8th Class Computer Booklet
8th Class Computer Booklet
Chapter-1 (Networking)
Communication means the ability to convey thoughts, ideas, and everything else that
needs to be experienced or conveyed.
A Network is a group of two or more computers or other electronic devices that are
interconnected to exchange data and share resources.
Networking in computers brings efficiency, economy, and effectiveness
in an organization.
Each computer has its own keyboard, mouse, scanner, and printer which are called as
Peripheral devices.
The collection of two or more computers connected in order to communicate and share
data and information are called computer networks.
The computers that share and receive data from servers are called Clients.
The Internet is a global (wide area) network connecting millions of computers
Bluetooth: - Bluetooth is a form of technology in which there is no existence of wires or
cables. This technology makes use of radio frequencies for sending and receiving data or
information over a short distance.
To establish a wired network in a group of computers, additional components are
required such as network cards, networking cables, modems, hubs, and switches.
Network security means protecting data and resources from any unauthorized access.
Personal Area Network makes use of short-range Radio Frequency.
The 1st computer network was introduced in the 1960s and was called
ARPANET. It was designed by the United States Department of Defense’s
Advanced Research Project Agency i.e. ARPA to connect universities and
research institutions across the country.
Internal question answers
Ques1.What is Modem?
Ans. The modem is the device that is used for data transfer from one computer network to
another computer network through telephone lines. The abbreviation of MoDem is
Modulation and Demodulation.
Ques2. What is PAN Network?
Ans. PAN is a computer network that enables communication between computer devices
Ques4. Mr. Nayar owns a company. His company has different departments that are
spread over two adjoining buildings. He wants to connect computers to all the
departments in both buildings for quick and efficient data transfer. Suggest an
economical method of networking to him.
Ans. Mr. Nayar has to use a LAN network.
Ques5. Differentiate between PAN and LAN.
Ans. PAN LAN
1. PAN stands for personal area 1. LAN stands for local area
network. network.
2. The data transfer rate is slow. 2. The data transfer rate is high.
Question 1
Riya wants to transfer pictures of her recent US trip from her mobile to her computer. Suggest a
wireless mode of transmission that she can use for the same.
Answer
Riya can connect her mobile and computer through Bluetooth wireless networking technology.
As the mobile phone can be brought in close range to the computer the transmission range of
Bluetooth is well suited for this setup.
Question 2
Mr. Nanda is opening a new branch of his office in Noida. He wants to connect the computers
of this branch with the computers of his home branch at Panchkula. Which networking type best
suits his requirements?
Answer
As the branches are located in two different cities so Mr. Nanda should use Wide Area Network
(WAN) to connect the computers of the two branches.
Palettes
To monitor and modify images (there are 5 palettes by default).
Palette Well
To organize palettes in the work area.
Drag a palette’s tab into the palette well to store it in the palette well.
Once in the palette well click on the palette tab to use it.
Ques11. What is a selection tool? Write the names of any three selection tools.
Ans. The selection tool is a fundamental feature that enables users to define and isolate
specific parts of an image for editing, retouching, or manipulation while leaving the
rest unaffected. Three notable selection tools are:
1. Rectangular Marquee Tool: This tool creates rectangular or square selections, useful for
straightforward, geometric areas.
2. Lasso Tool: With variations like the Lasso, Polygonal Lasso, and Magnetic Lasso, it
offers freehand or straight-edged selections, handy for intricate or irregular shapes.
3. Magic Wand Tool: It selects contiguous areas based on color similarity, streamlining the
process when dealing with areas of similar hues.
Ques12. What is the use of a toolbox?
Ans. The toolbox contains selection tools, painting tools, editing tools, foreground and
background colors, selection boxes, and viewing tools.
Ques13.What are the steps involved in using marquee and lasso tools?
Ans. The steps for making a selection using the Marquee tool are-
STEP 1: Open the image and right-click on the Marquee tool icon.
STEP 2: Now, select the required marquee tool from the list such as:
• Rectangular Marquee Tool • Elliptic Marquee Tool • Single row Marquee Tool
• Single column Marquee Tool
STEP 3: Drag the mouse over the selected image.
The steps involved in making a selection using the Lasso tool icon are:
STEP 1: Open the image and right-click on the lasso tool icon.
STEP 2: Now, select the required lasso tool shape from the list such as
• Lasso Tool • Polygonal Lasso Tool • Magnetic Lasso Tool
STEP 3: Place the pointer of the mouse on the image and drag it around the part of the
selected Image.
Ques14. Name few Blending brush combinations of Mixer Brush Tool. Write the steps to use
the Mixer Brush Tool.
Ans. Wet Blend, Dry Brush, Oil Pain, Moist, Very Wet, etc.
Step 1 Open a new document and select the mixer brush tool from the tool panel.
Step 2 Select the desired brush from the brush presets picker in the options bar.
Step 3 Set various options in the options bar according to your preferences.
Step 4 Click on drag the mouse on the image to paint.
Ques15. Define Spot Healing Brush Tool.
Ans. Photoshop offers an advanced retouching palette to correct image imperfections. Spot
healing brush tool is one of the retouching tools available in Photoshop.
Ques23.What is the use of Painting Tools? Name any five Painting Tools.
Ans. Painting tools are used to make photographs attractive and appealing.
Five painting tools are:- 1)spot healing 2)clone stamp tool 3)eraser tool 4)brush tool
Settings:
Brush: The size of the brush.
Mode: The blending mode. For most work Normal will be the best option. Experiment
with other modes to see what they do.
Opacity: Anything less than 100% will allow the underlying image to be seen.
Flow: Determines how quickly paint is applied. Lower setting produces lighter strokes.
The Airbrush Tool
The airbrush option allows you to apply gradual tones to an image, like a traditional airbrush.
Note: To draw a straight line, click a starting point in the image, then hold down the Shift key
and click an ending point.
Ques25.What is the use of the Hue/Saturation dialog box?
Ans. The hue/saturation dialogue box allows us to adjust the Hue (colors)/saturation (intensity
of colors) and lightness of an image.
Horizontal Type(T):
The Horizontal Type tool is the default Type tool. Click
and drag to make a text box. Type your text with the
keyboard to create text in the foreground color. Use
the Options bar to set the font, size, and other text
properties. Open the Character and or Paragraph palettes for more typography options. •
Vertical Type (T): This tool is similar to the Horizontal Type tool except that the type
stacks vertically, and the text direction goes from right to left for Asian languages.
• Horizontal Type Mask (T): This tool is similar to the Horizontal Type tool, but a
selection area is created rather than actual type. Although you can paint within the type
selection area, adjusting the type options is not allowed after type is created.
• Vertical Type Mask (T): This tool is similar to the Vertical Type tool, but a selection
area is created rather than actual type. Although you can paint within the type selection
area, adjusting the type options are not allowed after type is created.
Ques2.Vikram has inserted an image in a new file. He wants to duplicate the part of an
image on the same layer, Suggest him the tool which will fulfill his requirement.
Ans. Clone Stamp Tool
Important points:-
1. The ALT key is pressed on the keyboard to define the source point while using
the Healing Brush Tool.
2. Spacebar key help us to move the image while the image is zoomed in.
3. Brush tool is used to create smooth strokes of the foreground color.
4. Create Warped Text option is used to position the letters or text to different shapes
5. Hand tool is used to move the zoomed picture within the window.
Chapter-3(More About HTML)
HTML stands for Hyper Text Markup Language
HTML is the standard markup language for creating Web pages
HTML describes the structure of a Web page
HTML consists of a series of elements
HTML elements tell the browser how to display the content.
HTML is Not Case Sensitive.HTML tags are not case sensitive: <P> means the same
as <p>.
A simple HTML document:-
Example:-
<! DOCTYPE html>
<html>
<head>
<title>Page Title</title>
</head>
<body>
<h1>My First Heading</h1>
<p>My first paragraph</p>
</body>
</html>
Example Explained
The <!DOCTYPE html> declaration defines that this document is an HTML5 document
The <html> element is the root element of an HTML page
The <head> element contains meta information about the HTML page
The <title> element specifies a title for the HTML page (which is shown in the browser's
title bar or in the page's tab)
The <body> element defines the document's body, and is a container for all the visible
contents, such as headings, paragraphs, images, hyperlinks, tables, lists, etc.
The <h1> element defines a large heading
The <p> element defines a paragraph.
Ques1. Who developed HTML language.
Ans. The first version of HTML was written by Tim Berners-Lee in 1993.
Ques2. What is HTML5?
Ans. HTML5 is the improved HTML version released in 2014 by the World Wide Web
consortium.
Ans. Marquee in HTML is used to scroll text or image on a web page. It can scroll up, down,
left, or right automatically. Marquee can be applied by using tags.
Ques8. In HTML, we use the <hr> tag for .
Ques10.Which tag is used in HTML5 for the initialization of the document type?
Ques11.. What is the correct way in which we can start an ordered list that has the numeric
value count of 5?
Ques12. Besides <B> which of the following tags can make text bold on a webpage?
Ans. <Strong>
Ques13.In HTML, the text that links the other document is called .
Ans. Hypertext
Ans. HTML elements which do not have closing tags or do not need to be closed are Void
elements. For Example <br />, <img />, <hr />, etc.
The HTML tags need not be closed always. For example, in the case of images, the
closing tags are not required as <img> tag.,<br> tag.
Ques23. How many types of heading does an HTML contain?
Ans. The HTML contains six types of headings which are defined with the <h1> to <h6> tags.
Each type of heading tag displays a different text size from another. So, <h1> is the
largest heading tag and <h6> is the smallest one. For example:
Output:-
Heading no. 1
Heading no. 2
Heading no. 3
Heading no. 4
Heading no. 5
Heading no. 6
Ques25 .What are some common lists that are used when designing a page?
Ans. There are many common lists which are used to design a page. You can choose any or a
combination of the following list types:
o Ordered list - The ordered list displays elements in numbered format. It is represented by
<ol> tag.
o Unordered list - The unordered list displays elements in bulleted format. It is represented
by <ul> tag.
o Definition list - The definition list displays elements in definition form like in dictionary.
The <dl>, <dt> and <dd> tags are used to define description list.
Ans. Semantic HTML is a coding style. It is the use of HTML markup to reinforce the
semantics or meaning of the content. For example: In semantic HTML <b> </b> tag is
not used for bold statement as well as <i> </i> tag is used for italic. Instead of these we
use <strong></strong> and <em></em> tags.
Asn. The HTML <a> tag defines a hyperlink. It has the following syntax:
Example-
Here, an unvisited link will be green with no underline. A visited link will be pink with
no underline. An active link will be yellow and underlined. In addition, when mousing
over a link (a: hover) it will become red and underlined:
<style>
a:link {
color: green;
background-color: transparent;
text-decoration: none;
}
a:visited {
color: pink;
background-color: transparent;
text-decoration: none;
}
a:hover {
color: red;
background-color: transparent;
text-decoration: underline;
}
a:active {
color: yellow;
background-color: transparent;
text-decoration: underline;
}
</style>
_self - Default. Opens the document in the same window/tab as it was clicked
_blank - Opens the document in a new window or tab
_parent - Opens the document in the parent frame
_top - Opens the document in the full body of the window
Example
Use target="_blank" to open the linked document in a new browser window or tab:
<a href="https://www.google.com/" target="_blank">Visit Google</a>
Ques31. How to use an Image as a Link?
Ans. To use an image as a link, just put the <img> tag inside the <a> tag:
Example
<a href="default.asp">
<img src="smiley.gif" alt="HTML tutorial" style="width:42px;height:42px;">
</a>
Ques32 .How to create a Link to an Email Address?
Ans. Use mailto: inside the href attribute to create a link that opens the user's email program
(to let them send a new email):
Example
<a href="mailto:[email protected]">Send email</a>
Ques33. How we can add audio files to web page.
Ans. HTML audio tag is used to define sounds such as music and other audio clips. The
<source> tag or the src attribute is used to indicate the variations of the same audio file.
Currently there are three supported file format for HTML 5 audio tag.
1. Mp3 2.wav 3.ogg
Attribute Description
autoplay It specifies that the audio will start playing as soon as it is ready.
loop It specifies that the audio file will start over again, every time when it
is completed.
preload It specifies the author view to upload audio file when the page loads.
src It specifies the source URL of the audio file.
This player support video playback directly inside the HTML page with media controls,
such as, start, stop, volume, and others.When using the <video> tag, you need to ensure
that your sound file is in the proper format. There are three accepted formats:MP4,Ogg
and Web M.
soon as it is ready
loop loop Specifies that the video will start over again,
preload auto Specifies if and how the author thinks the video
metadata should be loaded when the page loads
none
A link does not have to be text. It can be an image or any other HTML element.
Ques1. Name the three accepted formats of a sound fi le for the <audio> tag.
Ans. Autoplay, controls, loop.
Ques2. Discuss and write about any three attributes of the <video> tag.
Ans. The following table describes three attributes of the <video> tag:
Attribute Description
Autopla It lets the video fi le to be played immediately after
y it loads.
Python is a general purpose interpreted interactive object oriented and high level
programming language.
It was first introduced in 1991 by Guido van Rossum, a Dutch computer programmer.
The language places strong emphasis on code reliability and simplicity so that
programmers can develop applications rapidly.
Decision-making statements in programming language decide the direction of flow of
program execution.
The keyboard shortcut to execute the active script in Python is F5.
NOP stands for no operation.
Internal question answers:-
Ques1. Write the working of the input() function.
Ans. 1. When the input() function starts its execution ,the program flow stops until the user
gives an input.
2. The text or message displayed on the output screen to ask a user to enter the input
value is optional
3. Whatever you enter as input, the input function converts it into a string. Even if you
enter an integer value, the input () function converts it into a string. You need to
convert it into an integer in your code using a particular command.
Ques2. Define Decision making statements.
Ans. There are situations in real life when we need to make some decisions and based on these
decisions, we decide what is to be done next. Similar situations arise in programming also,
where we need to make some decisions and based on these decisions, we will execute the
next block of code. The following are the decision making statements available in
python :-
1. If statement:- Python supports the usual logical conditions from mathematics:
Equals: a == b
Not Equals: a != b
Less than: a < b
Less than or equal to: a <= b
Greater than: a > b
Greater than or equal to: a >= b
1.In computer programming, we use the if statement to run a block code only when
a certain condition is
met.
For example, assigning grades (A, B, C) based on marks obtained by a student.
if the percentage is above 90, assign grade A
if the percentage is above 75, assign grade B
if the percentage is above 65, assign grade C
Syntax:-
If condition:
# Statements to execute if condition is true
Example:-
number = 10
Example:-
a= 30
b=40
if b>a:
print(“b is greater than a”)
else:
Print(“a is greater than b”)
Output:-
b is greater than a
3. Nested if:-Nested if statement means an if statement insisde another if
statement.Python allows us to nest if statements within if statements.
Syntax:-
If(Condition 1):
# Excecute when condition 1 is true
If(Condition 2):
# Excecute when condition 2 is true
#if block is end here
# if block is end here
Example:-
X=50
If x>30:
Print(“value of x is above 30”)
If x>40
Print(“value of x is above 40 also”)
Output:- value of x is above 30
value of x is above 40 also
4. If –elif-else Statement:-
A user can decide among multiple options.
The if statements are eecuted from the top down.
If one of the conditions controlling the if is true,the statement associated
with that if is executed and the rest of the ladder is bypassed.
If none of the condition is true,then the final else statement will be executed.
Syntax:-
If(Condition):
Statement
elif(condition):
statement
.
.
Else:
Statement
Example:-
X = 50
If x >40:
Print(“the value of x is above 40”)
If x >70:
Print(“and also above 70!”)
else:
print(“but not above 60”)
Output:-
The value of x is above 40
But not above 60
Ques3. Define loops in python.
Ans. When programmers write a certain piece of code, loops allow them to condense
hundreds of lines of code into a few simple lines. Loop statements allows them to
write the code once and then execute a set of statements multiple times and reuse
it as needed.
Python provides three ways for executing the loops:-
1. For Loop:- The For loop is use for iterating(repeating )over a aequence.
Syntax:- foriterator_varin sequence:
Statement(s)
where,
iterating_var = variable that takes each individual value of seq in each iteration
seq = data structures like lists, strings, tuples, dictionary, set, range
statements = executable code
Example:-
# whole number 0 to 7
for x in range(7):
Print(x)
Output:
0
1
2
3
4
5
6
2. While Loop:-
In python,the while loop is used to execute a block of statements repeatedly until a
given condition is satisfied.And when the condition become false,the line
immeiately after the loop in the program is executed.
Syntax:-
while expression:
Statement(s)
Example:-
#Natural number 1 to 10
i=1
While i<11:
Print(i)
i = i+1
Output:-
1
2
3
4
5
6
7
8
9
10
3. Infinite loop:-
While using a while loop,if you forget to increment the counter
variable in python or write a faulty logic ,the condition may never become false..
In such a case the loop will run infinitely,and the condition after the loop will never be
executed.
To stop execution ,press Ctrl+C.
Example:-
# Example of an infinite loop
While True:
Print (“hello students”)
Output:-
It will show ‘hello students’ for an infinite number of times.
4. Nested FOR loop:-
You can also nest a loop inside another loop.
You can put a for loop inside a while,or a while inside a for,or for inside a for,or while
inside a while.You can go far as you want.
Example:-
For i in range (0,5):
For j in range(0, i+1):
Print(“* ”,end=””)
Print()
Output:-
*
**
** *
** * *
** * * *
Ques4. Define Loop control statements.
Ans. Loop control statements change execution from their normal sequence.
Python supports following control statements:-
1. Break statement:- when we put a break statement in the body of a loop,the loop stop
executing and control shifts to the first statement outside it. You can put it in a for or
while loop.
Example:-
For val in “string”:
If val == ‘i’:
break
Print(val)
Print(“The end”)
Output:-
s
t
r
The end
Continue statement:-
When the program control reaches the continue statement ,it skip the statements after
‘continue’.
It the shifts to the next item in the sequence and executes the block of code for it.
Example:-
For val in “string”: ‘
If val == ‘i’:
Continue
Print (val)
Print (“The end”)
Output:-
s
t
r
n
g
The end
Pass Statement:-
It is a null statement, which when executed leads to nothing .
The interpreter does not ignore it, but it perform a no operation(NOP).
Example:-
For val in “string”: ‘
If val == ‘i’:
pass
Print (val)
Print (“The end”)
Output:-
s
t
r
i
n
g
The end
Textual question answers:-
Ques1. What is the use of pass statement in Python?
Ans. When we need a particular loop, class, or function in our program, but don’t know what
goes in it, we place the pass statement in it. It is a null statement which, when executed, leads to
nothing. The interpreter does not ignore it but performs a no operation (NOP).
Ques2. Name the decision making statements used in Python.
Ans. The decision-making statements in Python are: if, if else, nestled if, and if-else-if.
Ques3. Explain the while loop in Python with an example. Ans. In Python, the while loop is
used to execute a block of statements repeatedly until a given condition is satisfi ed. And when
the condition becomes false, the line immediately after the loop in the program is executed.
Syntax while expression: statement(s) All the statements indented by the same number of
character spaces after a programming construct are considered to be part of a single block of
code. Python uses indentation as its method of grouping statements.
Ques4. Write briefly about the infinite loop.
Ans. Infinite Loop: While using a while loop, if you forget to increment the counter variable in
Python, or write a faulty logic, the condition may never become false. In such a case, the loop
will run infi nitely, and the conditions after the loop will never be executed. To stop execution,
press Ctrl+C. However, an infi nite loop may actually be useful for cases when a semaphore is
needed, or for client/server programming. A semaphore is a variable used solely for
synchronisation in accessing shared resources.
Ques5. How does the input function work in Python?
Ans. The input() function first takes input from the user and then evaluates the
expression,which means python automatically identifies whether the user entered a string,a
number, or a list.if the input provided is ot correct,then a either syntax error or an exception is
raised by python.
Example:-
A= input (“Enter any number:”)
Print (a)
Output:-
Enter any number: 8
8
Important shortcut keys:-
Ctrl +T create a tab in the work area of the python editor for
the new script.
Ctrl +O Loads the selected script in the python editor work area.
Ctrl +- closes the active script.
Ctrl+S Saves the active script.
Ctrl +F2 saves the new active script.
F5 execute code or a script .
Chapter-5(Introduction to Database-Ms Access 2013)
????What is the difference between MS excel and MS Access?
Access Excel
Deals with text, numbers, files and all kinds of Microsoft Excel generally deals with
data numerical data
Lots of worksheets or documents are a store
All the data is stored one time, in one place.
with similar, repeated data.
Helps you to build highly functional data entry Only the primary data entry screen is
forms and report templates. available.
Users will be able to enter the data more Data accuracy and speed is not much because
efficiently and accurately. of the format.
On November 13, 1992, the first version of MS Access was released by Microsoft
Before Access was introduced, Borland and Fox were the two Database Management
systems that were dominating the market
It was Windows’ first mass-market database program
Multiple changes were made in the program and gradually Microsoft started releasing
different versions of MS Access. Each new version came in with a modified RAM and
storage requirement.
The first version of the MS Access database management system launched by Microsoft
was released in the year 1992.
Ques1. What do you mean by Data?
Ans. Facts relate to any object in consideration collectively known as Data.
Ques2. Define Database.
Ans. A database is a collection of interrelated data that help in efficient retrieval,insertion,
and deletion of data from the database.
Ques3. Define Field.
Ans. It is the column heading and contains a set of values for a single type.
Ques4. Define Record.
Ans. It is the row containing values under each field for one single type.
Ques5. Define Value.
Ans. It I the data item which is the smallest unit in a database. It can be numeric, a character,
or alphanumeric.
Ques6. What was the initial code of MS Access?
Ans. Cirrus
Ques7. When an Access file is saved,what file format does it take?
Ans. .accdb
Ques8. Write the steps for deigning a database.
a) Determining the purpose of your database
b) Finding and organizing the information required
c) Dividing the information into tables
d) Turning information items into columns
e) Specifying the primary keys
f) Setting up the table relationships ○ Refining the design
g) Applying the normalization rule.
Ans. A DBMS based on the relational data model stores data in the form of tables and is
called Relational Database Management System (RDBMS). Microsoft Access, which is
an example of RDBMS. Some other examples of RDBMS Oracle and Microsoft SQL
Server.
1. Improved Data Sharing: DBMS enables data sharing among multiple users and
applications. Multiple users can access the same data simultaneously, without
interfering with each other's work. This improves collaboration and productivity, as
well as reduces the risk of data duplication.
2.Data Integration: DBMS allows the integration of data from multiple sources. This
means that data can be collected from various systems and combined into a single
database, which makes it easier to access and analyze.
3.Data Security: DBMS provides various security features such as access control,
authentication, and encryption to safeguard data from unauthorized access and prevent
data loss or corruption.
1. High Cost: Implementing a DBMS can be expensive due to the cost of licensing,
hardware, and maintenance. This cost can be particularly significant for smaller
organizations.
3. System Overhead: DBMS requires system resources such as memory, CPU, and
disk space, which can lead to system overhead and reduced system performance.
4. Data Dependency: DBMS stores data in a particular format, which can create data
dependency issues. If the format changes, it can affect the application that uses the data,
leading to additional maintenance and development costs.
5. Single Point of Failure: DBMS represents a single point of failure for an
organization's data. If the DBMS fails, it can lead to significant data loss and downtime,
which can have a severe impact on the business.
Q 13. Define MS Access?
Ans: Microsoft Access is a database management system (DBMS) that combines the relational
Microsoft Jet Database Engine with a graphical user interface and software-development
tools.
Q 14. What are the uses of MS Access?
Ans: MS Access can be used to develop application software and is generally used by data
architects, software developers and power users. Following are the major uses of MS
Access:
Tables
Queries
Relationships
Macros
Forms
Reports
Module
Q 16. How many types of databases are there in MS Access?
Flat File Database: When the data is stored in the form of a plain text file and cannot
incorporate multiple tables.
Relational Database: When the data is stored in a form that the data items are related to
one another. It supports multiple tables which organise the text in rows and columns.
When we create a document of Access, data can be stored and accessed easily through
multiple components. There are seven major Database objects of MS Access database.
Discuss below are the same in brief:
Tables: A table in Access is similar to any other tabulated data in the form of rows and
columns. However, when adding data to a program to create a table, all the information
entered must be correct as if any incorrect data is entered the processing may become
slow or may not give the correct answer. The appearance of the table may look similar to
the one formed in Excel with column heading and titles
Queries: Once a table is created and the user or programmer is looking for a calculated
output, then it is called queries. This may include filtering, calculating, sorting, updating,
etc.
Relationships: As the name suggests, when more than one table is added, the relation or
connection between them can be achieved. There three ways in which the connection
between the tables can be determined:
1. One to one
2. One to Many
3. Many to Many
Macros: The tool using which predefined actions which can automate tasks on an Access
report is called macros. Multiple tasks can be assigned and they will function whenever
the macros option is selected on a report
Forms: A user interface for a database application can be created using forms. Forms can
further be divided into two: bound and unbound forms
Report: Once all the information is entered into the database, it can be reviewed or
analyzed using a report. A report can then be customized or modified as per the user’s
requirement
Module: This allows a set of pre-defined instructions to be created by a programmer in
the database. They can be used throughout the database
Ques19. Write the benefits of Using MS Access.
Ans. It was Microsoft’s first database software and came along with a lot of advantages and
convenience for its users.
Benefits:
Not too many people can use the same database at a single time. This may affect its speed
and efficiency.
The same database was tough to use with different Operating systems.
If you have a large database, you may find a file size limit.
c) Navigation pane:- The Navigation Pane is the main way you view
and access all your database objects and it displays on the left
side of the Access window by default. Note The Navigation Pane
can be customized in a variety of ways.
d) The Ribbon:- The ribbon is the strip of tabs across the top of the
program window that contains groups of commands.
e) Tabs:-Different tabs when clicked display their own set of commands on the Ribbon.
Common tabs of MS Access are Home, Create, External Data, Database Tools, etc.
f) Status Bar:- It show information about the datanase and also allows shifting between
views of MS Acess.
2. Select the Home tab on Ribbon, and locate the Sort &Filter group.
3. Sort the field by selecting the Ascending or Descending command. Here, select Sort
Smallest to Largest to sort marks in ascending order.
4. To save the new sort, click the save command on the Quick Access Toolbar.
4. Use the following options to determine which items will be included in your filter.
Select and deselect items one at a time by clicking their checkboxes.
Click Select All to include the item in the filter. If all items are already selected,
this option will deselect all items.
Click Blanks to set the filter to find only the records with no data in the selected
field.
5. Click ok. The filter will be applied. Our Class Record now displays only those students
who are in Class 8.
Ques4. Write the steps to create Query using the Query Wizard .
Ans Steps to create Query are:-
1. Select the create tab.
2. Click Query Wizard
3. Select simple Query Wizard.
4. Click OK
5. Click the Tables/Queries down arrow,and then click the table or query with the fields you
want to use in your query.
6. Click the first field to include in the query’s results.
7. Click Add.
8. Repeat step 3 to add more fields.
9. Click Next.
2. Click the Query design. Access will switch to Query Design view.
3. In the show Table dialog box that appears.
4. Select the table you want to run a query on. Select Class Record table.
5. Click Add ,then click close.
6. The selected table will appear as a small window in the Object Relationship pane.
7. In the table window ,double click the fields names you want to include in your query.
8. Set the search criteria by clicking the cell in the criteria row of each fields you want to
filter.
9. Click Run command on the Design tab
10.Save your query by clicking on Save command in the Quick Access Toolbar.
Ques5.Which is a social networking app that translates each side of conversation in real-time.
Ans. Skype
Ques6. Calculator is a app and hence, it can be used offline.
Ans. Native App.
Ques7. Gmail is considered to be a app.
Ans. Hybrid
Ques8. Apps can be installed on the phone with the help of which Store?
Ans. Google Playstore
Ques9. Write three types into which Mobile Apps are classified.
Ans.
Apps Developers
Ques15 . Which Apps combine features of both Web apps and Native apps?
Ans. Hybrid Apps
Ques16. The e-Commerce app that was founded by Sachin Bansal and Binny Bansal is called?
Ans. Flipkart.
Ques18. Sneha and her parents are planning to go for a movie. She wants to book the tickets online. W
Ques19. Mannat had a school trip last month where she clicked various photographs. Now she
wants to share these Photographs with her friends. Which app can she use?
Ans. WhatsApp.
4. The web apps face the threat of The native applications are more secure.
hacking.
Answer
A website’s primary purpose is to provide Web applications engage the user. They
information. can perform a variety of tasks, and they
are customizable.
It is very difficult to use the website on Web Apps can be very easily used on
mobile devices with smaller displays. mobile devices as they are optimized for
smaller displays.
Native apps are generally faster and more Hybrid apps may not be as fast or
reliable than hybrid apps. reliable as native apps.
1. Multipurpose — Mobile apps can have access to various device apps such as camera,
contacts, microphone, etc. They provide a better experience for the users and also serve
as a multipurpose platform.
2. Sharing Features — Mobile apps provide better and faster sharing of information such
as document files, images, clips, etc. can be shared instantly via mails, WhatsApp,
Facebook, etc.
3. Personalisation — It takes into consideration the user's choices, likings, behaviors,
culture, etc. hence, providing a user specific personalised experience.
4. Safe and Secure — Mobile apps enable the users to have a safe access for modifying and
sharing of data. The apps ensure a high level of security beyond the built-in security
system of the mobile.
5. App notifications — The push notifications play an important role in communicating
with the users. Various updates and promotional notifications can be provided to the
users through push notifications.
6. Can be accessed offline — Apps provide both online and offline access to the users.
Apart from making payments, banking, uploading or downloading data, other features
can be made available in offline mode.
Ques22. How are the different Mobile apps categorized? Give two examples of each.
Textual Question/Answers:-
Ques1.What is side-loading?
Ans. You can download the app to your computer as an apk file, which you can distribute
and share as you like by manually installing it on other devices. (sometimes called ‘side
loading’.)
Ques2. Differentiate between hybrid apps and web apps.
Ans. Hybrid Apps: They are built using multi-platform web technologies (for example,
HTML5, CSS and Javascript). Hybrid apps are mainly website applications disguised in a
native wrapper. A hybrid app combines the elements of both native apps and web
applications. These apps usually possess the pros and cons of both native and web mobile
applications. Web Apps: These are software applications that behave like native applications.
Web apps use a browser to run and are usually written in HTML5, JavaScript or CSS. These
apps redirect a user to a URL and offer the ‘install’ option by simply creating a bookmark to
their page.
Ques3. What do you mean by the term ‘command’?
Ans. A command is a block that specifies an action to be performed (e.g., playing sound)
when the event (e.g., pressing Button1) is triggered.
Ques4. Write briefly about the following:
(i) Gaming apps (ii) Packaging your app
Ans. (i) These are by far the most popular category among types of apps, as more than 24%
of all mobile applications, available in the App Store, fall into this section. 306 Living with
Computers TRM Mobile gaming has always been thriving, prompting app developers to
invest more time and resources into creating new games and mobile versions of well-known
stationary games. From the user’s perspective, gaming apps offer a sense of achievement
and high engagement in the process. An average gaming session is about 8 minutes long. For
developers, the game apps category is the most profitable one. Examples: Clash of Clans,
Angry Birds Go.
(ii) To ‘package’ an app to your phone or to send it to someone else, select the Build tab at
the top of the screen. Under Build there are two options available for you to choose from: 1.
App (provide QR code for .apk): You can generate a barcode (a QR code), which you can
use to install the app on a phone or tablet that has a camera, with the aid of a barcode
scanner, like the using barcode scanner (freely available in Google Play). 2. App (save .apk
to my computer): You can download the app to your computer as an apk file, which you can
distribute and share as you like by manually installing it on other devices. (sometimes called
‘side loading’.)
Ques5. Niti wants to create her first app using MIT App Inventor, but she does not know
how. Help her by providing her the steps required to create the app.
Ans. To create your first app with MIT, follow these steps:
1. Go directly to ai2.appinventor.mit.edu or click the orange button ‘Create Apps!’ from the
App Inventor website.
2. Log in to App Inventor using Gmail’s (or Google’s) username and password.
3. Click Continue to dismiss the Splash screen.
4. Click on Start a new project.
5. Type in the project name (underscores are allowed, spaces cannot be used) and click OK.
Chapter-8(Smart Internet)
Internet of Things
The Internet is a vast network that connects computers all over the world. Through the
Internet, people can share information and communicate from anywhere with an Internet
connection.
The Internet consists of technologies developed by different individuals and
organizations.
The Internet came in the year 1960 with the creation of the first working model
called ARPANET (Advanced Research Projects Agency).
Robert W. Taylor, led the development of the ARPANET.
In October 1969, using ARPANET first message was transferred from one computer to
another.
Vinton Cerf and Robert Kahn, who developed the Transmission Control
Protocol/Internet Protocol (TCP/IP) technologies.
The World Wide Web—commonly referred to as WWW, W3, or the Web—is a system
of interconnected public webpages accessible through the Internet. The Web is not the
same as the Internet: the Web is one of many applications built on top of the Internet.
The File Transfer Protocol(FTP) is a standard communication protocol used for the
transfer of computer files from a server to a client on a computer network.
Instant messaging technology is a type of online chat allowing real-time text transmission
over the Internet or another computer network.
Ques1. Write the advantages of Internet.
Ans: The advantages are:
Resources Sharing: The main advantage of internet is to provide easy means of resource sharing.
Education: Various online tutorials are available which are helpful for students to improve their
performance. Social Media: Various Social Networking sites like facebook, twitter etc., can be
used enough PC’s or tablets or smart phone to reconnect with anyone.
Entertainment: We can play various games online and watch videos and movies.
Virus attack: Though games and other data which we download or may be an email virus attack
are possible, this may slow down our computer.
Security: Our personal information is not safe, theft of personal information is quite possible.
Incorrect Information: The information which are available is not full proof.
Cybercrime and bullying: Inappropriate videos on internet are available on internet which may
not be suitable for children.
Ans. Don't share personnel information i.e. name, age, address, a/c number etc.
Don't create a password based on personnel information like last name, telephone number
etc.
Don't share password with anyone although he/she is a close friend.
Don't access irrelevant sites, open mails from unknown sources and comment anyone on
social networking site. Don't try to download unknown software and e-mail attachments
that may contain viruses.
WordPress
Blogger
com
Wix
Gator
Tumbl
Ans. Vlog or video blog is a blog in which we will create and publish video content.
Ans. Index.html
Ans. Explanation. In the 1960s J.C.R. Licklider wanted to connect people and share data
anytime from anywhere, hence he invented Cloud Computing.
Ques11. Write a type of cloud computing service?
Ans. Software as a Service, is the most widely used choice for enterprises. SaaS makes use of
the internet to offer apps to consumers that are controlled by a third-party vendor.
Ans. Amazon Web Services (AWS), an Infrastructure as a Service (IaaS) offering that allows
users to rent virtual machines on Amazon’s own infrastructure, is one of the most
successful cloud-based enterprises
Ans. Cloud computing refers to manipulating, configuring and accessing the applications
online. It offers online data storage, infrastructure and applications.
Cloud computing is the delivery of different services through the Internet. These
resources include tools and applications like data storage, servers, databases,
networking, and software.
2. Broad Network Access — The services can be accessed on the Internet anytime and
anywhere in the world through multiple devices such as mobile phones, tablets, laptops,
etc.
3. Resource Pooling — The resources like virtual server space, network connections,
bandwidth etc., are pooled by multiple users, simultaneously from any location, without
being interfered by the other users.
1. Data security- Data security is one of the biggest advantages of cloud computing. Cloud
offers many advanced features related to security and ensures that data is securely stored and
handled.
2. Cost savings- Whatever cloud service model you choose, you only pay for the resources you
actually use. This helps you avoid overbuilding and overprovisioning your data center and
gives your IT teams back valuable time to focus on more strategic work.
3. Scalability and flexibility- Cloud computing gives your business more flexibility. You can
quickly scale resources and storage up to meet business demands without having to invest in
physical infrastructure.
4. Back-up and restore data- Once the data is stored in a Cloud, it is easier to get the back-up
and recovery of that, which is otherwise very time taking process on-premise.
5. Unlimited storage capacity- The cloud offers almost limitless storage capacity. At any time
you can quickly expand your storage capacity with very nominal monthly fees.
Ques17 .Explain the Disadvantages of Cloud Computing.
Ans. Disadvantages of Cloud Computing are:-
3. Vulnerability to attacks- Storing data in the cloud may pose serious challenges in terms of
information theft since every company’s data is online. A security breach is something that
even the best organizations have suffered from, and it’s a potential risk in the cloud as well.
Although advanced security measures are deployed on the cloud, still storing confidential
data in the cloud can be a risky affair, and hence vulnerability to attacks shall be considered.
4. Network connectivity dependency- Cloud computing is entirely dependent on the Internet.
This direct tie-up with the Internet means that a company needs to have reliable and
consistent Internet service as well as a fast connection and bandwidth to reap the benefits of
cloud computing.
5. Downtime- Downtime is considered as one of the biggest potential downsides of using cloud
computing. Cloud providers may sometimes face technical outages that can happen due to
various reasons, such as loss of power, low Internet connectivity, data centers going out of
service for maintenance, etc. This can lead to temporary downtime in the cloud service.
3. Hybrid cloud:
A hybrid cloud is a heterogeneous distributed system formed by combining facilities of the
public cloud and private cloud. For this reason, they are also called heterogeneous clouds.
A major drawback of private deployments is the inability to scale on-demand and efficiently
address peak loads. Here public clouds are needed. Hence, a hybrid cloud takes advantage of
both public and private clouds.
Malware is also known as malicious code or malicious software. Malware is a program inserted
into a system to compromise the confidentiality, integrity, or availability of data. It is done
secretly and can affect your data, applications, or operating system. Malware has become one of
the most significant external threat to systems. Malware can cause widespread damage and
disruption, and requires huge efforts within most organizations.
2. Ransomware-
Ransomware enters computer networks and encrypts files using public-key encryption. Unlike
other malware, this encryption key stays on the cyber criminal’s server. Cyber criminals will
request ransom for this private key. Cyber criminals are using encryption as a weapon to hold
the data hostage.
3. Phishing-
Phishing is one of the most common methods that attackers use to gain access to a target system.
Often, it is easier to trick a user into clicking on a malicious link or opening an attachment than
it is to locate and successfully exploit a vulnerability in an organization’s network. Phishing
attacks can achieve a variety of goals, including credential theft, malware delivery, financial
fraud, and theft of sensitive data.
Many network protocols are protected against eavesdroppers by encryption, which makes the
traffic impossible to read. A Man-in-the-Middle (MitM) attack bypasses these protections by
breaking a connection into two pieces. By creating a separate, encrypted connection with the
client and the server, an attacker can read the data sent over the connection and modify it as
desired before forwarding it on to its destination.
Organizations’ IT infrastructure and services – like web applications, email, etc. – are critical to
their ability to do business. Denial of Service (DoS) attacks are designed to deny access to
critical services. This can be accomplished by exploiting a vulnerability in an application
(causing it to crash) or by flooding a system with more data or requests than it is able to manage
(rendering it unable to handle legitimate requests). In some cases, attackers will perform a
ransom DoS attack where a ransom payment is demanded to either stop an ongoing attack or
prevent a threatened one.
Computer vision is a field of artificial intelligence (AI) that enables computers and systems
to derive meaningful information from digital images, videos, and other visual inputs
—
and take action or make recommendations based on that information.
Ques32. What is artificial narrow intelligence (ANI)?
Ans. Artificial narrow intelligence (sometimes considered weak AI, but that really gets into the
semantics of AI research) is an AI system that's designed to perform specific tasks. While there
will always be disagreement as to what exactly constitutes AI and where the bar is set, let's look
at some of the things that are near universally considered ANIs at the moment.
Ans. An artificial general intelligence (AGI), or strong AI, is an AI that exhibits human-like
intelligence (or is "generally smarter than humans"). What this really means is up for debate,
but it's generally taken to be something a lot more sci-fi than we have now. It's not trained for
specific tasks; instead, it's able to do near enough anything it's asked to do.
Ans. Although AI offers several advantages, it still has a few disadvantages mentioned
below: