0% found this document useful (0 votes)
342 views41 pages

DAV Class 8 Computer Chapter 1 To 9

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
342 views41 pages

DAV Class 8 Computer Chapter 1 To 9

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 41

DAV Class 8 Computer Chapter 1

Let us Explore Computer Network Question Answer Notes Solution


Lesson No 1
Let us Explore Computer Networks
(Q1) Fill in the blanks :-
(1) Communication means the ability of conveying thoughts, ideas and
everything else that needs to experienced or conveyed.
(2) Each computer has its own keyboard, mouse, scanner and printer which
are called as
Peripheral devices.
(3) The collection of two or more computers connected together in order to
communicate and share the data and information are called computer
networks.
(4) The computers that share and receive data from servers are called
as Clients.

(5) Modem is the device which are used for data transfer from one
computer network to another computer network through telephone lines.
(6) Internet is a global (wide area) network connecting millions of
computers.
(Q2) State whether the following statements are True or False :-
(1)The abbreviation of MoDem is Modulation and Demodulation. True
(2) Router is the device which is used in networking that helps in jointing
the more than one networks together. True
(3) A wireless network is a network which uses networking cables to
connect devices (computers, printers, scanners etc). False
(4) Bluetooth is the wireless technology which uses radio frequencies to
transmit information over a short distances. True
(5) Radio waves are the electromagnetic signals that are transmitted by an
antenna. True
(Q3) Match the following Column A with Column B :-
Column A Column B Answers
Sr. No
In this network, networking
cables are been used for
Uses radio waves (RF) to connecting the devices like
allows two or more devices (computers, printers,
to communicate with one scanners) etc
1) Wired Network another

The cable that is used to


connect the two devices Electromagnetic signals
like computers and switch which are transmitted by an
Radio waves etc directly. antenna
2)
3) Coaxial cables In this network, networking A cable that consists of
cables are been used for central copper wire
connecting the devices like surrounded by an outer
jacket.
(computers, printers,
scanners) etc.

The cable that is used to


Electromagnetic signals connect the two devices like
which are transmitted by computers and switch etc
Twisted Pair an antenna directly
4)
A cable that consists of
central copper wire Uses radio waves (RF) to
surrounded by an outer allows two or more devices
5) Wi-Fi jacket. to communicate with one
another
(Q4) Answer the following questions in one or two sentences
each :-
(1) What is a Computer Network?
Ans:- Computer network is the process or method of connecting one or
more devices/computers together in a network for the purpose of sharing
the hardware devices or for the communication means.

(2) What do you know about Bluetooth and Infrared waves?


Ans :- (a) Bluetooth :- Bluetooth is a form of technology in which there is
no existence of wires or cables. This technology makes use of radio
frequencies for sending and receiving of data or information over a short
distance. Bluetooth enables in getting connected with many devices at a
same time. Bluetooth frequencies can range upto 10 metres or less than it.
(b) Infrared waves :- Infrared wave is a method of communicating with
the devices that is not very far way from each other. For ex :- Remote
control of a TV or Remote control of a Toy car etc. Infrared waves makes
use of infrared light for getting connected among the two devices. Infrared
waves works over a short distance and is distracted by the noise or heat. In
such methods, two devices can be communicated/connected with each
other in a time.
(3) What is an Internet?

Ans :- Internet is a connection of millions computers across the globe


(world wide) in a network with the intention of communication purpose or
for sharing of information amongst each other.
(4) What do you understand by WIMAX
Ans:
WIMAX stands for Worldwide Interoperability for Microwave Access. WIMAX
operates similar to the Wi-Fi and is much faster in its operation speed.
Generally WIMAX is used in large areas or for large cites. WIMAX
operates/covers at the distance of 30 miles having the speed as 30 mbps
(mega bytes per second).
(5) State the difference between the Wired Network Technology
and Wireless Network Technology?
Ans :- The difference between the Wired Network Technology and Wireless
Network Technology are as followed :-
(a) Wired Network Technology :- In this network technology, the cables
or wires are been made used for connecting the devices like printer,
scanner, computers etc. In the Wired Network technology, the information
or data is sent between the connected devices with the help for wires or
cables. Coaxial cables, Optical Fiber cables, Twisted pair cables are different
types of cables which are used in a Wired network as per the need.

(b) Wireless Network Technology :- This network performs of the


standard rules which means no cables or wires are been made used for
connecting the computers or any devices together. In this wireless network
technology, the computers or devices are connected to each other with the
help of radio signals, microwave signals, satellites etc. The information or
data is sent from one device to the other with the help of radio signals,
microwave signals, satellites. Radio link, Microwave, Satellite link, Infrared,
Bluetooth etc are the different means which are used for sharing and
transferring of data or resources in a wireless network.

(6) What is a Satellite Communication


Ans :- Such type of communication is mostly used in the world, where the
user can send the signal to anywhere within the earth. The signal can reach
anywhere to the earth, if incase the signal is sent to the satellite, it returns
back to the earth or if it does not returns back to the earth, then the signal
from one satellite goes to the other. The satellite communication is mostly
used by television broadcastings etc.

(Q5) Answer the following questions in brief :-


(1) Explain the different types of Computer Networks
Ans :- The different types of Computer Networks are LAN (Local Area
Network), WAN (Wide Area Network), MAN (Metropolitan Area Network).
(a) LAN :- The abbreviation of LAN is Local Area Network which means this
network is used to connect the computers and devices to each other at a
very limited (small) geographical area i.e is school computer lab, home,
office building, or within a buildings. The devices that are connected into
the LAN network are called as Nodes. By making use of cables Nodes are
been connected to the LAN.

(b) MAN :- MAN stands for Metropolitan Area Network that is established in
a metropolitan area such as city or tow. A MAN typically includes one or
more LAN but covers a smaller area than a WAN. Telephone companies,
cable television operators, and other organizations makes use of MAN
network.

(c) WAN :- The abbreviation of WAN is Wide Area Network which means
this network is used to connect the computers to each other who located at
a very far distance say globally. The data/information can be
exchanged/transferred to each other (computers connected into a network)
all over the world. In WAN connection the computers are connected to each
other with the help of cables, telephone lines, fibre optics, microwaves or
satellites. Connecting the computers in WAN network is a very difficult task,
as there can be a probability of faults or short circuits arises if in case the
wires/cables breaks down. As compared to other networks the speed is very
low. Internet can be the perfect example of WAN.
(2) What do you understand by Wi-Fi
Ans :- It is the wireless technology, which is used for connecting to the
internet within one room, building, hotel, hospital, schools or offices etc.
The abbreviation of Wi-Fi is Wireless Fidelity which makes uses of radio
waves and allows one or more than two devices to connect with each other.
Such type of technology helps in connecting the devices like Smartphones,
Computers, tablets etc to the internet. We should always make our Wi-Fi
connection secured from the accessing of unauthorized users which should
be protected by the password.
(3) Write the types of Internet services in brief
Ans :- Some types of internet services are as followed :-
(a) Dial up :- This service clearly states the slowest type of Internet
connection and can be used only in the areas where the internet service is
needed. Internet cannot be used at the same time when the dial is used
along with the phone line termed as telephone line.
(b) DSL :- Nowadays, Broadband connections by the DSL services for the
faster speed as compared to Dial up service. DSL also gets connected to the
internet with the help of phone line and the phone line and the internet can
be used at the same time. Not like the Dial up.

(c) Cable :-
This service is much easier in connecting the Internet with the Cable TV. As
comparison is made between the both i.e is Dial up and DSL, cable service
makes use of the broad band connection, which is much faster than these
both services.
(d) Satellite :- In this type service, broad band connection is used which
does not need
any cables or phone lines. In such type of services broad band gets
connected to the internet through the man-made satellite which is orbiting
the earth. Such connection are widely used around the world but can be
affected/disturbed according to the weather or climatic changes. These
connections are slower than the DSL or cable.
(3) 3G and 4G :- This service is mostly used in the devices such as mobile
phone, tablets etc and gets connected to it with the help of ISP’s network.
As the comparison is made between the Cable or DSL and 3G and 4G
services, such service’s connection is very slow than Cable or DSL. 3G and
4G services are nowadays popularly used.
(4) What do you mean by Twisted Pair cables, Coaxial cables, Fiber
optic cables? Write down their advantages and disadvantages.
Ans:- The different types of cables are Twisted Pair, Coaxial cable and Fiber
Optic cables etc are explained below along with their advantages and
disadvantages
Twisted Pair Cables :- Shielded and Unshielded are the two types of
twisted pair cables which are used for networking. Such type of cable is
used for connecting the two network devices (computer, switches etc)
directly. Ethernet cable is the perfect example of Twisted Pair cables.

Advantages of Twisted Pair cables

o This cables transfers the data at a very high speed and is much cheaper.
o This cables makes less use of electricity.
o This cable is very simple to use or install.

Disadvantages of Twisted Pair cables

o If incase there is any problem in the cable, so its very complicated to detect
the fault/problem of the cable.
o For using this cables (Ethernet), there must be the presence of the Ethernet
cable inside the computer.

Coaxial Cables :- The coaxial cable is the central copper wire which is
been covered by the outer jacket. It is widely used by the Cable television
companies in connecting the Television set with the antenna.
Advantages of Coaxial cables

o This cables are no much costly and carries the data over the long distance
more easily.
o This cable has noisy immune due to its thick outer covering.
o Such cables are light in weight, and easy and flexible to work with.
o As compared to the Twisted pair cables, this cables are more cable of
interference and attenuation in the terms of loss in the strength of the
signal.

Disadvantages of Coaxial cables

o This cables are consisting of copper metal wire which is easily breakable.
o Some of the coaxial cables are so thick, which cannot bend properly /easily
and results difficulty in installation and maintainance.

Fiber Optic Cables :- This cable makes use of glass thread (fibers) for
data transfer. Each of the glass threads of the cable is much capable of
transferring of data (messages) in the form of light waves. As this cable is
made up of glass, such cable is bendable.

(5) Name the devices which are required for connecting different
devices in a network?
Ans :- The devices which are required for connecting the different devices
in a network are as follows :-
(a) Cables :- For connecting the computers and other devices in a
networks, the cables such as flexible metal or fibre optic wires are been
made use of.

(b) Network Interface Card (NIC) :- You can easily connect the connect
the computer to the network as Network Interface Card (NIC) is
placed/installed on the mother board inside the system unit. It can be
added for each client and server computers. NIC is also known as Printed
Circuit Board (PCB). There are two kinds of Network Interface Card (NIC)
which are:-
Ethernet Card :- In this type of card, for
data transmission ethernet cables and connectors are been made used.
Wireless Card :- In this type of card, use of cables or connectors are not
made. Here for the data transmission, the use of antennas is made which
creates radio waves technology.

(c) Switches :- HUB is also called as Switch. It is used


for connecting many computers in a single network. In the hub, the
duplication of packets (data) that is received at one port and is
distributed to the other ones. Hence the data is shared within all
the connected devices those are connected to the hubs/switches.

(d) Modem :- The full of MoDem is Modulator and Demodulator which is a


hardware device. This devices transfers the data from one computer to the
another within the computer network. The computer networks work in the
digital form whereas modem makes use of the modulation technology for
transferring of messages over the phonelines. During the data transferring
the modem converts the information from digital to analog mode at the
transferring end whereas the Demodulator converts the information from
analog mode to the digital mode at the receiving end.

(e) Routers :- It is a device that is used to analyse, receive and forward


the data in the network or to the another one (network). In the network
whatever the data packets its receiving, Routers are makes a way for the
forwarding.

Lesson No 2
HTML – I
(Q1) Fill in the blanks :-
(1) Website is a collection of related webpages consisting of text, images,
sounds and videos.
(2) Static pages shows the same content each time they are viewed
whereas Dynamic pages have can change each time they are accessed.
(3) The unique name of the website is called as URL (Uniform Resource
Locator)
(4) The language which is used for creating or developing of webpages is
known as HTML
(5) A text editor is a word processing program that is used for typing or
editing an HTML program.
(Q2) State whether the following statements are True or False :-
(1) Home Page is the first page on every website which gives us basic
details about the information the website contains. True
(2) Text editor is the software which is used for viewing websites. False
(3) HTML tag is composed of the name of the element, surrounded by curly
brackets False
(4) A Tag can have more than one attributes also. True
(5) Empty Tags do not have an end tag. True
(6) <HTML> tag represents the root of an HTML document. True
7.) The first web browser World Wide Web, was developed in 1990 by Tim
Berners
for the NeXT Computers. Lee True
Q3.) Write down the full forms for the following :-
1.) URL – Uniform Resource Locator
2.) HTML – Hyper Text Mark-up Language

3.) WSIWYG – What You See Is What You Get


4.) WWW – World Wide Web
5.) <HR> – Horizontal Rule
6.) Bg color – Background color
Q4.) Answer the following questions in one or two sentences each:-
(1) What do you mean by a Website?
Ans :- In simple words, Website is termed as the collection of related
webpages which are consisting of text, images, sounds and videos. Website
is a set of webpages which are related to each other. As per the need and
design of the website, the website may have many pages. The persons who
develop or creates the websites by making use of the programming
languages is known as website developers. In every website there may be
Home page and other pages. An individual or organization or institution etc
can also own the website.

(2) What is a Home Page in HTML


Ans :- Home Page is the first page on every website which gives us basic
details about the information the website contains.
(3) State the different types of webpages
Ans :- There are two different types of webpages which are
(a) Static Webpages :- Whenever such webpages are viewed, they
display the same content.
(b) Dynamic Webpages :- When ever these webpages are viewed, this
webpages displays the different content means the contents gets changed
whenever the page is viewed.
(4) What is a HTML
Ans :- HTML stands for Hyper Text Mark-up Language. HTML is a special
type of programming language which is used for creating or developing the
websites. Text editors are made used for typing the programs in HTML
whereas the web browsers are used for displaying the results.
(5) What is the difference between the Web Browser and Text
editor
Ans :- The difference between the Web Browser and Text editor are as :-
(a) Text editor :- Text editor is word processing program which is only
used for typing and editing the program in HTML. It is used for typing HTML
program.
Ex:- Notepad for Windows and Gedit for Linux.
(b) Web Browser :- It is one type of software which is used for displaying
the websites. It is used for viewing the result. For ex :- Mozilla Firefox ,
Internet Explorer.

(6) State the difference between the Container tags and Empty
Tags
Ans :- The difference between the Container tags and Empty Tags are as :-
(a) Container Tags :- This tag includes text and other tags. In this tag,
there is Start tag and End Tag. As if in this tag, there is inclusion of Start
and End tag, so the Start tag starts within the angle brackets <> whereas
the end tag is closed by using a forward slash inside the angle brackets
</>. Ex :- <Title> </Title>

(b) Empty Tags :- This tag does not include any text or any other tags.
This tag does not have end tags. As if there is no presence of Start tag and
End tag so there is no need of defining it. <BR>, <HR> tag.
(Q5) Answer the following questions in brief :-
(1) Write down some Container Tags?
Ans :- Some of the Container Tags are as followed :-
(A) HTML Tag
This tag <HTML> tag defines the root/base/foundation of the HTML
document. This tag acts as an container for all the elements of a HTML
document.
In the HTML document, the code starts with <HTML> which is known as the
opening tag and </HTML> is known as closing tag.
The HTML document is divided into two parts which are HEAD and BODY.

(B) HEAD Tag


It is the container tag.
This <HEAD> tag is the first element in the HTML Tag.
In the <HEAD> tag, there is inclusion of the Title of the HTML document. In
<HEAD> tag, there is no text within it.

(C) TITLE Tag


For mentioning the title of the document, this tag is stated inside the
<head> tag. The title which is given to the document appears at the top of
the webpage i.e is on the Title Bar and not in viewing area of the actual
webpage. This tag falls under the category of container tag.

(D) BODY Tag


This tag is usually used in define the body of the document.
This tag includes the HTML document contents like text, hyperlinks, images,
tables, lists etc. In a HTML document, there is only one element <body>
This tag also lies under the container element.

(2) Write down the steps in saving a file in HTML


Ans :- For saving a file in HTML the steps are :-
(i) Make a click on the File ______ and select the option as Save As The Save
As dialog box appear.
(ii) Choose the location in the computer where you want to save the file.
(iii) Then in the Save As dialog box type the name for the file of your choice.
(iv) Click on Save button.
Note :- Kindly make a note of that while typing the name for the new file in
HTML, it is a must for one to add .htm or .html as the file extension. The
name that given to the HTML file is been displayed at the top of the
Notepad or Word pad window at Title bar.

The Word pad or Note pad file is usually save in .txt as the file extension
name by default but the HTML file is been saved with the .htm or .html file
extension in Word pad or Notepad.
(3) Explain the Attributes in brief
Ans :- In HTML program, attributes are the properties of the tags. Always
attributes are used in the opening brackets where as the values are been
mentioned in the quotation marks. A tag can have one or more than one
attributes. There are two parts in every attribute i.e is name and value.
(a) Name :- Name refers to the property that we want to set. For ex :- the
paragraph
<p> element carries the an attribute whose name is align, which is sued for
defining the paragraph’s alignment on the page.
(b) Value :- It is used to adjust or define the value of the property and is
declared inside the quotation marks. For ex :- In the below example, you
may notice the three values of the attribute align which are left, right and
center.

Value Description
Attribute
Left

This states the text


Right alignments in the paragraph
Align
Center
Justify

Attributes of the Body Tag


Attribute Description

This is used for stating the background


color of a document.
Bgcolor
Text It is used for stating the colour of the text
in a document.
Ex :- <BODY BGCOLOR=”GREEN”TEXT=”RED”>
(4) What do you mean understand Formatting Tags
Ans :- Formatting tags are the tags which are used for applying some
textual effects to the selected text in the HTML document. Some of the
formatting tags are explained below :-

o Bold, Underline and Italics

This tags are container tags. These tags are used for changing the face of
the text in bold face, underline face and italic face within the document.

o Changing Fonts

In the document we can change the fonts of the selected text. There are
different tags used for changing the font.

o Font tag

This tag is used for changing the font style, size and color of the text within
the document.
This tag comes under the category of container tag i.e means without
attributes this tags cant be used.
Value Description
Attribute
Color Color Name It specifies the color name of
the enclosed text
It specifies the face type of the
Font style enclosed text
Face
Any number ranging from 1 to
Size 7 It specifies the size of the
enclosed text.
In this tag, you may also notice that the text is been enclosed in different
styles and sizes.
The attributes of the Font Tags are

o Center

This tag is much helpful in aligning the enclose text at the center of the
webpage. It is also comes under the container tag.
(5) What do you mean by Font Tag? Write down its Attributes.
Ans :- Font tag :- This tag is used for changing the font style, size and
color of the text within the document.
This tag comes under the category of container tag i.e means without
attributes this tags can’t be used.
In this tag, you may also notice that the text is been enclosed in different
styles and sizes.
The attributes of the Font Tags are
Value Description
Attribute
Color Color Name It specifies the color name of
the enclosed text
It specifies the face type of
Font style the enclosed text
Face
Any number ranging from 1
Size to 7 It specifies the size of the
enclosed text.
(6) Explain the steps for viewing a web page in HTML
Ans :- Once the typing the programs coding is over, and the saving the file
is also done, then the now it’s the time for viewing the created webpage by
any of the web browser. The steps for performing the task of viewing the
webpage is as followed :-
(i) First of all open any supportable web browser by clicking on its icon. For
ex Internet Explorer.
Start ——– All Programs ——— Internet Explorer

(ii) Now make the click on the File menu and make the select for Open
option.
(iii) Now select the place in the computer system, where you wish to save
the HTML document file.
(iv) Now click on the Open Button, which allows the Open dialog box to get
displayed. After which click on Ok button in the open dialog box.
(v) In the browser window we will see that the output of the HTML
program/Webpage will be displayed.
Lesson No 3
Lists and Tables in HTML
(Q1) Fill in the blanks:-
(1) In word processors, we make use of Bullets and Numbering to make
our lists either in Numbered or Bulleted.
(2) In the HTML, to display the list of items on the webpage, we make use
of List Tag.
(3) An unordered list is the collection of related items that have no special
order.
(4) The <table> tag allows us to arrange the data into rows and columns.
(5) Caption tag is used to display the title for the table on the top.
(6) The space between the cells is called as Cell Spacing
(Q2) State whether the following statements are True or False:-
(1) <UL> tag is used to define the unordered list. True
(2) Disc, Circle and Square are the attribute types of the ordered list. False
(3) An ordered list is the collection of related items that are
numbered. True
(4) Nested list means that one list can be placed inside the other list. True
(5) Cell spacing represents the distance between cell borders and the
content within a cell. False
(Q3) Answer the following questions in one or two sentences
each :-
(1) What is the use of List tag in HTML
Ans :- If we have noticed that in different types of word processors, there is
availability of Bullets and Numbering which is used for creating the lists in
the number or bullets form. So in HTML, we make use of list tag, for
showing the lists on our webpage.
(2) What do you know about Nesting list

Ans :- In the program of HTML, the lists can be nested i.e is lists inside list
or one list can be place inside the other list is to be termed as Nesting list.
When we make use of the nesting list, it is necessary to close the inner tags
and the outer tags at the end.
(3) What is meant by Caption Tag
Ans :- Caption tag is used for giving the caption/heading to the table in a
HTML program. This tag performs the task of showing the title for the table
on the top.
(4) Name the tags which are used for defining Table Row, Table
Heading, Table Data in HTML.
Ans:- The tags which are used for defining the following terms in HTML are
as follow:-

o Table Row – <TR> Tag


o Table Heading – <TH> tag
o Table Data – <TD> tag

(5) What is a Table tag? Explain its attributes?


Ans:- If we want to present the data in the tabular form on paper, then we
draw rows and columns on the paper, similar to it if we want to show any
data in the tabular form in rows and columns. We can easily create the
table in HTM by using the <Table> tag.
<Table> tag is a container tag.

The attributes of a table Tag are as followed :-


Value Description
Attribute
It specifies the background color for the table
Bgcolor Color

It specifies whether the border is required around the table or


0 or 1 not
Border
Cell padding Pixels It used for specifying the space between the cell wall and cell
content
Pixels It specifies the space between the cells
Cell Spacing
Height_width Pixels %
It specifies the height and width of a table.
(Q4) Answer the following questions :-
(1) State the difference between ordered list and Unordered list
along with its attribute.
Ans :- The difference between Ordered List and Unordered List are as
follows :-
(a) Ordered List:- In this, the list of items will be displayed by using
different forms of numbers. In the HTML, to define the ordered list we make
use of <OL> tag. In this list, the list of items are been displayed with the
numbers/alphabet. There is a need to mention the <LI> tag at the front of
every single item in the list. <OL> tag is the container tag which means the
list should end with the </OL>.
Attributes of Ordered List
Value Description
Attribute
Start Number
It states the starting value of an ordered list
1
Type It states the form of numbering to be used in the list
(b) Unordered List :- In this list, the list of items will be displayed by
using the plain bullets. To define unordered list we make use of <UL> tag.
In this order the items which are related to each other does no have specific
order. There is a need to mention the <LI> tag at the front of every single
item in the list. Disc is the by default bullet style. <UL> tag is the container
tag which means the list should end with the </UL>.
Attributes of Unordered List
Description
Value
Disc
A filed circle
An untitled Circle
Circle
Square
A filled square
(2) Explain the concept of Table Caption, Table Row, Table
Heading, Table Data
Ans :- Some of the concepts are been explained below :-
(a) Table Caption :- In every table we have always seen caption/heading
at the top of the table which is easier in providing the clarity of the
concept/contents of the table to the reader. Like that we can also give the
caption/heading to our table in HTML by making use of the Caption tag. This
Caption tag is specially made used for showing the table’s title at the top.

(b) Table Row :- In the HTML table, the rows are been defined by using
the <TR> tag. Such type of tag is also a container tag which means <TR>
tag ends with </TR>
(c) Table Heading :- Table heading is used for displaying the heading/title
in the table in dark bold letters/characters. Table heading is also a container
tag and is defined by using the <th> tag.

(d) Table Data :- In the HTML table, the contents/data inside the columns
of a table can be shown using the <td> tag. Table data is a containers tag.
<tr> tag must contain <td> tag within it.

(3) State the difference between Cell Padding and Cell Spacing.
Ans :- The difference between the Cell Padding and Cell Spacing are as
followed :-
(a) Cell padding :- It is used to format the cells of the table look good by
providing the space within the cells. It defines the space/distance between
the contents of the table and the cell border in the table. 1 pixel is the by
default cell padding. For ex:- <table cellpadding=”5”>
(b) Cell Spacing :- This another type of attribute in the <table> tag. It is
used to define the space between the cells. It provides space outside the
border of the cells in the table. By default 2 pixel is cell spacing. For ex:-
<table cell spacing “7”>. Below you may find the figure showing the Cell
padding and Cell spacing
Lesson No 4
HTML-III
(Q1) Multiple Choice Questions:-
(1) In HTML document, we can insert image by using ______ tag.
(a) <picture>
(b) <photo>
(c) <img>
(d) <snap>
Ans: (c) <img>
(2) We use ______ attribute for the location/path of the image files
which needs to be inserted in the webpage.
(a) Location
(b) place
(c) venue
(d) src
Ans: (d) src
(3) The ______ attribute that is used for alternative text in the
webpage.
(a) substitute
(b) alt

(c) replace
(d) None of these
Ans: (b) alt
(4) It is an underlined word or phrase, or sometimes even a graphic
image or icon, which has been linked to another location.
(a) Attached
(b) Hyperlinked
(c) Joined
(d) Fixed
Ans: (b) Hyperlinked
Column A Column B
Sr. No Answers
It is an underlined word or
phrases, or sometimes even a
graphic image or icon, which
has been linked to another
<IMG> tag location. Used for inserting images in HTML
1) document
When one page is linked with Defines the location/path of the
SRC the other page on the same or image files that is to be inserted on
attribute another website. webpage
2)
Defines the location/path of
the image files that is to be
3) Anchor Tag inserted on webpage It used for creating the hyperlink in
a webpage
It is an underlined word or phrases,
Used for inserting images in or sometimes even a graphic
Hyperlink HTML document image or icon, which has been
4) linked to another location.
It used for creating the When one page is linked with the
External link hyperlink in a webpage other page on the same or another
5) website.
(5) Anchor tag is divided into _______ parts.
(a) Three
(b) Two

(c) Four
(d) Six
Ans: (b) Two
(Q2) Match the following column A with Column B
(Q3) State whether the following statements are True or False :-
(1) Anchor tag is divided into six parts. False
(2) The visited link is underlined and purple. True
(3) The name attribute of the <A> tag used for creating bookmark on a
webpage. True
(4) The <img> tag is container tag. False
(5) The three image file formats can be easily used in HTML which
are .jpg, .gif. and .png True
(6) The align attribute specifies the alignment of the image. True
(Q4) Answer the following questions in one or two sentences
each :-
(1) What is a Hyperlink
Ans :- It is the word, phrase which is been underlined or the graphic
image / icon which is been connected/linked to the another location. If we
make a go to the hyperlink, our arrow pointer turns into the hand shape
icon and make a click on the hyperlink, suddenly we are been taken from
the previous location to the other location in the same or other document or
on the world wide web.
(2) Name the two parts of the Anchor tag.
Ans :- There are two parts of the Anchor Tag which are The link text – on
which the user can click on and the other part is web address (URL).
(3) State the two types of linking.
Ans :- In HTML, there are two types of linking which are Internal linking and
External Linking.
(4) What is the abbreviation of HREF
Ans :- The abbreviation of HREF is Hypertext Reference.
(5) State the importance of IMG tag?
Ans:- In HTML IMG tag is used for adding or inserting images in the
document.
(Q5) Answer the following questions :-
(1) What is IMG Tag. Write down its attributes?
Ans :- In the HTML if incase there is a need of inserting or adding the
images in the document, then we can add or insert it in the document by
making using of the IMG tag. The IMG tag is defined as <img> tag. This tag
is always treated as the empty tag which means there is no content in this
tag nor it does not have any closing tag.
Whenever any webpage is created, then it is saved as file in HTML whereas
the image which is inserted in the HTML document/webpage is also saved
as the separate file. When many webpages are been uploaded on the web
server then, website is been formed/created. The webpage images are save
din a separate file file and is loaded into the space which been created by
the img element. HTML there type of image file formats/extensions are
been supported which are .jpg,, .gif, and .png. There are various attributes
of the img element and are classified as required attributes and optional
attributes.
Required attributes of IMG tag are
Description Possible Values
Attribute
It specifies the location/path of the image that
Src is to be inserted in the webpage
URL
Text It specifies the alternate
Alt text
(a) The src attribute states the browser that which image should be inserted
on the webpage and from where to find it (the image). All the images are
been stored in the separate folder which arises the need for the
specification of the location or path of the image in the src attribute. After
which the browser send the instructions to the respective folder, intakes the
images and then displays it in the space that is been reserved/kept in the
image tag.
(b) Alt attribute is used for alternate text. If incase, there is a problem with
the image in getting displayed, then the text with the double quotation
marks appears.
Optional Attributes of the IMG tag
Value Description
Attribute
Align Top Bottom Middle Right This specifies the image
alignment
Pixels It specifies the width for the
Border image border
It is used for specifying the
Pixels or % height of the image.
Height
width Pixels or % It is sued for specifying the
width of the image
Align attribute is used for stating the alignment of the image in the
document.
(2) What do understand by Anchor Tag
Ans :- Anchor tag is used for creating the hyperlinks in the webpage. For
creating the hyperlink, we make use of <A> tag. HREF which is known as
Hypertext reference attribute is used to state the URL (web address) of the
webpage of the page, which gets displayed when the user clicks on the
linked text. The text which is described between the <A> and </A> tag is
termed as the link text. Anchor tag is divided into two parts which are one is
link text and the other one is web address. In the browsers, there are some
links which appears by default which are :-

o Unvisited link – is underlined and Blue


o Visited link – is underlined and Purple
o Active link – is underlined and Red

You can even change the colors of the above links by making use of the
link, alink and clink attribute in the <body> tag. Link is the attribute which
can be used for changing the color of the links which are unvisited link,
vlink for visited link and alink for active link.
In the anchor tag <A> the name attribute is specially used for creating a
bookmark on the webpage. This states the attributes name of the anchor
which is sued as href attribute along with the # symbol.
(3) What do you mean by E-mail Linking
Ans :- If incase the visitor or our friends wishes to send the e-mail from the
designed/created website, then we can do it by simply providing the special
link by making use of the <a href> tag known as mailto. For ex :- <a
href=”mailto:youremailaddress”>Contact Me </a>. The output would be
seen in your friends e-mail where the program is opening a new email along
with your address already writer in the To: field.
(4) Explain the term Internal Linking and External Linking.
Ans :- The Internal Linking and External Linking are explained as followed :-
(a) Internal Linking:- In the Internal Linking one part of webpage is been
linked to the another part within the same webpage. In this type of links, for
jumping on to a particular location in the webpage that we wish to
Bookmark is much essential. Bookmark a website or a place in a file means
recording of the address which helps in quickly accessing of the same in
future. Thus bookmarks can be created by making use of the name
attribute of the <A> tag. .
(b) External Linking:- In the External Linking when one page is linked to
the other webpage on the same website or on the other one. When we click
on such type of links, then these links takes the user to the new webpage
which is on the same website or or to the other new website, stating the
external linking.
Lesson No 5
Identifying Networked Resources and Computers
(Q1) Fill the blanks:-
(1) Website is the collection of inter related webpages.
(2) A document that contains text, graphics, sound or video and can be
viewed in the web browser is termed as Web page.
(3) The huge computer that stores data, web sites etc and responds to the
commands that is given by us on the internet is known as Web server.
(4) Every website name is defined according to a naming system
called “Domain Name System” (DNS)
(5) The address of every single webpage is known as URL (Uniform
Resource Locator).
(6) Protocols are the set of rules and regulation that is followed while
communicating or transferring of data over the computer network or on the
internet.
(Q2) Write down the full forms of the following terms :-
(1) HTML – Hyper Text Mark-up Language
(2) FTP – File Transfer Protocol
(3) HTTP – Hyper Text Transfer Protocol
(4) TCP/IP – Transmission Control Protocol / Internet Protocol
(5) .com – Commercial Websites
(6) .org – Organizational Websites
(7) .edu – Educational Websites
(8) .gov – Government Websites
(9) DNS – Domain Naming System

(10) .mil – Military Websites


(Q3) State whether the following statements are True or False :-
(1) Webpage is a document that can contain text, graphics, sound, and
videos which can be viewed in a web browser. True
(2) The first page of the website is known as Homepage. True
(3) Server machine is the computer from which we are using the
internet. False
(4) Web hosting company is the company that is providing space on rent on
a Web server. True
(5) Every website name is defined according to a naming system called
Domain Naming System. True
(6) The rules and regulations over a network is to be termed as
Protocol. True
(7) HTTP are the rules which should be followed while transferring
information that is containing text, graphics, hypertext, sound video and
world wide web. True
(Q4) Answer the following questions in one or two sentences
each :-
(1) What is a webpage and website.
Ans :- Web page :- A web page is one type of document in which there is
text, graphics, sound , video etc containing. This webpages can only be
viewed with the help of the web browser that is available in your computer.

Websites :- Website is a collection of the webpages which are been


interlinked or related with each other. A website can have one or more than
one webpages.
(2) What is a Web server
Ans :- Webserver is a computer on which the websites which can be
browsed with the help of internet are been stored. Webserver also performs
the task of keeping and storing the websites and releasing/ sending it as
per the request given by us in the form of command.
(3) What do know about Web Hosting Company.
Ans :- Once the registration of website is been finalised, then there is a
need/requirement of the space on the webserver for storing/saving the
website. Such type of space for storing the website on the webserver is
been taken on the rental basis and the company providing the facility of
space on the rental basis is to be termed as Web Hosting Company.
(4) What do you mean by Domain Naming System (DNS)
Ans :- Nowadays you might have been observed the websites on the
internet, which starts with the www and ends with .in, .edu, .com, .org etc.
Every websites are been given name as per the naming system known as
Domain Naming System (DNS). When the user creates the website for the
first time, the gives the name to the website (generic name) which mostly
depends on the use /purpose of the website was been designed or created.
After the name of the website, domain code (generic domain) is been
followed. Basically there are six types of generic domains which are
.com – Commercial Websites
.org – Organizational Websites
.mil – Military Websites
.edu – Educational Websites
.net – Network Websites
For ex :- www.amazon.com
(5) What is a Protocol
Ans :- As in our daily life we follow certain rules for the smooth functioning
of the organization, or country just like that there is a need of some rules
for quicker and smooth transferring of files or for communication over the
network or internet, Such form of rules are to be known as Protocols.
(Q5) Answer the following questions in brief:-
(1) State the difference between the Server and Client?
Ans :- The difference between the Server and Client are as followed :-
(a) Server :- The other name for the server is the host computer that helps
in accessing and controlling of the hardwares and softwares in the network
and
provides the area for storing programs, data and information. he
applications, files, printers and other information is made available when
the user connects/makes use of server.
(b) Client :- It is a computer that mostly depends on the server for each
and every resources. For ex :- a server might store a network version of
network of word processing software. Every client on the network can
access the word processing software on the server.

(2) Write a note on URL


Ans :- As we are much aware that website is the collection of interrelated
webpages. On the internet, every webpage and website is given the web
address, which seems that the page number given to the page in a book.
The address that is given to the webpages or websites are in the form of
numbers. The address of the webpage or document defines the address as
the set of four numbers which is separated by three dots. Eg :-
233.132.198.20. It was very difficult for one to remember such a address of
every single website or webpages. URL stands for Uniform Resource Locator
which states the address of each webpage. URL is the method of
allotting/giving the address to a webpage on the internet. The
first/homepage of the website or the name of the website is one of the URL.
For ex :- www.yahoo.com, www.mail.yahoo.com, www.google.com etc.
(3) What is FTP
Ans :- The full abbreviation of FTP is File Transfer Protocol. This type of
protocol is mainly used for transferring files from one computer to the
another. When we want to upload (transferring of files from the client to the
webserver hosting) or downloading (transferring of files from the server to
the client computer) a file from the webserver, FTP protocol is been made
used of.

4) What do you understand by HTTP


Ans :- HTTP stand for Hyper text Transfer protocol. This is one type of
protocol which states the rules that is to be followed at the time of
transferring information which is containing, text, graphics, hypertext,
sound and video on world wide web (www). Such protocol is widely and
mainly used for transferring and viewing files. Tim Berner Lee was the first
person for defining such type of protocol.
(5) Explain the concept of the Security Network?
Ans :- Imagine that some one is trying to enter you house without taking
your permission and takes everything from your house, then what will you
do? Will you allow him/her to take away all the valuable things from your
house? Absolutely no, one will ever allow him/her to take the precious
things from their house without their permission. Similar to that in the world
of online there are many persons acting as hackers who tries to access your
bank accounts online or emails or our personal computers for their own
benefits. Such form of act is to be termed as Cyber Crime which is treated
as the very severe crime in the Cyber laws. For stopping the Cyber crimes
in India as well as in the world, certain laws are been implemented.
Hacking is the process or method of stealing someone’s personal
information by getting accessed to his personal computer.

Lesson No 6
Problem Solving
(Q1) Fill in the blanks:-
(1) The step-by-step method of solving any problem is called as Algorithm
(2) Flowchart is a picture (graphical representation) of the problem
solving process
(3) The boxes are connected by the directional arrows to show the flow of
the solution.
(4) Parallelogram is used to read data (input) or to print data (output).
Go beyond traditional BBA College with NEXIS 3-year UG

(5) Small circles which are used for connecting the different parts of the
flowchart is to be termed as Connectors.
(6) Computer understands the only one language it is called as Machine
Language.
(Q2) Match the following Geometric Shapes with the Flowchart
Symbols:-

(Q3) Answer the following questions in one or two sentences


each :-
(1) What is an Algorithm?
Ans:- The step-by-step instructions or method for solving any problem is to
be termed as Algorithm.
(2) What is a Flowchart?
Ans:- Flowchart is the method of solving the problem in the form of
presenting it in the pictorial (graphical representation) form. Flowchart is
totally related with the Algorithm.
(3) What is machine language?
Ans:- As there are different languages for the human beings to understand
and communicate. Similar to it computer (the machine) also understands
only the language (series of bits) that is 0’s and 1 is to be termed as
Machine Language. In the olden days you might have seen that the
computers were only programmed into machine language.
(4) What is Assembly language?
Ans :- If incase you are writing the programs in the machine language i.e is
in 0’s and 1, then surely there will be arise of problems of understanding or
understanding the language. But if you resemble the program by applying
the codes in English, it makes the task of understanding and writing of
programming language much easier. The language which makes use of
mnemonic codes (LDA for load, SUB for subtract, STA for Store etc) for
writing codes is to be termed as assembly language. This assembly
language is much easier to read and write.
(5) What is Assembler?
Ans:- Assembler is used for performing the task of converting the programs
that is been written in the assembly language into the machine coded form
which is clearly and directly understood by a computer.
(6) What is Interpreter?
Ans:- Interpreter is responsible for performing the task of grabbing the
single instruction or single step of program which is written in HLL (High-
Level language) and translates the program into the machine readable form
(codes) and runs the program immediately.

(7) What is a Compiler?


Ans :- Compiler is the language processor that is responsible for translating
the entire program into the one go machine code.

(8) Name the steps involved in every flowchart?


No. Compiler Interpreter
Compiler intakes the entire program Interpreter intakes the single instruction
1) as input or single set of program as input.
Generation of Intermediate Object Generation of Intermediate Object Code is
2) code not done.
As the Intermediate Object Code is Interpreter does not generate the
generated which arises for the need Intermediate Object Code, hence needs
3) for more memory. less memory.
In the compiling, program needs to High level program is been converted into
4) be compiled every time. the low level program always.
It displays all the errors at a time For every instructions, errors are
5) once the program is checked. displayed. Interpreted one at a time.
6) For ex :- C Compiler For ex :- Q BASIC
Ans:- In every flowchart there are steps involved, Input Data (reading
Assignment), Process (Calculations & comparisons), Output (Result of
processing).
(Q4) Answer the following questions in brief :-

(1) State the difference between the Compiler and Interpreter?


Ans :- The difference between the Compiler and Interpreter are:-
(2) What are the elements and uses of a flowchart?
Ans:- The elements and the uses of a flowchart are as follows :-
Elements of a Flowchart

o As the steps of the solving a problem, various geometrical shaped boxes


are been represented.
o To describe the flow of the problems solution, directional arrows are been
made used for connecting the geometrical shaped boxes.

Uses of a Flowchart

o It is the way or technique of solving the problem.


o This technique helps in planning the sequence of a computer program
o This method/technique conveys ideas, solutions etc.
DAV Class 8
Computer
Chapter 7
Programming with QBasic Question Answer Notes
Solution
(Q1) Multiple Choice Questions:-
(1) Q basic stands for _______.
(a) Quickly Beginning for All-Purpose Symbolic Instruction Code
(b) Quick Beginners for All-Purpose Symbolic Instruction Code
(c) Quick Beginners for All-Purpose Symbolic Informative Code
(d) All of these
Ans: (b) Quick Beginners for All-Purpose Symbolic Instruction Code

(2) Q Basic is an ________ developed by Microsoft.


(a) Internal Developed Environment (IDE)
(b) Instantly Developing Environment (IDE)
(c) Integrated Developing Environment (IDE)
(d) Integrated Development Environment (IDE)
Ans: (d) Integrated Development Environment (IDE)
(3) In Q Basic commands or instructions are called as
(a) Statements
(b) Variables
(c) Constants
(d) Keywords
Ans: (a) Statements

(4) Keywords are also called as _________ words.


(a) Unreserved
(b) Booked
(c) Appointed
(d) Reserved
Ans: (d) Reserved
(5) In Q Basic it has a place in computer memory which has a name
and stores data temporarily.
(a) Variables
(b) Strings
(c) Keywords
(d) Constants
Ans: (a) Variables

(Q2) State whether the following statements are True or False:-


(1) Statements should be written in accordance with the specific set of rules
of the language, which are called Syntax. True
(2) A character set is a defined as set of symbols used by programming
language. True
(3) Constants are the data or the values which can be changed during the
execution of the program. False
(4) Operators are the symbols that indicates the type for operation Q Basic
has to perform on the data or on the values of variables. True
(5) Logical operators are sued to connect two or more relational
expressions and returns a TRUE or FALSE value to be used in a
decision. True
(Q3) Match the following:-
Sr. Relational Operator Meaning Answers
No
1) = Greater than or equal to
Equal to
> Not equal to Greater than
2)
3) < Lesser than or equal to
Less than
<= Equal to Lesser than or equal to
4)
5) >= Less than
Greater than or equal to
<> Greater than
6) Not equal to
(Q4) Answer the following questions in one or two sentences
each :-
(1) What is Q Basic?
Ans :- QBASIC stands for Quick Beginners All-Purpose Symbolic Instruction
Code. It is an Integrated Development Environment (IDE) which is created
by the Microsoft company. QBASIC was been created for typing, editing,
debugging and executing/running the BASIC language programs.
(2) What is a Statement
Ans :- The commands or the instructions which are given in Q BASIC at the
time of writing the programs is to be termed as the Statement.
(3) What is a Syntax
Ans :- It is the set of rules in BASIC language which helps in writing the
statements according to it, is to be termed as Syntax.
(4) Name the basic elements which is helpful in writing a program.
Ans :- There are basically 5 elements which are involved/helpful in creating
the Q BASIC program are
(a) Set of Characters
(b) Keywords
(c) Constants
(d) Variables
(e) Operators and Expressions
(5) What do you mean by Character Set
Ans:- It is the set of symbols which is mostly used by the programming
language. This symbols are used as the Character set by the Q Basic.
A, B, C, D, E, F ………..

a, b, c, d, e, f ………….
Alphabets
Numbers 1, 2, 3, 4, 5, 6, 7, 8, 9, 0

Special
! , @, #, $, % …………….
Characters
(6) What are Keywords
Ans:- In QBASIC there are some words that have special meanings which
are known as Keywords. Reserved words is the another term used for
Keywords. Some of the reserved words are CLS, REM, INPUT, LET, PRINT,
FOR, NEXT, IF, THEN, ELSE, ELSEIF, END. MIDS,ASC, SQR, LEN, LEFTS, TIMES
INT etc. The user/ programmer cant make use of these reserved words as
the constants or variables.
(7) What is an Operator
Ans:- Operators are the types of symbols which gives an idea about what
type of operation will be performed by QBASIC on the entered/given
variable data or on the values.
(8) Write down the advantages of QBASIC language programs
Ans:- The advantages of QBASIC language are given below :-
(a) This language is very simple/easy to use and learn
(b) It is available free and works on almost on all the computers.
(c) The rules for using the language is very simple.
(d) GW BASIC, BASICA, QBASIC, and QB64 are some of the recent editions
of the QBASIC language.
(Q5) Answer the following questions in brief:-
(1) What is a Constant? Explain the types of categories
Ans:- The data or values in the program which cannot be changed at the
time of program’s execution is termed as Constants. A character, word.
Number or special characters etc. can be defined as the Constants. If
incase, there is a need of using the variable in more than one expression or
statement, then the constant is being stored in the variable. In QBASIC,
there are two types of Constants which are been explained below
(a) String Constant:- String constants are the letters, words, numbers,
numbers , or the letters combined with the numbers or special characters
which should be always written in the double quotation marks. You cannot
do any mathematical operations on the String Constants. The examples of
String Constants are “B” , “APPLE”, “SYMBOL NO:10205”, ”!!!”, “Welcome
to QBASIC World !!!”, etc.
(b) Numeric Constant:- This constant is related with the numbers. The
number
Which has a decimal point or don’t have, is termed as Numeric Constant.
There is no need of using separators in the numeric constants and should
not be written in double quotation marks. Logical and Mathematical tasks
can be done on numeric constants. The examples of numeric constants are
101, 105.50, 720, 45603, etc.
(2) Write the note on Variable
Ans:- In the computer memory it has its place with name and stores the
data on the temporarily basis. It only stores the data which is required in
the program. There are different number of variables in every programs and
variables values can be easily at the time of program execution. There are
two types of variables which are:-
(a) String Variable :- The string variable only stores the string data (viz is
string constant). It is always declared by the name followed by the dollar
sign. For ex:- Name $, address $, etc.
(b) Numeric Variable :- This variable only stores the data that is in the
form of numbers (numeric constant). For ex:- Age %, Marks, Number 1,
Number2 etc.
There are some rules that is to be followed while naming a variable which
are:-
(a) Always start the variable name with the letter.
(b) There can be inclusion of alphabets and numbers in the variables name.
(c) No other special character is allowed in the variable name except
underscore (_)
(d) If incase there is a string variable, then after the variable name there
will be a dollar sign for ex:- ADDRESS $, name $ etc.
(e) While naming the variable spacing/giving space is prohibited/not
allowed.
(f) Keywords or the reserved words can’t be used as the variable names.
(3) What do you understand by Operators? Explain the different
types of operators
Ans :- Operators are the symbols which helps the user in
indemnifying/recognizing what form of operation/action QBASIC is going to
perform on the data or the values of the variables. Operators are always
used in between two or more operands. For ex:- 3
– 2 Here 3 and 2 are called as operands whereas – sign is known as
operator. There are four types of operators which in Q BASIC those are:-
(a) Arithmetic Operators :- This operators are used for doing
mathematical calculations/ operations like addition, subtraction, division,
multiplication exponential etc. The different types of operators which are
used while performing Arithmetic operations in QBASIC which are :-
Operation Example Result
Operator
+ Addition 3+7
10
Subtraction 4–2 2

* Multiplication 8*4
32
Division 6/2 3
/
\ Integer Division 9/2
4
Exponential 4^3
^ 64
(b) Relational Operators:- With the help of this operators, the operations
of comparison between two values are done. After doing comparison, the
result may be true (non-zero) and false (zero). Below is the table, that
shows the different types of operation which are used for performing
relational operations in Q BASIC :-
Operation Example
Operator
= Equal to
A=B
Greater Than B>A
>
< Less than
A<B
Greater than or
A >= B
>= equal to
<= Less than or equal to
A <=B
Not equal to
<> A <> B
(c) Logical Operators:- This operators are used to make a combination
between two or more relational expressions. Calculations can be done to
return to the specific/single value. The single values can be true or false.
And, or, Not are the examples of logical operators. For ex:- the value of
A>50 and B>150 is True which means A is more than 50 at the same time
B is more than 150.

o AND Operator:- When the both expressions are True , then the result of AND
operator will be True otherwise False.
o OR Operator:- When the both expressions are False, the result of OR
Operator will be False otherwise True
o NOT Operator:- If the expression False, then the result of NOT operator will
be True and vice-versa.

(d) String Operator:- This operator is much helpful in joining two or more
data strings together. To represent the String operator plus sign (+) is used.
Concatenation is the act/process of joining two strings. Following is the
table which shows the example of String Operator :-
Concatenation

String value (A$) String Value (B$)


A$ + B$
“Science” Computer Science
“Computer”
“256” “20”
25620
“Peace” World Peace
“World”
“Cyber” “Safety”
Cyber Safety
“007”
“James Bond” James Bond 007
(4) What do you know about Flow of control in a Program
Ans:- Flow of control means it is the sequence of actions which are been
performed in a program. All the programs cannot be solved by only writing
them in proper sequence, but there are some programs which involves in
selecting between two or more possible actions. There are various control
flow statements which helps the programmer in changing the CPU path with
the help of program. QBASIC supports various control flow statements
which are as follows:-

o IF- THEN (Selected)


o IF-THEN ELSE (Branching)
o GOTO (Unconditional Jump)

(a) IF-THEN Statement :- From straight Line to Selection

(b) IF-THEN ELSE statement (Branching Statement) :- Depending upon the


conditions in the program, this statement helps the programmer to choose
any from the two possible actions.

(C) IF-THEN-ELSEIF-ELSE-ENDIF :- Depending on the conditions, this


statement helps the programmer to choose one from two or more actions .
FALSE

DAV Class 8
Computer
Lesson No 8
o Looping in QBasic & Project Handling
o (Q1) Fill in the blanks:-
o (1) Looping is the repeated execution of certain steps (statements
forming BODY of Loop) for a fixed number of times.
o (2) It is the systematic activity which has to be completed in a given
time is termed as Project.
o (3) Formatting is the process to prepare hard disk of a computer to
store data.
o (4) Defragmentation is the process of reorganizing the computer
memory to arrange all the files in continuity and contribute all the
blank chunks together to form a large blank space in memory.
o (5) Computer virus is a malicious that disturbs the normal
functioning of computer.
o (Q2) State whether the following statements are True or False
:-
o (1) Virus is a computer program that replicates itself and cause
problem with the smooth functioning of computer. False
o (2) Malware is the malicious software programmed to steal some
sensitive and confidential data from computer. True
o (3) Anti-virus is the program which protects our computer form
harmful programs known as virus. True
o (4) Anti-malware is the program which are used to scan and remove
the malwares from the computer. True
o (5) Loop is when the action is to be performed a fixed number of
times. True
o (Q3) Answer the following questions in one or two sentences
each:-
o (1) What is meant by Looping
o Ans :- Looping means it is an act where the some statements (which
are forming BODY of loop) for a fixed number of times.
o (2) What is FOR-NEXT statement? Explain the three steps
involved in making a loop?
o Ans :- This statement is helpful in simplifying the process of looping
(when some statements are to be repeated for fixed number of times).
o

o There are basically three steps which are involved in making a loop
which are :-
o (i) The control variable is initialised
o (ii) Condition is been checked with the final value
o (iii) Incrementing/decrementing of control variables.
o (3) What is a Project
o Ans:- Project is the part of an activity that needs to be completed
systematically within the specified time limit.
o (4) What is a Virus?
o Ans:- Virus is a software/computer program which is created with the
intention of hampering the working performance of the computer.
o (5) What is a Worm?
o Ans:- It is the computer program which replicates in itself and
disturbs the properly functioning of computer.
o (6) What is Malware?
o Ans:- Malware is the type of dangerous software specially designed
with the intention of stealing someone’s important information from
the computer.
o

o (7) What is the use of Anti-virus and Anti- Malware


o Ans:- Antivirus is a software program that is been created to protect
our computers from the very harmful computer program named as
Virus. Antivirus helps in removing the virus from the computer and
makes the computer to function smoothly. Whereas Anti -Malware also
work same as the Antivirus, which means it also scan the computer for
searching malwares and removes it from the computer.
o (8) What is Formatting
o Ans:- Formatting means to delete all the unwanted data from the
hard disk of the computer and making it capable of storing the data
again. One must take much care while formatting, as if carelessness
will lead the deletion of important files on the hard disk.
o (9) What is Defragmentation
o Ans:- It means transferring of memory used space at one place/side
and the making the empty memory space on the other place /side.
This process is completed by using the computer program called as
defragmenter. And the process of shifting of memory spaces is to be
termed as Defragmentation.
o (Q4) Answer the following questions in brief:-
o (1) Write down the steps involved in Looping
o Ans :- Following are the steps which are involved in Looping are :-
o (i) Initialization of Control Variable (COUNT = 0)
o (ii) Body of the loop can be formed by the repetition of statements
o (iii) Increasing the values of Constant Variable (COUNT = COUNT + 1)
o (iv) Checking the Control Variables against the FINAL (COUNT < FINAL)
It goes back to the body of the loop, when the condition is TRUE It
moves to the next step (statement), if the condition is FALSE
o (v) Display “LOOP OVER”
o (vi) END
o (2) How does the FOR-NEXT works?
o Ans:-
o (i) The initial value gets assigned to the control variable, when the
control name comes/appears to FOR statement for the very first time.
o (ii) The statements which are applied between the FOR and NEXT are
only been executed.
o (iii) The value of the Control variable is increased by NEXT statement
by 1 and transfers the control to FOR statement (beginning of Loop).
o (iv) When the Value of Control are been checked against the final
value, If incase, the Value of Control is less or equal to the Final value,
then the statement of Final value in body of loop are been repeated.
o (v) If the value of the control variable is more than Final value, the
control goes out of the loop and the statement that is given after the
NEXT is executed.
o (3) Write down the characteristics of a Project
o Ans :- The characteristics of a project are as followed :-
o (i) Every project that is to be made/created must have its
purpose/goal to be specified.
o (ii) Project contains of arrangement of tasks and sub-tasks
o (iii) Every task is the project must have the vision/reason and it should
be very much clear.
o (iv) The dead line of time must be allotted while creating the project.
The project must be completed within the specified given deadline.
o (v) Every project has its own time limit specified.
o (4) Explain the concept of Project Management Cycle
o Ans:- It means to complete the project properly, certain steps are
been followed. Such steps are to known as Project Management Cycle.
o
o Project Management Cycle
o The steps which are included in the Project Management Cycle are as
followed:-
o (i) Identification and Planning:- Before starting with the project
work, the most important thing that is done is to
recognize/realise/identify the main aim of the project, and as per it the
planning must be done to achieve the desired objective within the
given specified time limit.
o (ii) Coordination and Organization:- Each and every
tasks/activities need to be completed properly within the given time
limit. When all the tasks are completed, they are been combined
together to get the final project.
o (iii) Implementation:- Once all the tasks/activities of compiling are
done, then the final project execution is been done.
o (iv) Monitoring:- The supervision of tasks are done thoroughly for
the smooth running of the activities involved in the project.
o (v) Evaluation and Testing:- All the tasks involved in the project
are properly evaluated and then the project is been executed finally.

CLASS - 8
Lesson No 9
The Cyber World, Cyber Crime and the Law
(Q1) Fill in the blanks:-
(1) Cyber bullying is an act where the child is been tortured, threatened,
harassed etc or otherwise targeted by other child using the internet,
interactive or digital technologies or mobile phones.
(2) The crime which involves any computer/network/internet or any
electronic media is termed as Cyber Crime.
(3) Hacker is the person who focuses on security mechanism of computer
and network systems and seeks access to the computer system despite
these security measures.
(4) Cybercrime involves the criminal activities such as theft, fraud,
forgery, defamation, and mischief which are addressed by Information
Technology Act 2000.
(5) Cyber Bullying is because of anger, revenge, or frustration.
(Q2) Answer the following questions in two or three sentences
each:-
(1) What is Cyber Bullying?
Ans :- Cyber Bullying is an activity which is carried out by making use of
communication or digital technologies like internet, mobile phones with the
motive of harming, troubling, harassing, torturing, threatening etc other
person. This activity is carried out against the anger, frustration or revenge.
(2) What is a Cyber Crime?
Ans :- Cyber Crime is a crime in which the computer or a network/internet
is been made involved. The criminal activities like the theft, forgery, fraud,
defamation, and mischief etc comes under the category of Cyber Crime.
(3) What is Cyber Law?
Ans:- The criminal activities which involves the activities such as theft,
forgery, mischief etc. All such type of illegal or criminal activities are been
observed or controlled by certain rules and law as per the Information
Technology Act 2000.
(4) Name the types of Cyber Crime?
Ans:- Hacking, copyright infringement, child pornography and child
bullying, cross- border crimes (cyber terrorism) etc are the types of Cyber
Crimes.
(5) Who is a hacker?
Ans :- A hacker is the person who intentionally commits the crime of
harming the security of the computer system or network, and seeks the
access to the computer system without the permission authorized user.

(Q3) Answer the following questions in brief:-


(1) State the reasons for Cyber Bullying?
Ans:- There are certain reasons of Cyber Bullying which are :-

o This activity is carried out in regards/response to anger, frustration, anger


etc.
o Sometimes some children conduct the activities of bullying with the other
children as a part of fun, entertainment etc.
o The main reason for such activity is many children are equipped with the
new tech toys. So they are unaware about its uses and harmful side effects.
So the children misuse the technology.
o As to seek the response of the bullied person, as if they enjoy teasing other
people.
o Sometimes it happens this children sends the message unknowingly to the
wrong recipient of don’t think before doing this.

(2) What are effects of Cyber Bullying?


Ans:- The harmful effects of the cyber bullying leads the victim towards the
anxiety, depression, stress-related disorders etc. Some of the harmful
effects of Cyber Bullying are as follows :-

o The Cyber bullied victims tries to remain alone away from family members,
friends or any activities. He/she does not get involve in such activities.
o As result of the bullying, the victim always shows aggressiveness on the
family members at home. Always becomes angry on silly reasons.
o The victim always tries to stay alone from his family members, relatives,
friends etc and is never happy.
o Does not likes to remain in connect to the other person or with the rest of
the world.
o Does not get involve in the social activities, groups or gatherings.
o There is a sudden change in the behaviour, mood, sleep etc of the victim.
o Due to the cyber bullying, the victim remains emotionally upset or unhappy
after making use of the internet or phone.
o When ever the victim receives the text messages, emails online, suddenly
he/she becomes nervous .
o Tries to avoid in taking active part in the discussions related to the topic of
internet and mobile phones.
o Is not willing to make use of internet, mobile phones or computer
henceforth.
o Starts to show bad effect/impacts on the studies by achieving low grades.

(3) State the precaution taken to prevent form Cyber Bullying?


Ans:- There are some preventive measures where the Cyber Bullying can
be avoided which are as followed :-

o Upgrading the people about the consequences which will take place after
losing the ISP or Instant Messaging accounts.
o Guiding or training the persons in respecting other’s privacy and to take
sudden and strict action against the bullying.
o You can avoid bullying by blocking them (IM’s, emails, text messages etc)
electronically. As if new devices all upgraded with blocking facilities.
o You should always make use of internet under the proper guidance or
supervision of your parents but in limit.
o You can also share your online friends with your parents and ask them to
follow you friends online.
o You can also try to be safe online by protecting the passwords , and not by
sharing your exact location, address etc.
o You should also make sure that the proper email is been sent to the exact
email id (to the person whom we wanted to sent).
o We should make a habit of not forwarding others emails or their personal
information to any other person online without taking the other persons
permission
o We should respect peoples time by not wasting it by junk , chain e-mails or
spreading rumours.
o We should always try to respect others when we are online,. We should not
hurt them in the sense of not getting much involved in the controversy or
by insulting them.
o We should not get involve in online fights by posting any aggressive
comment, post or by sending email, instant messages etc.

(4) State the points for the Safe use of Networks


Ans: – The cyber crime team suggests and makes sure that the children
make safe use of internet by following the safety measures which are :-

o When we are online, we do not know anyone personally. Everyone are


strangers to us. So we should always make sure that whenever we are
making an online chat with the unknown persons/strangers, we should be
much careful and polite in talking with them.
o Nowadays we see many people are friends with few peoples as if they know
them well, but when it’s the matter of online, the same people have a huge
friend list out of which many of the persons are strangers. We should be
much aware in choosing our friends online. Confirm the friend request of
the known persons only. For increasing the number of friends on social
networking site, don’t try to confirm the request of the persons whom you
don’t know well. As if joining them or accepting the strangers request will
create a big problem for you.
o We should try to avoid in getting involved into the fights/arguments during
the online chat or discussions with the other persons.
o We should not try to share our personal information to any of the strangers.
We should try to keep it protected.
o We should never upload our personal pictures online. Before uploading it
online, we should make sure that all the thing are been store at cyber space
and that too forever.
o We should never try to use our real name or nickname as the screen name
or User ID.
o We should be much careful in meeting the online friend. If you wish to meet
him/her, make sure that you meet each other in the public place, and you
must make sure that you take your parent or friend at time of meeting.
o You should also make sure that your ISP (internet Service Provider) is
having the acceptable use policy that prohibits in cyber-stalking.
o If we are been mentally troubled or tortured online by someone, then it is
our prime duty to seek the help from the local police or our elders and
make sure that you keep all the communicating chats as an evidence.
o During the online chats, when you personally feel/think that the situation or
discussion is going beyond the topic, the you must log off the account or
can surf anywhere.
o Most important thing is that kindly add your parents in your friend list which
will help you from getting protected from bullying. The person who is
bullying may think that he is been watched.

(5) What are the suggestions that helps in securing the computer
or internet from getting misused by the strangers.
Ans :- There are some suggestions which will help in preventing the
internet or computer from getting misused by the strangers :-

o It is much essential for one to protect his internet by framing a strong


password, which would be impossible for the other person (stranger) to
guess.
o We should always make use of the anti virus and a firewall to keep us
protected. It acts as a gatekeeper between the computer and internet
which similarly acts like the watchman of a bungalow/building.
o We should never keep our computer or internet in online mode. Whenever it
is not required/not in use, we should turn it off or disconnect the internet.
o Don’t try to opening the email that may be sent by any stranger no matter
how beautiful the subject line looks or the attachment might be.
o The elders like parents must strictly supervise the internet usage, and upon
the activities that is performed on the internet.
o If we facing any problems/troubles on the internet. We should immediately
speak/concern it with the elders specially with our parents.

You might also like