0% found this document useful (0 votes)
595 views31 pages

Future Tech (Comp) Ans Key-7 (Final)

The document covers various number systems including Decimal, Binary, Octal, and Hexadecimal, explaining their symbols, base values, and conversion methods. It also discusses chart creation in MS Excel, detailing types of charts, their uses, and how to modify them. Additionally, it introduces animation concepts in Animate 2022, focusing on movie clips, buttons, and different tweening methods.

Uploaded by

Vandana Barai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
595 views31 pages

Future Tech (Comp) Ans Key-7 (Final)

The document covers various number systems including Decimal, Binary, Octal, and Hexadecimal, explaining their symbols, base values, and conversion methods. It also discusses chart creation in MS Excel, detailing types of charts, their uses, and how to modify them. Additionally, it introduces animation concepts in Animate 2022, focusing on movie clips, buttons, and different tweening methods.

Uploaded by

Vandana Barai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

Computer - 7

1. Number System
Check Your Learning
1. 2 2. 8 3. 16 4. 10
EXERCISES
A. Fill in the blanks with the help of words given in the box.
1. 2 2. Decimal number 3. 8 4. 10 5. Binary
B. Write 'T' for true and 'F' for false statements.
1. F 2. F 3. F 4. T 5. F
C. Tick (3) the correct option.
1. b 2. a 3. c 4. b 5. b
D. Answer the following questions.
1. A number system is a set of values used to represent different quantities.
There are four types of number systems:
a. Decimal Number System: Decimal Number System consists of 10
symbols from 0 to 9. These 10 digits can be used to form any number. It
has a base value 10.
Example: (915)10, (-53)10
b. Binary Number System: Binary Number System consists of 2 symbols
i.e. 0 and 1. Therefore, it has a base value 2. All the digital computers
use binary number system and converts the decimal number format to
binary equivalent.
Example: (10011)2, (10001111)2
c. Octal Number System: Octal Number System consists of 8 symbols
from 0 to 7. Therefore, it has a base value 8.
Example: (426)8, (312)8
d. Hexadecimal Number System: Hexadecimal Number System consists
of 16 symbols from 0 to 9 and the letters A to F. A – F represents
numbers 10 to 15. It has a base value 16.
Example: (4C)16, (3B4)16
2. To convert decimal number to binary, you need to follow the given rules:
a. Divide the given decimal number with the base 2.
b. Write down the remainder and divide the quotient
again by 2. 2 13
c. Repeat the step 2 till the quotient is zero. 2 6 1
Example: Suppose we want to convert (13)10 to binary 2 3 0
number. 2 1 1
3. The rules to subtract two binary numbers are given below: 0 1
A B A–B
0 0 0–0=0
0 1 0–1=1
1 0 1–0=1
1 1 1–1=0
4. The Octal Number System consists of 8 symbols from 0 to 7. The concept
of Octal Number System came from the Native Americans as they used to
Computer - 7 29
count numbers by using the space between the fingers instead of using
their fingers. It has a base value 8. You can convert octal numbers to any
other number system by following the rules properly.
5. Hexadecimal Number System consists of 16 symbols from 0 to 9 and A to F.
Here, A = 10, B = 11, C = 12, D = 13, E = 14 and F = 15. It has a base value 16
because hex = 6 and Decimal = 10 and combining them makes the
hexadecimal = 16. Like any other number system, you can also convert
hexadecimal numbers to any other number system by following the rules.
6. Decimal Number System consists of 10 symbols from 0 to 9. It has a base
value 10. Each number can be used separately or you can group the
numbers to form a numeric value. The value of each digit in a number
depends upon the following:
a. The face value of the digit b. The base of the number system
c. The place of the digit in the number
E. Application-based questions.
1. To convert Octal Number to Decimal, she needs to use the given rules,
a. Multiply each octal digit with its place number, with increasing power
of 8 starting from extreme right digit.
b. Increasing the power one by one, keeping the base value fixed as 8.
c. Sum up all products to get the decimal number.
2. When we subtract 1 from 0 in binary numbers, we need to borrow 1, so
(0 – 1 = 1).
Fun Zone
Game Activity Lab Session
Do it yourself Do it yourself
Higher Order Thinking Skills
A. a. 2 76 b. (1001)2=(?)10
2 38 0 = (1 * 23) + (0 * 22) + (0 * 21) + (1 * 20)
2 19 0 =8+0+0+1
2 9 1
2 4 1 = 9
2 2 0 (1001) 2 = (9)10
2 1 0
0 1
(1001100)2
c. (32A)16=(?)2
(i) Convert Hexadecimal to (ii) 2 810
decimal number system 2 405 0
= (3 * 162) + (2 * 161) + (A * 160) 2 202 1
2 101 0
= 768 + 32 + (10 * 1) 2 50 1
= (810)10 2 25 0
2 12 1
2 6 0
2 3 0
2 1 1
0 1
(810)10 = (1100101010)2
Therefore, (32A)16 = (1100101010)2
30 Computer - 7
B. a. 10101 + 00111 b. 10011 – 01010 c. 101 × 011
1 1 1

1 0 1 0 1 10011 101
+ 0 0 1 1 1 – 01010 ×011
1 1 1 0 0 1001 101
101×
000××
1111
Project Work
Do it yourself

2. Charts in MS Excel 2016


Check Your Learning
Chart Title

Chart Area
Y-Axis
Axis Title Gridlines

Legend
Data Table

EXERCISES
A. Fill in the blanks with the help of words given in the box.
1. Legend 2. Bar 3. Pie 4. X-axis 5. Ribbon
B. Write 'T' for true and 'F' for false statements.
1. T 2. T 3. F 4. T 5. F
C. Tick (3) the correct option.
1. b 2. c 3. b 4. a 5. b
D. Explain the difference between the following terms.
1. X-axis is the horizontal axis, also known as Category axis which represents
the categories on the plot area. Y-axis is the vertical axis, also known as
Value axis which represents the value of the categories using which a chart
is created.
2. Chart title is a title given to a chart and axis title is the title of x-axis and y-
axis.
3. A 2D or 2 Dimension chart has only two dimensions say length and height,
but 3D or 3 Dimension chart has three dimensions say length, height and
width.
4. A plot area contains only the graphical representation of chart. But chart
area includes the plot area and other elements of chart.
5. A column chart uses bars that run vertical to plot a chart but line chart uses
lines to plot a chart of data series.
6. Bar chart uses bars that run horizontal to plot a chart but pie chart displays
the values of a series as proportional slices of pie. Bar chart can be drawn
using multiple data series but pie chart is drawn using one series of data.
Computer - 7 31
7. Area chart is used to plot a chart in which the area below the plot line is
solid. It is not in the case of X Y Scatter chart. The other difference is that
the X-axis in X Y scatter chart can display numeric or non-numeric factors
whereas in area chart the x-axis only displays texts.
8. Format tab can be used to format a chart by changing the styles, adding
colors, inserting shapes and changing size, whereas the Layout tab can be
used to change the chart layout by adding or modifying chart labels.
E. Answer the following questions.
1. A chart is used to represent the data graphically. It uses symbols to
represent the data like bars in Bar chart, lines in Line chart or slices in Pie
chart. A 2D or 2-Dimensional chart has two axis – X-axis and Y-axis which
represents two variables, on the basis of which a 2D chart is created. A 3D
or 3-Dimensional chart has three axis – X-axis, Y-axis and Z-axis, which
represents three variables on the basis of which a 3D chart is created.
Charts are useful to not only make the worksheets visually more appealing
but also help the viewer to sort out and understand the information
presenting to them.
2. The various types of charts are:
a. Column Chart: A column chart uses bars that runs vertical to plot the
data series. It is used to show the data changes over a period of time or
show the comparisons among items.
b. Bar Chart: A Bar chart uses bars that runs horizontally to plot the data
series. It is also used to show the comparisons among individual items
through a group of bars.
c. Line Chart: A Line chart uses lines to display trends. The vertical axis
always displays numeric values and horizontal axis displays time or
other category.
d. Area Chart: Area chart is same as line chart, except that the area below
the plot line is solid. It is used to show trends over time.
e. Pie Chart: A Pie chart can only display one series of the data which is
displayed as proportional slices of a pie.
3. A Pie chart is used to plot a chart as proportional slices of a pie. It can
display only one series of data. It represents the data in circular form. A
circle is partitioned into different sections that represents a percentage
for a particular partition. To create a pie chart,
a. Create a data series in an Excel sheet.
b. Select the data series along with field name. c. Go to Insert tab.
d. From Charts group, click on the Pie chart. e. Select 2 D Pie chart.
f. A 2D pie chart will be created according to the selected series.
4. To modify the labels and titles of a chart,
a. Select the chart. b. Click on Layout tab in ribbon.
c. From Labels group, click on Chart Title or Data Labels option.
d. From the drop-down menu, select the appropriate option.
e. Change the chart title or data label and press Enter key.
5. To change the data in a chart,
a. Select the chart. b. Click on Design tab in ribbon.
c. From Data group, click on Select Data option.
32 Computer - 7
d. A Select Data Source dialog box appears.
e. Make the desired modifications and click OK button.
F. Application-based questions.
1. He can create a column chart to compare the profit and expenses of his
firm. For this, he needs to create a table in Excel sheet. Then select the
table and go to Insert tab> Charts group> Column Chart. A chart will be
drawn accordingly. He can view the chart to view the comparison.
2. To plot a column chart, Ishan can follow the given steps:
a. Create a data series in Excel sheet.
b. Select the data series along with field names.
c. Go to Insert tab ® Chart group ® Column Chart option.
d. Select the type of Column chart. It will be drawn on the Excel sheet.
Fun Zone
Game Activity Lab Session
Do it yourself Do it yourself
Higher Order Thinking Skills
Joseph 20% Ravi 10%

Ali 35% Ria 15%


Raj 20%

(a) Pie Chart (b) Column Chart (c) Area Chart (d) Line Chart
Project Work
Do it yourself

3. Creating Animation in Animate 2022


Check Your Learning
Ÿ Movie Clip: It is a special type of symbol which has its own multi-frame timeline.
Users can run animations regardless of how many actual frames the instance
occupies.
Ÿ Buttons: It is a special type of four-frame interactive movie clip in Animate
which is used to perform some mouse related activities like click, rollover etc.
Ÿ Graphic Symbol: It is a static symbol which is used when there is no need to add
interactive functionality in an animation.
EXERCISES
A. Fill in the blanks with the help of words given in the box.
1. Instance 2. Motion 3. Classic 4. Animation 5. Movie clip
B. Write 'T' for true and 'F' for false statements.
1. T 2. F 3. F 4. T 5. T
C. Tick (3) the correct option.
1. a 2. a 3. b 4. c 5. b
D. Answer the following questions.
1. Animation is the method of photographing successive drawings to create
an illusion of movement in sequence. The images are created with little
modifications to appear as moving images.
Computer - 7 33
Three methods used to create animation are:
a. Motion Tween: In Motion tween, a path is created and an object
moves along with the path.
b. Shape Tween: In Shape tween, the animation is done on an object
which changes its shape as it moves from starting point to ending
point.
c. Classic Tween: Classic tween is the traditional method of animation. It
works like Motion tween, but with less flexibility.
2. A frame is just an intermediary between keyframes. During a normal
frame, there is no modifications in the amount of an object on stage. The
actual changes appear in keyframes. The total number of frames in a
timeline can be used to specify the total length of the movie.
A keyframe is a frame where a new symbol instance appears in the
timeline.
In order to make any changes in an animation, a keyframe is inserted and
changes are made.
3. Timeline is used to organize and control the contents of the document
over time in layers and frames.
Timeline helps in controlling when a particular image or video will be
displayed and when a particular character will enter or exit the scene in
animation. You can also determine the stacking order of a scene in relation
to other elements on the screen.
4. A layer is like a translucent sheet where you can organize your artwork. It
can be used to draw and edit objects on one layer without affecting
objects on another layer. These layers are stacked on the top of one
another, each containing a different image that appears on the stage.
Together all the layers are combined for a complete graphic or animation.
A frame is just an intermediary between keyframes. During a normal
frame, there is no modifications in the amount of an object on stage. The
actual changes appear in keyframes. The total number of frames in a
timeline can be used to specify the total length of the movie.
5. Motion Presets are pre-defined and saved motion tween animations
which can be applied to objects on a stage. These presents are found in
Motion Presets panel. You can also create and save your own custom
presets.
6. A Symbol is a static object which, once created in Animate, can be reused
throughout the document or in other documents as well. It can be ready-
made or imported from other files or the artwork created by the user.
When user converts an object or drawing into a symbol, it moves to the
library automatically.
Three types of symbols are used in Animate, they are:
Ÿ Movie Clip: It is a special type of symbol which has its own multi-frame
timeline. Users can run animations regardless of how many actual
frames the instance occupies.
Ÿ Buttons: It is a special type of four-frame interactive movie clip in
Animate which is used to perform some mouse related activities like
click, rollover etc.
34 Computer - 7
ŸGraphic Symbols: It is a static symbol which is used when there is no
need to add interactive functionality in an animation.
7. A symbol is a reusable object and an instance is an occurrence of the
symbol on the stage. When you use the symbols outside the library, either
on stage or nested inside another symbol, you are actually using the
instance of the symbol.
The advantage of using instance in animation is that if you repeatedly use
instance in your animation, it does not increase the file size and keep your
document file size small.
E. Application-based questions.
1. Tony can use Adobe Animate to learn animation.
2. To create a symbol of an object,
a. Select an object.
b. Click on Modify tab.
c. Click on Convert to Symbol option.
d. A Convert to Symbol dialog box appears. Specify the name of symbol
in Name textbox.
e. Specify the type of symbol using Type drop-down list.
f. Click on Registration grid to position the registration point for the
symbol.
g. Click OK button.
3. Steps to create an Instance of a symbol are:
a. Click on Library Panel.
a. Click and drag the instance from Library to Stage.
An instance of the symbol will be created on stage.
Fun Zone
Game Activity

Delete layer Show layers as outlines

Add a new layer Lock/Unlock layers

Current layer Show/Hide layers

Lab Session Higher Order Thinking Skills Project Work


Do it yourself Do it yourself Do it yourself

4. Introduction to HTML
Check Your Learning
1. <b> Text </b> 2. <comment> Text Note </comment>
3. <br> 4. <hn> Heading text </hn> where, n can be 1 to 6
EXERCISES
A. Fill in the blanks with the help of words given in the box.
1. network 2. two 3. six 4. Container 5. Cascading
B. Write 'T' for true and 'F' for false statements.
1. T 2. F 3. F 4. T 5. F
Computer - 7 35
C. Tick (3) the correct option.
1. c 2. a 3. a 4.a 5. c 6. b
D. Answer the following questions.
1. HTML is a Hyper Text Markup Language which is used to create web pages.
It is a complete package code using which users can generate web pages
that consists of both text and graphics. The document structure of HTML is
given below:
<html>
<head>
<title> Title of a webpage </title>
</head>
<body>
Body of the document
</body>
</html>
The general structure of HTML document has two parts: Head and Body.
Head Section: Head section contains the general information like title of
web page.
Body Section: Body section contains the contents which will be displayed
on the web page. The body of the webpage is defined using various tags
and attributes.
2. Container elements are those elements which contain both the ON and
OFF tags. These elements start with starting tag or ON tag and ends with
ending tag or OFF tag.
For example: <b> This element is used to bold the enclosed text. </b>
Empty elements are those elements which include only ON tag. These
elements start with starting tag or ON tag, but has no ending tag or OFF
tag.
For example: <br>
3. HTML Editor is a program used for writing the HTML code. There are two
most common types of editors used, WYSIWYG editor and Text editor.
WYSIWYG editor: WYSIWYG expands to What You See Is What You Get
editor. It allows the users to do editing directly in a web browser. It does
not require the knowledge of HTML while using this editor.
Text editor: To use Text editor, you must have a thorough knowledge of
HTML. The examples of text editors are WordPad and Notepad.
Steps to create a web page in HTML are:
a. Click on Start> All apps> Windows Accessories> Notepad.
b. A Notepad window opens.
c. Type the HTML code.
d. Go to File> Save As option. A Save As dialog box opens.
e. Type the file name and save with extension .html. Click on Save button.
36 Computer - 7
4. The explanation of two container tags are given below:
a. <p>: <p> is a paragraph tag which has an ending tag i.e. </p>. It is used
to mark the block of text as a paragraph in a web page. When you start
a new paragraph, the web browser will leave one line between the two
paragraphs.
Syntax: < p> Paragraph text </p>
Example: <p> Internet has become an integral part of our lives. It is a
network of networks in which user at one computer can get the
information from any other computer provided he must have a
permission. </p>
b. <b>: <b> is a bold tag which is used to emphasize the enclosed text by
making it bold.
Syntax: <b> Text </b>
Example: <b> This is used to make the text bold. </b>
The explanation of empty tags are given below:
a. <br>: <br> is a line break tag which is used to move the followed text to
the next line. It works like an Enter key of the keyboard.
Syntax: <br> Example: <br>
b. <hr>: <hr> is a horizontal rule tag which is used to draw a horizontal
line along the page.
Synatx: <hr> Example: <hr>
5. Cascading Style Sheets or CSS are used to format the layout of web pages
and their visual formatting. It makes it easy to change styles across several
web pages at once. Using CSS, the display of the document can be
separated with the contents of the document. The various methods of
using CSS are:
a. External CSS: In this method, the style rules are defined individually in
one file which can be used with any HTML document. External CSS is a
text file with extension .css. To link this file, you need to give the
reference of the file using <link> tag in head section.
b. Internal CSS: In this method, the style rules are defined inside the
<style> element in the head section.
c. Inline CSS: In this method, you can add the style attribute to the
relevant element, which may contain any CSS property.
6. The various Background properties of CSS are:
a. Background color: This property is used to set the background color of
a HTML element.
Syntax: background-color: color or RGB code
b. Background image: This property is used to set an image to the HTML
document.
Syntax: background-image: url
c. Background Position: This property is used to set the position of the
image on the HTML document.
Syntax: background-position: value

Computer - 7 37
d. Background Repeat: This property is used to set the repetition pattern
of an image on the webpage, like repeat the image horizontally or
vertically or both or don't repeat.
Syntax: background-repeat: value
e. Background Attachment: This property is used to either fixing the
image in the background or make it scroll when user scrolls the page.
Syntax: background-attachment: fixed or scroll
E. Application-based questions.
1. Monika should try the following code with the body tag to apply the image
as background image.
<body background = “URL”>
2. Mohit can use the background-position property to set the position of the
image on webpage.
3. The default web browser in Windows 10 is Microsoft Edge.
4. To add a horizontal line, Deepak can use <hr> tag.
Fun Zone
Lab Session Higher Order Thinking Skills Project Work
Do it yourself <a> anchor tag is used to Do it yourself
create hyperlink in HTML.

5. Working with Web Browsers


Check Your Learning
Back Button Refresh Favorites

Forward Button Home Address Bar Share


EXERCISES
A. Fill in the blanks with the help of words given in the box.
1. software 2. Cache 3. transfer 4. Plug-ins 5. image
B. Write 'T' for true and 'F' for false statements.
1. F 2. T 3. T 4. F 5. T
C. Tick (3) the correct option.
1. a 2. b 3. a 4. c 5. c
D. Answer the following questions.
1. A web browser is an application software using which you can access to
the world wide web. You can use the web browser to open the webpages
by specifying the URL in the address bar. It brings the webpages from the
servers along with necessary files like images, audio, video, interprets
them and then display it in the browsers. There are two types of browsers:
a. Text Web browsers: It displays only text.
b. Graphic Web browsers: It displays both text and graphics.
Examples: Internet Explorer, Mozilla Firefox, Microsoft Edge, Google
Chrome, Safari

38 Computer - 7
2. The various popular web browsers are Internet Explorer, Mozilla Firefox,
Microsoft Edge, Google Chrome, Safari and Opera.
a. Google Chrome: Google Chrome was developed by Google and was
released in 2008. It allows its users to quickly access the web pages and
make local desktop shortcuts to open web application in the browser.
b. Internet Explorer: Internet Explorer was developed by Microsoft in
1995. It can be used to view web pages, to listen and watch streaming
contents, access online banking, make sale or purchase on internet.
3. Every time you browse the internet, your web browser keeps its track and
create a history of pages you have seen. These pages will stay in the history
for a certain number of days. If you want to view the history in internet
explorer, first click on Favorites button and then on History button. If you
want to delete the history, click on Favorites button, then on History
option and then click on 'Clear history' option. The history will be cleared
from the browser.
4. The various features of a web browser are:
Ÿ Address Bar: It is the URL of the page where the web address is
displayed.
Ÿ Link: A link allows you to jump to a new location when you click on it.
Ÿ Navigation Buttons: Navigation buttons include forward or back
buttons and Refresh button.
Ÿ Search bar: It is used for performing web searches.
Ÿ Bookmark: It allows you to go back to the previously visited website by
clicking on the saved link. It is also called Favorites.
Ÿ Browsing history: History is a location where the history of the
webpages you visited stays. You can view the history or delete it.
5. Bookmark is a feature of a web browser which is used to save a web page's
address. While browsing the web pages, you can bookmark the current
webpage by using Ctrl + D shortcut key. In Internet Explorer, Bookmarks
are also referred to as Favorites. It is useful when you want to remember a
webpage and want to view it again. Bookmark creates a shortcut for quick
access to that webpage. In Internet Explorer, you can access and view the
bookmark using shortcut key Ctrl + I.
6. HTTP expands to Hyper Text Transfer Protocol. This protocol is used to
transfer the data over the web. It allows web clients and web servers to
communicate with each other. When a web address is entered in the
address bar of a web browser, the browser sends an HTTP command to the
web server. The browser asked the server to respond by transmitting the
requested webpages to the client by displaying it on web browser. All the
web servers serving websites and web pages support HTTP protocol.
Example: http://www.mapsofindia.com/maps/delhi/
Here,
http: is a protocol
www.mapsofindia.com: is server name
maps/delhi/: is file name
Computer - 7 39
F. Application-based questions.
1. We should not click on any irrelevant link or advertisements on a webpage
while browsing because it may contain the fake links which may cause
fraud or contain virus or other type of threats which may cause harm to us.
2. Cache is a high-speed memory which is used to store frequently used web
documents like webpages, images, multimedia files etc. When you want
to view same web page again, the browser will look for that page in cache
first rather than requesting it from web server. It will increase the
response time by providing the requested page fast to the user.
Fun Zone
Game Activity Lab Session
Do it yourself Do it yourself
Higher Order Thinking Skills
1. Microsoft Edge 2. Bing
3. A cookie is a message which is passed to the web browser by the web server
when you open a web page. A browser stores each message in a small file
called Cookie.
4. Hyperlink
Project Work
Do it yourself

6. Electronic Mail
Check Your Learning

EXERCISES
A. Fill in the blanks with the help of words given in the box.
1. Server 2. Gmail, Yahoo 3. E-mail 4. Bcc 5. Domain
B. Write 'T' for true and 'F' for false statements.
1. F 2. F 3. T 4. T 5. T
C. Tick (3) the correct option.
1. a 2. b 3. b 4. b 5. a
D. Answer the following questions.
1. E-mail or Electronic mail is a way to send and receive messages through
the internet. You can attach digital files like documents, video clips,
images, audio files etc. to the email. The mail sent via email service
reaches to its destination within few seconds. The most commonly used
email services are Gmail, Rediffmail, Yahoo mail, Outlook etc.
Advantages of using Email:
a. It is the cheapest mode of sending and receiving messages.
b. Sent and received messages are stored in receiver's inbox which can be
checked at any time.
40 Computer - 7
c. It is the fastest method of communication because the message can
reach to any part of the world within fraction of seconds.
d. You can access this service anytime and from anywhere provided that
you must have an internet connection.
e. There is no use of paper thus it reduces environmental cost.
Disadvantages of using Email:
a. E-mail is the main source of virus which may be harmful for the
computer.
b. Due to lack of emotions and facial expression, there may be
misunderstanding while interpreting the emails.
c. Spam and junk mails are very common.
2. You can attach a digital file with an email like text files, images, audio or
video files etc. Steps to attach a file to the email are:
a. Click on Compose button to compose an email.
b. A New Message box opens.
c. Type the receiver's id, subject and message.
d. Click on Attachment button. An Insert Attachment dialog box opens.
e. Browse and select the file which you want to attach. Click Attach button.
f. The file will be attached to the email and displayed in New Message
box.
g. Click Send button to send the mail.
3. The various components of email window are:
a. Inbox: It is used to store the received mails.
b. Compose: It is used to create and send a new message. When you click
on Compose button, it contains the following components:
i. To: In this textbox, type the email address of recipient.
ii. Cc (Carbon Copy): In this textbox, type the email address of the
recipient to whom you want to send the same copy of mail.
iii. Bcc (Blind Carbon Copy): It is same as Cc but the email address of
recipients will not be visible to each other.
iv. Subject: It contains the subject of the email.
v. Body of the Mail: It contains the actual message.
vi. Attachment: It is used to attach the digital document with email.
vii. Reply: It is used to respond to the email you received.
c. Starred: It contains the important mails which are marked as starred.
d. Sent Mail: It contains all the mails you have sent to the recipients.
e. Drafts: It contains those messages which you do not want to send yet.
f. Trash: It is used to store the deleted emails for a defined time.
g. All Mail: This is an archive folder where all emails are stored with label.
h. Sign out: It is used to sign out from the email account.
4. Cc : Cc is the short form of Carbon Copy. In this box, you can enter the E-
mail address of the person to whom you would like to send the copy of
your mail. This is optional.
Bcc : Bcc stands for Blind Carbon Copy. In this box, you can enter the E-mail
address of another recipient who receives the copy of the mail, but whose
name and address are hidden from all other recipients. This is also optional.
Computer - 7 41
5. To create an email account on gmail (for example),
a. Open the web browser and type www.gmail.com in address bar.
b. Click on Create account option.
c. A form will appear which you need to fill like name, date of birth,
phone number, gender email address, and password.
d. There is a section that includes security questions which can help to
retrieve the password in case you forget it.
e. In the next section, you need to type a code for security reasons.
f. Then click on I Agree option which indicates that you are agreed with
all the terms of services.
g. Click on Create button and your new email account will be created.
6. A blogging is an act of posting contents on a blog. A blog or weblog is a
personal online diary which allows you to share and post your thoughts
and ideas. You can also add pictures, audio or video etc. to the blog. It
helps the users to interact with each other by posting blogs or adding
comments to other's blogs. A person who is involved in blogging is known
as Blogger. There are many types of blogs like personal blogs, corporate
blogs, organizational blogs etc. To create a blog,
a. First step in creating a blog is to choose a topic of the blog. The topic
should be you are interested in or expertise in.
b. Create an account.
c. Based on the topic you choose, pick a domain that tells readers what
your blog is about.
d. Customize the design of blog like fonts, color scheme, header image etc.
e. Now, create your first blog by clicking on Add button. It will direct you
to an editor where you can write and format the blog.
f. Publish your blog to share it with others.
E. Application-based questions.
1. Spam mails are the form of commercial advertisements. Spammers collect
the recipients addresses from publicly accessible sources or dictionaries
and send the spam mails to them which may be of no use to the receiver.
Sometimes, spam contain virus which is harmful for the computers.
2. Chatting with the unknown users should always be avoided. Chatting with
unknown users and sharing the personal information with them is a big
risk. They may use your personal information for wicked reasons.
3. To create an email account in Gmail, Shikha needs to follow the given steps:
a. Open the web browser and type www.gmail.com in address bar.
b. Click on Create account option.
c. A form will appear which you need to fill like name, date of birth,
phone number, gender email address, and password.
d. There is a section that includes security questions which can help to
retrieve the password in case you forget it.
e. In the next section, you need to type a code for security reasons.
f. Then click on I Agree option which indicates that you are agreed with
all the terms of services.
g. Click on Create button and your new email account will be created.
42 Computer - 7
4. To send the photographs, Divya needs to attach them to email. For this,
a. Click on Attachment button in New Message box.
b. An Insert Attachment dialog box appears.
c. Browse and select the photographs and click Attach button.
d. Click on Send button to send the email.
Fun Zone
Game Activity Lab Session
Do it yourself Do it yourself
Higher Order Thinking Skills
1. No 2. No 3. Yes 4. No
Project Work
Do it yourself

7. Computer Malware
Check Your Learning
1. Trojans 2. Worms 3. Resident Virus 4. Overwrite Virus 5. Zombies
EXERCISES
A. Fill in the blanks with the help of words given in the box.
1. Antivirus 2. Trojan Horse 3. Polymorphic
4. AVG Antivirus 5. Anti-malware
B. Write 'T' for true and 'F' for false statements.
1. T 2. F 3. F 4. T 5. T 6. T
C. Tick (3) the correct option.
1. b 2. a 3. a 4. b 5. a
D. Answer the following questions.
1. Malware is a malicious software program which is designed to damage
and destroy the computer and computer network. Once the computer
system is damaged, all the information it contains is lost.
Objectives of a malware can be:
Ÿ Steal sensitive data from the targeted computer or network.
Ÿ Provide remote control of the infected system to an attacker.
Ÿ Send spam from the infected machines to unsuspecting targets.
Ÿ Investigate the infected local network.
2. A Computer Virus is a type of ill-natured code or program which once
enters into the computer, corrupts it and it is designed to enter from one
computer to another. A virus has a potential to cause damage effect such
as harming the system software or corrupting data. It can enter into the
computer through infected CD, pen drive, or internet.
The five computer virus are:
a. Resident virus b. Overwrite virus c. Trojans
d. Boot virus e. Worms
3. Ransomware is a type of malware which encrypts the computer or files
inside it or make the system inaccessible. Then it asks for ransom in
exchange to access the system or files.

Computer - 7 43
Scareware is a malware which use some tactics to force the users to
download or buy malicious software. It takes advantage of user's fear and
coax them into installing fake anti-virus programs. It forcefully asks the
user to take some actions like to pay an amount to fix the system back to
normal.
4. A Trojan Horse is a malware program which is designed to allow the
unauthorized users to access the remote computer. These are used to
hack a computer by misleading the computer users. The malicious coding
is hidden inside the innocent-looking programs or E-mails. When user
opens it, the malicious code is executed and enters in the computer
system.
5. The signs that signify the presence of virus in the computer system are:
a. The computer starts to operate slower than normal.
b. The computer shuts down frequently.
c. The computer usually restarts on its own.
d. Applications stored in the system do not work as usual.
e. Strange error messages might display on the screen.
f. Strange icons emerge on the desktop that are not associated to any
program.
6. The precautions that we can take to protect our system from computer
malware are:
Ÿ Install an anti-virus program to your system.
Ÿ Scan the entire system every week or when you surf the internet.
Ÿ Do not use pirated software.
Ÿ Do not download any file from untrusted source.
Ÿ Do not use any device on your system without scanning it.
Ÿ Do not open E-mails from unknown source.
Ÿ Keep current data backups.
7. An antivirus software is a software program which is used to detect and
remove the virus immediately. It is advisable to load an antivirus software
in your system to keep your system protected from any malicious
program. When you start the computer, antivirus starts automatically. It
scans the entire files in the system to detect the virus. If a virus is detected,
that virus is removed.
Examples: Norton, AVG, McAfee, Kaspersky, SmartDog
8. The three types of antivirus programs are:
a. AVG Antivirus: It is a free software program which includes both
antivirus and antispyware capabilities and scans all the files in the
system at regular intervals.
b. McAfee Antivirus: It is an antivirus program which protects your
computer from viruses and spyware.
c. Bit Defender Antivirus: It is an antivirus program which protects the
system from viruses, spyware and rootkits.
E. Application-based questions.
1. There can be the chances of virus attacks on Preeti's computer system.
That is why, Preeti's computer system is behaving in a strange manner.
2. There are lots of Antivirus programs available in the market. Tannu can
choose any program according to her requirements like Bitdefender,
McAfee, Norton etc.
44 Computer - 7
Fun Zone
Game Activity

AVG McAfee Norton


Lab Session
1. Trojan Horse: Trojan Horse is a malware program which allows the
unauthorized users to access the remote computer.
2. Resident Virus : It is a type of virus which once enters into the computer
system becomes the permanent resident of the main memory.
3. Polymorphic Virus: Polymorphic virus is a dangerous virus which can create its
copies and changes its signature everytime it replicates and it becomes
difficult to detect it.
Higher Order Thinking Skills
Rootkit is a malicious software program which give unauthorized users access to a
computer or other software. It is difficult to detect this program in an infected
computer.
Project work
Do it yourself

8. Cyber Threats and Security


Check Your Learning
Crime against organization Humiliating a victim by sending insulting remarks

Crime against individual Software piracy and copyright infringement

Crime against property Hacking Government and military websites

EXERCISES
A. Fill in the blanks with the help of words given in the box.
1. Spoof 2. Cyber bullying 3. Pharming 4. Hacking 5. Biometrics
B. Write 'T' for true and 'F' for false statements.
1. F 2. T 3. F 4. T 5. F
C. Tick (3) the correct option.
1. c 2. b 3. b 4. a 5. b
D. Answer the following questions.
1. It is important to secure our computer to keep the information protected.
A break in computer security may cause harmful and potentially major
issues. Proper computer security helps prevent viruses and malware
which allows programs to run quicker and smoother. The various security
threats are:
a. Installing unverified freeware
b. Opening emails from unknown sender
c. Using removable disks without scanning

Computer - 7 45
Therefore, it is required to keep your system safe which can be done by
keeping the security software updated, enable a firewall, adjust the
privacy and security settings of a browser, install antivirus and
antispyware software, keep your system protected by using password.
2. Cyber crime is an unlawful activity done through internet. It may include
identity theft in which somebody steal your email-id or password and use
it to send fake emails to others like winning lottery or product etc. It may
also include credit card account thefts, internet frauds, forgery, harassing
others and much more which comes under the jurisdiction of Indian Penal
Code.
Cybercrime can be categorized into three types:
a. Crime against an individual person b. Crime against property
c. Crime against an organization/society
3. Cyber Bullying is an act to harass or harm a person by posting insulting
remarks against gender, race, religion or nationality and sending
threatening messages by emails, posting embarrassing photos, emails to
hurt someone to threaten him. The attacker is often anonymous or
unknown and there is no one to fight back against.
Cyber Stalking is a more specific form of Cyberbullying. It is the use of the
internet and other technology to harass someone by spying on them
electronically. Most social media websites have made it easier to keep an
eye on someone's activities. The purpose of Cyber Stalking is to gather
information about the person or humiliate the victim or his family by
posting false information about him.
4. Phishing is a form of fraud in which an attacker acts like a reputable entity
or person in email or other communication channels. The user is asked to
visit a website in which he needs to enter his personal information like
username, password, credit card details etc. Like, sometimes it happens
that you get a mail like you are winning an award or money type mails, in
which you are asked to enter your login details or credit card details or OTP
(One Time Password). In this way, the operators of the fake website
conduct crimes in your name after stealing your identity like to attack on
the bank property and steal money. While using the internet, you may find
various counterfeit websites that resembles to the authorized sites, in
which when you enter the personal and confidential details, are recorded
on the wicked person's system and he can use these for his benefits.
5. Stealing someone's personal information is called Identity Theft. It is a
major issue for people who use internet for online shopping, cash
transactions and banking services. An imposter steals the identity of
another person like name, photograph, signature, email id, id card, etc.
and use it for nasty reasons. By using the identity details of another
person, he can steal his property, purchase something on his name, send
wicked messages from his id, commit crimes using his name and
photograph, share his identity and phone number publicly, which may
cause big harm to his reputation. The stolen information generally
includes the person's name, date of birth, account number, credit/debit
card number, ATM pin etc.
46 Computer - 7
6. While creating a password, a person should keep the following points in
mind.
a. A password should start and end with special characters.
b. It should be more than 8 characters.
c. It should not be common like date of birth or on pet name.
d. It should be strong and unique.
7. Firewall is a security system which is used to protect computer by
preventing unauthorized users from accessing the system through
internet. It can either be hardware or software or combination of both. It
is enacted on the gateway of a network and follows a particular set of rules
defined by user or network administrator. On the basis of these rules, it
checks the incoming and outgoing network traffic. And allows only the
authorized packets to enter into the network.
8. Encryption is the process of converting information of data into a code,
especially to prevent unauthorized access. Encryption software is used to
create the encrypted text called 'Cipher text'. To read an encrypted
message, it has to be decrypted with the same software on the receiver's
side. This process is called Decryption.
E. Application-based questions.
1. Mohit needs to install some antivirus software like AVG or Norton to
remove the virus and protect the system.
2. To send the information securely, Mehul should encrypt it.
3. Geetika should discuss the situation with her parents and file a complaint
against the person.
F. Explain the following terms.
1. In Biometrics, a person is verified by means of his unique biological or
physical characteristics. It recognizes a person by retinal scan, finger
prints, voice recognition etc.
2. A cookie is a text message given to web browser by a web server. The web
browser saves this user-specific data in a text file. This file is called a cookie.
3. In computer terminology, backup refers to the process of making copies of
data or data files to use in the event the original data files are lost or
destroyed.
Fun Zone
Game activity Lab Session
1. Cyber Stalking 2. SMS Spoofing 3. Pharming Do it yourself
Higher Order Thinking Skills
1. (i), (iii), (iv)
2. Hacking means unauthorized access to data in a computer system. Hackers
are those people who are having full knowledge of technology but they are
using their knowledge for wicked purposes. They used to hack the computers
in banks, government organizations, or industries and hack their databases to
steal important information.
Cracking is same as hacking but with criminal intentions. A cracker is someone
who breaks into a network, bypasses passwords or licenses in computer
programs or in other ways intentionally breaches computer security.
Project Work
Do it yourself
Computer - 7 47
9. Google Apps
Check Your Learning
1. Google Sheets 2. Google Slides 3. Google Docs
EXERCISES
A. Fill in the blanks with the help of words given in the box.
1. Gmail 2. Google 3. Real time 4. Maps 5. Desktop
B. Write 'T' for true and 'F' for false statements.
1. T 2. T 3. F 4. T 5. T
C. Tick (3) the correct option.
1. b 2. c 3. b 4. a 5. b
D. Answer the following questions.
1. An app is an application which is a software program designed to perform
a particular task. An app that can run on your mobile phone, is called
Mobile apps. An app that can run on other devices like PC, laptop, desktop
etc. is called Desktop app. An app that can run on remote server is called
Web app.
2. Google is an American multinational software company which is famous
for its search engine. It also focuses in search engine technology, online
advertising, computer software, e-commerce, cloud computing etc.
To search information on Google search engine:
a. Open Google by typing www.google.com in the URL of a web browser.
b. Type keyword related to the search in Search box and press Enter key.
3. Gmail is one of the most commonly used mailing apps which is easy to
access through the web browser over the internet. This app is used to
send and receive mails to any other person or group of persons free of
cost. It can be used to send images, videos, documents or other files as an
attachment.
4. Google provides a cloud storage to its users. Users can upload files on the
remote server and can also download files from it. It allows multiple users
to access the same file simultaneously from different locations. To access
these files, you need an authority to do so.
5. Google Docs is a web-based word processing software, works same like
MS Word. It can be used to create, edit and store the documents. But
other word processing software like MS Word are used offline on your
computer system whereas Google Docs is a web-based software which
allows you to use this software online and there is no need to download or
purchase this software.
6. Steps to create a new presentation in Google Slides are:
a. Open Google and click on Google Apps.
b. Select Slides option.
c. A Google Slides window appears on the screen. Click on Blank option.
A new blank document window named “Untitled presentation”
appears on the screen, which can be renamed.
d. Select any theme from the right pane and it will be applied to the
current presentation.
48 Computer - 7
7. Google Sheets is a web-based spreadsheet program which works similar
to Excel sheets. It is used to organize the data in tabular form. In Google
Sheets, you can create a spreadsheet, update, modify and analyse it which
can also be shared with other people. It also provides various functions,
formulas and calculations which can be performed on data stored in it.
8. YouTube is a video sharing app which is provided by Google. This app can
be used to upload or download videos, watch videos, comment on them,
share and like them.
E. Application-based questions.
1. Tania can access that link just by clicking on it.
2. Pooja can share her app on YouTube.
F. You have worked with Word and have used Google Docs also. Can you find
and write down the differences between these two software?
Word Google Docs
Word is a word processing software Google Docs is a word processing
which is used to create and edit software which is used to create and
documents. But it is used offline on edit document just like Word. But it
computer system. is used online.
I t n eed s to b e p u rc h a s ed o r It does not need to be purchased or
downloaded to use this software. downloaded. You can use it online.
The documents created in Word are The documents created in Google
stored in the computer system. Docs are stored in computer system
and on cloud as well.
You can use this software only in your You can use this software at anytime,
system and there is no need of anywhere using any device provided
internet connection to use it. that you must have an internet
connection.
Fun Zone
Game Activity

Facebook WhatsApp Instagram Snapchat


Lab Session
Do it yourself
Higher Order Thinking Skills
Google Classroom is a learning platform used for teaching and learning. It can be
used to streamline assignments, boost collaboration, and foster communication.
Project Work
Do it yourself

10. Programming with Python


EXERCISES
A. Fill in the blanks with the help of words given in the box.
1. Editor 2. .py 3. F5 4. Equal to (=) 5. Input()
Computer - 7 49
B. Write 'T' for true and 'F' for false statements.
1. T 2. T 3. F 4. T 5. F
C. Tick (3) the correct option.
1. b 2. c 3. a 4. b 5. a 6. b 7. a
D. Answer the following questions.
1. IDLE Editor window is a text editor window which is used to write Python
programs. The Python code we write in IDLE Editor window is called Script
or Module. To open IDLE editor window, we can follow the given steps:
Ÿ Click on Start button ® All Programs ® IDLE Python (3.8) option.
Ÿ Click on File menu ® New File option.
A Python Editor window will open.
2. In Python, the print() function is used to display the value stored in a
variable or the output of a command (statement). The syntax of the print()
function is as follows:
Syntax : print (variable's name)
For example:
To print the values of two variables a and b, the program code is:
a = 10
b = 20
print(“The value of a is:”, a)
print(“The value of b is:”, b)
3. The input() function is used to take input from the user while executing a
program. The value input by the user is stored in a variable as text strings.
The general syntax is as follows:
Syntax: input (“text strings or message”)
For example:
To input your name and age and print it, the program code is:
name = input(“Enter your name: “ )
print(“My name is:”, name)
age = int(input(“Enter your age: “)
print(“My age is:”, age)
4. The type() function is used to know the data type of the variable. The
syntax of type() function is:
type(variable's name)
For example:
x = 100
type(x)
It will return int as an output.
5. int() function is used to accept an integer value from the user. The syntax
of int() function:
int(input(“text string or message”))
For example:

50 Computer - 7
6. float() function is used with input() function to a ccept floating value from
the user. The syntax of float() function is:
float(input(“text string or message”))
For example:
E. Application-based questions.
1. 10, 11, 12, 13, 14, 2. Error
3. i. ** Exponent ii. % Modulus iii. & Bitwise AND iv. > Comparison
4. Do it yourself
Fun Zone
Game Activity
The syntax of input() function is:
input(“text string or message”)
The syntax of print() function is:
Print(“text string or message”)
Lab Session
Do it yourself
Higher Order Thinking Skills
Ÿ A parameter is a variable defined by a method that receives a value when the
method is called.
Ÿ An argument is a value that is passed to a method when it is invoked.
Project Work
Do it yourself

11. Artificial Intelligence


Check Your Learning

output layer

input layer
hidden hidden
layer 1 layer 2
Check Your Learning
1. Google 2. Myntra 3. Facebook
EXERCISES
A. Fill in the blanks with the help of the words given in the box:
1. Driverless 2. Medical Research 3. Image Recognition
4. Data 5. Input
B. Write 'T' for true and 'F' for false statements:
1. T 2. F 3. T 4. F 5. F
Computer - 7 51
C. Tick (3) the correct option.
1. b 2. b 3. b 4. a 5. c
D. Answer the following questions.
1. Machine Learning is a subset of Artificial Intelligence which facilitates
software applications to become more accurate in predicting the future
decisions on the basis of their past experiences without being explicitly
programmed. It uses the previous and historical data as its input and
predict new output values.
Machines are given some trial data to access. As the machines go through
these trials data, they learn themselves. These machines are not
specifically programmed to perform such tasks and therefore eliminating
the requirement of writing millions of lines of written code. They learn and
improve from their experience automatically.
2. There are three types of Machine Learning: Supervised Learning,
Unsupervised learning and Reinforcement Learning.
a. Supervised Machine Learning:
In this type of Machine Learning, the output is already known and the
algorithm is corrected each time to optimize its result. This type of
learning occurs when a machine is fed with the data to learn from and
the guidelines for what output is expected. It also predicts the errors
during the entire learning process and also corrects those errors
through algorithms.
b. Unsupervised Machine Learning:
In this type of Machine Learning, output is unknown and only input
variables are available. There is no labelled information. The machines
figure out the output and predictions on its own. Therefore, the output
it produces may not be correct always.
c. Reinforcement Learning:
Reinforcement Learning is a feedback-based learning method. In this
type of Machine Learning, a learning agent gets a reward for each right
action it performs and also gets a penalty for each wrong action it
performs.
3. Deep Learning is a subset of Machine learning. It enables a machine to
learn to think by using the complex structure of algorithms modelled on
human brain. To provide impressive results, deep learning requires large
amount of labelled data and substantial computing power.
Deep Learning is based on Artificial Neural Networks. Neutral network is a
network of neurons that make up human brain which can interpret the
context of real-world situations. Artificial Neural Networks have millions
of artificial neurons which are called Nodes or Units.

52 Computer - 7
Deep Learning is essentially a neural network with three or more layers.
Using these neural networks, a machine is able to simulate the behaviour
of human brain and is able to learn from large amount of data.
4. Reinforcement Learning is a type of machine learning which is based on
the science of decision making. A machine is trained in such a way that it
can learn the optimal environment and performs the action to obtain
maximum rewards.
Let us understand it with the help of example.
We have an agent named Robo and a diamond as a reward.

The task is that Robo has to reach to


the reward that is a diamond by
avoiding any hurdles in between.
Obstacles
Here, fire flames are the hurdles. For
choosing the correct step towards
the reward, Robo will get one point Robo
as a reward. But on choosing an
incorrect step, Robo will lose one Final
point from its reward. When it Reward
reaches to the final reward, i.e.,
diamond, calculate the total number
of rewards it has achieved.

5. The two real-life examples of Machine Learning are:


a. Music or Video recommendation system: Various e-commerce websites
like Myntra or Amazon are using the recommendation systems which
recommends more products when you start searching products on those
websites. It observes the online searching habits of the user and the
previous searches he has made and learns these observations. On the
basis of the data it has learnt and collected, it makes future
recommendations.
b. Image recognition: Machine learning is used for facial recognition
where it uses the database of people and search the database to find the
correct match. Various social media sites are using image or facial
recognition systems to give you tag suggestions.
6. Recommender System are the powerful engines which uses machine
learning algorithms to segment customers on the basis of their
behavioural patterns and user data. The main purpose of the
recommender system is to target the customers with personalized
products and content suggestions.
There are two types of Recommender Systems: Content-based Filtering
and Collaborative Filtering.

Computer - 7 53
Content Based Filtering
Content-based filtering is a recommender system in which the relevant
items are recommended to the user on the basis of the previously
searched items by the users.
Collaborative Filtering
Collaborating Filtering is a recommender system in which the new items
are recommended to the users on the basis of the interest and preferences
of the other similar users.
E. Application-based questions:
1. Recommender System
2. Image Recognition Systems
Fun Zone
Game Activity
Supervised Learning Unsupervised Learning Reinforcement Learning
It learns by using It is trained by using It works on interacting
labelled data. unlabelled data without with the environment.
any guidance.
Lab Session
1. Traffic alerts using Google Map 2. Chatbot
3. Google Translation 4. Self-driving Cars
5. Email Filtering
Higher Order Thinking Skills
The various AI techniques are Machine Learning, Machine Vision, Natural
Language Processing and Automation and Robotics.
Project Work
Do it yourself

12. Extended Reality


Check Your Learning
Virtual Reality Augmented Reality
Pilot Training AR Colouring Book
Military Training Vito Technology's Star Walk

EXERCISES
A. Fill in the blanks with the help of words given in the box.
1. Extended 2. Cross 3. Beat Saber 4. 3D 5. Matterport
B. Write 'T' for true and 'F' for false statements.
1. F 2. F 3. T 4. F 5. T

54 Computer - 7
C. Tick (3) the correct option.
1. a 2. c 3. a 4. b 5. c
D. Answer the following questions.
1. Extended Reality or Cross Reality refers to the combination of real world
with virtual environments, so that human can interact with machines or
virtual world using wearable devices and computing technology.
2. Three application areas of Extended Reality are:
a. Gaming: There are lots of games using the technology of Extended
Reality like Beat Saber, Half Life: Alyx and Moss etc.
b. Vehicle Design and Development: Develpers are using virtual reality to
get a 3D view of the product before manufacturing it. For ex: BMW is
using Augmented Reality in the designing process of their vehicle.
c. Education: Extended Reality is used in the field of education to provide
a different, exciting and practical learning experience to the learners.
3. Virtual Reality provides a completely digital and computer-generated
environment. This artificial environment provides a 3-dimensional (3D)
view to its users. It facilitates the user to step inside it and interact with the
3D world that can either simulate or completely differ from the real world.
It provides the 360° view of the virtual worlds.
In order to experience the Virtual world, you need to wear gears, such as
VR Googles, VR Headset, VR Gloves and VR Body Suit. When you wear
these gears and enter in the virtual world, you can experience through
vision, hearing and sometimes touch senses.
4. Augmented Reality uses real-world environment and put virtual objects in
it in real time. It includes three basic features:
Ÿ Combination of real world and virtual world
Ÿ Interaction at real time
Ÿ 3D registration of virtual objects and real objects
For example: Vito Technology's Star Walk and AR Colouring Book
5. Mixed Reality is a combination of virtual elements and real world. It
provides a completely new environment and visualisations in which digital
and physical objects co-exist and interact in real time.
For example: Mixed Reality games such as Angry Birds.
6. Augmented Reality is different from Virtual Reality in that Virtual Reality
creates a complete virtual and digital environment whereas, Augmented
Reality uses the real-world environment and overlays new information on
it by putting virtual objects in real time. These virtual objects can be text,
graphic, audio or other virtual enhancements.

Computer - 7 55
7. In order to experience the Virtual world, you need to wear gears, such as
VR Googles, VR Headset, VR Gloves and VR Body Suit. When you wear
these gears and enter in the virtual world, you can experience through
vision, hearing and sometimes touch senses.
E. Application-based questions.
1. To experience the virtual tour, we need VR Goggles, VR Headset, VR Gloves
and VR Body Suit.
2. A 5D experience capitalizes on all five senses, stunning realistic visuals, the
tactile feeling as one navigates the environment, the sound, smell and
virtual taste.
F. Explore more.
a. Many e-commerce websites are using extended reality to facilitate their
users that they can try on their outfit virtually before even buying them.
b. The use of XR in food manufacturing operations can provide productivity,
maintenance, training, and marketing benefits.
Fun Zone
Game Activity

VR Headset VR Body Suit VR Gloves VR Goggles

Lab Session
Virtual Reality Augmented Reality Mixed Reality
Completely digital Virtual objects overlaid Virtual environment
environment on the real-world combined with real
environment world
Synthetic experience Real world remains Interaction with and
with no sense of real central to the experience manipulation of both
world enhanced by virtual physical and virtual
details world
Ex. Military Training Ex. AR Colouring Book Ex. Simulation of surgical
operations

Higher Order Thinking Skills


From theatres, museums, sporting events to music concerts, AR and VR
technologies seem to bring tremendous benefits to various domains in the
entertainment industry. AR/VR technology will be monumental in helping
entertainment businesses reach new audiences and improve their experience.
56 Computer - 7
Metavere technology is used in the entertainment and media industry and has
proven to be beneficial in:
Ÿ Increasing audience engagement
Ÿ Retaining viewer's attention for a longer period of time
Ÿ Exploring new technologies
Ÿ Conducting virtual exhibitions
Project Work
Do it yourself

Test Paper - 1
A. Tick (3) the correct option.
1. b 2. c 3. b 4. c 5. b
B. Fill in the blanks.
1. Hexadecimal Number System 2. 0 3. Medical Research
4. <br> 5. Software
C. Write 'T' for true and 'F' for false statements.
1. F 2. F 3. F 4. F 5. T
D. Answer the following questions.
1. The rules to subtract two binary numbers are given below:
A B A–B
0 0 0–0=0
0 1 0–1=1
1 0 1–0=1
1 1 1–1=0
2. A Pie chart is used to plot a chart as proportional slices of a pie. It can
display only one series of data. It represents the data in circular form. A
circle is portioned into different sections that represents a percentage for
a particular partition. To create a pie chart,
a. Create a data series in an Excel sheet.
b. Select the data series along with field name. c. Go to Insert tab.
d. From Charts group, click on the Pie chart. e. Select 2 D Pie chart.
f. A 2D pie chart will be created according to the selected series.
3. HTTP is a Hyper Text Transfer Protocol which is used for encoding and
transporting information between a client and a web server. It is a system
by which computers talk to each other across the World Wide Web.
4. A layer is like a translucent sheet where you can organize your artwork. It
can be used to draw and edit objects on one layer without affecting
objects on another layer. These layers are stacked on the top of one
another, each containing a different image that appears on the stage.
Together all the layers are combined for a complete graphic or animation.
A frame is just an intermediary between keyframes. During a normal
frame, there is no modifications in the amount of an object on stage. The
actual changes appear in keyframes. The total number of frames in a
timeline can be used to specify the total length of the movie.
Computer - 7 57
5. The explanation of two container tags are given below:
a. <p>: <p> is a paragraph tag which has an ending tag, i.e. </p>. It is used
to mark the block of text as a paragraph in a web page. When you start
a new paragraph, the web browser will leave one line between the two
paragraphs.
Syntax: < p> Paragraph text </p>
Example: <p> Internet has become an integral part of our lives. It is a
network of networks in which user at one computer can get the
information from any other computer provided he must have a
permission. </p>
b. <b>: <b> is a bold tag which is used to emphasize the enclosed text by
making it bold.
Syntax: <b> Text </b>
Example: <b> This is used to make the text bold. </b>
E. Define the following.
1. A Number System is a set of values used to represent different quantities.
There are four types of number system:
a. Decimal Number System
b. Binary Number system
c. Octal Number System
d. Hexadecimal Number System
2. A column chart uses bars that run vertical to plot a chart but line chart uses
lines to plot a chart of data series.
3. Google Chrome is a web browser which is used to quickly access the web
pages and make local desktop shortcuts to open web application in the
browser.
4. Cascading Style Sheets or CSS are used to format the layout of web pages
and their visual formatting.
5. A symbol is a static, reusable object and an instance is an occurrence of the
symbol on the stage.

Test Paper - 2
A. Tick (3) the correct option.
1. b 2. b 3. a 4. c 5. c
B. Fill in the blanks.
1. F5 2. Two 3. Objects, procedure 4. Translucent 5. Cascading
C. Write 'T' for true and 'F' for false statements.
1. T 2. T 3. T 4. T 5. F
D. Answer the following questions.
1. Hide/Show Layers button in Timeline is used to hide or show the layer in
Animate 2022. To hide the layer, just click on this button once.
2. An app is an application software which is designed to perform a
particular task. The apps designed by Google are called Goole Apps. To use
these apps, you need a Google account. Once you logged in your Google
account, it will display a list of apps which can be accessed by you
according to your requirements.
58 Computer - 7
Examples of Google apps are Gmail, Google Drive, Google Docs, Google
Maps, Google Sheets etc.
3. Container elements are those elements which contain both the ON and
OFF tags. These elements start with starting tag or ON tag and ends with
ending tag or OFF tag.
For example: <b> This element is used to bold the enclosed text. </b>
Empty elements are those elements which include only ON tag. These
elements start with starting tag or ON tag, but has no ending tag or OFF
tag.
For example: <br>
4. A Trojan Horse is a malware program which is designed to allow the
unauthorized users to access the remote computer. These are used to
hack a computer by misleading the computer users. The malicious coding
is hidden inside the innocent-looking programs or E-mails. When user
opens it, the malicious code is executed and enters in the computer
system.
5. Cyber crime is an unlawful activity done through internet. It may include
identity theft in which somebody steal your email-id or password and use
it to send fake emails to others like winning lottery or product etc. It may
also include credit card account thefts, internet frauds, forgery, harassing
others and much more which comes under the jurisdiction of Indian Penal
Code.
Cybercrime can be categorized into three types:
a. Crime against an individual person
b. Crime against property
c. Crime against an organization/society
E. Define the following.
1. Firewall is a security system which is used to protect computer by
preventing unauthorized users from accessing the system through
internet. It can either be hardware or software or combination of both.
2. Malware is a malicious software program which is designed to damage
and destroy the computer and computer network. Once the computer
system is damaged, all the information it contains is lost.
3. Variables are used to store values that may change during processing. For
example: x, y, name, class etc.
4. <br>: <br> is a line break tag which is used to move the followed text to the
next line. It works like an Enter key of the keyboard.
Syntax: <br> Example: <br>
5. Extended Reality or Cross Reality refers to the combination of real world
with virtual environments, so that human can interact with machines or
virtual world using wearable devices and computing technology.

Computer - 7 59

You might also like