DAV Class 8 Computer Chapter 1 To 9
DAV Class 8 Computer Chapter 1 To 9
(5) Modem is the device which are used for data transfer from one
computer network to another computer network through telephone lines.
(6) Internet is a global (wide area) network connecting millions of
computers.
(Q2) State whether the following statements are True or False :-
(1)The abbreviation of MoDem is Modulation and Demodulation. True
(2) Router is the device which is used in networking that helps in jointing
the more than one networks together. True
(3) A wireless network is a network which uses networking cables to
connect devices (computers, printers, scanners etc). False
(4) Bluetooth is the wireless technology which uses radio frequencies to
transmit information over a short distances. True
(5) Radio waves are the electromagnetic signals that are transmitted by an
antenna. True
(Q3) Match the following Column A with Column B :-
Column A Column B Answers
Sr. No
In this network, networking
cables are been used for
Uses radio waves (RF) to connecting the devices like
allows two or more devices (computers, printers,
to communicate with one scanners) etc
1) Wired Network another
(b) MAN :- MAN stands for Metropolitan Area Network that is established in
a metropolitan area such as city or tow. A MAN typically includes one or
more LAN but covers a smaller area than a WAN. Telephone companies,
cable television operators, and other organizations makes use of MAN
network.
(c) WAN :- The abbreviation of WAN is Wide Area Network which means
this network is used to connect the computers to each other who located at
a very far distance say globally. The data/information can be
exchanged/transferred to each other (computers connected into a network)
all over the world. In WAN connection the computers are connected to each
other with the help of cables, telephone lines, fibre optics, microwaves or
satellites. Connecting the computers in WAN network is a very difficult task,
as there can be a probability of faults or short circuits arises if in case the
wires/cables breaks down. As compared to other networks the speed is very
low. Internet can be the perfect example of WAN.
(2) What do you understand by Wi-Fi
Ans :- It is the wireless technology, which is used for connecting to the
internet within one room, building, hotel, hospital, schools or offices etc.
The abbreviation of Wi-Fi is Wireless Fidelity which makes uses of radio
waves and allows one or more than two devices to connect with each other.
Such type of technology helps in connecting the devices like Smartphones,
Computers, tablets etc to the internet. We should always make our Wi-Fi
connection secured from the accessing of unauthorized users which should
be protected by the password.
(3) Write the types of Internet services in brief
Ans :- Some types of internet services are as followed :-
(a) Dial up :- This service clearly states the slowest type of Internet
connection and can be used only in the areas where the internet service is
needed. Internet cannot be used at the same time when the dial is used
along with the phone line termed as telephone line.
(b) DSL :- Nowadays, Broadband connections by the DSL services for the
faster speed as compared to Dial up service. DSL also gets connected to the
internet with the help of phone line and the phone line and the internet can
be used at the same time. Not like the Dial up.
(c) Cable :-
This service is much easier in connecting the Internet with the Cable TV. As
comparison is made between the both i.e is Dial up and DSL, cable service
makes use of the broad band connection, which is much faster than these
both services.
(d) Satellite :- In this type service, broad band connection is used which
does not need
any cables or phone lines. In such type of services broad band gets
connected to the internet through the man-made satellite which is orbiting
the earth. Such connection are widely used around the world but can be
affected/disturbed according to the weather or climatic changes. These
connections are slower than the DSL or cable.
(3) 3G and 4G :- This service is mostly used in the devices such as mobile
phone, tablets etc and gets connected to it with the help of ISP’s network.
As the comparison is made between the Cable or DSL and 3G and 4G
services, such service’s connection is very slow than Cable or DSL. 3G and
4G services are nowadays popularly used.
(4) What do you mean by Twisted Pair cables, Coaxial cables, Fiber
optic cables? Write down their advantages and disadvantages.
Ans:- The different types of cables are Twisted Pair, Coaxial cable and Fiber
Optic cables etc are explained below along with their advantages and
disadvantages
Twisted Pair Cables :- Shielded and Unshielded are the two types of
twisted pair cables which are used for networking. Such type of cable is
used for connecting the two network devices (computer, switches etc)
directly. Ethernet cable is the perfect example of Twisted Pair cables.
o This cables transfers the data at a very high speed and is much cheaper.
o This cables makes less use of electricity.
o This cable is very simple to use or install.
o If incase there is any problem in the cable, so its very complicated to detect
the fault/problem of the cable.
o For using this cables (Ethernet), there must be the presence of the Ethernet
cable inside the computer.
Coaxial Cables :- The coaxial cable is the central copper wire which is
been covered by the outer jacket. It is widely used by the Cable television
companies in connecting the Television set with the antenna.
Advantages of Coaxial cables
o This cables are no much costly and carries the data over the long distance
more easily.
o This cable has noisy immune due to its thick outer covering.
o Such cables are light in weight, and easy and flexible to work with.
o As compared to the Twisted pair cables, this cables are more cable of
interference and attenuation in the terms of loss in the strength of the
signal.
o This cables are consisting of copper metal wire which is easily breakable.
o Some of the coaxial cables are so thick, which cannot bend properly /easily
and results difficulty in installation and maintainance.
Fiber Optic Cables :- This cable makes use of glass thread (fibers) for
data transfer. Each of the glass threads of the cable is much capable of
transferring of data (messages) in the form of light waves. As this cable is
made up of glass, such cable is bendable.
(5) Name the devices which are required for connecting different
devices in a network?
Ans :- The devices which are required for connecting the different devices
in a network are as follows :-
(a) Cables :- For connecting the computers and other devices in a
networks, the cables such as flexible metal or fibre optic wires are been
made use of.
(b) Network Interface Card (NIC) :- You can easily connect the connect
the computer to the network as Network Interface Card (NIC) is
placed/installed on the mother board inside the system unit. It can be
added for each client and server computers. NIC is also known as Printed
Circuit Board (PCB). There are two kinds of Network Interface Card (NIC)
which are:-
Ethernet Card :- In this type of card, for
data transmission ethernet cables and connectors are been made used.
Wireless Card :- In this type of card, use of cables or connectors are not
made. Here for the data transmission, the use of antennas is made which
creates radio waves technology.
Lesson No 2
HTML – I
(Q1) Fill in the blanks :-
(1) Website is a collection of related webpages consisting of text, images,
sounds and videos.
(2) Static pages shows the same content each time they are viewed
whereas Dynamic pages have can change each time they are accessed.
(3) The unique name of the website is called as URL (Uniform Resource
Locator)
(4) The language which is used for creating or developing of webpages is
known as HTML
(5) A text editor is a word processing program that is used for typing or
editing an HTML program.
(Q2) State whether the following statements are True or False :-
(1) Home Page is the first page on every website which gives us basic
details about the information the website contains. True
(2) Text editor is the software which is used for viewing websites. False
(3) HTML tag is composed of the name of the element, surrounded by curly
brackets False
(4) A Tag can have more than one attributes also. True
(5) Empty Tags do not have an end tag. True
(6) <HTML> tag represents the root of an HTML document. True
7.) The first web browser World Wide Web, was developed in 1990 by Tim
Berners
for the NeXT Computers. Lee True
Q3.) Write down the full forms for the following :-
1.) URL – Uniform Resource Locator
2.) HTML – Hyper Text Mark-up Language
(6) State the difference between the Container tags and Empty
Tags
Ans :- The difference between the Container tags and Empty Tags are as :-
(a) Container Tags :- This tag includes text and other tags. In this tag,
there is Start tag and End Tag. As if in this tag, there is inclusion of Start
and End tag, so the Start tag starts within the angle brackets <> whereas
the end tag is closed by using a forward slash inside the angle brackets
</>. Ex :- <Title> </Title>
(b) Empty Tags :- This tag does not include any text or any other tags.
This tag does not have end tags. As if there is no presence of Start tag and
End tag so there is no need of defining it. <BR>, <HR> tag.
(Q5) Answer the following questions in brief :-
(1) Write down some Container Tags?
Ans :- Some of the Container Tags are as followed :-
(A) HTML Tag
This tag <HTML> tag defines the root/base/foundation of the HTML
document. This tag acts as an container for all the elements of a HTML
document.
In the HTML document, the code starts with <HTML> which is known as the
opening tag and </HTML> is known as closing tag.
The HTML document is divided into two parts which are HEAD and BODY.
The Word pad or Note pad file is usually save in .txt as the file extension
name by default but the HTML file is been saved with the .htm or .html file
extension in Word pad or Notepad.
(3) Explain the Attributes in brief
Ans :- In HTML program, attributes are the properties of the tags. Always
attributes are used in the opening brackets where as the values are been
mentioned in the quotation marks. A tag can have one or more than one
attributes. There are two parts in every attribute i.e is name and value.
(a) Name :- Name refers to the property that we want to set. For ex :- the
paragraph
<p> element carries the an attribute whose name is align, which is sued for
defining the paragraph’s alignment on the page.
(b) Value :- It is used to adjust or define the value of the property and is
declared inside the quotation marks. For ex :- In the below example, you
may notice the three values of the attribute align which are left, right and
center.
Value Description
Attribute
Left
This tags are container tags. These tags are used for changing the face of
the text in bold face, underline face and italic face within the document.
o Changing Fonts
In the document we can change the fonts of the selected text. There are
different tags used for changing the font.
o Font tag
This tag is used for changing the font style, size and color of the text within
the document.
This tag comes under the category of container tag i.e means without
attributes this tags cant be used.
Value Description
Attribute
Color Color Name It specifies the color name of
the enclosed text
It specifies the face type of the
Font style enclosed text
Face
Any number ranging from 1 to
Size 7 It specifies the size of the
enclosed text.
In this tag, you may also notice that the text is been enclosed in different
styles and sizes.
The attributes of the Font Tags are
o Center
This tag is much helpful in aligning the enclose text at the center of the
webpage. It is also comes under the container tag.
(5) What do you mean by Font Tag? Write down its Attributes.
Ans :- Font tag :- This tag is used for changing the font style, size and
color of the text within the document.
This tag comes under the category of container tag i.e means without
attributes this tags can’t be used.
In this tag, you may also notice that the text is been enclosed in different
styles and sizes.
The attributes of the Font Tags are
Value Description
Attribute
Color Color Name It specifies the color name of
the enclosed text
It specifies the face type of
Font style the enclosed text
Face
Any number ranging from 1
Size to 7 It specifies the size of the
enclosed text.
(6) Explain the steps for viewing a web page in HTML
Ans :- Once the typing the programs coding is over, and the saving the file
is also done, then the now it’s the time for viewing the created webpage by
any of the web browser. The steps for performing the task of viewing the
webpage is as followed :-
(i) First of all open any supportable web browser by clicking on its icon. For
ex Internet Explorer.
Start ——– All Programs ——— Internet Explorer
(ii) Now make the click on the File menu and make the select for Open
option.
(iii) Now select the place in the computer system, where you wish to save
the HTML document file.
(iv) Now click on the Open Button, which allows the Open dialog box to get
displayed. After which click on Ok button in the open dialog box.
(v) In the browser window we will see that the output of the HTML
program/Webpage will be displayed.
Lesson No 3
Lists and Tables in HTML
(Q1) Fill in the blanks:-
(1) In word processors, we make use of Bullets and Numbering to make
our lists either in Numbered or Bulleted.
(2) In the HTML, to display the list of items on the webpage, we make use
of List Tag.
(3) An unordered list is the collection of related items that have no special
order.
(4) The <table> tag allows us to arrange the data into rows and columns.
(5) Caption tag is used to display the title for the table on the top.
(6) The space between the cells is called as Cell Spacing
(Q2) State whether the following statements are True or False:-
(1) <UL> tag is used to define the unordered list. True
(2) Disc, Circle and Square are the attribute types of the ordered list. False
(3) An ordered list is the collection of related items that are
numbered. True
(4) Nested list means that one list can be placed inside the other list. True
(5) Cell spacing represents the distance between cell borders and the
content within a cell. False
(Q3) Answer the following questions in one or two sentences
each :-
(1) What is the use of List tag in HTML
Ans :- If we have noticed that in different types of word processors, there is
availability of Bullets and Numbering which is used for creating the lists in
the number or bullets form. So in HTML, we make use of list tag, for
showing the lists on our webpage.
(2) What do you know about Nesting list
Ans :- In the program of HTML, the lists can be nested i.e is lists inside list
or one list can be place inside the other list is to be termed as Nesting list.
When we make use of the nesting list, it is necessary to close the inner tags
and the outer tags at the end.
(3) What is meant by Caption Tag
Ans :- Caption tag is used for giving the caption/heading to the table in a
HTML program. This tag performs the task of showing the title for the table
on the top.
(4) Name the tags which are used for defining Table Row, Table
Heading, Table Data in HTML.
Ans:- The tags which are used for defining the following terms in HTML are
as follow:-
(b) Table Row :- In the HTML table, the rows are been defined by using
the <TR> tag. Such type of tag is also a container tag which means <TR>
tag ends with </TR>
(c) Table Heading :- Table heading is used for displaying the heading/title
in the table in dark bold letters/characters. Table heading is also a container
tag and is defined by using the <th> tag.
(d) Table Data :- In the HTML table, the contents/data inside the columns
of a table can be shown using the <td> tag. Table data is a containers tag.
<tr> tag must contain <td> tag within it.
(3) State the difference between Cell Padding and Cell Spacing.
Ans :- The difference between the Cell Padding and Cell Spacing are as
followed :-
(a) Cell padding :- It is used to format the cells of the table look good by
providing the space within the cells. It defines the space/distance between
the contents of the table and the cell border in the table. 1 pixel is the by
default cell padding. For ex:- <table cellpadding=”5”>
(b) Cell Spacing :- This another type of attribute in the <table> tag. It is
used to define the space between the cells. It provides space outside the
border of the cells in the table. By default 2 pixel is cell spacing. For ex:-
<table cell spacing “7”>. Below you may find the figure showing the Cell
padding and Cell spacing
Lesson No 4
HTML-III
(Q1) Multiple Choice Questions:-
(1) In HTML document, we can insert image by using ______ tag.
(a) <picture>
(b) <photo>
(c) <img>
(d) <snap>
Ans: (c) <img>
(2) We use ______ attribute for the location/path of the image files
which needs to be inserted in the webpage.
(a) Location
(b) place
(c) venue
(d) src
Ans: (d) src
(3) The ______ attribute that is used for alternative text in the
webpage.
(a) substitute
(b) alt
(c) replace
(d) None of these
Ans: (b) alt
(4) It is an underlined word or phrase, or sometimes even a graphic
image or icon, which has been linked to another location.
(a) Attached
(b) Hyperlinked
(c) Joined
(d) Fixed
Ans: (b) Hyperlinked
Column A Column B
Sr. No Answers
It is an underlined word or
phrases, or sometimes even a
graphic image or icon, which
has been linked to another
<IMG> tag location. Used for inserting images in HTML
1) document
When one page is linked with Defines the location/path of the
SRC the other page on the same or image files that is to be inserted on
attribute another website. webpage
2)
Defines the location/path of
the image files that is to be
3) Anchor Tag inserted on webpage It used for creating the hyperlink in
a webpage
It is an underlined word or phrases,
Used for inserting images in or sometimes even a graphic
Hyperlink HTML document image or icon, which has been
4) linked to another location.
It used for creating the When one page is linked with the
External link hyperlink in a webpage other page on the same or another
5) website.
(5) Anchor tag is divided into _______ parts.
(a) Three
(b) Two
(c) Four
(d) Six
Ans: (b) Two
(Q2) Match the following column A with Column B
(Q3) State whether the following statements are True or False :-
(1) Anchor tag is divided into six parts. False
(2) The visited link is underlined and purple. True
(3) The name attribute of the <A> tag used for creating bookmark on a
webpage. True
(4) The <img> tag is container tag. False
(5) The three image file formats can be easily used in HTML which
are .jpg, .gif. and .png True
(6) The align attribute specifies the alignment of the image. True
(Q4) Answer the following questions in one or two sentences
each :-
(1) What is a Hyperlink
Ans :- It is the word, phrase which is been underlined or the graphic
image / icon which is been connected/linked to the another location. If we
make a go to the hyperlink, our arrow pointer turns into the hand shape
icon and make a click on the hyperlink, suddenly we are been taken from
the previous location to the other location in the same or other document or
on the world wide web.
(2) Name the two parts of the Anchor tag.
Ans :- There are two parts of the Anchor Tag which are The link text – on
which the user can click on and the other part is web address (URL).
(3) State the two types of linking.
Ans :- In HTML, there are two types of linking which are Internal linking and
External Linking.
(4) What is the abbreviation of HREF
Ans :- The abbreviation of HREF is Hypertext Reference.
(5) State the importance of IMG tag?
Ans:- In HTML IMG tag is used for adding or inserting images in the
document.
(Q5) Answer the following questions :-
(1) What is IMG Tag. Write down its attributes?
Ans :- In the HTML if incase there is a need of inserting or adding the
images in the document, then we can add or insert it in the document by
making using of the IMG tag. The IMG tag is defined as <img> tag. This tag
is always treated as the empty tag which means there is no content in this
tag nor it does not have any closing tag.
Whenever any webpage is created, then it is saved as file in HTML whereas
the image which is inserted in the HTML document/webpage is also saved
as the separate file. When many webpages are been uploaded on the web
server then, website is been formed/created. The webpage images are save
din a separate file file and is loaded into the space which been created by
the img element. HTML there type of image file formats/extensions are
been supported which are .jpg,, .gif, and .png. There are various attributes
of the img element and are classified as required attributes and optional
attributes.
Required attributes of IMG tag are
Description Possible Values
Attribute
It specifies the location/path of the image that
Src is to be inserted in the webpage
URL
Text It specifies the alternate
Alt text
(a) The src attribute states the browser that which image should be inserted
on the webpage and from where to find it (the image). All the images are
been stored in the separate folder which arises the need for the
specification of the location or path of the image in the src attribute. After
which the browser send the instructions to the respective folder, intakes the
images and then displays it in the space that is been reserved/kept in the
image tag.
(b) Alt attribute is used for alternate text. If incase, there is a problem with
the image in getting displayed, then the text with the double quotation
marks appears.
Optional Attributes of the IMG tag
Value Description
Attribute
Align Top Bottom Middle Right This specifies the image
alignment
Pixels It specifies the width for the
Border image border
It is used for specifying the
Pixels or % height of the image.
Height
width Pixels or % It is sued for specifying the
width of the image
Align attribute is used for stating the alignment of the image in the
document.
(2) What do understand by Anchor Tag
Ans :- Anchor tag is used for creating the hyperlinks in the webpage. For
creating the hyperlink, we make use of <A> tag. HREF which is known as
Hypertext reference attribute is used to state the URL (web address) of the
webpage of the page, which gets displayed when the user clicks on the
linked text. The text which is described between the <A> and </A> tag is
termed as the link text. Anchor tag is divided into two parts which are one is
link text and the other one is web address. In the browsers, there are some
links which appears by default which are :-
You can even change the colors of the above links by making use of the
link, alink and clink attribute in the <body> tag. Link is the attribute which
can be used for changing the color of the links which are unvisited link,
vlink for visited link and alink for active link.
In the anchor tag <A> the name attribute is specially used for creating a
bookmark on the webpage. This states the attributes name of the anchor
which is sued as href attribute along with the # symbol.
(3) What do you mean by E-mail Linking
Ans :- If incase the visitor or our friends wishes to send the e-mail from the
designed/created website, then we can do it by simply providing the special
link by making use of the <a href> tag known as mailto. For ex :- <a
href=”mailto:youremailaddress”>Contact Me </a>. The output would be
seen in your friends e-mail where the program is opening a new email along
with your address already writer in the To: field.
(4) Explain the term Internal Linking and External Linking.
Ans :- The Internal Linking and External Linking are explained as followed :-
(a) Internal Linking:- In the Internal Linking one part of webpage is been
linked to the another part within the same webpage. In this type of links, for
jumping on to a particular location in the webpage that we wish to
Bookmark is much essential. Bookmark a website or a place in a file means
recording of the address which helps in quickly accessing of the same in
future. Thus bookmarks can be created by making use of the name
attribute of the <A> tag. .
(b) External Linking:- In the External Linking when one page is linked to
the other webpage on the same website or on the other one. When we click
on such type of links, then these links takes the user to the new webpage
which is on the same website or or to the other new website, stating the
external linking.
Lesson No 5
Identifying Networked Resources and Computers
(Q1) Fill the blanks:-
(1) Website is the collection of inter related webpages.
(2) A document that contains text, graphics, sound or video and can be
viewed in the web browser is termed as Web page.
(3) The huge computer that stores data, web sites etc and responds to the
commands that is given by us on the internet is known as Web server.
(4) Every website name is defined according to a naming system
called “Domain Name System” (DNS)
(5) The address of every single webpage is known as URL (Uniform
Resource Locator).
(6) Protocols are the set of rules and regulation that is followed while
communicating or transferring of data over the computer network or on the
internet.
(Q2) Write down the full forms of the following terms :-
(1) HTML – Hyper Text Mark-up Language
(2) FTP – File Transfer Protocol
(3) HTTP – Hyper Text Transfer Protocol
(4) TCP/IP – Transmission Control Protocol / Internet Protocol
(5) .com – Commercial Websites
(6) .org – Organizational Websites
(7) .edu – Educational Websites
(8) .gov – Government Websites
(9) DNS – Domain Naming System
Lesson No 6
Problem Solving
(Q1) Fill in the blanks:-
(1) The step-by-step method of solving any problem is called as Algorithm
(2) Flowchart is a picture (graphical representation) of the problem
solving process
(3) The boxes are connected by the directional arrows to show the flow of
the solution.
(4) Parallelogram is used to read data (input) or to print data (output).
Go beyond traditional BBA College with NEXIS 3-year UG
(5) Small circles which are used for connecting the different parts of the
flowchart is to be termed as Connectors.
(6) Computer understands the only one language it is called as Machine
Language.
(Q2) Match the following Geometric Shapes with the Flowchart
Symbols:-
Uses of a Flowchart
a, b, c, d, e, f ………….
Alphabets
Numbers 1, 2, 3, 4, 5, 6, 7, 8, 9, 0
Special
! , @, #, $, % …………….
Characters
(6) What are Keywords
Ans:- In QBASIC there are some words that have special meanings which
are known as Keywords. Reserved words is the another term used for
Keywords. Some of the reserved words are CLS, REM, INPUT, LET, PRINT,
FOR, NEXT, IF, THEN, ELSE, ELSEIF, END. MIDS,ASC, SQR, LEN, LEFTS, TIMES
INT etc. The user/ programmer cant make use of these reserved words as
the constants or variables.
(7) What is an Operator
Ans:- Operators are the types of symbols which gives an idea about what
type of operation will be performed by QBASIC on the entered/given
variable data or on the values.
(8) Write down the advantages of QBASIC language programs
Ans:- The advantages of QBASIC language are given below :-
(a) This language is very simple/easy to use and learn
(b) It is available free and works on almost on all the computers.
(c) The rules for using the language is very simple.
(d) GW BASIC, BASICA, QBASIC, and QB64 are some of the recent editions
of the QBASIC language.
(Q5) Answer the following questions in brief:-
(1) What is a Constant? Explain the types of categories
Ans:- The data or values in the program which cannot be changed at the
time of program’s execution is termed as Constants. A character, word.
Number or special characters etc. can be defined as the Constants. If
incase, there is a need of using the variable in more than one expression or
statement, then the constant is being stored in the variable. In QBASIC,
there are two types of Constants which are been explained below
(a) String Constant:- String constants are the letters, words, numbers,
numbers , or the letters combined with the numbers or special characters
which should be always written in the double quotation marks. You cannot
do any mathematical operations on the String Constants. The examples of
String Constants are “B” , “APPLE”, “SYMBOL NO:10205”, ”!!!”, “Welcome
to QBASIC World !!!”, etc.
(b) Numeric Constant:- This constant is related with the numbers. The
number
Which has a decimal point or don’t have, is termed as Numeric Constant.
There is no need of using separators in the numeric constants and should
not be written in double quotation marks. Logical and Mathematical tasks
can be done on numeric constants. The examples of numeric constants are
101, 105.50, 720, 45603, etc.
(2) Write the note on Variable
Ans:- In the computer memory it has its place with name and stores the
data on the temporarily basis. It only stores the data which is required in
the program. There are different number of variables in every programs and
variables values can be easily at the time of program execution. There are
two types of variables which are:-
(a) String Variable :- The string variable only stores the string data (viz is
string constant). It is always declared by the name followed by the dollar
sign. For ex:- Name $, address $, etc.
(b) Numeric Variable :- This variable only stores the data that is in the
form of numbers (numeric constant). For ex:- Age %, Marks, Number 1,
Number2 etc.
There are some rules that is to be followed while naming a variable which
are:-
(a) Always start the variable name with the letter.
(b) There can be inclusion of alphabets and numbers in the variables name.
(c) No other special character is allowed in the variable name except
underscore (_)
(d) If incase there is a string variable, then after the variable name there
will be a dollar sign for ex:- ADDRESS $, name $ etc.
(e) While naming the variable spacing/giving space is prohibited/not
allowed.
(f) Keywords or the reserved words can’t be used as the variable names.
(3) What do you understand by Operators? Explain the different
types of operators
Ans :- Operators are the symbols which helps the user in
indemnifying/recognizing what form of operation/action QBASIC is going to
perform on the data or the values of the variables. Operators are always
used in between two or more operands. For ex:- 3
– 2 Here 3 and 2 are called as operands whereas – sign is known as
operator. There are four types of operators which in Q BASIC those are:-
(a) Arithmetic Operators :- This operators are used for doing
mathematical calculations/ operations like addition, subtraction, division,
multiplication exponential etc. The different types of operators which are
used while performing Arithmetic operations in QBASIC which are :-
Operation Example Result
Operator
+ Addition 3+7
10
Subtraction 4–2 2
–
* Multiplication 8*4
32
Division 6/2 3
/
\ Integer Division 9/2
4
Exponential 4^3
^ 64
(b) Relational Operators:- With the help of this operators, the operations
of comparison between two values are done. After doing comparison, the
result may be true (non-zero) and false (zero). Below is the table, that
shows the different types of operation which are used for performing
relational operations in Q BASIC :-
Operation Example
Operator
= Equal to
A=B
Greater Than B>A
>
< Less than
A<B
Greater than or
A >= B
>= equal to
<= Less than or equal to
A <=B
Not equal to
<> A <> B
(c) Logical Operators:- This operators are used to make a combination
between two or more relational expressions. Calculations can be done to
return to the specific/single value. The single values can be true or false.
And, or, Not are the examples of logical operators. For ex:- the value of
A>50 and B>150 is True which means A is more than 50 at the same time
B is more than 150.
o AND Operator:- When the both expressions are True , then the result of AND
operator will be True otherwise False.
o OR Operator:- When the both expressions are False, the result of OR
Operator will be False otherwise True
o NOT Operator:- If the expression False, then the result of NOT operator will
be True and vice-versa.
(d) String Operator:- This operator is much helpful in joining two or more
data strings together. To represent the String operator plus sign (+) is used.
Concatenation is the act/process of joining two strings. Following is the
table which shows the example of String Operator :-
Concatenation
DAV Class 8
Computer
Lesson No 8
o Looping in QBasic & Project Handling
o (Q1) Fill in the blanks:-
o (1) Looping is the repeated execution of certain steps (statements
forming BODY of Loop) for a fixed number of times.
o (2) It is the systematic activity which has to be completed in a given
time is termed as Project.
o (3) Formatting is the process to prepare hard disk of a computer to
store data.
o (4) Defragmentation is the process of reorganizing the computer
memory to arrange all the files in continuity and contribute all the
blank chunks together to form a large blank space in memory.
o (5) Computer virus is a malicious that disturbs the normal
functioning of computer.
o (Q2) State whether the following statements are True or False
:-
o (1) Virus is a computer program that replicates itself and cause
problem with the smooth functioning of computer. False
o (2) Malware is the malicious software programmed to steal some
sensitive and confidential data from computer. True
o (3) Anti-virus is the program which protects our computer form
harmful programs known as virus. True
o (4) Anti-malware is the program which are used to scan and remove
the malwares from the computer. True
o (5) Loop is when the action is to be performed a fixed number of
times. True
o (Q3) Answer the following questions in one or two sentences
each:-
o (1) What is meant by Looping
o Ans :- Looping means it is an act where the some statements (which
are forming BODY of loop) for a fixed number of times.
o (2) What is FOR-NEXT statement? Explain the three steps
involved in making a loop?
o Ans :- This statement is helpful in simplifying the process of looping
(when some statements are to be repeated for fixed number of times).
o
o There are basically three steps which are involved in making a loop
which are :-
o (i) The control variable is initialised
o (ii) Condition is been checked with the final value
o (iii) Incrementing/decrementing of control variables.
o (3) What is a Project
o Ans:- Project is the part of an activity that needs to be completed
systematically within the specified time limit.
o (4) What is a Virus?
o Ans:- Virus is a software/computer program which is created with the
intention of hampering the working performance of the computer.
o (5) What is a Worm?
o Ans:- It is the computer program which replicates in itself and
disturbs the properly functioning of computer.
o (6) What is Malware?
o Ans:- Malware is the type of dangerous software specially designed
with the intention of stealing someone’s important information from
the computer.
o
CLASS - 8
Lesson No 9
The Cyber World, Cyber Crime and the Law
(Q1) Fill in the blanks:-
(1) Cyber bullying is an act where the child is been tortured, threatened,
harassed etc or otherwise targeted by other child using the internet,
interactive or digital technologies or mobile phones.
(2) The crime which involves any computer/network/internet or any
electronic media is termed as Cyber Crime.
(3) Hacker is the person who focuses on security mechanism of computer
and network systems and seeks access to the computer system despite
these security measures.
(4) Cybercrime involves the criminal activities such as theft, fraud,
forgery, defamation, and mischief which are addressed by Information
Technology Act 2000.
(5) Cyber Bullying is because of anger, revenge, or frustration.
(Q2) Answer the following questions in two or three sentences
each:-
(1) What is Cyber Bullying?
Ans :- Cyber Bullying is an activity which is carried out by making use of
communication or digital technologies like internet, mobile phones with the
motive of harming, troubling, harassing, torturing, threatening etc other
person. This activity is carried out against the anger, frustration or revenge.
(2) What is a Cyber Crime?
Ans :- Cyber Crime is a crime in which the computer or a network/internet
is been made involved. The criminal activities like the theft, forgery, fraud,
defamation, and mischief etc comes under the category of Cyber Crime.
(3) What is Cyber Law?
Ans:- The criminal activities which involves the activities such as theft,
forgery, mischief etc. All such type of illegal or criminal activities are been
observed or controlled by certain rules and law as per the Information
Technology Act 2000.
(4) Name the types of Cyber Crime?
Ans:- Hacking, copyright infringement, child pornography and child
bullying, cross- border crimes (cyber terrorism) etc are the types of Cyber
Crimes.
(5) Who is a hacker?
Ans :- A hacker is the person who intentionally commits the crime of
harming the security of the computer system or network, and seeks the
access to the computer system without the permission authorized user.
o The Cyber bullied victims tries to remain alone away from family members,
friends or any activities. He/she does not get involve in such activities.
o As result of the bullying, the victim always shows aggressiveness on the
family members at home. Always becomes angry on silly reasons.
o The victim always tries to stay alone from his family members, relatives,
friends etc and is never happy.
o Does not likes to remain in connect to the other person or with the rest of
the world.
o Does not get involve in the social activities, groups or gatherings.
o There is a sudden change in the behaviour, mood, sleep etc of the victim.
o Due to the cyber bullying, the victim remains emotionally upset or unhappy
after making use of the internet or phone.
o When ever the victim receives the text messages, emails online, suddenly
he/she becomes nervous .
o Tries to avoid in taking active part in the discussions related to the topic of
internet and mobile phones.
o Is not willing to make use of internet, mobile phones or computer
henceforth.
o Starts to show bad effect/impacts on the studies by achieving low grades.
o Upgrading the people about the consequences which will take place after
losing the ISP or Instant Messaging accounts.
o Guiding or training the persons in respecting other’s privacy and to take
sudden and strict action against the bullying.
o You can avoid bullying by blocking them (IM’s, emails, text messages etc)
electronically. As if new devices all upgraded with blocking facilities.
o You should always make use of internet under the proper guidance or
supervision of your parents but in limit.
o You can also share your online friends with your parents and ask them to
follow you friends online.
o You can also try to be safe online by protecting the passwords , and not by
sharing your exact location, address etc.
o You should also make sure that the proper email is been sent to the exact
email id (to the person whom we wanted to sent).
o We should make a habit of not forwarding others emails or their personal
information to any other person online without taking the other persons
permission
o We should respect peoples time by not wasting it by junk , chain e-mails or
spreading rumours.
o We should always try to respect others when we are online,. We should not
hurt them in the sense of not getting much involved in the controversy or
by insulting them.
o We should not get involve in online fights by posting any aggressive
comment, post or by sending email, instant messages etc.
(5) What are the suggestions that helps in securing the computer
or internet from getting misused by the strangers.
Ans :- There are some suggestions which will help in preventing the
internet or computer from getting misused by the strangers :-