while loop, if you forget to increment the counter variable in
Python, or write a faulty logic, the condition may never become false. In such a case, the loop
will run infi nitely, and the conditions after the loop will never be executed. To stop execution,
press Ctrl+C. However, an infi nite loop may actually be useful for cases when a semaphore is
needed, or for client/server programming. A semaphore is a variable used solely for
synchronisation in accessing shared resources.
Ques5. How does the input function work in Python?
Ans. The input() function first takes input from the user and then evaluates the
expression,which means python automatically identifies whether the user entered a string,a
number, or a list.if the input provided is ot correct,then a either syntax error or an exception is
raised by python.
Example:-
A= input (“Enter any number:”)
Print (a)

Output:-
Enter any number: 8
8
Important shortcut keys:-
 Ctrl +T create a tab in the work area of the python editor for
 the new script.
 Ctrl +O Loads the selected script in the python editor work area.
 Ctrl +- closes the active script.
 Ctrl+S Saves the active script.
 Ctrl +F2 saves the new active script.
 F5 execute code or a script .
Chapter-5(Introduction to Database-Ms Access 2013)
????What is the difference between MS excel and MS Access?
Access Excel
Deals with text, numbers, files and all kinds of Microsoft Excel generally deals with
data numerical data
Lots of worksheets or documents are a store
All the data is stored one time, in one place.
with similar, repeated data.
Helps you to build highly functional data entry Only the primary data entry screen is
forms and report templates. available.
Users will be able to enter the data more Data accuracy and speed is not much because
efficiently and accurately. of the format.

 On November 13, 1992, the first version of MS Access was released by Microsoft
 Before Access was introduced, Borland and Fox were the two Database Management
systems that were dominating the market
 It was Windows’ first mass-market database program
 Multiple changes were made in the program and gradually Microsoft started releasing
different versions of MS Access. Each new version came in with a modified RAM and
storage requirement.
 The first version of the MS Access database management system launched by Microsoft
was released in the year 1992.
Ques1. What do you mean by Data?
Ans. Facts relate to any object in consideration collectively known as Data.
Ques2. Define Database.
Ans. A database is a collection of interrelated data that help in efficient retrieval,insertion,
and deletion of data from the database.
Ques3. Define Field.
Ans. It is the column heading and contains a set of values for a single type.
Ques4. Define Record.
Ans. It is the row containing values under each field for one single type.
Ques5. Define Value.
Ans. It I the data item which is the smallest unit in a database. It can be numeric, a character,
or alphanumeric.
Ques6. What was the initial code of MS Access?
Ans. Cirrus
Ques7. When an Access file is saved,what file format does it take?
Ans. .accdb
Ques8. Write the steps for deigning a database.
a) Determining the purpose of your database
b) Finding and organizing the information required
c) Dividing the information into tables
d) Turning information items into columns
e) Specifying the primary keys
f) Setting up the table relationships ○ Refining the design
g) Applying the normalization rule.

Ques9.Define Database Management System(DBMS).

Ans. A Database Management System (DBMS) is a software program that enables us to


create, modify and extract data from a database. DBMS can be based on different data
models such as network, hierarchical and relational.

Ques10. Define Relational Database Management System.

Ans. A DBMS based on the relational data model stores data in the form of tables and is
called Relational Database Management System (RDBMS). Microsoft Access, which is
an example of RDBMS. Some other examples of RDBMS Oracle and Microsoft SQL
Server.

Ques11. Write Advantages of DBMS.


Ans. There are following Advantages of DBMS:-

1. Improved Data Sharing: DBMS enables data sharing among multiple users and
applications. Multiple users can access the same data simultaneously, without
interfering with each other's work. This improves collaboration and productivity, as
well as reduces the risk of data duplication.

2.Data Integration: DBMS allows the integration of data from multiple sources. This
means that data can be collected from various systems and combined into a single
database, which makes it easier to access and analyze.

3.Data Security: DBMS provides various security features such as access control,
authentication, and encryption to safeguard data from unauthorized access and prevent
data loss or corruption.

4.Data Consistency: DBMS enforces consistency in data by ensuring that data is


accurate, complete, and up-to-date. This helps to avoid data inconsistencies and errors
that can result in significant consequences for an organization.
5. Data Integrity: DBMS ensures that data is stored and retrieved without any loss or
corruption. It provides mechanisms such as transaction management and recovery, which
guarantees data integrity even in case of system failures.

Ques12. Write the Disadvantages of DBMS:

Ans. There are following Disadvantages of DBMS:-

1. High Cost: Implementing a DBMS can be expensive due to the cost of licensing,
hardware, and maintenance. This cost can be particularly significant for smaller
organizations.

2. Complexity: DBMS is a complex software that requires a significant amount of


technical expertise to install, configure, and maintain. This complexity can lead to
increased maintenance costs and technical difficulties.

3. System Overhead: DBMS requires system resources such as memory, CPU, and
disk space, which can lead to system overhead and reduced system performance.

4. Data Dependency: DBMS stores data in a particular format, which can create data
dependency issues. If the format changes, it can affect the application that uses the data,
leading to additional maintenance and development costs.
5. Single Point of Failure: DBMS represents a single point of failure for an
organization's data. If the DBMS fails, it can lead to significant data loss and downtime,
which can have a severe impact on the business.
Q 13. Define MS Access?
Ans: Microsoft Access is a database management system (DBMS) that combines the relational
Microsoft Jet Database Engine with a graphical user interface and software-development
tools.
Q 14. What are the uses of MS Access?
Ans: MS Access can be used to develop application software and is generally used by data
architects, software developers and power users. Following are the major uses of MS
Access:

 Manage accounts and bills


 Store data in the form of tables and edit or customise them later as per the requirement of
the user
 It can be used to make our websites
 Comparing data or finding a relationship between the existing data can be done using
Access
Q 15. What are the major components of MS Access?

Ans: The major components of MS Access are as follows:

 Tables
 Queries
 Relationships
 Macros
 Forms
 Reports
 Module
Q 16. How many types of databases are there in MS Access?

Ans: There are two types of database in MS Access:

 Flat File Database: When the data is stored in the form of a plain text file and cannot
incorporate multiple tables.
 Relational Database: When the data is stored in a form that the data items are related to
one another. It supports multiple tables which organise the text in rows and columns.

Ques17. Write the steps to open MS Access ?


Ans. 1. Click “Start” button then click on “Run”

2.Type “Ms access” and lastly click “Ok”.

Ques18. Write the database objects of MS Access.


Ans. The main usage of MS Access is for accounting. Since it is Microsoft’s primary
accounting database, it can be used to manage invoice/bills, manage accounts, keep an
eye on credit and debit, etc.

When we create a document of Access, data can be stored and accessed easily through
multiple components. There are seven major Database objects of MS Access database.
Discuss below are the same in brief:

 Tables: A table in Access is similar to any other tabulated data in the form of rows and
columns. However, when adding data to a program to create a table, all the information
entered must be correct as if any incorrect data is entered the processing may become
slow or may not give the correct answer. The appearance of the table may look similar to
the one formed in Excel with column heading and titles
 Queries: Once a table is created and the user or programmer is looking for a calculated
output, then it is called queries. This may include filtering, calculating, sorting, updating,
etc.
 Relationships: As the name suggests, when more than one table is added, the relation or
connection between them can be achieved. There three ways in which the connection
between the tables can be determined:

1. One to one
2. One to Many
3. Many to Many

 Macros: The tool using which predefined actions which can automate tasks on an Access
report is called macros. Multiple tasks can be assigned and they will function whenever
the macros option is selected on a report
 Forms: A user interface for a database application can be created using forms. Forms can
further be divided into two: bound and unbound forms
 Report: Once all the information is entered into the database, it can be reviewed or
analyzed using a report. A report can then be customized or modified as per the user’s
requirement
 Module: This allows a set of pre-defined instructions to be created by a programmer in
the database. They can be used throughout the database
Ques19. Write the benefits of Using MS Access.
Ans. It was Microsoft’s first database software and came along with a lot of advantages and
convenience for its users.

Benefits:

 Easy to create database within lesser time duration


 Used a very comprehensive programming language which made it user friendly
 With each revised version, new options and features were made available to the users for
their convenience
 It is easy to install and then easy to understand its working
 Importing data was easy
 Graphical user interface made it easy to use.
Ques20. Write the Limitations of using Ms Access.

Ans. Limitation of using Ms Access are:-

 Not too many people can use the same database at a single time. This may affect its speed
and efficiency.
 The same database was tough to use with different Operating systems.
 If you have a large database, you may find a file size limit.

Ques 21. Define the parts of MS Access 2013 Window.


Ans. Parts of MS Access 2013 Window are:-
a) The Backstage view:- The backstage view gives you various options for saving,
opening, printing, and sharing your presentations. To access Backstage view, click the
File tab on the Ribbon. The Backstage View also provides some information (properties)
about the file, including the following, when you click the Info option.
b) Quick Access Toolbar:- Like other Microsoft programs, Access contains a small
toolbar called the Quick Access Toolbar (QAT) in the upper-left of the window. Its
default is to display icons for three commands—Save, Undo, and Redo—but you can
also customize the QAT to show the commands you use the most in Access, helping you
work more efficiently.
 Customize the QAT
The settings for the QAT are located under File, Options, Quick Access Toolbar. You can
also right-click the toolbar and choose “Customize Quick Access Toolbar” or click on the
down arrow at the far-right of the QAT.

c) Navigation pane:- The Navigation Pane is the main way you view
and access all your database objects and it displays on the left
side of the Access window by default. Note The Navigation Pane
can be customized in a variety of ways.
d) The Ribbon:- The ribbon is the strip of tabs across the top of the
program window that contains groups of commands.

e) Tabs:-Different tabs when clicked display their own set of commands on the Ribbon.
Common tabs of MS Access are Home, Create, External Data, Database Tools, etc.
f) Status Bar:- It show information about the datanase and also allows shifting between
views of MS Acess.

Ques22. How you can create Table in Ms Access?


Ans. Ms Access allows different ways to create a table:-
a) Using Wizard
b) Using Design view
c) Using Datasheet view
 While the Wizard allows creation of a table through a step by step procedure.
 Design view allows you to create a table by explicity specifying the various field and
their data type.

Ques23. Write the rules while typing a Field name.


Ans. Rules are:-
a) A field name can consist of number, letter and a special character.
b) It must not include any space or any other special character.
c) A field name can be up to 255 character long.
d) One must give meaningful names to fields.
Ques24. Define Primary key and its rules.
Ans. A primary key is a field or set of fields that needs to be unique.This can be a unique
identification number.For example,Employee ID number,Pension number etc.
 A primary key cannot contain duplicate values.
 A primary key cannot contain null values.

Ques25.In which view we can enter the data in a Table.


Ans. In Datasheet view.
Ques26. Which keyboard key is used to navigate between the rows and columns?
Ans. Tab key
Ques27. In which view we can rename a Field?
Ans. In Design view
Ques28. Write the steps to add a new Field .
Ans. Steps are:
a) Choose Design view.
b) Click on the field before which you want to insert the new field.
c) Right click and choose INSERT ROWS. Or click on INSERT ROWS button in the
TOOLS group under the DESIGN tab.

d) A blank row is added.


e) Type the new field name , select the datatype and press ctrl +s to save the

changes. Ques29. Write the steps to delete a field .


Ans Steps are:-
a) Choose Design view.
b) Click on the field which you want to delete.
c) Right click and choose Delete Rows.
d) Press Ctrl +S to save the changes.

Ques30. How you can open existing Database?


Ans. Steps to open existing Database are:-
a) Click on File and choose Open option or press Ctrl +O.
b) From the Open dialog box,select the database and choose open. The desired database
will open.

Ques31. Which key is used to show/hide the Navigation pane?


Ans. F11
Ques32. Which key is used to inserts a new record?
Ans. Ctrl +Shift ++

Answer the Textual Questions Answers.


1. List any three advantages of a database.
Ans. Advantages of a Database are;-
a). Sharing of Data: In a database, users can share the data among themselves. There are
various levels of authorisation (for example, password) to access the data, and the data
can only be shared based on the correct authorisation entered by the users. Many remote
users can also access the database simultaneously and share the data among themselves.
b). Data Integrity: Data integrity means that the data is accurate and consistent in the
database. Data integrity is very important as big organisations are completely
dependent upon database systems. Any error in the data cause a serious disruption in
the working of the organisation. So it is necessary to ensure that the data is correct and
consistent in all the databases and for all the users.
c).Data Security and Privacy: Data security is a vital concept in a database. Only
authorised users should be allowed to access the database and their identity should be
authenticated using a Living with Computers 8 TRM 283 username and password. There
are levels of database access and a user can only view the data he/she is allowed to.
(b) Name the tasks that can be performed using a DBMS.
Ans. Data Definition: It helps in organising data into various types so
that a relation can be set for accessing information.
Data Updation: It helps in insertion, modification and deletion of
the data in the database.
Data Retrieval: It helps in taking out relevant information from the
stored data in an organised manner.
(c) What is a primary key? How can a primary key be defined in a
table?
Ans. A primary key is a field or a set of fields that needs to be unique.
This can be a unique identify cation number such as a Medicare
number, employee ID number, pension number, etc.
Defining Primary Key in a Table
1. Select the table in the Navigation Pane.
2. In the Design tab, click on the down-arrow under the Views option and
choose Design View.
3. Click on the fi eld which you want to set as primary key.
4. Click on the Primary Key button present next to Views button.
5. You can also right click on the fi eld name and choose the
Primary Key option from the context menu. It is a toggle button, i.e.,
clicking once will set the fi eld as primary key and clicking again
will remove the primary key setting.
(d) Discuss briefly a few data types available in MS Access
(e) Write the steps to delete a fi eld from a table.
Ans. Deleting a Field
1. Change the view to Design View.
2. Click on the field which you want to delete.
3. Right-click and choose Delete Rows.
4. You can also click on the Delete rows button in the
Tools group under the Design tab.
5. A confirmation dialog box appears. Choose Yes to delete the fi eld.
6. Press Ctrl+S to save the changes.
Chapter-6(More on Ms Access 2013)
 A DBMS serves the needs of an organization by logically arranging data so that it is easy
to access and hides various difficult procedures from the users.
 MS Access 2013 performs basic mathematical calculations like sum, Average,
Maximum, Minimum, count, etc. on numeric fields.
 This special feature is called ‘Totals’ and is present in the Records group under the
Home tab.
 Database objects are Tables, Queries, Forms, Reports.
 All the database objects are visible in the Navigation Pane.
 Data from tables and queries can be presented in a printable format called reports.
 Sorting and Filtering are two tools that let you customize how organize and view your
data.
 Sorting allows you to put records into logical order, with similar data grouped together.
 Filters allow you to view only the data you want to see.
 Toggling your filter allows you to turn the filter on and off.
 Quick search on data can be done in Access using the Record Navigation Pane available
at the bottom of the MS Access screen.

Internal Question Answers:-


Ques1. Write the steps to sort records.
Ans. The steps to sort records are as:-
1. Select the field you want to sort by. In this example, we will sort by marks of the students.

2. Select the Home tab on Ribbon, and locate the Sort &Filter group.
3. Sort the field by selecting the Ascending or Descending command. Here, select Sort
Smallest to Largest to sort marks in ascending order.
4. To save the new sort, click the save command on the Quick Access Toolbar.

Ques2. Write the steps to create a Filter.


Ans. Steps to create a Filter are:-
1. Click the drop-down arrow next to the field you want to filter by. We will filter by Class
because we want to see a list of students who are in a certain class.
2. A drop-down arrow menu with a checklist will appear.
3. Only checked items will be included in the filtered result.

4. Use the following options to determine which items will be included in your filter.
 Select and deselect items one at a time by clicking their checkboxes.
 Click Select All to include the item in the filter. If all items are already selected,
this option will deselect all items.
 Click Blanks to set the filter to find only the records with no data in the selected
field.
5. Click ok. The filter will be applied. Our Class Record now displays only those students
who are in Class 8.

Ques3. Write the steps to perform Quick search .


Ans. Steps to perform Quick search are:-
1. Type the first few letters of the data you want to search in the search box.
2. The first record containing the matching set is highlighted.

3. Press the Enter key to find the next matching record.


4. Repeat the above step to find all matching record.

Ques4. Write the steps to create Query using the Query Wizard .
Ans Steps to create Query are:-
1. Select the create tab.
2. Click Query Wizard
3. Select simple Query Wizard.
4. Click OK

5. Click the Tables/Queries down arrow,and then click the table or query with the fields you
want to use in your query.
6. Click the first field to include in the query’s results.
7. Click Add.
8. Repeat step 3 to add more fields.
9. Click Next.

10.Click the Detail option button.


11.click next.

12.Type a name for your query.


13.click finish.
Ques5. Write the steps to create a query using Query Design.
Ans. Steps to create query are:-
1. Select the Create tab on the ribbon ,and locate the Queries group.

2. Click the Query design. Access will switch to Query Design view.
3. In the show Table dialog box that appears.
4. Select the table you want to run a query on. Select Class Record table.
5. Click Add ,then click close.
6. The selected table will appear as a small window in the Object Relationship pane.

7. In the table window ,double click the fields names you want to include in your query.
8. Set the search criteria by clicking the cell in the criteria row of each fields you want to
filter.
9. Click Run command on the Design tab

10.Save your query by clicking on Save command in the Quick Access Toolbar.

Ques6. Define Forms .


Ans. Forms are the interfaces that facilitate easy data entry for users.
Ques7. Write the steps to create a Form.
Ans. steps to create a Form are:-
1. In the Navigation pane, select the table you want to use to create a Form.
2. Select the create tab,locate the Forms group,and click the Form command.

3. Your Form will be created and opened in Layout view.


4. To save form, click the save command on the Quick Access Toolbar.

Ques8.Write the steps to create a form using Form Wizard.


Ans. Steps to create a form using Form Wizard:-
1. On the Create tab in the Forms group, click Form Wizard.
2. In the Wizard , from the Table/Queries drop down list, select the table(or query)to base
the form on.
3. The fields for the selected table load in the Available Fields list box.
4. Move the fields to include on the form from the Available Fields list box to the selected
Fields list box.Highlight the field name to move it or highlight the field name and click
>.
5. To move all fields at once, click >>

6. Select the layout for the form.


7. Click Next.
8. Select an option for the view you want to open the form in.Your options are:
a) Open the form to view or enter information (open in form view).
b) Modify the form’s design (open in design view).
9. Click Finish.
10.The form loads in the view you selected.

Ques9.Write the steps to create a Report.


Ans. steps to create a Report are:-
1. Open the table or query you want to use in your report.
2. Select the create tab on the Ribbon. Locate the Reports group.
3. Then click the Report command.
4. Access will create a new report based on your object.
5. You can resize your fields, simply select a field then click and drag its edge until the field
is of the desired size.

Ques10.Write the steps to create a report using Report Wizard.


Ans. Steps to create a report are:-
1. On the create tab in the Reports group, click Report Wizard. The Wizard starts.
2. From the Tables/Queries drop-down list, select the table(or query)to base the report on.
3. Move the fields to include on the report from the Available Fields list box to the
Selected Fields list box.
4. Move the fields to include on the report from the Available Fields list box to the selected
Fields list box.Highlight the field name to move it or highlight the field name and click
>.

5. To move all fields at once , click >>.


6. Click Next.
7. Now, you can sort the records in ascending or descending order.
8. Select layout of the Report and orientation.
9. Click Next.
10.Select an option for the view you want to open the report in. Your options are:-
a. Preview the report(opens in print preview mode).
b. Modify the report’s design (open in Design view).
c. Click Finish .The report loads in the view you selected.

Ques11. Write the layout of Form.


Ans. Columnar, Tabular, Datasheet, Justified.
Ques12. Report command is present under which tab of the Ribbon.
Ans. Create Tab.
Ques13.Total is present in which group under Home tab.
Ans. Records.
Ques14.Quick search on data can be done in Access using which pane.
Ans. Record Navigation Pane.
Ques15.To select a primary key with multiple fields, hold down the key.
Ans.Ctrl key.
Ques16.Preview the report opens a report in which mode.
Ans. Print Preview mode.
Ques17.All Database objects present in which Pane?
Ans. Navigation Pane.
Ques18.Which keyboard key is used to select a primary key with multiple fields?
Ans. CTRL key
Ques19. Which shortcut key is used to move to a different tab?
Ans. Alt +F10
Ques20.Sort and Filter group is present under which tab of Ribbon.
Ans. Home tab.
Ques21. How do you create a Totals row in a table?
Ans. The ‘Total’ row adds up an entire column of numbers, just like in a ledger or on a receipt.
The resulting sum appears in a special row at the bottom of the table, called the ‘Total’ row.
Steps to create a totals row:
(a) From the Home tab, locate the Records group and click the Totals command.
(b) Scroll down to the last row of your table.
(c) Locate the desired field for the ‘Total’ row and then select the second empty cell below the
last record for that field. When a drop-down arrow appears, click it.
(d) Select the function you want to perform on the field data.
(e) The ‘Total’ row will appear.
Ques22. Write two different ways in which queries can be added.
Ans. Query Wizard; Query Design
Ques23.By default, Access sorts records by?
Ans. By their ID number.

Answer the following questions.(Textual Ques/Ans.)


Ques1.Name the different layout formats of a report available in MS Access 2013.
Ans. Stopped, Block and Outline.
Ques2. Differentiate between ‘sorting’ and ‘filtering’ in MS Access 2013.
Ans. Sorting records means putting records into a logical order with similar data grouped
together. Filtering allows you to view only the data you want to see. When you create a filter,
you set the criteria for the data you want to display.
(c) Why do we use ‘Filter’ in MS Access?
Ans. Filters are useful because they allow you to focus on specific records without being
distracted by the data you’re uninterested in. For instance, if you had a database that included
customer and order information, you could create a filter to display only customers living
within a certain city or only orders containing a certain product.
(d) Kanishka wants to filter out the students scoring 100 marks in Maths. Which feature of MS
Access should she use? Write the steps that she should follow.
Ans. Kanishka should use the Filter tool of MS Access.
The steps to access this tool are:
1. Click the drop-down arrow next to ‘Masks in Maths’.
2. Now select the checkbox in front of ‘100.’
3. Click ok.
Chapter-7(Developing Apps)
 App is an abbreviated form of the word ’application’. »
 An application is a software program designed to perform a specific function directly for
the user or, in some cases, for another application program.
 There are three types of apps: Native apps, Hybrid apps, and Web apps.
 Native Apps: These apps are developed for a single mobile operating system and
therefore they are ‘native‘ for a particular platform or device.
 Web Apps: These are software applications that behave like native applications. Web
apps use a browser to run and are usually written in HTML5, JavaScript or CSS. These
apps redirect a user to the URL and offer the ‘install‘ option by simply creating a
bookmark to their page.
 Hybrid Apps: They are built using multi-platform web technologies (for example
HTML5, CSS, and Javascript). Hybrid apps are mainly website applications disguised in
a native wrapper. Apps possess the usual pros and cons of both native and web mobile
applications.
 Mobile gaming has always been thriving, prompting app developers to invest more time
and resources into creating new games and mobile versions of well-known stationary
games.
 Business Apps: Also referred to as productivity apps, they hold the second place with a
considerable 10% share.
 Educational Apps: An app can be educational to some extent and still not fi t in this
category.
 Entertainment Apps: Here, we are talking about streaming, chatting, searching events,
watching videos online, posting photos on Instagram and so on.
 Utility Apps: Utility software is used on a daily basis by literally every one of us, we
don’t even realize it. Though unlike other types of apps, utility apps display the shortest
user session times. People use these to just get things done and move on. For example,
taxi apps. However, most popular types of applications here are scanners, trackers,
healthcare, first aid manuals, etc.
 MIT App Inventor is a visual programming environment that allows everyone to build
completely functional apps for smartphones and tablets.
Internal Question/Answers:-
Ques 1.The websites are designed using CSS. What does CSS mean?
Ans. CSS stands for Cascading Style Sheets.
Ques2. Which mobile app is developed by Zuckerberg?
Ans. Facebook. Facebook is developed by Mark Elliot Zuckerberg.
Ques3.The full form of App is ?
Ans. Application.
Ques4. Twitter allows short messaging called?
Ans. Tweet

Ques5.Which is a social networking app that translates each side of conversation in real-time.
Ans. Skype
Ques6. Calculator is a app and hence, it can be used offline.
Ans. Native App.
Ques7. Gmail is considered to be a app.
Ans. Hybrid
Ques8. Apps can be installed on the phone with the help of which Store?
Ans. Google Playstore
Ques9. Write three types into which Mobile Apps are classified.

Ans. 1. Native apps


2. Web apps
3. Hybrid apps
Ques10. Give two examples of Native apps.
Ans. 1. Camera 2. Contacts
Ques11. Two examples of Hybrid apps
Ans. 1. Gmail 2. Baskin-Robbins
Ques12.Write the developers of following apps.

Ans.

Apps Developers

Facebook Mark Elliot Zuckerberg

YouTube Steve Chen

WhatsApp Brion Acton

Instagram Kevin Systrom

Twitter Jack Dorsey


Ques13. Write two software used for free App development.

Ans. 1. Appypie 2. PhoneGap


Ques14. Write two social networking apps used to write short messages

Ans. 1. Twitter 2. Skype

Ques15 . Which Apps combine features of both Web apps and Native apps?
Ans. Hybrid Apps
Ques16. The e-Commerce app that was founded by Sachin Bansal and Binny Bansal is called?

Ans. Flipkart.

Ques17.We can pay utility bills using which app?

Ans. Banking App

Ques18. Sneha and her parents are planning to go for a movie. She wants to book the tickets online. W

Ans. BookMyShow App

Ques19. Mannat had a school trip last month where she clicked various photographs. Now she
wants to share these Photographs with her friends. Which app can she use?
Ans. WhatsApp.

 20. Differentiate between the following


2. Web App and Native App
Answer-
Web App Native App
1. The web app runs on the browser. The native app runs on the device itself.
2. A web application needs active The native app can work with/without
internet mode. the internet.
3. The web applications are independent The native apps once made for a
of environments and can be adapted to particular environment can't be used for
Web App Native App
all devices. other environments.

4. The web apps face the threat of The native applications are more secure.
hacking.

It needs to be constantly updated by the


5. It can update itself.
user.

It can either be already installed or


6. It does not need to be downloaded.
downloaded on the device.

3. Website and Web app

Answer

Website Web App

A website is a compilation of interlinked A web app is a website that is designed


web pages which are present under a stylishly and responds well when
single domain name. viewed on a smartphone. It is an
interactive website.

A website’s primary purpose is to provide Web applications engage the user. They
information. can perform a variety of tasks, and they
are customizable.

It is very difficult to use the website on Web Apps can be very easily used on
mobile devices with smaller displays. mobile devices as they are optimized for
smaller displays.

4. Native App and Hybrid App


Answer-
Native App Hybrid App

Hybrid apps are combination of native


Native apps are built specifically for one
apps and web apps and they are
platform/OS and have access to all the
designed to work on multiple
device's features and capabilities.
platforms.

Native apps are coded in specific


programming language for a specific Hybrid apps are built using web
platform such as Java for Android technologies such as HTML, CSS,
operating system and C and C++ for iOS and JavaScript.
operating system.

Native apps are generally faster and more Hybrid apps may not be as fast or
reliable than hybrid apps. reliable as native apps.

Ques21. What are the advantages of Mobile apps? Explain.


Ans. The advantages of Mobile apps are as follows:

1. Multipurpose — Mobile apps can have access to various device apps such as camera,
contacts, microphone, etc. They provide a better experience for the users and also serve
as a multipurpose platform.
2. Sharing Features — Mobile apps provide better and faster sharing of information such
as document files, images, clips, etc. can be shared instantly via mails, WhatsApp,
Facebook, etc.
3. Personalisation — It takes into consideration the user's choices, likings, behaviors,
culture, etc. hence, providing a user specific personalised experience.
4. Safe and Secure — Mobile apps enable the users to have a safe access for modifying and
sharing of data. The apps ensure a high level of security beyond the built-in security
system of the mobile.
5. App notifications — The push notifications play an important role in communicating
with the users. Various updates and promotional notifications can be provided to the
users through push notifications.
6. Can be accessed offline — Apps provide both online and offline access to the users.
Apart from making payments, banking, uploading or downloading data, other features
can be made available in offline mode.

Ques22. How are the different Mobile apps categorized? Give two examples of each.

Ans. Mobile apps can be classified into three types.

1. Native apps — A native app is developed for a particular platform or an operating


system. These apps are coded in a specific programming language for a specific
platform. They are faster and more reliable in terms of their performance.
For example, Camera, calculator, etc.
2. Web apps — Web apps are the programs that are stored on a remote server and are
delivered to the user's device with the help of the internet browser interface. These are
accessed through a web browser on the user's mobile phone. They are platform-
independent.
For example, Facebook, Flipkart, etc.
3. Hybrid apps — The combination of the native apps and the web apps is referred to as
hybrid Apps. These apps can access device features and can also be accessed offline but
their internal working is like that of a web app.
For example, Gmail, and Baskin-Robbins.

Textual Question/Answers:-
Ques1.What is side-loading?
Ans. You can download the app to your computer as an apk file, which you can distribute
and share as you like by manually installing it on other devices. (sometimes called ‘side
loading’.)
Ques2. Differentiate between hybrid apps and web apps.
Ans. Hybrid Apps: They are built using multi-platform web technologies (for example,
HTML5, CSS and Javascript). Hybrid apps are mainly website applications disguised in a
native wrapper. A hybrid app combines the elements of both native apps and web
applications. These apps usually possess the pros and cons of both native and web mobile
applications. Web Apps: These are software applications that behave like native applications.
Web apps use a browser to run and are usually written in HTML5, JavaScript or CSS. These
apps redirect a user to a URL and offer the ‘install’ option by simply creating a bookmark to
their page.
Ques3. What do you mean by the term ‘command’?
Ans. A command is a block that specifies an action to be performed (e.g., playing sound)
when the event (e.g., pressing Button1) is triggered.
Ques4. Write briefly about the following:
(i) Gaming apps (ii) Packaging your app
Ans. (i) These are by far the most popular category among types of apps, as more than 24%
of all mobile applications, available in the App Store, fall into this section. 306 Living with
Computers TRM Mobile gaming has always been thriving, prompting app developers to
invest more time and resources into creating new games and mobile versions of well-known
stationary games. From the user’s perspective, gaming apps offer a sense of achievement
and high engagement in the process. An average gaming session is about 8 minutes long. For
developers, the game apps category is the most profitable one. Examples: Clash of Clans,
Angry Birds Go.
(ii) To ‘package’ an app to your phone or to send it to someone else, select the Build tab at
the top of the screen. Under Build there are two options available for you to choose from: 1.
App (provide QR code for .apk): You can generate a barcode (a QR code), which you can
use to install the app on a phone or tablet that has a camera, with the aid of a barcode
scanner, like the using barcode scanner (freely available in Google Play). 2. App (save .apk
to my computer): You can download the app to your computer as an apk file, which you can
distribute and share as you like by manually installing it on other devices. (sometimes called
‘side loading’.)
Ques5. Niti wants to create her first app using MIT App Inventor, but she does not know
how. Help her by providing her the steps required to create the app.
Ans. To create your first app with MIT, follow these steps:
1. Go directly to ai2.appinventor.mit.edu or click the orange button ‘Create Apps!’ from the
App Inventor website.
2. Log in to App Inventor using Gmail’s (or Google’s) username and password.
3. Click Continue to dismiss the Splash screen.
4. Click on Start a new project.
5. Type in the project name (underscores are allowed, spaces cannot be used) and click OK.
Chapter-8(Smart Internet)

Internet of Things
 The Internet is a vast network that connects computers all over the world. Through the
Internet, people can share information and communicate from anywhere with an Internet
connection.
 The Internet consists of technologies developed by different individuals and
organizations.
 The Internet came in the year 1960 with the creation of the first working model
called ARPANET (Advanced Research Projects Agency).
 Robert W. Taylor, led the development of the ARPANET.
 In October 1969, using ARPANET first message was transferred from one computer to
another.
 Vinton Cerf and Robert Kahn, who developed the Transmission Control
Protocol/Internet Protocol (TCP/IP) technologies.
 The World Wide Web—commonly referred to as WWW, W3, or the Web—is a system
of interconnected public webpages accessible through the Internet. The Web is not the
same as the Internet: the Web is one of many applications built on top of the Internet.
 The File Transfer Protocol(FTP) is a standard communication protocol used for the
transfer of computer files from a server to a client on a computer network.
 Instant messaging technology is a type of online chat allowing real-time text transmission
over the Internet or another computer network.
Ques1. Write the advantages of Internet.
Ans: The advantages are:
Resources Sharing: The main advantage of internet is to provide easy means of resource sharing.

Education: Various online tutorials are available which are helpful for students to improve their
performance. Social Media: Various Social Networking sites like facebook, twitter etc., can be
used enough PC’s or tablets or smart phone to reconnect with anyone.

Entertainment: We can play various games online and watch videos and movies.

Ques2. Write the disadvantages of Internet.


Ans: The dis-advantages are:

Virus attack: Though games and other data which we download or may be an email virus attack
are possible, this may slow down our computer.

Security: Our personal information is not safe, theft of personal information is quite possible.
Incorrect Information: The information which are available is not full proof.

Cybercrime and bullying: Inappropriate videos on internet are available on internet which may
not be suitable for children.

Ques3. Write few points of safety protection on Internet.

Ans. Don't share personnel information i.e. name, age, address, a/c number etc.

 Don't create a password based on personnel information like last name, telephone number
etc.
 Don't share password with anyone although he/she is a close friend.

 Don't access irrelevant sites, open mails from unknown sources and comment anyone on
social networking site. Don't try to download unknown software and e-mail attachments
that may contain viruses.

 Use strong antivirus software for computer,


 Don't send any kind of message bullying friend or any unknown person over social
networking sites like Facebook, twitter or whatsapp.

Ques4. Define Blog.


Ans. A blog is a website that consists of a frequently updated collection of information and
entries. Most blogs focus on a particular topic or subject area.
The entries that appear on a blog are called posts.
Ques5. What is a Blogger?
Ans. A single person who maintains many blogs is known as a Blogger.
Ques6. Write some blogging platforms .
Ans. Some blogging platforms are:-

 WordPress
 Blogger
 com
 Wix
 Gator
 Tumbl

Ques7. What is Vlog?

Ans. Vlog or video blog is a blog in which we will create and publish video content.

Ques8. What are the benefits of blogging?

Ans. Sone Benefits of blogging are:

 reaching a wider audience


 Gaining monetary benefits

Ques9. The first page of a blog post is .html.

Ans. Index.html

Ques10. Who is the father of cloud computing?

Ans. Explanation. In the 1960s J.C.R. Licklider wanted to connect people and share data
anytime from anywhere, hence he invented Cloud Computing.
Ques11. Write a type of cloud computing service?

Ans. Software as a Service, is the most widely used choice for enterprises. SaaS makes use of
the internet to offer apps to consumers that are controlled by a third-party vendor.

Ques12.Write the applications of cloud computing.


Ans. Adobe Creative Cloud is used in the art sector. Paypal is an online payment application.
Google G Suite is the best storage and backup application used by google.

Ques13. Which of the following is the Cloud Platform provided by Amazon?

Ans. Amazon Web Services (AWS), an Infrastructure as a Service (IaaS) offering that allows
users to rent virtual machines on Amazon’s own infrastructure, is one of the most
successful cloud-based enterprises

Ques14. What is Cloud Computing?

Ans. Cloud computing refers to manipulating, configuring and accessing the applications
online. It offers online data storage, infrastructure and applications.

Cloud computing is the delivery of different services through the Internet. These
resources include tools and applications like data storage, servers, databases,
networking, and software.

Ques15.Explain the characteristics of Cloud Computing.


Ans. The characteristics of Cloud Computing are as follows:
1. On-Demand Self-Service — In Cloud Computing, multiple clients can share the
resources and applications at the same time. These Cloud services and resources can be
used on-demand and often bought on a subscription basis without human interaction
with the service providers.

2. Broad Network Access — The services can be accessed on the Internet anytime and
anywhere in the world through multiple devices such as mobile phones, tablets, laptops,
etc.

3. Resource Pooling — The resources like virtual server space, network connections,
bandwidth etc., are pooled by multiple users, simultaneously from any location, without
being interfered by the other users.

4. Rapid Elasticity — This characteristic allows consumers to transparently scale up or


scale down the resources according to their computing needs.

5. Measured service — Cloud Computing is based on a pay-for-what-you-use model


where resource usage is monitored, measured and reported transparently, based on
utilization.

Ques16.Explain the Advantages of Cloud Computing.

Ans. Advantages of Cloud Computing ae:-

1. Data security- Data security is one of the biggest advantages of cloud computing. Cloud
offers many advanced features related to security and ensures that data is securely stored and
handled.

2. Cost savings- Whatever cloud service model you choose, you only pay for the resources you
actually use. This helps you avoid overbuilding and overprovisioning your data center and
gives your IT teams back valuable time to focus on more strategic work.

3. Scalability and flexibility- Cloud computing gives your business more flexibility. You can
quickly scale resources and storage up to meet business demands without having to invest in
physical infrastructure.

4. Back-up and restore data- Once the data is stored in a Cloud, it is easier to get the back-up
and recovery of that, which is otherwise very time taking process on-premise.
5. Unlimited storage capacity- The cloud offers almost limitless storage capacity. At any time
you can quickly expand your storage capacity with very nominal monthly fees.
Ques17 .Explain the Disadvantages of Cloud Computing.
Ans. Disadvantages of Cloud Computing are:-

1. Vendor lock-in- Vendor lock-in is the biggest disadvantage of cloud computing.


Organizations may face problems when transferring their services from one vendor to
another. As different vendors provide different platforms, that can cause difficulty moving
from one cloud to another.
2. Limited Control - As we know, cloud infrastructure is completely owned, managed, and
monitored by the service provider, so cloud users have less control over the function and
execution of services within a cloud infrastructure.

3. Vulnerability to attacks- Storing data in the cloud may pose serious challenges in terms of
information theft since every company’s data is online. A security breach is something that
even the best organizations have suffered from, and it’s a potential risk in the cloud as well.
Although advanced security measures are deployed on the cloud, still storing confidential
data in the cloud can be a risky affair, and hence vulnerability to attacks shall be considered.
4. Network connectivity dependency- Cloud computing is entirely dependent on the Internet.
This direct tie-up with the Internet means that a company needs to have reliable and
consistent Internet service as well as a fast connection and bandwidth to reap the benefits of
cloud computing.

5. Downtime- Downtime is considered as one of the biggest potential downsides of using cloud
computing. Cloud providers may sometimes face technical outages that can happen due to
various reasons, such as loss of power, low Internet connectivity, data centers going out of
service for maintenance, etc. This can lead to temporary downtime in the cloud service.

Ques18. Define types of Cloud Computing.


Ans.
1. Public Cloud
Public clouds are managed by third parties which provide cloud services over the internet to
the public, these services are available as pay-as-you-go billing models.
They offer solutions for minimizing IT infrastructure costs and become a good option for
handling peak loads on the local infrastructure. Public clouds are the go-to option for small
enterprises, which can start their businesses without large upfront investments by completely
relying on public infrastructure for their IT needs.
The fundamental characteristics of public clouds are multitenancy. A public cloud is meant to
serve multiple users, not a single customer. A user requires a virtual computing environment
that is separated, and most likely isolated, from other users.
2. Private cloud
Private clouds are distributed systems that work on private infrastructure and provide the users
with dynamic provisioning of computing resources. Instead of a pay-as-you-go model in
private clouds, there could be other schemes that manage the usage of the cloud and
proportionally billing of the different departments or sections of an enterprise. Private cloud
providers are HP Data Centers, Ubuntu, Elastic-Private cloud, Microsoft, etc.

3. Hybrid cloud:
A hybrid cloud is a heterogeneous distributed system formed by combining facilities of the
public cloud and private cloud. For this reason, they are also called heterogeneous clouds.
A major drawback of private deployments is the inability to scale on-demand and efficiently
address peak loads. Here public clouds are needed. Hence, a hybrid cloud takes advantage of
both public and private clouds.

Ques19. What is Cyber security?


Ans. Cyber security is the application of technologies, processes, and controls to protect
systems, networks, programs, devices and data from cyber attacks. It aims to reduce the
risk of cyber attacks and protect against the unauthorised exploitation of systems,
networks, and technologies.
Ques20. Write the types of Cyber Security Threats.
Ans. 1. Malware-

Malware is also known as malicious code or malicious software. Malware is a program inserted
into a system to compromise the confidentiality, integrity, or availability of data. It is done
secretly and can affect your data, applications, or operating system. Malware has become one of
the most significant external threat to systems. Malware can cause widespread damage and
disruption, and requires huge efforts within most organizations.

2. Ransomware-
Ransomware enters computer networks and encrypts files using public-key encryption. Unlike
other malware, this encryption key stays on the cyber criminal’s server. Cyber criminals will
request ransom for this private key. Cyber criminals are using encryption as a weapon to hold
the data hostage.
3. Phishing-

Phishing is one of the most common methods that attackers use to gain access to a target system.
Often, it is easier to trick a user into clicking on a malicious link or opening an attachment than
it is to locate and successfully exploit a vulnerability in an organization’s network. Phishing
attacks can achieve a variety of goals, including credential theft, malware delivery, financial
fraud, and theft of sensitive data.

4. Man-in-the-Middle (MitM) Attack-

Many network protocols are protected against eavesdroppers by encryption, which makes the
traffic impossible to read. A Man-in-the-Middle (MitM) attack bypasses these protections by
breaking a connection into two pieces. By creating a separate, encrypted connection with the
client and the server, an attacker can read the data sent over the connection and modify it as
desired before forwarding it on to its destination.

5. Denial of Service Attack-

Organizations’ IT infrastructure and services – like web applications, email, etc. – are critical to
their ability to do business. Denial of Service (DoS) attacks are designed to deny access to
critical services. This can be accomplished by exploiting a vulnerability in an application
(causing it to crash) or by flooding a system with more data or requests than it is able to manage
(rendering it unable to handle legitimate requests). In some cases, attackers will perform a
ransom DoS attack where a ransom payment is demanded to either stop an ongoing attack or
prevent a threatened one.

Ques21.What is cyber ethics ?


Ans. Cyberethics governs rules that individuals must be polite and responsible when they use
the internet. Cyberethics aim to protect the moral, financial, social behavior of
individuals. Cyberethics engages the users to use the internet safely and use technology
responsibly and sensibly.
Ques22. Write the guidelines to Cyber ethics and safety for students.
Ans. Ethics are followed while using Internet computers are:
 Do not install or uninstall software without prior permission.
 Do not steal information from Internet.
 Do not make illegal copies of software, for which are not paid.
 Protect important documents using passwords.
 Do not browse unwanted websites or emails.
Ques23. Who is known as the -Father of “AI”?
Ans. School McCarthy
Ques24. Which of the following are the software languages used in AI?
Ans. JAVA , C++, Lisp

Ques 25.What is the full form of AI?

Ans. Artificial Intelligence


Ques26.AEG bot is an example of which field of AI applications?

Ans. Data Security


Ques27. Putting a hash tag in social media environment is an example of which field of AI
applications?
Ans. AI in social media
Ques28.Strong AI belongs to which Type of Artificial Intelligence?
Ans. Artificial General Intelligence
Ques29. Theory of Minds belongs which type of Artificial Intelligence?
Ans. Artificial Neural Network
Ques30.Give one example of Reactive Machines.

Ans. IBM’s Deep Blue system


Ques31.Write the names of major domains of AI. Explain Computer Vision technique in
this regard.
Ans.. Major domains of AI are:
a) Machine learning b) Deep learning c) Robotics d) Expert systems) Fuzzy logic f) Natur
al language processing g) Computer vision.

Computer vision is a field of artificial intelligence (AI) that enables computers and systems
to derive meaningful information from digital images, videos, and other visual inputs


and take action or make recommendations based on that information.
Ques32. What is artificial narrow intelligence (ANI)?

Ans. Artificial narrow intelligence (sometimes considered weak AI, but that really gets into the
semantics of AI research) is an AI system that's designed to perform specific tasks. While there
will always be disagreement as to what exactly constitutes AI and where the bar is set, let's look
at some of the things that are near universally considered ANIs at the moment.

Ques33. What is artificial general intelligence (AGI)?

Ans. An artificial general intelligence (AGI), or strong AI, is an AI that exhibits human-like
intelligence (or is "generally smarter than humans"). What this really means is up for debate,
but it's generally taken to be something a lot more sci-fi than we have now. It's not trained for
specific tasks; instead, it's able to do near enough anything it's asked to do.

Ques34. What is artificial super intelligence (ASI)?


Ans. ASIs are AI systems that far outstrip human intelligence. They're your sentient sci-fi
supercomputers. We're nowhere near developing one yet.

Ques35. Explain Robotics, their types and use cases in detail.


Ans. Robotics is a branch of engineering that involves the conception, design,manufacture, and
operation of robots. This fields overlaps with electronics,computer science, artificial
intelligence, mechatronics, nanotechnology, and bioengineering.
Different types of robots
a) Pre- programmed robots b) Humanoid robots c) Autonomous robots
d) Teleoperated robots e) Augmenting robots
Use cases
a) Manufacturing b) Logistics c) Healthcare d) Home

Ques36.Write down the main Steps of AI Project Cycle.


Ans. 1. Problem Scoping: Understanding the problem2. Data Acquisition : Collecting accurate
and reliable data3. Data Exploration : Arranging the data uniformly4. Modelling : Creating
Models from the data5. Evaluation: Evaluating the project.

Ques37. Explain Problem Scoping in terms of AI.


Ans. Problem Scoping refers to understanding a problem finding out various factors which
affect the problem, define the goal or aim of the project
.
The 4W's of Problem Scoping are Who, What, Where and Why. These W’s helps
in identifying and understanding the problem in a better and efficient manner.1. Who - "Who"
part helps us in comprehending and categorizing who all are affected directly and indirectly
with the problem and who are called the StakeHolders2. What - "What" part helps us in
understanding and identifying the nature of the problem and how do we get to know what helps
to get us know the evidence.3. Where - "Where" does the problem arises, situation and the
location.4. Why - "Why" is the given problem worth solving.

Ques38. Write the Advantages of Artificial Intelligence.

Ans. In real-world applications, AI is revolutionizing various industries through many


advantages it has to offer in the following ways:
1. By Reducing Human Error
 It is likely for humans to make mistakes in tedious and monotonous tasks, but computers
can avoid such errors if programmed correctly.
 AI models make predictions by applying algorithms to the compiled data, thereby
reducing errors and improving accuracy.
 Hence, achieving better results and fewer mistakes is possible. This can save both time
and resources. So, organizations tend to increase their investments in AI for leveraging
big data.
2. Allows Automating Repetitive Tasks
 Repetitive tasks and processes continue to be a significant aspect of many occupations
today.
 This does not allow using the full potential of human employees.
 AI enables automation of routine monotonous tasks in different areas of data collection
and entry, email responses, customer support through chatbots, factory operations such as
visual quality inspection, software testing, invoice generation, and many more.
 This can undoubtedly free up the employees' time to focus on creativity or other areas
that require distinctively human abilities.
3. Easily Handles Big Data
 AI can process and make sense of big data in very less time.
 It can quickly capture data and extract relevant data for analysis. However, that's not all,
as AI can also further process this data through interpretation and transformation.
4. Faster Decision-Making with Continuous Availability
 Organizations are always keen on faster decision-making to respond to today's dynamic
markets.
 But for faster decision-making, it is essential to have reliable insights available at a faster
pace.
 AI, along with various technologies, enables machines to bring consolidated information
and predictions to assist in faster decision-making.
 Additionally, AI also improves the process every time with previous predictions. Besides,
AI systems can be continuously available, ensuring continual availability 24/7 with
breaks (other than planned maintenance activities). This significantly impacts the
company's productivity.
5. AI-powered Digital Assistants
 Many businesses today have implemented digital assistants (chatbots) for customer
interactions.
 A chatbot can significantly reduce the need for excessive customer service staff for
routine and simple customer queries.
 Chatbots can smartly interact with the customer and provide relevant information on
demand.
 Voice assistants like Alexa and Siri are examples of voice bots that respond to voice
commands and assist users with queries and personal management tasks.
6. Mitigates Risks
 A highly notable advantage of AI application is in areas that are hazardous to humans.
 AI systems can minimize the risks involved for humans in such tasks. For example, AI-
enabled robots can undertake risky tasks such as coal mining, marine life exploration,
assisting in rescue operations during natural disasters, and so on.
7. Pattern Identification
 AI outperforms human talents when spotting patterns in words, figures, or images.
 AI effectively discovers trends and patterns in a dataset and, as a result, can generate
more accurate predictions faster.
 This is crucial for companies as they can visualize the bigger picture for better
decision- making.
 For example, with such trends and patterns, AI can improve the marketing analytics
capabilities of any organization.
8. Improving Processes and Workflows
 Companies strive to find ways to work more efficiently, increase productivity, and boost
revenues.
 An important part of this includes developing better human workflows. It might be
possible to achieve higher efficiency by designing workflows that reduce error and
rework by humans.
9. Medical Applications and Treatments
 The best thing that has ever happened to humans is AI being involved in medical
applications and treatments.
 Doctors can assess their patients and their health risks quickly with AI. The growing
applications of AI used in medical science also help educate the machines regarding the
side effects of various medicines.
 Nowadays, medical professionals are trained with artificial surgery stimulators that help
monitor and detect neurological disorders and stimulate brain functions.
 AI also helps in radiosurgery. It is used while operating on tumors without damaging the
surrounding tissues.
 The growing applications of AI used in medical science also help educate the
machines regarding the side effects of various medicines.
10. 24x7 Availability
 Many studies have been conducted, and it has been proved that humans are productive
only for three to four hours a day.
 They demand breaks and time off to maintain a healthy work-life balance. This is where
artificial intelligence (AI) enters the picture.
 AI can work indefinitely without taking a break or vacation. Machines can think much
faster than humans and perform multiple tasks simultaneously while giving accurate
results.
 Unlike humans, they are programmed to work for longer hours without getting bored or
distracted. They can also handle tedious and monotonous jobs easily with the help of AI
algorithms. Check out the online Bootcamp Data Science programs that can help you
grasp relevant Data Science and AI concepts.

Ques39. Write the Disadvantages of Artificial Intelligence.

Ans. Although AI offers several advantages, it still has a few disadvantages mentioned
below:

1. More Likely to Increase Human Laziness


 Automation in tasks and increased availability of digital assistants tend to increase
machine dependency, which can likely increase human laziness.
 Too much relying on AI for simple tasks such as small calculations or remembering
numbers or addresses can affect humans in their day-to-day activities, which require
memorization or analysis.
 Conscious use of AI is crucial to avoid negative effects on future generations.
2. AI is Expensive to Implement
 Initial set-up for AI requires a high investment as companies have to invest in AI
frameworks, including the latest hardware and software.
 Additional costs are incurred on training teams to learn how to utilize the AI systems. All
this makes implementing and maintaining AI systems expensive.
3. Can Increase Unemployment
 Although AI can replace repetitive tasks and other types of manual work, which is
beneficial for organizations, this also has a negative impact on employment.
 Conventional jobs will likely be completely replaced by AI in the future, leading to the
unemployment of individuals who perform them.
4. Lacks Creativeness
 Since AI systems make predictions based on a set of algorithms, these can lack creativity,
especially in the content marketing field.
 As AI systems improve over time from inputs and experience, they cannot think outside
the box or generate creative approaches to a project.
5. Cannot Understand Emotions
 AI systems can work faster and without a break, but they cannot evaluate emotions
before making decisions.
 These systems always remain highly rational and practical. This is why AI systems find it
challenging to bring in emotions while interacting with customers, as emotions play a key
role in sales and marketing while convincing a customer to make a purchase.
6. Difficult to Implement Ethics
 Finally, AI systems cannot process human emotions and feel them. It is highly
challenging to incorporate ethics and morality into these systems.
 Advanced versions of AI like the theory of mind and Self-awareness, when achieved, can
only implement ethical behaviour in AI systems.
 Currently, these systems are on paper and only partly achieved; it looks a long way to
think about implementing ethics in AI systems. Also, take a look at the details on skills
to become an AI & ML engineer.

Textual Question answers:-


Ques1. What do you understand by cloud computing? Discuss its
advantages and disadvantages.
Ans. Cloud computing means that instead of all the computer hardware
and software you’re using sitting on your desktop, or somewhere inside your company’s
network, is provided to you as a service by
another company via the Internet.
Advantages of Cloud Computing
 Less costs: The services are free from capital expenditure.
 24 × 7 availability: Most of the cloud providers are reliable in offering
their services.
 All over functioning: Cloud computing offers the advantage of
working from anywhere across the globe, as long as you have
an Internet connection.
 Automated updates on software: In cloud computing, the server
suppliers regularly update your software including the
updates on security.
 Security:Cloud computing offers great security when any sensitive
data has been lost.
Disadvantages of Cloud Computing
 Network connection dependency: In order to get the benefits of cloud computing, your
business must always have an Internet connection. You need a network to be able to use
your virtual machines. If you lose your network connection because of a storm or an
outage, you may experience some downtime.
 Limited features: Not all cloud providers are created equally.
 Loss of control: You are essentially trusting another party to take care of your data.
 Security: Cloud hacking cases have shown that not all cloud providers are as secure as
they claim to be.
 Technical issues: If you experience any technical issues, you have no choice but to call y
our service provider’s technical support for help.
Ques2. Differentiate between blogs and websites.
Ans. Blog is an online journal or website displaying information in reverse chronological order.
It is a platform where a writer or group of writers share their views on any subject.
Website is a group of web pages on any topic containing information about the topic.
Ques3.Why is it important to be safe online? Mention any two reasons.
Ans. It is very important to stay safe online because it can lead to a data beach and can lead to a
lot social, business and personal risk.
Ques4.Write briefly about the following:
(i) Blog structure
(ii) Cyber ethics
(iii) Artifi cial Intelligence
Ans. (i) Blog Structure: The appearance of blogs changed over time, and nowadays blogs
include different items. But most blogs include some standard features and structure. Here are
common features that a typical blog will include:
 Header with the menu or navigation bar
 Main content area with highlighted or latest blog posts
 Sidebar with social profiles, favourite content, etc.
 Footer with relevant links like a disclaimer, privacy
policy, contact page, etc.
(ii) Cyber Ethics: Cyber ethics is a set of moral choices that individuals make when using
Internet-capable technologies and digital media. The acceptable behaviour in the real world
is also acceptable in cyberspace. Examples of moral conduct in both physical and virtual
environment include showing respect for others, being honest, not stealing from others, etc.
(iii) Artifi cial Intelligence: Artificial Intelligence (AI) is an area of computer science that
emphasises on the creation of intelligent machines that can work and react like humans.
It includes learning (the acquisition of information and rules for using the information),
reasoning (using rules to reach approximate or definite conclusions) and self-correction.
AI can be categorised as either weak or strong. Weak AI is an AI system that is designed and
trained for a particular task. Virtual personal assistants, such as Apple’s Siri, are a form of
weak AI.
Ques5.Name any two types of cyber threats. Write briefl y about each.
Ans. 1. Ransomware is a type of malware that involves an attacker locking the victim’s
computer system fi les – typically through encryption – and demanding a payment to decrypt
and unlock them.
2. Malware is any fi le or program used to harm a computer user, such as worms, computer
viruses, Trojan horses and spyware.
Ques6. Naman is working on his Science project given by his school teacher. He needs to
prepare a PowerPoint presentation and requires relevant pictures. He has downloaded some
protected pictures from Internet for his personal use. What’s wrong with this
act of Naman and why?
Ans. Naman is not following cyber ethics. All intellectual property has
copyright laws and he cannot copy any material from any website
without permission.
Ques7. Karina was typing an e-mail to be sent to her friend. She attached
some pictures and audio fi les (downloaded from the Internet) with the mail. Suddenly, her
computer started showing irrelevant symbols and messages. What could have gone wrong with
Karina’s computer? What should she do to avoid any such thing in future?
Ans. Karina’s computer might be attacked by malware. She should use a good anti-virus
software that protects her computer from malware attacks.

You might also like