0% found this document useful (0 votes)
59 views31 pages

Book - 6 Answers

The document contains an answer key for various topics including malware, Excel functions, animation software, emerging technologies, internet services, and cloud computing. It includes self-evaluation sections with true/false statements, fill-in-the-blanks, definitions, and differentiations between terms. Each section is designed to assess understanding of the respective subjects.

Uploaded by

abhinavxnaruto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views31 pages

Book - 6 Answers

The document contains an answer key for various topics including malware, Excel functions, animation software, emerging technologies, internet services, and cloud computing. It includes self-evaluation sections with true/false statements, fill-in-the-blanks, definitions, and differentiations between terms. Each section is designed to assess understanding of the respective subjects.

Uploaded by

abhinavxnaruto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

Answer Key

1 PM Publishers Pvt.Ltd.
1 Malware-Threat to
Computers
Page No. 12

TRIAL TRIVIA

Match the antivirus software icons with their names:

a. i. AVG

b. ii. Norton

c. iii. Kaspersky

d. iv. TotalAV

e. v. Quick Heal

f. vi. McAfee

Page No. 13-14

SELF-EVALUATION

A. Tick (√) the correct answer.


1. (c) Jerusalem Virus 2. (a) File Infector 3. (c) Adware
4. (a) Payload 5. (a) Virus definition

B. Write ‘T’ for True and ‘F’ for False statements.


1. True 2. False 3. True
4. True 5. True

C. Fill in the blanks.


1. Virus Author 2. E-mail 3. Trojan Horse
4. Virus Signature/ Virus definition 5. A logic bomb
IT Planet - (Code AI Plus-6)
2
D. Differentiate between the following.

Adware Spyware
It is a program that displays an It is a program placed on a
unwanted advertisement in a computer or mobile device
banner or pop-up window on without the user’s knowledge
web pages. that secretly collects information
about the user, and then sends
the information to an outside
source while the user is online.

E. Answer in 1-2 sentences.


1. C
 omputer viruses are programs that are created deliberately to
damage critical information and data. Most of the viruses are
very harmful and destroy data or even the entire hard disk.
2. 
we use an antivirus program to protect a computer against
viruses by identifying and removing any computer virus found in
the files or memory.
3. A
 virus signature also called virus definition, is known as a specific
pattern of virus code.
F. Answer briefly.
1. B
 oot sector virus attaches itself to the boot sector of the disk.
This sector is the part of the disk where start-up instructions and
the file allocation tables are kept.
2. E
 -mail viruses are spread by files attached to e-mail messages.
When we open an e-mail attachment that contains a virus, the
virus spreads to your computer.
3. Ransomware is a program that restricts access to our computer
system and demands a ransom to be paid to remove the
restriction.
4. T
 he two precautions that should be taken to prevent computer
viruses are-
(a) Do not start a computer with removal media inserted in the
drives or plugged in the ports.
(b) N
 ever open an e-mail attachment unless we are expecting
the attachment, and it is from a trusted source.
G. Application-based Question
It might be attacked by virus.
PM Publishers Pvt.Ltd.
3
2 Excel -Functions
and Charts
Page No. 20

TRIAL TRIVIA

If cells A1 and B1 contain the values 15 and 5 respectively, then


evaluate the following formulas and write the result in the given
space:
1. =A1-(-B1)= 15-(-5)=20
2. =A1+(-B1)= 15+(-5)=10
3. =2*B1+A1=2*5+15=25
4. =A1+A1+B1*A1=15+15+5*15=105
5. =A1+B1+10/B1=22
6. =B1-A1+15>10=5-15+15>10=5>10
Page No. 25

TRIAL TRIVIA

Enter the following data into a worksheet in Calc:

51000
24000
36000
26000
137000
Page No. 36

SELF-EVALUATION

A. Tick (√) the correct answer.


1. (b) Formula 2. (b) letter 3. (a) Arguments
4. (c) Data Series 5. (b) Chart Title 6. (b) pie
IT Planet - (Code AI Plus-6)
4
B. Write ‘T’ for True and ‘F’ for False statements.
1. True 2. True 3. True
4. False 5. True 6. True

C. Fill in the blanks.


1. Constants and Formulas 2. Formula 3. Parenthesis
4. Absolute 5. Objects 6. Horizontally

D. Differentiate between the following.


1. Formula Function
Formula is a sequence of values, Function is a built-in formula
cell references or operators. which is used to perform a
calculation.

2. Absolute Referencing Relative Referencing


The cell reference is fixed, and The cell reference is relative to
it does not change when we the position of the formula when
copy a formula to other cells. It copied to other cells.
is denoted by dollar sign.

E. Answer in 1-2 sentences.


1. O
 perators are symbols which are used to indicate a type of
calculation. It can contain one or more operators.
2. T
 he names of four functions of Calc are- AVERAGE, COUNT, MAX,
and SUM.
3. e
 very cell in a worksheet has a unique address, called cell
reference, which is identified by a specific column letter and row
number of that cell.
F. Answer briefly.
1. W
 hen a formula contains more than one operator, Calc performs
the calculations in a specific order according to precedence.
The order in which Calc performs operations in formulas is
called order of calculation. We can use parentheses () to change
the order in which Calc performs calculations. It performs the
calculation inside the parentheses first.
PM Publishers Pvt.Ltd.
5
2. The steps to edit a formula are:
(a) D
 ouble-click on the cell containing the formula you want to
edit.
(b) P
 ress the Arrow key to move the cursor to the place where
we want to remove or add characters.
(c) T
 o add data where the cursor flashes on a screen, type
the data. To delete the data where the cursor flashes, use
Backspace or Delete key.
(d) W
 hen we finish making changes to the formula, press the
Enter key.
3. C
 harts are graphical representations of the data. Calc offers a
wide selection of charts, which help us to display our data in a
pictorial way. Charts help us to make instant decisions based on
the comparison of numbers.
G. Application-based Question.
2,70,000.
Page No. 38

ACTIVITY SECTION

ACTIVITY (LABELING)

Data Label Chart Title Gridlines

Plot Area

Y-axis

Chart Area

Data Series X-axis

IT Planet - (Code AI Plus-6)


6
3 Pencil2D- Animation
Software
Page No. 56

SELF-EVALUATION

A. Tick (√) the correct answer.


1. (c) Patrick Corrier 2. (c) Layers
3. (b) Move 4. (a) Onion Skin

B. Write ‘T’ for True and ‘F’ for False statements.


1. True 2. False 3. False
4. True 5. True

C. Fill in the blanks.


1. Bitmap and Vector 2. Canvas 3. Rectangles
4. Playhead 5. Paint Bucket

D. Define the following.


1. T
 imeline window: It is located below the canvas. It contains
keyframes and layers that make an animation.
2. T
 ools window: it has basic tools for drawing, coloring, selecting
and modifying the graphic.

E. Differentiate between the following.


1. Bitmap Layer Vector Layer
It is used for raster graphics. It is used for vector graphics.
It is made up of pixels. It is not made up of pixels.

F. Answer in 1-2 sentences.


1. Frames are used to control what appears in animation sequences.
PM Publishers Pvt.Ltd.
7
2. O
 nion skin is used to see several keyframes at once. It can be
used to make decisions on how to create or change an image
based on the previous image in the sequence.
3. T
 here are four types of layers available in Pencil2D are bitmap
layer, vector layer, camera layer, and sound layer.

G. Answer briefly.
1. The steps to rename a layer are:
(a) Double-click on the layer which we want to rename.
(b) Type a new name for the layer.
(c) Click on OK.
2. T
 he eraser tool is used to erase unwanted parts of objects or
drawing on the Canvas.
Move tool is used to move the selected drawing from one place
to another on the Canvas.

H. Application-based Question.
He will use to clear the canvas by using Clear Frame tool.

IT Planet - (Code AI Plus-6)


8
4 Emerging Technologies

A. Tick (√) the correct answer.


1. (a) AI 2. (a) Headset 3. (a) Google assistant
4. (b) Meta and Universe 5. (b) Things

B. Write ‘T’ for True and ‘F’ for False statements.


1. True 2. True 3. False
4. True 5. True

C. Fill in the blanks.


1. Internet of Things (IoT) 2. Apple 3. Avatars
4. AI 5. A virtual assistant

D. Differentiate between the following.

Virtual Reality Augmented Reality


It immerses us in a virtual world through It takes digital images and
the use of a headset with a screen layers them on the real world
displaying a virtual environment. around us through the use of a
smartphone.

E. Answer in 1-2 sentences.


1. G
 oogle Assistant is an Artificial Intelligence-powered virtual
assistant developed by Google that is primarily available on
mobile and smart home devices.
2. Initially, Alexa was developed for Amazon Echo and the Amazon
Echo Dot smart speaker device.
3. Metaverse is related to AR and VR by digital avatars.

F. Answer briefly.
1. 
The metaverse is a virtual world where people interact via
PM Publishers Pvt.Ltd.
9
their digital avatars and do almost anything- go shopping,
attend meetings, play with their friends, and do much more.
The metaverse can be accessed from devices like smartphone,
computer or specific hardware devices like virtual reality headset,
augmented reality glass, gaming console, etc.
2. Quantum computing is a technology that uses the properties of
quantum physics to store data, perform computations and solve
those problems which are too complex for regular computers.
Quantum computers are now a multitude times faster than
regular computers.
3. R
 PA is the use of software robots or bots to handle high-volume,
repeatable tasks that previously required humans to perform.

G. Application-based Question.
She can use 3D printer.

IT Planet - (Code AI Plus-6)


10
5 Internet Services

A. Tick (√) the correct answer.


1. (c) C2C 2. (a) online catalog 3. (a) secure web
4. (b) Flipkart 5. (b) website

B. Write ‘T’ for True and ‘F’ for False statements.


1. True 2. False 3. True 4. False
5. True

C. Fill in the blanks.


1. M-commerce 2. Broadband 3. E-commerce 4. Lock
5. Blogosphere

D. Define the following.


1. E
 -wallet also called digital wallet, allows us to store our credit
card and bank account numbers in a secure environment and
eliminates the need to enter account information while making
our payment.
2. N
 et Banking is a system of banking in which a customer performs
transactions electronically without visiting the bank personally .

E. Differentiate between the following.

B2B B2C
In a B2B e-commerce, the sale or In a B2C e-commerce consists of
exchange of products and services the sale of products or services
takes place between firms or from business concern to the
companies. general public or end users.

F. Answer in 1-2 sentences.


1. E
 -commerce or Electronic commerce also known as e-business,
is a financial business transaction that occurs over an electronic
PM Publishers Pvt.Ltd.
11
network. Two popular types of e-commerce are shopping and
trading in stocks.
2. B
 logging is a modern and dynamic medium by which we can
publish our ideas, opinions, and stories online.

G. Answer briefly.
1. The advantages of e-commerce are-
For buyers:
(a) They have the convenience of shopping at home.
(b) They can read reviews of other users before buying.
(c) They can compare the price of items easily.
For sellers:
(a) Web offers low overhead expenses.
(b) Free or low-cost marketing activities.
(c) Potential buyers can be millions of people.
2. Video conferencing is used to do live meetings of two or more
geographically separated people who use a network or the
Internet to transmit audio and video data.
3. A
 blog is a website that consists of a frequently updated collection
of information and entries.
 usinesses create blogs to communicate with employees, customers,
B
and vendors. They may post announcements or new information
on a corporate blog.

H. Application-based Question
She can pay by COD (Cash on Delivery) mode.

IT Planet - (Code AI Plus-6)


12
6 Cloud Computing

Page No. 88-89

SELF-EVALUATION

A. Tick (√) the correct answer.


1. (a) Cloud Computing 2. (b) Services
3. (c) Resource pooling 4. (c) Google Drive

B. Write ‘T’ for True and ‘F’ for False statements.


1. True 2. True 3. True 4. False
5. False

C. Fill in the blanks.


1. Hybrid 2. Pay as you go 3. Google Drive
4. Trash 5. Sign out

D. Define the following.

1. IaaS: IaaS provides IT infrastructure like servers, storage, network


operating systems over the Internet on ‘pay as you go’ basis. It is
the most flexible cloud computing model.

2. SaaS: SaaS is a method for delivering software applications over


the Internet, on demand and typically, on a subscription basis.

3. PaaS: PaaS provides a cloud platform and allows developers to


create, test, and run their program, website, web app, etc. without
having to purchase the hardware and software.
PM Publishers Pvt.Ltd.
13
E. Differentiate between the following.

Public Cloud Private Cloud


1. 
It is not proprietary of any 3. 
It is a proprietary architecture
organization. subscribed to by an organization.
2. Clouds can be accessed by any 4. It provides hosted services to the
organization or individual. users within the organization.

F. Answer in 1-2 sentences.


1. Cloud computing is a technology that provides resources and
services over the Internet. Cloud storage is an Internet service
that provides storage facility to computer users.
2. A
 WS, Google Cloud Platform, and Microsoft Azure are service
providers.
3. G
 oogle Drive is a cloud storage service developed by Google.
We can store our files online in Google Drive and can access
them from anywhere in the world.

G. Answer briefly.
1. The three advantages of cloud computing are:
(a) It allows users to get large storage capacity for storing data
and information.
(b) It allows users to access files on the Internet from any
computer or device that has Internet access.
(c) It makes data backup easier and less expensive.
2. The characteristics of cloud computing are-
(a) On demand self service.
(b) Elasticity
(c) Pay per use
(d) Resource Pooling
H. Application-based Question
 he can upload her file first on Google Drive and then share online
S
with her teacher.

IT Planet - (Code AI Plus-6)


14
7 Introduction to HTML5
and CSS
Page 102

TRIAL TRIVIA

Identify the errors in the following HTML code and rewrite the correct
code in the given space:
Output

Page 108

TRIAL TRIVIA

Write the HTML code to create the following web page in the given
space:

PM Publishers Pvt.Ltd.
15
Page No. 112

SELF-EVALUATION
A. Tick (√) the correct answer.
1. (b) HTML 2. (a) <TITLE> 3. (a) /
4. (a) Inline 5. (b) Margin
B. Write ‘T’ for True and ‘F’ for False statements.
1. True 2. False 3. True
4. False 5. True
C. Fill in the blanks.
1. Notepad 2. DOCTYPE 3. <WBR>
4. Inline 5. <Link>
D. Differentiate between the following.
Container Tag Empty Tag
Tags that have both starting as well as Tags that have only a starting, and
ending are known as container tags. there is no need to close them
called empty tags.

E. Answer in 1-2 sentences.


1. <DIV> tag is a tag used for defining a section of our document.
We can group a large section of HTML elements together and
format them.
2. The DOCTYPE declaration at the beginning of our page specifies
that the document is written in HTML5.
3. There are three ways to define style sheet in HTML document.
F.Answer briefly.
1. The three features of HTML are-
(a) HTML is not a case-sensitive language.
(b) S
 paces and tabs can be used anywhere in the document
because it does not affect the appearance of the document.
(c) HTML document is saved with .htm or .html file extension.
2. <
 BODY> tag of HTML contains the main content of the web
page. It is a container element, which includes text, graphics, and
other elements.
IT Planet - (Code AI Plus-6)
16
3. W
 e can add metadata to our page to include extra descriptive
information that does not appear in the browser window.

G. Application-based Question
 e has to save his file by .htm or .html file extension to open this on
H
web browser.
Page No. 114

ACTIVITY SECTION
ACTIVITY (LAB)

Write the HTML code for the following web page.

PM Publishers Pvt.Ltd.
17
8 Python-Introduction

Page No. 119

TRIAL TRIVIA

Type the following Python code lines one by one and write the
output in the space given:
1. 2220 2. TajMahal 3. 20 4. 234
5. 2030 6. 47 7. Welcome
Page no. 124

TRIAL TRIVIA

Find the output of the following codes by using Interactive mode:


1. 20 2. 21 3. 39.0
4. Who are you? 5. Photosynthesis 6. 24
Page No. 126

SELF-EVALUATION

A. Tick (√) the correct answer.


1. (a) lowercase 2. (b) Operators
3. (b) Operands 4. (c) Data Types

B. Write ‘T’ for True and ‘F’ for False statements.


1. True 2. False 3. True
4. True 5. True

C. Fill in the blanks.


1. F5 2. Keywords 3. Literals
IT Planet - (Code AI Plus-6)
18
4. Indentation 5. Statement

D. Define the following.


1. Token: A token is the smallest element of a program that is
meaningful to the interpreter. It is supported in Python include
identifiers, delimeters, keywords, literals and operators.
2. O
 perator: Operators are the special symbols that carry out
arithmetic and logical computations. The values operated by the
operator are called operands.
3. 
Comments: Comments are very important while writing a
program in Python. They are used to explain Python code and
make it more readable.

E. Differentiate between the following.

Keywords Literals
Keywords are the reserved words The fixed values that never change
in Python and cannot be used as throughout the program’s run are
identifier names. called literals.

F. Answer in 1-2 sentences.


1. Python was developed by Guido van Rossum in 1991.
2. A
 name consisting of letters, digits, and/or an underscore (_) to
identify a function, variable, class, etc. is known as an identifier.
3. V
 ariables are the memory locations used to store data in memory.
The data can be numbers, text and/or objects.
4. Indentation is an empty space at the beginning of block of code.
Python uses it to express the block structure of a program.

G. Answer briefly.
1. T
 here are three data types used in Python. They are- Integer,
Float, String. Integer are the whole numbers consisting of + or –
sign without decimal point such as 1000.
F loat data type represents floating point numbers which contain
decimal point.

PM Publishers Pvt.Ltd.
19
 tring is a sequence of characters (letters, numbers, operators
S
and punctuation) used to store and represent text-based
information.
2. An input () function is used to get input from user. This function
helps user to input the values and text for the operation. The
input () function always returns string value.
The print () function is used to print the value of given input
value or string. It helps to show output on screen.

H. Application-based Question
She should use INT function as an integer value.

IT Planet - (Code AI Plus-6)


20
9 Chatbot

Page No. 135

TRIAL TRIVIA

Surf the Inbternet and find any two chatbots used in education
sector. Write their names in the space given below:
1. GPT 2. Bard
Page No. 135

SELF-EVALUATION

A. Tick (√) the correct answer.


1. (a) Customer Service 2. (a) NLP
3. (c) Ochatbot 4. (c) Kuki
B. Write ‘T’ for True and ‘F’ for False statements.
1. False 2. False 3. True
4. False 5. True
C. Fill in the blanks.
1. NLP 2. Script 3. Clever
4. Watson Assistant
D. Differentiate between the following.
1. Script-bots Smart-bots
Script-bots work with a set of Smart-bot utilizes NLP
guidelines or programmed technology and has a wide
scripts. These are limited in range of functionality and it
their functionality and can only can handle the queries of the
respond to a set number of customer without any human
requests with predetermined assistance.
styles.

PM Publishers Pvt.Ltd.
21
2. Eva Ochatbot
Eva is a banking chatbot from Ochatbot is a chatbot that
HDFC Bank that uses an Artificial uses an Artificial Intelligence
Intelligence algorithm and NLP algorithm for e-commerce and
to help us with our banking engages online shoppers by
queries. providing advice to help them
quickly find what they are
looking for.

E. Answer in 1-2 sentences.


1. C
 hatbot is the most interactive applications of a computer which
allows humans to interact with technology using a variety of
input methods such as voice or text.
2. The role of Eva chatbot is to help us with our banking queries.
3. K
 uki_AI is the world’s most popular English language social
chatbot having exchanged over one billion messages with an
estimated 25 million users on the web, social media, and various
messaging applications.

F. Answer briefly.
1. N
 LP stands for Natural Language Processing is the core of
chatbot which is used to split the user input into sentences and
words. It is the same technology that is used by virtual assistants
such as, Siri, Alexa, etc.
2. A
 user interacts with a chatbot using natural language which can
be either textual or verbal, by using various chat mediums. If user
enters voice, the chatbot first turns the voice data input into text
using ASR technology.
 he chatbot then analyses the text input, considers the best
T
response and delivers that back to the user. The chatbot’s reply
output can be delivered in any way such as written text or vice
via Text to Speech tools.

G. Application-based Question
Eva chatbot

IT Planet - (Code AI Plus-6)


22
10 Fields of Artificial
Intelligence
Page No. 140

TRIAL TRIVIA

Search on the Internet about AI machines used in Agriculture. Paste


the pictures of any two machines in the space given below and also
write their names.
1. Driverless tractors 2. Smart irrigation system
Page No. 145-146

SELF-EVALUATION

A. Tick the correct answer.


1. (b) AGI 2. (c) Google 3. (a) Chatbot
4. (a) Machine 5. (a) Neural networks

B. Write ’T’ for True and ‘F’ for False statements.


1. False 2. True 3. False 4. False

C. Fill in the blanks.


1. ANI 2. Limitless 3. Strategic 4. Obstacles

D. Differentiate between the following.

Machine learning Deep learning


It is a subset of AI that enables systems It is the subset of machine learning
to learn automatically from experience which itself is a subset of AI.
or past information.

E. Write the full form of the following.

PM Publishers Pvt.Ltd.
23
AGI: Artificial General Intelligence
ANI: Artificial Narrow Intelligence

F. Answer in 1-2 sentences.


1. A
 SI refers to the ability of an AI system that could perform any
task better than humans with cognitive behavior.
2. T
 he two games that use Artificial Intelligence are F.E.A.R., and
Tic-Tac-Toe.
3. A
 rtificial Intelligence ethics refers to a set of rules which employ
widely accepted standards of right and wrong to guide moral
conduct in the development of AI technologies.
4. S
 ome ethical concerns raised by AI systems are privacy safeguard,
threat to employment.

G. Answer briefly.
1. 
The role of AI in gaming industry are used to improve the
strategic aspects of games. The main objective of AI in games is
to generate responsive, adaptive or intelligent behavior primarily
in non-player characters similar to human-like intelligence.
2. W
 ith ASI, a system would become so self-aware that it would
surpass the level of cognitive performance and decision-making
skills found in humans.

H. Application-based Question.
Artificial Super Intelligence has been depicted.

IT Planet - (Code AI Plus-6)


24
Worksheet 1 Chapters 1-5

A. Tick () the correct answer.


1. (c) Jerusalem Virus 2. (a) Payload 3. (a) letter
4. (b) Arguments 5. (c) Patrick Corrieri 6. (a) Onion Skin
7. (c) C2C 8. (b) Flipkart 9. (a) Headset
10. (b) Meta and Universe

B. Write ‘T’ for True and ‘F’ for false statements.


1. False 2. True 3. False 4. False
5. False 6. True 7. False 8. False
9. True 10. True

C. Fill in the blanks.


1. E-mail 2. Virus Signature 3. Formula
4. Constants and Formulas 5. Canvas 6. Playhead
7. M-commerce 8. Security 9. IoT
10. Virtual Assistant

D. Define the following.


1. T
 ools Window: It has basic tools for drawing, coloring, selecting,
and modifying the graphic. Placing the mouse over any tool will
display the name of the tool.
2. T
 imeline Window: It is located below the Canvas and contains
keyframes and layers that make an animation.
3. E
 -Wallet: E-wallet also called digital wallet, allows us to store our
credit card and bank account numbers in a secure environment,
and eliminates the need to enter account information while
making our payment.
4. N
 et Banking: Net banking is a system of banking in which a
customer performs transactions electronically without visiting
PM Publishers Pvt.Ltd.
25
the bank personally.

E. Differentiate between the following.


1. Adware Spyware
It is a program that displays an It is a program placed on a
unwanted advertisement in a computer or mobile device
banner or pop-up window on web without the user’s knowledge that
pages, email messages or on other secretly collects information about
Internet services. the user and then communicates
or sends the same information to
outside source while the user is
online

2. Formula and Function


Formula Function
It is a sequence of values, cell It is a built-in formula which is
reference or operators. used to perform a calculation.

3. Bitmap Layer and Vector Layer


Bitmap Layer Vector Layer
It is used for raster graphics. It is used for vector graphics.
It is made up of pixels. It is not made up of pixels.

4. Virtual Reality and Augmented Reality


Virtual Reality Augmented Reality
It immerses us in a virtual world It takes digital images and layers
through the use of a headset them on the real world around us
with a screen displaying a virtual through the use of a smartphone.
environment.

5. Public cloud Private cloud


It is not proprietary of any It is a proprietary architecture
organization. The services provided subscribed to by an organization.
in these clouds can be accessed by It provides hosted services to the
any organization or individual. users within the organization.

F. Answer the following questions.


1. Boot sector virus is a virus that attaches itself to the boot sector
IT Planet - (Code AI Plus-6)
26
of the disk. This sector is the part of the disk where start-up
instructions and the file allocation tables are kept.
2. Operators are symbols which are used to indicate a type of
calculation. A formula can contain one or more operators.
3. The four functions of Excel are- AVERAGE, SUM, COUNT, MAX.
4. The steps to rename a layer are-
(a) Double-click on the layer which we want to rename.
(b) Type anew name for the layer.
(c) Click on Ok.
5. Eraser tool is used to erase the unwanted parts of object or
drawing on the Canvas.
Move tool is used to move the selected drawing from one place
to another on the Canvas.
6. Google Glass is used to provide a hands-free, augmented reality
experience, allowing users to access information, capture photos
and videos, and receive notifications through a wearable device.
7. Blogging is a modern and dynamic medium by which we can
publish our ideas, opinions, and stories online. It is a place to
express ourself to the world, a place to share our thoughts and
our passion.
8. E-commerce is also known as e-business, is a financial business
transaction that occurs over an electronic network. Two types of
e-commerce are shopping and trading in stocks.
9. Metaverse is a virtual world where people interact via their digital
avatars and do almost anything- go shopping, attend meetings,
play with their friends and do much more.
10. RPA is the use of software robots or bots to handle high-volume,
repeatable tasks that previously required humans to perform.

PM Publishers Pvt.Ltd.
27
Worksheet 2 Chapters 6-10

A. Tick () the correct answer.


1. (c) Resource pooling 2. (c) Google Drive 3. (a) /
4. (b) margin 5. (b) Operators 6. (a) lowercase
7. (a) Customer service 8. (c) Kuki 9. (a) Neural Networks
10. (a) Chatbot

B. Write ‘T’ for True and ‘F’ for false statements.


1. True 2. False 3. False 4. True 5. True
6. True 7. True 8. False 9. True 10. False

C. Fill in the blanks.


1. Google Docs 2. Pay as you go 3. DOCTYPE
4. Link 5. Statement 6. F5
7. Watson Assistant 8. NLP 9. Strategic
10. Obstacles

D. Define the following.


1. SaaS: SaaS is a method for delivering software applications over
the Internet, on-demand and typically, on a subscription basis.
2. PaaS: PaaS provides a cloud platform and allows developers to
create, test, and run their program, website, web app, etc. without
having to purchase the hardware and software.
3. O
 perator: Operators are the special symbols that carry out
arithmetic and logical computations. The values operated by the
operator are called operands.
4. 
Comments: Comments are very important while writing a
program in Python. They are used to explain Python code and
make it more readable. Python interpreter ignores the text
written in the comments.

IT Planet - (Code AI Plus-6)


28
5. A
 NI: ANI is the ability of AI systems to perform a single assigned
task effectively and efficiently.

E. Differentiate between the following.


1. Public cloud Private Cloud
It is not proprietary of any It is a proprietary architecture
organization. subscribed to by an organization.
It can be accessed by any It provides hosted services to the
organization or individual. users within the organizations.

2. Container Tag Empty Tag


Tags that have both starting as well Tags that have only a starting , and
as ending are known as container there is no need to close them
tags. (using </>) are known as empty
tag.
3. Keywords Literals
Keywords are the reserved words The fixed values that never change
in Python and cannot be used as throughout the programs run are
identifier names. called literals.
All keywords contain lowercase Literals means any number, text
letters only except True, False and or any other information that
None. represents a value.
4. Eva Ochatbot
Eva is a banking chatbot from It is a chatbot that uses an AI
HDFC Bank that uses an Artificial algorithm for e-commerce and
Intelligence algorithm and NLP to engages online shoppers by
help us with our banking queries. providing advice to help them
quickly find what they are looking
for.

5. Machine learning Deep learning


It is a subset of AI that enables It is the subset of machine learning
systems to learn automatically from which itself is a subset of AI.
experience or past information.
It is a function of AI that imitates
It focuses on the development the working of the human brain
of computer programs that can in processing data and creating
access data and use them to learn patterns for making decisions.
by themselves.

PM Publishers Pvt.Ltd.
29
F. Answer the following questions.
1. The three advantages of cloud computing are-
(a) It allows users to get large storage capacity for storing data
and information.
(b) It allows users to access files on the Internet from any
computer or device that has Internet access.
(c) It makes data backup easier and less expensive.
2. The characteristics of cloud computing are-
(a) On demand self service
(b) Elasticity
(c) Pay per use
(d) Resource Pooling
3. <
 BODY> tag of HTML contains the main content of the web
page. It is a container element, which includes text, graphics and
other elements.

4. <
 META> tag is used to add metadata to our page to include
extra descriptive information that does not appear in the browser
window.

5. A
 name consisting of letters, digits, and/or an underscore (_) to
identify a function, variable, class, etc, is known as an identifier.

6. T
 here are three data types used in Python. They are Integer,
Float, String

Integer are the whole numbers consisting of + or – sign without


decimal point such as 1000.

F loat data type represents floating point numbers which contain


decimal point. Example- 0.5.

String is a sequence of characters used to store and represent


text-based information. Single quotes and double quotes are
used to represent strings in Python.

7. N
 LP stands for Natural Language Processing is the core of
chatbot which is used to split the user input into sentences and
words. It is the same technology that is used by virtual assistants
such as Siri, Alexa, Cortana, etc.
IT Planet - (Code AI Plus-6)
30
8. A
 user interacts with a chatbot using natural language which can
be either textual or verbal, by using various chat mediums. If user
enters voice, the chatbot first turns the voice data input into text
using ASR technology.

 he chatbot then analyses the text input, considers the best


T
response and delivers that back to the user. The chatbot’s reply
output can be delivered in any way such as written text or vice
via Text to Speech tools.

9. A
 rtificial Intelligence ethics refers to a set of rules which employ
widely accepted standards of right and wrong to guide moral
conduct in the development of Artificial Intelligence technologies.

10. A
 SI, a system would become so self-aware that it would surpass
the level of cognitive performance and decision-making skills
found in humans.

PM Publishers Pvt.Ltd.
31

You might also like