Computer Answer Key 7
Computer Answer Key 7
Computer Answer Key 7
2. NUMBER SYSTEM 11
4. PHOTOSHOP - INTRODUCTION 17
7. HTML - INTRODUCTION 23
WORKSHEET 31
2
TEACHER’S MANUAL
INTRODUCTION
Computers are used everywhere, i.e., at homes, libraries, schools, offices, etc.
They touch every aspect of our life making it easier and comfortable. We rely
on computers for most of our daily work. In today’s world, not knowing about
the computer is nothing less than illiteracy. Knowing about computer and its
uses are no more a luxury, but a necessity.
Keeping in mind the increasing need of computer, IT Planet, a series of 8
books from class 1 to 8 has been written with a focus to impart knowledge
about computers to young minds. This series will help the teachers to make
the children computer-friendly according to the level of their knowledge and
help them acquire computer technology skills as required by the curriculum of
various boards. These books are based on new N.C.E.R.T. guidelines.
OBJECTIVES
You are a computer teacher. The subject you are teaching and the knowledge
you are giving will help the students throughout their lifetime. You are
creating a tech-savvy generation.
We should strike a balance between theory and applications, and we should
include appropriate elements of recent research in our curriculum. We expect
our students to play leading roles in industry, profession and government.
Rather than just coping with the future, we expect our students to create the
future.
Co-existence Is The Key: Learning is a collective effort and not an individual
effort. Group learning enhances better understanding and decreases
dissonance among students.
Integration On Life Skills Into Teaching Methodologies: Learning takes place in
every walk of life – from taking our first baby steps to landing a person on the
surface of the Moon. Learning from life skills is, perhaps, the most essential
part of overall student development.
Bridging The Gap: Students in a classroom learn at different levels, thus, the
need for the teacher to adopt various innovative methods to bridge gaps
between the understanding levels of the first child and the last child.
GUIDED DISCOVERY-BASED LEARNING
The teachers should give their students a discovery-based learning. Compared
with many other subjects, Computer Science is not straight-forward to teach.
One reason for this is the general nature of the computer field. The computer
field is changing very rapidly. The computers available to your students in the
school and homes 20 years from now will be a hundred or a thousand times
as powerful as the computers they have now in school. A guided discovery-
based learning environment contributes greatly to learning, and it facilitates
3
transfer of learning. In addition, you may want to assign a number of activities
at the end of the chapters as homework and make use of this in assessment.
TEACHING PROCEDURES
The best teaching style ratio is 90:10.
90% serious teaching style and 10% fun based teaching style.
1. Begin by making sure all students have their books. Ask students to
recall what they learnt from the previous lesson. Then observe several
students' responses.
2. Read the chapter to the students. Explain it to them in a very easy to
understand way. Help students get well-versed with every chapter. Have
them write down some important points that they remember from the
chapter.
3. Assign the activity at the end of the chapter.
4. Closure. Near the end of the period, let students think about some of
the important ideas that have been covered in today's discussions and
readings. Each student has to decide on one idea that he/she felt was
particularly important. As time permits, these ideas can be shared by the
whole class in small groups, written down, or merely thought about at a
personal level.
4
Bloom’s taxonomy : teacher planning kit
Bloom's Taxonomy was created under the leadership of educational
psychologist, Dr Benjamin Bloom, in order to promote higher forms of
thinking in education, such as analyzing and evaluating concepts, processes,
procedures and principles, rather than just remembering facts (rote learning).
It is most often used while designing educational, training, and learning
processes.
It provides an important framework for teachers to use to focus on higher
order thinking (HOT). By providing a hierarchy of levels, this taxonomy can
assist teachers in designing performance tasks, crafting questions for conferring
with students, and providing feedback on student work.
This resource is divided into different levels each with Keywords that
exemplify the level and questions that focus on that same critical thinking
level. Questions for Critical Thinking can be used in the classroom to develop
all levels of thinking within the cognitive domain (development of our mental
skills and the acquisition of knowledge). The results will be improved attention
to detail, increased comprehension and expanded problem-solving skills. Use
the keywords as guidelines to structuring questions and tasks. Finish the
Questions with content appropriate to the learner.
1. KNOWLEDGE (Remembering)
Recall/regurgitate facts without understanding. Exhibits previously learned
material by recalling facts, terms, basic concepts and answers.
Key Words:
Choose List Quote Repeat Trace
Copy Listen Read Reproduce What
Define Locate Recall Retell When
Duplicate Match Recite Select Where
Find Memorise Recognise Show Which
How Name Record Spell Who
Identify Observe Relate State Why
Label Omit Remember Tell Write
Questions:
! Can you list three ....? ! What is ...?
! Can you recall ...? ! When did ...?
! Can you select ...? ! When did ........ happen?
! How did .......... happen? ! Where is ... ?
! How is ....? ! Which one ....?
! How would you describe ...? ! Who was ... ?
! How would you explain ...? ! Who were the main ...?
! How would you show ...?
5
2. COMPREHENSION (Understanding)
To show understanding finding information from the text. Demonstrating
basic understanding of facts and ideas.
Key Words:
Ask Estimate Indicate Purpose Summarise
Cite Explain Infer Relate Translate
Classify Express Interpret Rephrase
Compare Extend Match Report
Contrast Generalise Observe Restate
Demonstrate Give examples Outline Review
Discuss Illustrate Predict Show
Questions:
! Can you explain what is ! How would you summarise ...?
happening ... what is meant ...? ! What can you say about ...?
! How would you classify the type ! What facts or ideas show ...?
of ...? ! What is the main idea of ...?
! How would you compare ...? ! Which is the best answer ...?
contrast ...? ! Which statements support ...?
! How would you rephrase the ! Will you state or interpret in your
meaning ...? own words ...?
3. APPLICATION (Applying)
To use in a new situation. Solving problems by applying acquired knowledge,
facts, techniques and rules in a different way.
Key Words:
Act Classify Experiment with Manipulate Select
Administer Connect Group Model Show
Apply Construct Identify Organise Simulate
Associate Correlation Illustrate Perform Solve
Build Demonstrate Interpret Plan Summarise
Calculate Develop Interview Practice Teach
Categorise Dramatise Link Relate Transfer
Choose Employ Make use of Represent Translate
Questions:
! How would you use ...? understanding of ...?
! What examples can you find to ...? ! What approach would you use to
! How would you solve ........... using ...?
what you have learned....? ! How would you apply what you
! How would you organise ........... to learned to develop ...?
show .....? ! What other way would you plan to
! How would you show your ...?
6
! What would result if ...? ! What facts would you select to
! Can you make use of facts to ...? show ....?
! What elements would you choose ! What questions would you ask in
to change ...? an interview with ...?
4. ANALYSIS (Analysing)
To examine in detail. Examining and breaking information into parts by
identifying motives or causes; making inferences and finding evidence to
support generalisations.
Key Words:
Analyse Discover Function Omit Research
Appraise Discriminate Group Order See
Arrange Dissect Highlight Organise Select
Assumption Distinction In-depth discussion Point out Separate
Breakdown Distinguish Inference Prioritize Similar to
Categorise Divide Inspect Question Simplify
Cause and effect Establish Investigate Rank Survey
Choose Examine Isolate Reason Take part in
Classify Find List Relationships Test for
Differences Focus Motive Reorganise Theme
Questions:
! What are the parts or features of ...? How is .......... related to ....?
! Why do you think ...? What is the theme ...?
! What motive is there...? Can you list the parts ...?
! What inference can you make ...? How would you classify...?
! What conclusions can you draw...? How would you categorise...?
! Can you identify the different parts ...? What evidence can you find ...?
! What is the relationship between ...? What is the function of ...?
! Can you make a distinction between ...? What ideas justify ...?
5. SYNTHESIS (Creating)
To change or create into something new. Compiling information together in a
different way by combining elements in a new pattern or proposing
alternative solutions.
Key Words:
Adapt Delete Happen Modify Solve
Add to Design Hypothesise Original Speculate
Build Develop Imagine Originate Substitute
Change Devise Improve Plan Suppose
Choose Discover Innovate Predict Tabulate
Combine Discuss Integrate Produce Test
Compile Elaborate Invent Propose Theorise
Compose Estimate Make Up Reframe Think
Construct Experiment Maximise Revise Transform
Convert Extend Minimise Rewrite Visualise
Create Formulate Model Simplify
7
Questions:
! What changes would you make to ! What way would you design ...?
solve ...? ! Suppose you could ........ what
! How would you improve ...? would you do ....?
! What would happen if ...? ! How would you test ....?
! Can you elaborate on the reason ! Can you formulate a theory for ...?
...? ! Can you predict the outcome if ...?
! Can you propose an alternative...? ! How would you estimate the
! Can you invent ...? results for ...?
! How would you adapt ........ to ! What facts can you compile...?
create a different.....? ! Can you construct a model that
! How could you change (modify) would change....?
the plot (plan)....? ! Can you think of an original way
! What could be done to minimise for the ...?
(maximise)...?
6. EVALUATION (Evaluating)
To justify. Presenting and defending opinions by making judgements about
information, validity of ideas or quality of work based on a set of criteria.
Key Words:
Agree Criteria Evaluate Justify Select
Appraise Criticise Explain Mark Support
Argue Debate Give reasons Measure Test
Assess Decide Good Opinion Useful
Award Deduct Grade Perceive Validate
Bad Defend How do we know? Persuade Value
Choose Determine Importance Prioritise Why
Compare Disprove Infer Prove
Conclude Dispute Influence Rate
Consider Effective Interpret Recommend
Convince Estimate Judge Rule on
Questions:
! Do you agree with the ! How could you determine... ?
actions/outcomes ...? ! What choice would you have made...?
! What is your opinion of ...? ! What would you select...?
! How would you prove/disprove ...? ! How would you prioritise...?
! Can you assess the value/importance ! What judgement would you make
of ...? about ...?
! Would it be better if ....? ! Based on what you know, how would
! Why did they (the character) choose you explain...?
...? ! What information would you use to
! what would you recommend....? support the view...?
! How would you cite to defend the ! How would you justify...?
actions ...? ! What data was used to make the
! How would you evaluate...? conclusion...?
8
1 Computer Virus
9
F. Answer in 1-2 sentences.
1. A computer virus is a program which is created deliberately to
damage critical information and data.
2. An antivirus program protects a computer against virus, identifying
and removing any computer virus found in the memory, storage
media, or incoming files.
G. Answer Briefly.
1. This virus attaches itself to the boot sector of the disk. The infected
code runs when the system is booted from that infected disk and it
will infect at BIOS level.
2. Viruses are activated on our computer in many different ways such
as when we open an e-mail attachment that contains a virus, when
something we downloaded from the Internet is infected by virus or
when a virus-infected software is installed in our computer via CD or
pen drive.
3. E-mail viruses are spread by the files attached to e-mail messages.
When we open an e-mail attachment that contains a virus, the virus
spreads to our computer. If we forward the attachment to other
people, their computers will also be affected when they open the
attachment.
4. Ransomware is a virus that restricts access to our computer system
and demands a ransom (money) to be paid in order to remove the
restriction.
5. i. Do not start a computer with removable media inserted in the
drives or plugged in the ports.
ii. Install an antivirus program on all your computers. Update the
software and the virus signature files regularly.
10
2 Number System
11
F. Answer Briefly.
12
Activity Section
2 145 2 287
2 72 1 2 143 1
2 36 0 2 71 1
2 18 0 2 35 1
2 9 0 2 17 1
2 4 1 2 8 2
2 2 0 2 4 0
1 0 2 2 0
1 0
Ans (10010001)2 Ans (100011111)2
2. Binary to Decimal
i. (111)2 = (1 x 2²) + (1 x 2¹) + (1 x 2⁰)
(1 x 4) + (1 x 2) + (1 x 1)
4 + 2 + 1 = (7)10
ii. (1101)2 = (1 x 2³) + (1 x 2²) + (0 x 2¹)+(1 x 2⁰)
(1 x 8) + (1 x 4) + (0 x 2) + (1 x 1)
8 + 4 + 0 + 1 = (13)10
iii. (1001)2 = (1 x 2³) + (0 x 2²) + (0 x 2¹) + (1 x 2⁰)
(1 x 8) + (0 x 4) + (0 x 2) + (1 x 1)
8 + 0 + 0 + 1 = (9) 10
13
iv. (1011)2= (1 x 2³⁾ + (0 x 2²) + (1 x 2¹) + (1 x 2⁰)
(1 x 8) + (0 x 4) + (1 x 2) + (1 x 1)
8 + 0 + 2 + 1 = (11) 10
3. Decimal to Octal
i. 45 ii. 70
8 45 8 70
8 5 5 8 8 6
0 5 8 1 0
0 1
4. Decimal to Hexadecimal
i. 22 ii. 330
16 22 16 330
16 1 6 16 20 10
0 1 16 1 4
0 1
Ans (16)16 Ans (14A)16
(because A = 10)
14
3 Animate - Layers & Animation
1. a. 2. b. 3. b. 4. a. 5. c.
6. a.
15
3. There are two ways to slow down an animation:
i. You can adjust the frame rate of your Animate movie in the
Properties panel.
ii. You can add frames between your keyframes by right-clicking on
the Timeline, and then clicking on Insert Frame.
F. Answer Briefly.
16
4 Photoshop - Introduction
17
F. Answer in 1-2 sentences.
1. There are many tools in Toolbox that you can use for working on an
image. If we leave mouse curser over the tool, it will indicate the
name of the tool and its keyboard shortcut.
2. i. Changing on-screen size of an image.
ii. Changing the canvas size of an image.
3. Magnetic Lasso tool is used to select elements of our image that have
well-defined edges. It will snap on the edge of the element as you
drag.
G. Answer Briefly.
18
5 Photoshop - Layers and Filters
1. b. 2. a. 3. c. 4. b.
5. a.
19
F. Answer Briefly.
1. Layers are the key components to work with graphic objects. Layered
Photoshop files act like several images combined into one. Each layer
of an image has its own set of pixels that you can move and
transform, independently of the pixels in other layers.
2. Photoshop blending modes specify how pixels in a layer should blend
with the layers below. Photoshop has many blending modes.
Selecting a blending mode changes the appearance of the layer or
image, based on the layer or layers beneath it.
20
6 Internet - Ethics & Safeguard
21
F. Answer Briefly.
1. We should make a strong password and change it frequently. Our
password should be at least six characters long and include at least
one number, letter (combination of upper and lower cases) and
special character (@, *, &, !, etc.). Our new password should be
different from any other passwords that we have used. It is strongly
advised that we use different passwords for all different accounts.
2. We should not save password of an account in a particular website
because, in future, anyone else who uses our computer might also
be able to access our account from the site without our permission.
3. i. Parents should advise children to play only those online games
which are suitable for their age.
ii. Parents should advise children not to share any personal
information to any unknown person.
22
7 HTML - Introduction
23
F. Answer Briefly.
24
8 HTML - Creating Web Page
25
F. Answer Briefly.
26
9 HTML - Images, Links & Table
27
F. Answer in 1-2 sentences.
1. We add images to the web pages because a concept that is difficult
to explain in the form of text can be explained with the help of a
picture or an image easily and quickly.
2. IMG stands for 'image' that tells the browser that an 'image will be
placed here' on the page.
SRC stands for 'source'. It is the source of image file. It specifies the
URL of the image.
3. Links enable users to navigate from one topic to the other on a
website and from one website to another. The user clicks the link,
and the browser opens the destination page.
4. We can create a table to clearly display information on a web page
in a tabular format. For example, if we like to display the price list
or sales order of an item, the best possible solution is to display it
using a table.
G. Answer Briefly.
1. We can create a link to an image so that we can click on that image
to display the link. This is helpful in case we wish to display a large
number of images on our page. So, in that case, we can display the
same images in small size on a page and create hyperlinks to their
larger sizes. Its syntax is:
<A HREF = "http://www.pcworld.com"> <IMG SRC=“computer.
jpg”></A7
2. The various attributes associated with Table tag are: SUMMARY,
BORDER, BORDER-COLOR, BGCOLOR, ALIGN, WIDTH.
3. We can combine two or more cells in a row or column to make one
large cell. Spanning cells is mainly used to display a title across the
top or down side of a table.
28
10 Access - Creating a Database
29
F. Answer in 1-2 sentences.
1. Microsoft Access is a powerful database software that allows us to
create, manage and process data in the form of a table.
2. We use templates in Access to includes pre-built tables and forms, in
which you can add your own data.
3. Primary key is needed to identify a field which is having unique
records and to establish relationship between tables.
4. Default value in properties are used to speed up data entry for fields
that usually contain the same value by making that value as the
default.
G. Answer Briefly.
30
Worksheet - 1
Chapters 1 - 5
31
E. Differentiate between the following.
1. Executable File Virus: This virus stores itself in an executable file and
infects other files each time the file is run.
Macro Virus: This virus infects files that are created using certain
applications or programs that contain macros.
2. Canvas size of image: It is used to change the size of canvas. It adds
blank space to the sides of an image.
Print size of image: It is used to set image size and its print
resolution.
32
ii. The conversion between the binary and the hexadecimal number
systems is very efficient.
5. Tweening defines two points of movement in the Timeline with two
keyframes; then it lets Animate calculate all the in-between frames
necessary to get from first point to the last point.
6. A symbol is an object in Animate. This object is stored in the Library;
it can be used repeatedly throughout a movie. Symbol can be a
graphic object, a movie clip, a graphic created in another program,
or a button. Sound clips may also be symbols.
When we drag a symbol from the Library to the Stage, we create an
instance.
7. Layers are the key components to work with graphic objects and
animation. Layers are very helpful to add depth to our graphic
objects.
8. Some of the selection tools available in Photoshop are:
! Magic Wand: This tool is used to select the groups of similarly
coloured pixels. It works best on solid colour background.
! Marquee: This tool is used to select a rectangular or elliptical
area of an image. We can move, delete, or stylize the selected
area using other Photoshop commands.
! Lasso: With this tool, we can create oddly shaped selections.
Then we can move, delete or stylize the selected area using
other Photoshop commands.
9. By using Filters in Photoshop, we can quickly and easily apply
enhancements to our image, including artistic effects, texture effects,
and distortions.
10. In Photoshop, layers are the key components to work with graphic
objects. Layered Photoshop files act like several images combined
into one. Each layer of an image has its own set of pixels that you
can move and transform, independently of the pixels in other layers.
Most commands affect only the layer that you select.
33
Worksheet - 2
Chapters 6 - 10
34
7. Data Type: Data type defines which type of data you can store in the
field.
8. Field Name: It is a unique name for each field in the table. For
example, in the Students' Detail table, the field names are Studnet-
ID, Name, Class, Transportation, and Fees.
35
F. Answer the following questions.
36
feedback that can help us improve our website.
8. To display entire list in a box, type the number of List Box entries as
the SIZE attribute value. This makes the List Box appear as a
rectangular box that displays all the items in the list. If the List Box
list is long, it may take up more room on the form than you want,
making users scroll to view the selections. If you prefer to save room
on your form, keep the List Box size as 1. This creates a drop-down
list.
9. i. Setting a Default Value: You can speed up data entry for fields
that usually contain the same value by making that value as the
default.
ii. Setting the Field Format: You can change the format of a field to
update its appearance in datasheet, form, and report.
iii. Creating Validation Rules: A Validation rule is used to limit a field
entry to meet certain criteria. By Validation Rules, you can
ensure that the correct value is entered into the field.
10. Design View is used for greater control on table structure. We can
describe the structure of the table before creating it. Here, we enter
our own field names and descriptions, and choose our own data
type to associate with each field.
11. Primary key contains data that is unique to a specific record and it
uniquely identifies a record in a table. In each table we have to set
one field as the primary key, Access uses this key to relate record of
this table to those of another table.
12. The different data types available in Access are: Short Text, Long
Text, Number, Date/time, Currency, Auto Number, Yes/No, OLE
Object, Hyperlink, Attachment, Calculated and Lookup wizard.
37