The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.
Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by Education Technology, 2023-07-19 12:05:36

Computing Class 8

Third Edition

Keywords: Computing Class 8

Robot Programmer Knowledge Constructor Empowered Learner Digital Citizen Computational Thinker Innovative Designer Technology Explorer ICTECH Computing EdTech Department Developed By: The City School Third Edition


Education Technology Acknowledgements Project Lead EDTECH Department & Regional Computing Curriculum Leaders Group Head Office: 31 – Industrial Area, Guru Mangat Road, Gulberg III, Lahore, Pakistan. Ph: +92 (42) 111 444 123 Fax: +92 (42) 35773065 Website: www.thecityschool.edu.pk Project Team All rights reserved. No part of this publication may be reproduced or transmitted in any part by any means at any time. The entire computing curriculum is mapped with the attainment levels of the UK National Curriculum, ICDL and ISTE Student Standards 2017-2018. ICDL


Table of Contents Internet Search Techniques & e-Safety...................................................................11 1.1. What is a Search Engine? .......................................................................................................................................................................12 1.2. How do Search Engines Work?...........................................................................................................................................................12 1.3. Internet Searching Strategies...............................................................................................................................................................13 1.4. Ethical Citation...................................................................................................................................................................................................15 1.5. Digital Citizenship............................................................................................................................................................................................15 1.6. Digital Resilience..............................................................................................................................................................................................16 1.7. Cyber Bullying....................................................................................................................................................................................................16 1.8. Fake News.............................................................................................................................................................................................................17 1.9. Pop-up Blocking...............................................................................................................................................................................................17 1.10. Live Streaming...................................................................................................................................................................................................18 1.11. Password Protection.....................................................................................................................................................................................19 1.12. Privacy Protection..........................................................................................................................................................................................19 Advance Imaging.............................................................................................................22 2.1. Introduction..........................................................................................................................................................................................................23 2.2. What are Raster Graphics? ....................................................................................................................................................................23 2.3. Adobe Photoshop Interface...................................................................................................................................................................24 2.4. Understanding Layers in Photoshop..............................................................................................................................................26 2.5. Selection Tools in Photoshop ................................................................................................................................................................27 2.6. Resolution, Color Mode and Color Adjustment.....................................................................................................................28 2.7. Resizing Image, Enlarging, and Compressing........................................................................................................................30 2.8. Image Adjustments and Enhancements .....................................................................................................................................31 2.9. Gradient Fill .........................................................................................................................................................................................................32 2.10.Border, Shadow, Bevel and Emboss...............................................................................................................................................34 2.11. Scale and Rotate.............................................................................................................................................................................................37 2.12. Layer Opacity and Blending..................................................................................................................................................................37 2.13. Layer Blending..................................................................................................................................................................................................38 2.14. Hue and Saturation.......................................................................................................................................................................................39 2.15. Perspective crop tool...................................................................................................................................................................................40 2.16. Retouch Tools.....................................................................................................................................................................................................41 2.17. Saving Images for Print Media............................................................................................................................................................42 2.18. Saving Images for Web.............................................................................................................................................................................43


Table of Contents Handling Databases with Research......................................................................46 3.1. What is a Database?................................................................................................................................................................................47 3.2. Introduction to MS Access...................................................................................................................................................................47 3.3. Datatypes in MS Access........................................................................................................................................................................48 3.4. Understanding Tables in MS Access...........................................................................................................................................50 3.5. Creating Relationships Between Tables..................................................................................................................................54 3.6. Constraints in Database .......................................................................................................................................................................56 3.7. Creating Relationships in MS Access..........................................................................................................................................57 3.8. Simple and Complex Queries in MS Access .........................................................................................................................58 3.9. Forms and Reports in MS Access .................................................................................................................................................62 3.10. Import and Export Data in MS Access......................................................................................................................................66 3.11. Microsoft Forms ...........................................................................................................................................................................................68 Developing Applications..............................................................................................75 4.1. What is User Interface Design..........................................................................................................................................................76 4.2. Characteristics of Good User Interface ....................................................................................................................................76 4.3. Bad User Interfaces...................................................................................................................................................................................78 4.4. Getting Started with Visual Studio.................................................................................................................................................79 4.5. Basic GUI Controls in Visual Basic.................................................................................................................................................82 4.6. Variables..............................................................................................................................................................................................................83 4.7. Data Types.........................................................................................................................................................................................................86 4.8. Conditional Statements..........................................................................................................................................................................87 4.9. Conditional Operators .............................................................................................................................................................................89 4.10. Looping Statements ..................................................................................................................................................................................90 4.11. Event Handling...............................................................................................................................................................................................92 4.12. Functions and Subroutines .................................................................................................................................................................93 4.13. Modules ...............................................................................................................................................................................................................95 4.14. Program Debugging and Error Handling ..............................................................................................................................96


Programming Robots & Single Board Computers.................................100 5.1. Single-Board Computers.........................................................................................................................................................101 5.2. Introduction to Raspberry Pi................................................................................................................................................101 5.3. Raspberry Pi Architecture.......................................................................................................................................................104 5.4. Python Basics....................................................................................................................................................................................106 5.5. Variables in Python ......................................................................................................................................................................107 5.6. LIST in Python ...................................................................................................................................................................................108 5.7. Conditional Statements in Python...................................................................................................................................110 5.8. Conditional and Logical Operators ................................................................................................................................111 5.9. Looping Statement in Python..............................................................................................................................................112 5.10. Python Functions............................................................................................................................................................................113 5.11. Getting Started with Python and Raspberry Pi....................................................................................................113 5.12. Interfacing with SONAR Sensor.........................................................................................................................................117 5.13. Interfacing with Servo Motor...............................................................................................................................................118 5.14. Building Smart Robotic Car...................................................................................................................................................120 Appendix....................................................................................................................130 Glossary.......................................................................................................................136 Table of Contents


What is ICTECH Computing? Structure of the Book Book Features Student Learning Outcomes ISTE Student Standard Coverage Chapter Opener The ICTech (Innovation in Curriculum through Technology) Curriculum is based on the best practices in learning and teaching with technology to improve higher order thinking skills of students to prepare them for their future in a competitive global job market. In this curriculum, technology is used as a tool to integrate 21st century competencies and expertise such as communication, leadership, critical thinking, complex problem solving and collaboration in different subjects. These appear at the start of each chapter and define the skills students will be equipped with after completing the lesson. These represent the ISTE student standards covered in each chapter. A complete description of ISTE student standard can be found here. These appear at the start of every chapter and are designed to grasp learners attention related to the topic. Chapter openers consist of useful bits of information related to the topic. • Internet Search Techniques and e-Safety: techniques to surf internet and staying safe in online world • Advanced Imaging: working with photo editing and manipulation and creating graphics for digital and print media • Handling Database with Research: working with data using database software • Developing Applications: designing and building desktop applications • Programming Robots and Single-Board Computers: using python programming to program robots


Checkpoints are learning bits that appear within the chapter at different stages to reinforce the important learning concepts. Food for neurons consist of fun facts or trending news about the topic. These appear within each chapter. Checkpoint Food for Neurons Let’s Review My Notes Chapter Highlights Each chapter ends with the key learning points that provide a complete overview of the chapter. Key terms appearing throughout the chapter are highlighted to draw learner’s attention. My Notes section appears at the end of the chapter. Here learners can write important learning points or reflect on their learning. Glossary Contains the important terminology covered in the book.


Stay Online...Stay Safe S M A R T Stay safe.... Do not give out your personal information Do not meet anyone who you have only become friends online with Do not accept messages and friend requests from people who are strangers Check the authenticity of any news or person from reliable sources Tell your parents or teachers if someone or something makes you uncomfortable


Student Learning Outcomes ISTE Student Standard Coverage 1. Understand what search engines are 2. Identify how search engines work and gather information 3. Use keywords to specify search 4. Use boolean and arithmetic operators to search 5. Extract information from different websites to create a report 6. Understand the ethical purpose of citing sources 7. Understand how to protect personal information and private life on the internet 8. Understand digital resilience 9. Identify bullying and how to avoid it 10. Identify fake news, pop-up blocking and live streaming 11. Understand password protection and privacy protection After going through this chapter, students will be able to: Empowered Learner Digital Citizen Knowledge Constructor Global Collaborator 1a 1b 1c 1d 2a 2b 2c 2d 3a 3b 3c 7c Internet Search Techniques & e-Safety


1.1. What is a Search Engine? 1.2. How do Search Engines Work? A search engine is designed to search for information on the World Wide Web by using specified keywords. The search results are usually presented in a list commonly called hits. The information may consist of web pages, images, information and other types of files. Below are some of the most common search engines: Internet search engines are special sites on the web that are designed to help people find information stored in other sites. There are differences in the ways various search engines work, but they all perform three basic tasks: Early search engines held an index of a few hundred thousand pages and documents and received maybe one or two thousand inquiries each day. Today, a top search engine will index hundreds of millions of pages, and respond to tens of millions of queries per day. They search the internet or select pieces of the internet based on important words. They allow users to look for words or combinations of words found in the index of words. They keep an index of the words they find, and where they find them. Search Engine Purpose google.com For generally searching anything images.google.com For image searching scholar.google.com For educational and research searches books.google.com For searching books online yahoo.com For generally searching anything duckduckgo.com For organic searching 12 The City School 2023-2024


Internet Search Techniques and e-safety 1.3. Internet Searching Strategies Google receives over 63,000 searches per second on any given day. That’s the average figure of how many people use Google a day, which translates into at least 2 trillion searches per year, 3.8 million searches per minute, 228 million searches per hour, and 5.6 billion searches per day. Search engines are very different from subject directories. While humans organize and catalogue subject directories, search engines rely on computer programs called spiders or robots to crawl the Web and log the words on each page. With a search engine, keywords related to a topic are typed into a search box . The search engine scans its database and returns a file with links to websites containing the word or words specified. Because these databases are very large, search engines often return thousands of results. Without search strategies or techniques, finding what you need can be like finding a needle in a haystack. Nowadays keywords search on search engines based on improper or slang language which also results in improper outcomes. To use search engines effectively, it is essential to apply techniques that narrow results and push the most relevant pages to the top of the results list. Below are several strategies for boosting search engine performance. When performing a search, break down the topic into key concepts. For example, to find information on what the FCC has said about the wireless communications industry, the keywords might be: FCC Wireless Communication Connecting search terms with AND tells the search engine to retrieve web pages containing ALL the keywords: FCC AND wireless and communication 1. Identify Keywords 2. Boolean AND A single second delay in loading time on a web page can result in a 7% loss in conversions. It’s also important to note that 40% of internet users will bounce back out if the page takes longer than 3 seconds to load. 13 The City School 2023-2024


3. Boolean OR 4. Boolean AND NOT 5. Implied Boolean Plus and Minus (+ & -) Linking search terms with OR tells the search engine to retrieve web pages containing ANY and ALL keywords. For example, FCC OR wireless OR communication. When OR is used, the search engine returns pages with a single keyword, several keywords, and all keywords. The boolean OR does the following: AND NOT tells the search engine to retrieve web pages containing one keyword but not the other. For example, Dolphins AND NOT Miami. The above example instructs the search engine to return web pages about dolphins but not web pages about the “Miami Dolphins” football team. Use AND NOT when you have a keyword that has multiple meanings. The need for AND NOT often becomes apparent after you perform an initial search. If your search results contain irrelevant results (e.g., Saturn the car rather than Saturn the planet), consider using AND NOT to filter out the undesired websites. In many search engines, the plus and minus symbols can be used as alternatives to full Boolean AND and AND NOT. The plus sign (+) is the equivalent of AND, and the minus sign (-) is the equivalent of AND NOT. There is no space between the plus or minus sign 1. The OR expands your search results. 2. Use OR when you have common synonums for a keyword 3. Surround OR statements with parentheses for best results 4. To narrow results as much as possible, combine OR statements with AND statements. For example, the dollowing search statement locates information on purchasing a used car (Car OR automobile) AND (buy OR purchase) AND used The search engine will not return pages with just the word FCC. Neither will it return pages with the word FCC and the word wireless. The search engine will only return pages where the words FCC, wireless, and communication all appear somewhere on the page. Thus, AND helps to narrow your search results as it limits results to pages where all the keywords appear. 14 The City School 2023-2024


Internet Search Techniques and e-safety 1.4. Ethical Citation 1.5. Digital Citizenship It is important to cite sources you used in your research for several reasons: To show your reader you’ve done proper research by listing sources you used to get your information. To be a responsible scholar by giving credit to other researchers and acknowledging their ideas. To avoid plagiarism by quoting words and ideas used by other authors. To allow your reader to track down the sources you used by citing them accurately in your paper by way of footnotes, a bibliography or reference list. If you are a citizen, this means you belong to a group of people. You could be a citizen of your classroom or your neighbourhood. Being a digital citizen means you are a part of the group of people that use technology to communicate. There are rules that you need to follow when you are a digital citizen, to protect yourself and to protect others. and the keyword. For example; +welding +process, +Saturn -car, couch sofa NOTE: AltaVista’s Simple Search requires the use of plus and minus rather than AND, OR, and AND NOT. 15 The City School 2023-2024


1.6. Digital Resilience 1.7. Cyber Bullying Examples of Cyber Bullying How to Avoid Cyber Bullying? A digitally resilient person will be able to: Know what to do to seek help. Learn from their experiences. Recover when things go wrong. Understand when they are at risk online. Writing hurtful things through instant messaging, text messaging or online games. Posting derogatory messages on social media to humiliate a person or communiity Posting or sharing embarrasing videos or photos over the social media. Creating a fake profile of someone to humiliate or hurt them. Do not reply to the messages sent by bully. Block all the messages from the bully. Keep all the e-mails and messages that the bully sends. Report the bullying to the parent or a trusted adult. Cyber bullying is bullying that occurs online, often through instant messaging, text messages, emails, and social networks. If someone is repeatedly unkind or harasses another person online, then they are a cyberbully. Cyber bullying usually involves people you know. It is often accompanied by traditional, offline, bullying. 16 The City School 2023-2024


Internet Search Techniques and e-safety 1.8. Fake News 1.9. Pop-up Blocking You may have heard of the term fake news talked about in the media or between friends. There are different types of fake news. Some fake news is deliberately made up stories or images to make people believe something that isn’t true. Others have some truth to them, but may be misleading, including some false information that hasn’t been checked properly or with facts that have been exaggerated by the author. Anybody can make mistakes online. Even if you are careful, accidents can happen. You may feel unsafe and people can be unkind. Sometimes bad things happen. Don’t worry, it isn’t your fault. The most important thing is that you know how to get help and recover. Thinking about what you do online, and getting support, will help you to recover – from whatever has happened. You can even learn from your experience and become more resilient. What will you do when things go wrong online? • Has the story been repeated elsewhere? Check other reputable sites. • Does the image look believable? Is it used elsewhere? For example, an edited photo of a pink giraffe flying across the moon is a big clue that the story isn’t real! • Does the web address (URL) look strange? Or is it from a trusted site? • Do you know who the author is? Have you heard of the organization reporting it? • Are you familiar with the organization or company? Are they reputable? Sometimes messages pop up in a small window on the screen when you open certain websites. Often the popups are adverts for products and services and other times they are phishing scams asking you to enter personal details to claim an unbelievable prize. You should avoid clicking on the Checkpoint A search engine is designed to search for information on the World Wide Web by using specified keywords. Digital citizenship being part of the group of people that use technology to communicate. Cyberbullying is bullying that occurs online, often through instant messaging, text messages, emails, and social networks. 17 The City School 2023-2024


Some Risks of Live Streaming Live streaming is the broadcasting of real-time, live, video to an audience over the internet. All you need is an internet-enabled device, such as a smartphone or tablet, and a platform to broadcast on. • You never know who’s watching – if your live stream is popular with loads of viewers, it might be promoted so people who don’t follow you can tune in too if your profile is public. • You never know what you’re going to see – when watching someone else’s live stream, you can never tell what’s about to happen. This can be part of the fun of live streaming. But you might be exposed to harmful or upsetting content by other users. • Not all viewers are friendly – viewers can comment on your live stream as it happens, and their comments might be mean, rude or inappropriate and can make you feel sad or scared. • Letting people know where you are – you should be mindful of what you’re revealing in your live stream. If you’re in your school uniform or close to your house, you could be letting strangers know where you go to school and where you live, even if you don’t verbally say it. 1.10. Live Streaming popup links just in case they are unreliable or a scam. This term in the online world is also called Click-Bait. You can just close them by clicking the only the small x on the top right-hand corner of the popup box. 18 The City School 2023-2024


Internet Search Techniques and e-safety A password is a secret word, phrase or combination of characters that allows you access to protected information or an account. A strong password is one that is secure and not easy to guess. It can be used to help protect your information online, keeping it private. Following are some tips to create strong and protective passwords: 1.11. Password Protection It is important to protect your information when you’re online and think carefully about what it is ok to share and make public for everyone to see and what it is best to keep private. Sharing too much personal information such as your full date of birth or your full name and address could leave you vulnerable for several reasons: 1. There are identity thieves who may try to steal your personal information to create an identity. 2. Identity thieves may use your information to pretend to be you online. 3. There are some people who want to harm and harass others online. 1. Create different passwords for different accounts.Choose a password that is not easy to guess. 2. Use a mixture of numbers, characters and lower and upper-case letters. 3. Avoid obvious words such as your name or your pet’s name. 4. Avoid obvious numbers such as your date of birth, age or phone number. 5. Instead of just one word, think of a short phrase that nobody would guess. 6. Keep your passwords secret, even from your best friend. 1.12. Privacy Protection Checkpoint Fake news is deliberately made up stories or images to make people believe something that isn’t true. Live streaming is the broadcasting of real-time, live, video to an audience over the internet. A password is a secret word, phrase or combination of characters that allows you access to protected information or an account. 19 The City School 2023-2024


1. A search engine is designed to search for information on the World Wide Web by using specified keywords. 2. Search engines rely on computer programs called spiders or robots to crawl the Web and log the words on each page. 3. Ethical citation involves avoiding plagiarism, by giving credit to work of other scholars, allow your reader to track down the sources cited. 4. Digital citizen refers to the group of people that use technology to communicate. 5. Cyberbullying is bullying that occurs online, often through instant messaging, text messages, emails, and social networks. 6. Fake news is deliberately made up stories or images to make people believe something that isn’t true. 7. Popups are adverts for products and services and other times they are phishing scams. 8. Live streaming is the broadcasting of real-time, live, video to an audience over the internet. 9. A password is a secret word, phrase or combination of characters that allows you access to protected information or an account. Let’s Review My Notes! 20 The City School 2023-2024


Photo Editing Cropping Photos Brochures and Flyers 3D Text Photo Editing Mockups Match Fonts Web Design Artwork Web Graphics Things You Can Do with Imaging Tool


Student Learning Outcomes ISTE Student Standard Coverage 1. Develop an understanding of what graphics are. 2. Learn the difference between raster and vector graphics 3. Familiarise with the interface of Adobe Photoshop 4. Understanding of resolution, colour depth and colour mode 5. Understand layers, text layers and layer styles in Photoshop 6. Apply adjustments, filters and effects on an image 7. Apply gradient, stroke borders, drop shadow, bevel and emboss 8. Use Scale and rotate 9. Manage the Layer opacity 10. Apply Blend modes 11. Use of Prospective crop tool 12. Use of retouch tools 13. Saving images for web and print media Empowered Learner Innovative Designer Creative Communicator Knowledge Constructor 1a 1d 3c 3a 3b 3c 4a 4b After going through this chapter, students will be able to: Advance Imaging


2.1. Introduction 2.2. What are Raster Graphics? Adobe Photoshop CC 2018 is a popular image editing software that provides a work environment consistent with Adobe Illustrator, Adobe InDesign, Adobe Photoshop, and other products in the Adobe Creative Suite although Adobe Photoshop is a raster-based graphic software. In computer graphics, a raster graphics or bitmap image is a dot matrix data structure that represents a generally rectangular grid of pixels (points of colour), viewable via a monitor, paper, or other display media. Raster images are stored in image files with varying formats. A bitmap is a rectangular grid of pixels, with each pixel’s colour being specified by a number of bits. Vector Zoom-Sharp Image Raster Zoom-Pixalated Image A bitmap might be created for storage in the display’s video memory or as a deviceindependent bitmap file. A raster is technically characterized by the width and height of the image in pixels and by the number of bits per pixel (or colour depth, which determines the number of colours it can represent). 23 The City School 2023-2024Advance Imaging


2.3. Adobe Photoshop Interface Menu Bar Toolbar The Image Image name Toolbar Image Layers Panel Colors and swatches window Option menu If you look at the top of the screen you will see the Menu bar, which contains all the main functions of Photoshop, such as File, Edit, Image, Layer, Type, Select, Filter, Analysis, 3D, View, Window, and Help. Most of the major tools are located in the Toolbar for easy access. The image will appear in its own window once you open a file. 24 The City School 2023-2024


Advance Imaging Q uick tip Press the Tab key on your keyboard to show or hide all active panels. Option Menu Colour, Swatches, Style Image Name The name of any image that you open will be at the top of the image window as shown above. Options bar which changes constantly depending on what tool you have selected. The colour palette displays the current foreground and background colours and RGB values for these colours. You can use the sliders to change the foreground and background colours in different colour modes. You can also choose a colour from the spectrum of colours displayed in the colour ramp at the bottom of the palette. In the swatches palette, you can choose a foreground or background colour and add a customized colour to the library. The styles palette allows you to view, select, and apply pre-set layer styles. By default, a pre-set style replaces the current layer style. You can use the styles in the palette or add your own using the Create New Style icon. 25 The City School 2023-2024


2.4. Understanding Layers in Photoshop Layers let you organize your work into distinct levels that can be edited and viewed as individual units. Every Photoshop CC document contains at least one layer. Creating multiple layers lets you easily control how your artwork is printed, displayed, and edited. You will use the Layers palette often while creating a document, so it is crucial to understand what it does and how to use it. 1. Layer Visibility: the eye shows that the selected layer is visible. Click on or off to see or to hide a layer. 2. Layer Locking Options: click the chequered square icon to lock Transparency, click the brush icon to lock the Image, click the arrow icon to lock the Position, and click the lock icon to lock all options. 3. Layer Blending Mode: defines how the layer’s pixels blend with underlying pixels in the image. By choosing a particular blending mode from the drop-down menu you can create a variety of special effects. 4. Fill: by typing in a value or dragging the slider you can specify the transparency. 5. Opacity: by typing in a value or dragging the slider, you can specify the transparency of the entire layer. 6. Layer Mask: allows you to hide certain parts of the layer, which can then be revealed by using the paintbrush and the white paint colour to expose portions of the layer. 7. Create New Fill or Adjustment Layer: have the same opacity and blending mode options as image layers and can be rearranged, deleted, hidden and duplicated in the same manner as image layers. Click the icon and select an option to create a new fill or adjustment layer. Checkpoint Adobe Photoshop is raster-based photo editing tool A bitmap is a rectangular grid of pixels 26 The City School 2023-2024


Advance Imaging 2.5. Selection Tools in Photoshop Move Marquee Lasso Magic Wand Used to select and move objects on the page. Click the tool button, then click on any object on the page you wish to move. Selects an object by drawing a rectangle or an ellipse around it. Click the tool button, choose a rectangular or an elliptical marquee. Drag the marquee over the area of the image you wish to select. Selects an object by drawing a freehand border around it. Click the tool button, drag to draw a freehand border around the area of the image you wish to select. Selects all objects in a document with the same or similar fill colour, stroke weight, stroke colour, opacity or blending mode. By specifying the colour range or tolerance, you can control what the Magic Wand tool selects. 8. Create New Layer: click this icon to create a new layer. 9. Layer Lock: the icon shows when the layer is locked and disappears when it is unlocked. Double-click the icon to unlock the layer. 10. Link Layers: can be used to link layers together. 11. Layer Styles: if a layer has a style, an F icon shows at the bottom of the Layers palette. Click the little black triangle to see style options. 27 The City School 2023-2024


Transformation Tool Resolution Select the area of your image which you want to transform and press Ctrl+T to enable the transformation tool on that selection. You will see a familiar transformation tool around your object. PPI & DPI (Pixel per inch and Dots per inch respectively) are the standard units for measuring image size. Resolution is the number of pixels on a printed area of an image. The higher the resolution, the more pixels there are on the page, the better the quality of the image. However, high resolution increases the size of the file. The standard recommended resolution for printed images is 150-300 dpi, for Web images it is 72 dpi. 2.6. Resolution, Color Mode and Color Adjustment 1” 28 The City School 2023-2024


Advance Imaging Color Mode Color Adjustment Choose a colour mode that will best fit your project. For example, when making a graphic for a web site, choose RGB. When making an image for print choose CMYK. Colour adjustment options in Photoshop CC 2018 can help you to make your digital photos look more natural. To colour correct your images, follow these steps: 1. Open the image you wish to correct. 2. In the main menu, go to Image > Adjustments > Levels. You will see a dialogue box displaying a diagram of the colours in your image. 3. Make sure the Preview box is checked off. 4. In the Channels dropdown menu, you can choose between RGB. These indicate whether your changes affect all the colours, or just one (red, green, or blue). 5. Choose the channel you wish to change and drag the triangles. 6. The black triangle is for shadows, the grey is for mid-tones, the white is for highlights. • Dragging the black triangle to the right will make the shadows in your photo darker. • Dragging the grey triangle to the left will make the mid-tones in your photo lighter. • Dragging it to the right will make the mid-tones darker. Indesign vs. Photoshop vs. Illustrator? • Use Indesign when you need to create miltipage documents. • Use Photoshop when you need to edit and retouch photos. • Use Illustrator when you need to create logos, one-page print piece or illustrations 29 The City School 2023-2024


2.7. Resizing Image, Enlarging, and Compressing You can alter the following parameters to change the image size: 1. Under Dimensions, you can see your original document size. If you use the dropdown arrow, you can see different units of measurements for your document. Use the original size to determine the proportions for your resizing. 2. Adjust your new height and width by typing in the desired new proportions. To resize your image to different size: 1. In the main menu, go to Image > Image Size. 2. In the Image Size dialogue box, you can readjust your image by typing in the width and height that is needed for your resizing. 3. An important reminder is that if your document is not already 300ppi or a highresolution photo, making your image drastically larger than what it already is can distort the document, thus the same for making a large document smaller. 4. Photoshop measures in pixels, so altering sizes of a photo can reduce the quality. 5. It is best to adjust size first before doing any editing. 7. You will be able to see the changes in your image. (underexposed image) shows a photo which is underexposed. By correcting the highlights and making the image lighter, we can make the photo appear much brighter (corrected image). Underexposed image Levels Window Corrected Image 30 The City School 2023-2024


Advance Imaging 2.8. Image Adjustments and Enhancements 3. Type in your desired resolution (150-300 PPI for high-quality prints and 72 PPI is good for web images). 4. Have the resample checked to tell Photoshop to try and keep your pixels together if you are making a drastic change. 5. Click OK. 6. Your document should be now of the desired proportions, if you are dissatisfied, you can hold Ctrl+Z to undo the sizing adjustment, or you can use the crop tool to get the desired look. Filter and Effects Filter Gallery A filter can be applied to the active layer or a smart object. Filters applied to a smart object are non-destructive and can be readjusted at any time. The filter gallery provides a preview of many of the special effects & filters. Multiple filters can be applied/used on the same object/image, turn on or off the effect of a filter, reset options for a filter, and change the order in which filters are applied. When you are satisfied with the preview, you can then apply it to your image. Press Ctrl+F to open the filter gallery. Do one of the following: • to apply a filter to an entire layer, make sure the layer is active or selected. • to apply a filter to an area of a layer, select that area. • to apply a filter non-destructively so you can change your filter settings later, select the Smart Object that contains the image content you want to filter. 31 The City School 2023-2024


A. Preview B. Filter gallery C. Thumbnail of selected filter D. Show/Hide filter thumbnails E. Filters pop up menu F. Options for selected filter. G. List of filter effects to apply or arrange H. Filter effect selected but not applied I. Filter effects applied cumulatively but not selected J. Hidden filter effect Checkpoint Resolution is the number of pixels on a printed area of an image PPI-Pixels per inch DPI-Dots per inch 2.9. Gradient Fill The gradient tool creates a gradual transition between multiple colours. You can choose from preset gradient fills or create your own. Gradient tool cannot be used with the bitmap or indexedcolour images. 32 The City School 2023-2024


Advance Imaging Apply Gradient Fill Linear Gradient Radial Gradient 1. To fill part of the image, select the desired area. Otherwise, the gradient fill is applied to the entire active layer. 2. Select the Gradient tool . (If the tool isn’t visible, hold down the Paint Bucket tool.) 3. In the options bar, choose a fill from the wide gradient sample: 4. Select an option to determine how the starting point (where the mouse is pressed) and ending point (where the mouse is released) affect gradient appearance. Shades from the starting point to the ending point in a straight line. Shades from the starting point to the ending point in a straight line. Linear black to white gradient Multiple colour linear gradient Linear colour to transparency gradient Radial colour to white gradient 33 The City School 2023-2024


2.10.Border, Shadow, Bevel and Emboss In Photoshop all layers can be individually customizable in various aspects, for Layer Style option double click on the layer from the layer panel. Layer styles window will pop-up from where you can apply effects, such as colour overlays, drop shadows, glow, or bevel & emboss, to the primary layer. To create a rollover pair, turn the layer style on or off and save the image in each state. Angular Gradient Reflected Gradient Diamond Gradient Shades from the starting point to the ending point in a straight line. Mirrors the same linear gradient on either side of the starting point. Shades from the middle to the outer corners of a diamond pattern. 34 The City School 2023-2024


Advance Imaging A. Layer effects icon B. Click to expand show layer effects C. Different layer effects applied on the layer. Drop Shadow Outer Glow Inner Glow Adds a shadow that falls behind the contents on the layer. Add glows that emanate from the outside edges of the layer’s content. Add glows that emanate from the inside edges of the layer’s content. 35 The City School 2023-2024


Bevel and Emboss Color Overlay Gradient Overlay Pattern Overlay Stroke as Gradient Stroke as Pattern Stroke as Colour Add various combinations of highlights and shadows to a layer. Fills the layer’s content with color. Fills the layer’s content with gradient. Fills the layer’s content with pattern. Outlines the object in current layer using colour. Outlines the object in current layer using gradient. Outlines the object in current layer using gradient. 36 The City School 2023-2024


Advance Imaging 2.11. Scale and Rotate The free transform command lets you apply transformations (rotate, scale, skew, distort, and perspective) in one continuous operation. You can also apply a warp transformation. Instead of choosing different commands, you simply hold down a key on your keyboard to switch between transformation types. 1. Select what you want to transform. 2. Open Edit Menu > Free Transform (Short Key Ctrl+T). 3. To scale by dragging, drag a handle. Press Shift as you drag a corner handle to scale 4. proportionately. 5. To rotate by dragging, move the pointer outside the bounding border (it becomes a 6. curved, two-sided arrow), and then drag. 7. Press Shift to constrain the rotation to 15° increments. A. Original image B. Layer flipped C. Selection border rotated D. Part of object flipped 2.12. Layer Opacity and Blending Layer Opacity A layer with 1% opacity appears nearly transparent, whereas one with 100% opacity appears completely opaque. In addition to overall opacity, which affects layer styles and blending modes applied ta layer, you can specify fill opacity. Fill opacity affects only pixels, shapes, or text on a layer without affecting the opacity of layer effects such as drop shadows. 37 The City School 2023-2024


2.13. Layer Blending More Blending Options By default, the blending mode of a layer is pass through, which means that the layer has no blending properties of its own. When you choose a different blending mode for a layer, you effectively change the order in which the image components are put together. Choose a blending mode other than pass through for the layer. Original image-1 Hard light Linear light Vivid light Pin light Original Picture Normal 50% opacity Dissolve 50% opacity Color burn Original image-2 38 The City School 2023-2024


Advance Imaging Linear burn Lighten Screen Clear Darken Multiply Colour Dodge Linear Dodge (Add) Overlay Soft light 2.13. Hue and Saturation Use the Hue slider to add special effects, to colour a black and white image (like a sepia effect), or to change the range of colours in a portion of an image. This adjustment is especially good for finetuning colours in a CMYK image. The Hue/Saturation command adjusts the Hue (colour), Saturation (purity), and lightness of the entire image or individual colour components in an image. 39 The City School 2023-2024


1. Image Menu > Adjustment > Hue/Saturation. (Short key Ctrl+U) 2. Choose Master to adjust all colours at once. Alternatively, choose one of the other pre-set colour ranges listed for the colour you want to adjust. To modify the colour range. Original Picture Entire image changed to speia using colorize option Magenta color targeted in the edit menu and changed using hue slider 2.14.Perspective crop tool A much easier and faster way to correct images that suffer only from perspective distortion is to use the perspective crop tool. 1. In this case, we will be extracting the painting from the wall. 2. Select the Perspective Crop Tool from the Tools panel. 3. Click and drag to create a rectangle that covers your whole image. 4. Drag the corner handles so that the horizontal and vertical lines of the grid align with the respective lines of your subject. 5. Press Enter to crop. 40 The City School 2023-2024


Advance Imaging 2.15. Retouch Tools Retouch with the Healing Brush tool: The healing brush tool lets you correct imperfections, causing them to disappear into the surrounding image. Like the cloning tools, you use the Healing Brush tool to paint with sampled pixels from an image or pattern. However, the Healing Brush tool also matches the texture, lighting, transparency, and shading of the sampled pixels to the pixels being healed. As a result, the repaired pixels blend seamlessly into the rest of the image. 1. In this example by using the healing tool, we will remove the cell phone. 2. Select the Healing Brush tool 3. Specify the source for repairing pixels by holding the Alt key and left-click and release the Alt key. 4. Use the Healing brush on the effected area i.e. cell phone, healing tool will use the pixels from the source and adjust on the destination. Before After Retouch with the Clone Stamp Tool: The clone stamp tool paints one part of an image over another part of the same image or over another part of any open document that has the same colour mode. You can also paint part of one layer over another layer. The Clone Stamp tool is useful for duplicating objects or removing a defect in an image. 41 The City School 2023-2024


Originally when we are working in Photoshop with layers and objects Photoshop saves the document in PSD format whereas if need to save the picture for print media it is recommended to save images in JPEG format with the resolution up to 200 to 300 DPI, saving the image at this resolution avoids pixelation at a later stage. To save an image in Photoshop follow these steps: 1. In this example using the Clone Stamp tool, we will add another paper clip. 2. Select the Clone Stamp tool 3. Specify the source for copying the pixels by holding the Alt key and left-click and release the Alt key. 4. Use the Clone Stamp tool on a similar place where you want to paste the paper clip. 5. Clone Stamp tool will use the pixels from the source and paste it on the destination. Before After 2.16. Saving Images for Print Media 1. Click on File menu. 2. Click Save As (Short Key Ctrl+Shift+S). 3. Type the name for the picture 4. Select a file format for your image. 5. Click the save button. 42 The City School 2023-2024


Advance Imaging 2.17. Saving Images for Web 1. Click on File Menu. 2. Click Export > Save for Web (Short Key Ctrl+Alt+Shift+S). 3. Select Fit on Screen to check the overall look of the image. 4. Select an appropriate file format. 5. Set your required quality. 6. Check the estimated file size to meet the desired requirement. 7. Click the Save button to save the file. While saving pictures for the web we have to be careful about the size of the file as on the web we are always keen to keep the file size small, this helps the website load quickly as all the content on the webpage downloads on your computer via the internet. Therefore, it is highly recommended to save files intended for webpages in a smaller size. The recommended format is GIF, PNG and JPEG. Checkpoint The gradient tool creates gradual transition between multiple colours. Layer opacity determines to what degree it obscures or revelas the layer beneath it. 43 The City School 2023-2024


1. A raster graphics or bitmap image is a dot matrix data structure that represents a generally rectangular grid of pixels (points of colour), viewable via a monitor, paper, or other display media. 2. PPI & DPI (Pixel per inch and Dots per inch respectively) are the standard units for measuring image size. 3. Recommended resolution for printed images is 150-300 dpi, for Web images it is 72 dpi. 4. Resolution is the number of pixels on a printed area of an image. 5. In the swatches palette, you can choose a foreground or background colour and add a customized colour to the library. 6. The free transform command lets you apply transformations (rotate, scale, skew, distort, and perspective) 7. The Hue/Saturation command adjusts the Hue (colour), Saturation (purity) and lightness of the entire image, 8. The gradient tool creates a gradual transition between multiple colours. 9. The healing brush tool lets you correct imperfections, causing them to disappear into the surrounding image. My Notes Let’s Review My Notes! 44 The City School 2023-2024


Online Television Streaming Personal Cloud Storage Finances eCommerce Healthcare Weather Government Organizations Social Media Sports Practical Uses of Databases


Student Learning Outcomes ISTE Student Standard Coverage 1. Organize and create tables in MS Access 2. Create relationships between tables 3. Understand use of different data types in the database 4. Identify concept of primary and secondary key 5. Create simple and complex queries 6. Creare forms and reports through wizard feature 7. Import and export data in and out of MS Access 8. Creating, editing and sharing forms in Microsot Forms After going through this chapter, students will be able to: Empowered Learner Creative Communicator Computational Thinkiner 1a 1d 5a 5b 5c 6a 6d Handling Databases with Research


A structured set of data held in a computer, especially one that is accessible in various ways is called Database. A database is usually controlled by a Database Management System (DBMS). Together, the data and the DBMS, along with the applications that are associated with them, are referred to as a database system, often shortened simply to database. The common language among electronic database is SQL. It works at the backend of most of the user interface in any application. MS Access is one of the software which uses the same structure of SQL. Relational Database Management System (RDBMS). Microsoft Access is a database management system (DBMS) from Microsoft that combines the relational Microsoft Jet Database Engine with a graphical user interface and software-development tools. Access is an easy-to-use tool for creating business applications, either from templates or from scratch. With its rich and intuitive design tools, Access can help in creating appealing and highly functional applications in a minimal amount of time. 3.1. What is a Database? 3.2. Introduction to MS Access 47 The City School 2023-2024Handling Databases with Research


3.3. Datatypes in MS Access Every field in a table has properties. Properties define the field’s characteristics and behaviour. The most important property for a field is its data type. A field’s data type determines what kind of data it can store. MS Access supports different types of data, each with a specific purpose. Here are some of the most common data types you will find used in a typical Microsoft Access database. 1. Quick Access Toolbar: the quick access toolbar lets you access common commands no matter which tab is selected. You can customize the commands depending on your preference. 2. The Ribbon: the ribbon contains all of the commands you will need to perform common tasks in Access. It has multiple tabs, each with several groups of commands. 3. Tell Me: the tell me box works like a search bar to help you quickly find tools or commands you want to use. 4. Microsoft Account: from here, you can access your Microsoft account information, view your profile, and switch accounts. 5. Navigation Pane: the navigation pane displays all of the objects contained in your database. The objects are grouped by type. Double-click an object to open it. 6. Documents Tab Bar: all open objects are displayed in tabs on the document tabs bar. To view an object, click its tab. 7. Record Navigation Bar: the record navigation bar allows you to navigate records one at a time. Click the arrows to navigate through the records. You can jump to a specific record by typing its ID number into the box. 8. Record Search Box: you can use the record search box to search for any term in the current object. The first result will be selected automatically. To navigate through additional results, press the Enter key on your keyboard. 48 The City School 2023-2024


Handling Databases with Research Advance Imaging Types of Data Description Short Text Text or combinations of text and numbers, including numbers that do not require calculating (e.g. phone numbers). Long Text Lengthy text or combinations of text and numbers. Number Numeric data used in mathematical calculations. Date/Time Date and time values for the years 100 through 9999. Currency Currency values and numeric data used in mathematical calculations involving data with one to four decimal places. AutoNumber A unique sequential (incremented by 1) number or random number assigned by Microsoft Access whenever a new record is added to a table. Yes/No Yes and No values and fields that contain only one of two values (Yes/No, True/False, or On/Off). 1. To create a database from a template, we first need to open MS Access. 2. Select Blank Database. Enter the name and click the Create button. 3. Access will create a new blank database and will open up the table which is also completely blank. 4. After selecting a template related to your requirements, enter a name in the File name field and you can also specify another location for your file if you want and save it with your relevant name. Follow the steps below to create your first database in MS Access: Creating Database in MS Access 49 The City School 2023-2024


When you create a database, you store your data in tables. You should always start your design of a database by creating all of its tables and then creating any other object. Before you create tables, carefully consider your requirements and determine all the tables that you need. Create the first table that will store the basic contact information concerning the employees as shown in the following table: 3.5. Understanding Tables in MS Access Creating Tables in MS Access A field is a way of organizing information by type. Whereas, A record is one unit of information. Every cell on a given row is part of that row’s record. All tables are composed of horizontal rows and vertical columns, with small rectangles called cells in the places where rows and columns intersect. In Access, rows and columns are referred to as records and fields respectively. Each record has its own ID number. Within a table, each ID number is unique to its record and refers to all of the information within that record. The ID number for a record cannot be changed. 50 The City School 2023-2024


Click to View FlipBook Version