1st Edition
Computing
Wo n d e rs!
7th Grade
10100
1st Edition
Name:
Roll no:
Section:
ACKNOWLEDGEMENTS
Project Team/Co-Author
ED-TECH Research and Development Department
Tarib Ahmed
Chief Operating Officer- TechTree
Muhammad Taha
Chief Technology Officer- TechTree
Uzair Iqbal
Manager Ed-Tech and Research- TechTree
Saad Bin Imtiaz
Head of Trainings & STEM Research- TechTree
The entire computing curriculum in the STEM wonders book series have been mapped
with the attainment levels of ICDL & Single National Curriculum Pakistan education
policy 2021.
All rights reserved by TechTree. No part of this publication may be reproduced or
transmitted in any part by any means at any time.
Content Computing Wonders
CO N T E N T S 01 Computer Virus 04
1.1 What does a computer virus do?
1.2 Types of computer viruses
1.3 Malware
14. Preventing Virus infections
1.5 Antivirus Softwares
02 Communicating Online 17
2.1 Networking basics
2.2 What is a blog?
2.3 Social Media
24. Communication tools
2.5 Digital citizenship
03 Creating A Document 47
3.1 Formatting text
3.2 Advanced font formatting
3.3 Images and graphics
34. Working with tables
3.5 Project
04 STEM Activities 79
4.1 Moon Phases
05 Robotics 99
5.1 What is Robotics?
5.2 What are Robots?
06 Web Designing 104
6.1 Introduction to Web designing
6.2 Working with tags.
6.3 Working with List
64. Working with Images
6.5 Project – Design a WebPage
Contents
0 1S e ct i o n
Computer
Viruses
Students will learn :
1. What does a computer virus do?
2. Types of computer viruses
3. Malware
4. Preventing Virus infections
5. Antivirus Softwares
01 The Computer viruses Computing Wonders
Computer Viruses
A computer virus is a computer program that runs without the user’s knowledge on any
computer system. It is a malicious program that has the ability to duplicate itself and
sends copies of itself to other computers via the Internet.
A virus can be either destructive or non-destructive. Viruses can erase data or corrupt
program on a computer in some cases. Viruses are written by expert computer program-
mers to run on computer systems without the user’s knowledge.
Computer viruses enter a computer system and attach themselves to an item such as the
startup area or an executable file in the same way that biological viruses enter our bodies
and attack specific cells.
Most viruses remain active in the memory until the system is turned off. The virus is
removed from the computer’s memory, but not from the files. As a result, the virus
program is activated again the next time you use your computer. It may then attach the
infected file(s) or disc to additional programs and/or files.
5
01 The Computer viruses Computing Wonders
1.1 WHAT DOES A COMPUTER VIRUS DO?
A virus attempts to take over the computer system that it has infected. It replicates
itself and attempts to carry out the frequently dangerous duties that it has been trained
to undertake. This procedure might occur so rapidly that the user is unaware that a virus
has infected the computer. Some viruses are set to activate at a specific day and time.
Such viruses constantly monitor the system clock and damage when the specified time or
date arrives.
Viruses can also infect newly produced files on an infected computer, as well as the
contents of USBs (or other removable storage media) plugged into such a machine. They
include duplicates of themselves in these new files and/or files on the storage media.
1.1.1 What a Virus Can Do 1.1.2 What a Virus Cannot Do
Different viruses do different things. A There are certain things no program can
computer virus could be capable of any of do. A computer virus is a program; hence,
the following: it cannot do the following:
• It cannot infect files on write-protected
• It has the ability to infect executable discs, such as CD-ROMs.
software files, such as word processors, • It cannot infect computer hardware such
spreadsheets, and operating systems. as monitors and
• It is capable of infecting drives by attach- keyboards. It infects only software.
ing itself to special applications on the hard
disc known as boot records. These are the Did You Know?
programmes that allow the computer to
boot up. The first computer virus, called
• It is capable of infecting files attached to “Creeper system”, released in 1971.
email messages or transferred to drives and
USBs. It can propagate from one machine was an experimental
to another in this manner. self-replicating virus
• These are placed in the codes of links,
advertisements, and images so that when
users click on them, their devices become
unusable and information is compromised.
• These viruses write over your computer’s
content, rendering it useless.
6
01 The Computer viruses Computing Wonders
1.1.3 Warning Signals
When you notice unusual behavior, such as screen distortion or characters that do not
appear on the screen when entered, it is conceivable that a virus has infected the appli-
cations that control the display or the keyboard. If you are unable to open files, a virus is
most likely to blame. Although the hard disc of the computer is not physically damaged,
the data and programs stored on it may be corrupt-
ed or damaged.
Here are some of the most common signs of a virus
attack:
• The computer runs slower than normal.
• Applications take longer to load or do not work
properly.
• Unusual error messages appear on the screen.
• You notice changes in file size. Fig 1.1
• You notice that the hard disk has more files than it had earlier.
• The computer often freezes or stops responding.
• The computer restarts on its own.
• You see distorted menus and dialog boxes.
1.1.4 How Does a Computer Virus Spread?
Computer viruses move from one computer to another by the transmission of infected
data via emails, USBs, or other means.
Viruses are activated when you launch an infected application or boot your computer from
a disc containing infected system files. Once in the computer’s memory, the virus nor-
mally infects any application you launch Viruses behave in a variety of ways. Some remain
active in memory until the computer is turned off. Others are only active when the infect-
ed application is running.
7
01 The Computer viruses Computing Wonders
1.2 TYPES OF COMPUTER VIRUSES
1.2.1 File-infecting Virus 1.2.2 Macro Virus
A virus that attached itself to an executable A virus that attached itself to an
program. It is also called a parasitic virus executable program. It is also called a
which typically infects files with .exe or .com parasitic virus which typically infects
extensions. Some file infectors can overwrite files with .exe or .com extensions.
host files and others can damage your hard Some file infectors can overwrite
drive’s formatting. host files and others can damage your
hard drive.
1.2.3 Browser Hijacker 1.2.4 Web Scripting Virus
This virus targets and alters your browser A very sneaky virus that targets pop-
setting. It is often called a browser redirect ular websites. What this virus does is
virus because it redirects your browser to overwrite code on a website and
other malicious websites that you don’t have insert links that can install malicious
any intention of visiting. This virus can pose software on your device. Web script-
other threats such as changing the default ing viruses can steal your cookies and
home page of your browser. use the information to post on your
behalf on the infected
1.2.5 Boot Sector Virus website.
These viruses are once common back when computers are booted from floppy disks.
Today, these viruses are found distributed in forms of physical media such as external
hard drives or USB. If the computer is infected with a boot sector virus, it automatically
loads into the memory enabling control of your computer.
1.2.6 Polymorphic Virus
This virus has the capability to evade anti-virus programs since it can change codes
every time an infected file is performed.
8
01 The Computer viruses Computing Wonders
1.2.7 Resident Virus Do You Know?
A resident virus stores itself on your com- Before the development of computer
puter’s memory which allows it to infect files networks, many viruses were transferred
on your computer. This virus can interfere
with your operating system leading to file using floppy disks.
and program corruption.
1.2.8 Multipartite Virus
A type of virus that is very infectious and
can easily spread on your computer system.
It can infect multiple parts of a system in-
cluding memory, files, and boot sector which
makes it difficult to contain.
1.3 MALWARE
Malware is an abbreviation for harmful
software. The term refers to any program that
infects and harms a computer without the
user’s knowledge or permission.
Malware is a term for computer viruses,
worms, Trojan horses, spyware, and spam.
Malware can slow machines and networks, be
irritating, or be actively damaging.
1.3.1 Worms Fig 1.2
A computer worm is a software that may replicate and transmit to another computer
system, typically via a computer network.
Worms, unlike viruses, spread without human intervention. Viruses only spread when a
user does something, such as executing an infected software or attaching an infected
file.
9
01 The Computer viruses Computing Wonders
A worm sends copies of itself via email to other Fig 1.3
computers, infects them, and uses the infected
computer’s contact book to propagate further.
Typically, computer worms do not cause direct damage
to program or information. They do, however, require a
lot of memory and network traffic, slowing down the
computer and making it nearly impossible for the user
to work. Computer worms include CodeRed, Sircam,
and ILOVEYOU.
1.3.2 Trojan Horses
A Trojan horse is a program that appears to be useful but
is actually designed to send the user’s data to someone
else.
They do not spread by infecting other files or
self-replicating, like viruses and worms do.
A Trojan horse enters a computer system when a user
install it under the mistaken belief that it is a helpful and
harmless program. When a Trojan horse is triggered, it Fig 1.4
usually modifies or produces new desktop icons.
It may also remove critical system files. Its primary goal, however, is to steal sensitive
data saved on the infected machine. Some well-known Trojan horses are Twelve Tricks,
ClickBot.A, Zeus, Zero Access and Koobface etc.
1.3.3 Spyware
Spyware is a term that refers to computer program that secretly collect information
about the user and broadcast it to advertising or other parties who are interested.
They are also referred to as spybots or tracking software.
Spyware is frequently installed without the user’s knowledge when the following events
occur:
• the user downloads anything from the Internet; or • the user clicks on something in a
popup window that appears while surfing.
Spyware can eat up a lot of memory, making the computer slow and difficult to use.
The most serious issue with spyware is that it can steal your information and
misuse your machine.
10
01 The Computer viruses Computing Wonders
1.3.4 Spam Fig 1.5
Fig 1.6
Unsolicited, undesired email is referred to as spam.
It may contain advertisements or be used to
propagate malware such as viruses and worms.
Some methods for avoiding spam include:
• Never give out your email address to strangers.
• Use your email program’s spam filter to block
unsolicited emails.
• Delete spam messages without opening them.
The information on the card can be destroyed by
magnetic fields, physical damage, and contact with
certain liquids.
circles in this manner.This technology is called
optical mark recognition (OMR). It’s commonly used
to check exam answer sheets with multiple-choice
questions.
1.4 PREVENTING VIRUS INFECTIONS
Here are some general guidelines for avoiding viruses:
• Limit both offline and online access to your Smart Tip
system.
• Only allow trusted users to access the system. Since no security method is perfect,
it is important to back up your files
• Never use an unknown disc on your system regularly.
unless it comes from a reliable source and you
know it is virus-free.
• Install, use, and maintain antivirus software up
to date.
• If feasible, keep programs and data on differ-
ent discs.
• Scan any files you download from the Internet.
• Never click on a link or attachment in an email
unless it comes from a reliable source.
• Install and keep up to date an anti-spyware tool that protects against malware and
spyware. Ad Aware SE and Windows Defender are two examples of such apps.
• Download and run a free firewall tool to assist you prevent unwanted Internet traffic
that can cause difficulties. Make certain that the firewall is always turned on.
• If you receive a dangerous script from a web page and are unsure what to do, or if a
popup opens asking if you wish to accept an automatic installation, select NO. 11
01 The Computer viruses Computing Wonders
1.5 ANTIVIRUS SOFTWARE
Antivirus software is software that detects and removes viruses from computer systems.
Certain viruses, on the other hand, are difficult to remove, and the files they destroy may be
lost forever. When the computer system boots up, the antivirus software kicks in and mon-
itors every file that is opened or run, as well as any Internet traffic. If it finds a virus, it will
attempt to eradicate it. For an antivirus application to be effective, the following require-
ments must be met:
• It should always be running in the background.
• It should be kept up to date so that it can detect new versions of harmful applications.
• It must be capable of scanning email attachments and files as they are downloaded from
the Internet.
• The user should do full disc scans on a regular basis. This programme examines all of the
files on a computer system.
Some popular antivirus programs are:
• Bitdefender Antivirus
• Norton 360 AntiVirus
• Webroot SecureAnywhere
• Microsoft Security Essentials
• Webroot SecureAnywhere
• Trend Micro Antivirus+ Security
Fig 1.7
Do You Know? 1.5.1 Avast Antivirus
Let us study the Avast Antivirus Software
in more detail to understand how an antivi-
rus program helps to secure your system.
Across the world, antivirus programs To start Avast Antivirus, click Start >
detect 350,000 viruses every day All Programs » Avast Antivirus Or
Double-click the Avast Antivirus icon in
the Windows system tray.
12
01 The Computer viruses Computing Wonders
1.5.2 Avast Antivirus Main Window
On the left bar, there are 4 options;
Table 1.1
Status It shows the status of your computer/machine
Protection You can scan your computer here and also check firewall settings
Privacy In privacy, you can protect your password, devices and also hack alerts
Performance In performance you have the option for updating the software
Fig 1.8
13
01 The Computer viruses Computing Wonders
THE TOP BAR HAS 2 MAIN OPTIONS
1) NOTIFICATIONS
You can set your alerts and monitor
your history.
2) MENU
Enables you to customize and configure settings.
You can decide settings for automatic update,
full system scan and it also Provides
information on how to use Avast Antivirus and
provides details about the version, virus
database, etc.
3) SYSTEM SCANNING
To perform full system scanning,
click on Performance, then Virus
Scans, and then you will have the
option for Full system Scan.
14
01 The ComputerEvnirudseOs f Section - 01 Computer Viruses STEM Wonders
Choose the right one!
1) Which of the following infects the files in a computer?
1 Bacteria.
2 Virus.
3 Fungi.
4 Parasite
2) The first computer virus was called _____________.
1 Creeper System.
2 CodeRed.
3 Sircam.
4 TheFamous.
3) __________ is an abbreviation for harmful software.
1 Virus.
2 Bacteria.
3 Malware.
4 Trojan.
5) Malware that may replicate and transmit data to another computer system, typically
via a computer network is ____________.
1 Trojan Horse.
2 Spyware.
3 Spam.
4 Worms.
6) Which of the following can be effective in preventing virus infections?
1 Limit both offline and online access to your system.
2 Only allow trusted users to access the system.
3 Scan any files you download from the Internet.
4 All of the above.
15
Answer the following!
1. Define computer virus?
2. Write down the most common signs of a virus attack?
3. List down types of viruses?
4. Define Malware? Also, list down its types?
16
STEM Wonders
0 2S e ct i o n
t
Students will learn :
1. Networking basics
2. What is a blog?
3. Social Media
4. Communication tools
5. Digital citizenship
02 Computer Networking Computing Wonders
It’s time to investigate one of the Internet’s most powerful features: communication. You
will learn about networks and how to communicate with others in this subject. Blogs,
communication tools, and virtual communities will all be covered.
Learning Objectives
In this module, you will learn
> How to construct your personal website and
share your views and ideas;
> How to use websites to interact with your
friends and learn about their news;
> How to use websites to learn about their news.
> How to connect with others using your computer and the Internet;
> How to respect other people’s personalities and work.
Skills
After studying this course, you will be able to:
> Understand what a network is and how to distinguish among different types
of networks;
> Use blogs to post articles and comment on other people’s posts;
> Use Facebook and Twitter to stay connected;
> Use Skype to make calls and video calls;
> Think and act like a perfect digital citizen.
Tools 2.1 Networking Basics
> Blogger
> Facebook What precisely is a network? It’s necessary to clearly
> Twitter define a network and learn about the many sorts of
> Skype networks based on topology or geographical constraints.
> Apple Facetime
> Google Android A computer network (also termed as a network) is a
> Edmodo combination of two or more computers and other devices
(such as printers, mobile phones, and tablets) connected
by cables, fiber channels, or wireless devices (infrared,
radio waves, satellites, etc.). The systems and hardware
devices which access the network are referred to as
“nodes.” Network nodes connect with one another to
exchange data, files, messages, and devices.
18
02 Computer Networking Computing Wonders
2.1.1 Network Topology
Network topology refers to how computers are linked together. The most frequent
topologies are as follows:
Point-to-point: This is the most basic topology, consisting of a persistent connection be-
tween two nodes. Point-to-point topology is used in traditional analogue telephony. This
implies that a point-to-point circuit can be built up dynamically (for as long as needed)
and then discarded when no longer required.
Bus Topology: A single wire connects each node.
2.1.2 Network Categories
Networks are also classified according on the geographical distance between connected
devices. There are two kinds of networks: local area networks (LANs) and wide area net-
works (WANs).
A LAN links computers in a limited region, such as a house or workplace.
A WAN spans a larger region that may extend beyond a country’s borders. For instance,
the Web is a sort of WAN.
Since it is costly and difficult for larger networks, the physical fully linked mesh
architecture is utilized for networks with a modest number of nodes.
2.1.3 The Client/Server Model
A network is made up of two or more linked HISTORY
computing nodes. Tim Berners-Lee, Is a British computer scien-
The most popular model is client/server. It’s tist and the originator of the World Wide Web.
absolutely everywhere: schools, banks, and so forth. On December 25, 1990, he created the first
You may go anywhere. As a network grows in size, successful communication between an HTTP
server and the client with the cooperation of
Robert Calliau.
it supports more jobs and the burden grows. Each
computer in a network should have a unique role in
order to split and the burden.
The client/server approach operates as a distributed
software, with some computers acting as servers
and others as clients. Consider a store with workers
and clients. Clients have demands that the workers must fulfil. In the client/server para-
digm, the servers must satisfy the requests of the clients.
The client/server concept underpins services such as email and online access. When you
19
02 Computer Networking Computing Wonders
The client/server paradigm is the most often used. It
may be found practically anywhere, including schools,
banks, and so on.
2.1.4 Information exchange
Fig 2.1
In order to share messages and information, computers in a network must interact with
one another. Computer communication differs greatly from human communication.
Computers “speak” to one another using various “languages” known as communication
protocols.
2.1.5 Digital units
Bit is the fundamental digital unit. A bit can be either 1 or 0. Binary digits are these two
values that might have different meanings. The most well-known usage is for states
(on/off).
1 Bit
1 Kb 1024 Bits
1 Mb 1024 Kb 1.048.576 bits
1 Gb 1024 Mb 11.073.741.824 bits
1 Tb 1024 Gb 1.099,511.627.776 bits
There are other information units that are described as multiples of bits. The most
popular is the byte, which has 8 bits.
1 Byte 8 Bits 1.048.576 bits
1 Kb 1024 Bits 11.073.741.824 bits
1 Mb 1024 Kb 1.099,511.627.776 bits
1 Gb 1024 Mb
1 Tb 1024 Gb
20
02 Computer Networking Computing Wonders
2.1.6 Communication Protocol
A communication protocol is a set of rules that govern the exchange of digital message
forms. A protocol specifies how messages should be constructed.
Computer communication is now dependent on the exchange of data packets. The data
to be sent is divided into little pieces that are tagged with the sender and receiver’s
identity. It is similar to the conventional postal service with postcards. Packets have a
limited length and are sent from one computer to another to their destination. If a loss
of a packet is detected, it must be resent. Whenever a packet is received, the receiver
must send an acknowledgement to the sender to notify it that the packet was
successfully received. Re-transmissions are reduced as a result.
Packets must have certain structure:
1. It has bits for the sender and receiver, including the network protocols and packet number.
2. The information data known as Payload.
3. The Trailer is a pair of bits that inform the receiver that it has reached the end of the packet.
A packet’s structure is shown below.
Header Payload Trailer
> Sender’s address > Information Data > Data to show the end of
packet
> Receiver’s address
> Protocol
> Packet number
2.1.7 Network Speed
As technology advances, so are users’ expectations. Speed is the most typical need.
Speed in computer networks refers to how quickly data is sent. Speed in a network is
measured in binary units per second. For instance, 1 bit per second is expressed as 1 bps
or 1 bit/s and signifies that it takes 1 second to transmit 1 bit. Many solutions have been
developed to improve transmission speed in both wireless and wired networks.
21
02 Computer Networking Computing Wonders
Asymmetric Digital Subscriber Line (ADSL)
ADSL is now the most widely used solution for enabling quicker transmission of data
over telephone lines. When compared to standard modem lines, ADSL allows more data
to be sent over existing telephone lines. ADSL can receive data at speeds ranging from
15 to 24 Mbit/s and transmit data (downstream) at rates ranging from 0.5 to 3.5 Mbit/s
(upstream).
Very high bit-rate Digital Line Subscriber (VDSL)
VDSL is a next-generation DSL technology that transmits data faster than ADSL. For
short distances, VDSL enables extreme data speeds of 300 Mbps downstream and 100
Mbps upstream.
3rd generation (3G), 4th generation (4G) and 5th generation (5G) networks
Fast mobile communication and Internet accessibility are provided via 3G networks. 4G
networks are the replacement for 3G networks. Today, 4G Long Term Evolution (LTE)
provides up to 100 Mbit/s for data reception and 50 Mbit/s for data transmission. 5G
networks will be available very soon, bringing increased speed and new capabilities.
2.1.8 Optical Fiber
An optical fiber is a thin, flexible, transparent fiber
composed of silicon or plastic. Data is transformed
to light, and optical fibers allow for data interchange
across greater distances and at faster data speeds
than other kinds of communication. Fig 2.2
2.1.9 How the Internet works
The internet allows us to send data all across the world in seconds. When you connect
your computer to the Internet, you are connected to a unique sort of server that your
Internet Service Provider provides (ISP). The ISP server connects your computer to the
outside world, or the Internet. When you visit a website or check your email, your com-
puter sends a request to the ISP server, which connects to other Internet servers and
forwards the request. A web server is a type of Internet server.
Previously, if someone wanted to get knowledge, he or she had to visit a public library and
spend some time looking. We now have the Internet. The Internet is the most compre-
hensive information source, and individuals can access it from their homes, workplaces, or
anyplace else using their mobile phones.
22
02 Computer Networking Computing Wonders
See what happens when you want to view a web page from your browser:
1. Type an address you want to go in the address bar of your browser.
2. Browser will sends a request to your ISP server asking for the page.
3. Your ISP server will find the exact web server from the vast database which hosts the website
you want, then sends a request for the page to this web server.
4. The web server sends the requested page to your ISP server.
5. ISP sends the page to your browser and you see it displayed on your screen.
HISTORY
The Integrated Services Digital Network
(ISDN) enables digital phone, video, and data
transfer. The Public Switched Telephone
Network (PSTN) connects each telephone in
the globe to any other. The PSTN has a data
transmission rate of 64 Kbits/s. Both of these
technologies are becoming more outdated.
23
02 Computer Networking Computing Wonders
LET’S DO IT!
Across Down
3. This network covers a broader area that 1. Network consists of two or more
may exceed country’s border interconnected computers
5. Devices connected in a network are called? 2. Simplest network topology
6. WWW stands for? 4. 1 or 0 are?
7. One of the tools of communicating online
Fill the gaps with the correct word:
Internet, LAN, bus, blogs, networks, bit
> A _____ links computers in a limited region, such as a house or workplace.
> Use _______ to post articles and comment on other people’s posts.
> A ____ can be either 1 or 0.
> A single wire connects each node is called _____ topology.
> The __________ allows us to send data all across the world in seconds.
> Many solutions have been developed to improve transmission speed in both wireless
and wired ___________.
24
02 Computer Networking Computing Wonders
2.2 What Is A Blog?
A blog is a website that contains regular entries known as “posts.” The postings are
normally shown in chronological order, with the most recent entries at the top of the main
page and the most recent posts at the bottom and on other web pages.
A blog is typically created by one person and updated on a regular basis. It is frequent-
ly written on a specific topic. Blogging may be used for anything you can think of, from
photography to recipes, personal ideas, and hobbies. Others may learn a lot of things via
blogs, exchange ideas, make friends.
There are unwritten “blogosphere” norms that every blogger should obey. Concern how
you should write as well as how you should act while using other sources and other peo-
ple’s words in your writings:
> When writing a blog, be explicit so that the reader understands the goal of your con-
tent. Images, illustrations, bullet points, and highlighted language make the content easier
and more enjoyable to read.
> Be aware of the readers to get bored while reading, keep your text short.
> Do corrections, if needed before publishing your blog.
> You should always mention your sources while writing a blog. If you refer to another
post or blog, include a link to it. To follow the principles of fair use, you must identify the
source of the quotation. You should do this by noting the original author’s name as well
as the name of the website or blog where the quotation was first used, as well as a link
back to the original source.
> Under fair use legislation, using a few words or a phrase and identifying your source is
permissible. However, if you want to replicate more than a few words or phrases, you must
need obtain permission from the original author to republish their material in your blog.
Permission is also required for the usage of pictures and graphics on your blog.
> Your blog’s content is visible to the entire globe. The language you use in your blog may
be regarded offensive in the same way that a reporter’s or a person’s spoken comments
may be. Avoid legal problems by writing for a worldwide audience. You never know who
could stumble over your blog. Always write on relevant topics.
The last three blogging principles are critical because bloggers who do not follow them
may face unfavorable publicity or worse, legal difficulties.
25
02 Computer Networking Computing Wonders
2.2.1 How to create your own blog with Blogger
To create a new blog
> Log into blogger.com.
> Click New Blog.
> Type a Title, an Address and click a tem-
plate.
> Click Create blog!
Create a blog Fig 2.3
Address
Fig 2.4 Fig 2.5
If you want to be a young journalist, blogs are a good place to start.
The Title is the title for your new blog.
Address denotes where your article will be published.
By choosing a Template, you actually choose what your article will look like.
26
02 Computer Networking Computing Wonders
2.2.2 Edit your profile HISTORY
Peter Merholz invented the term “blog” in April
You may also change your profile to control what or May 1999, as a portmanteau of the phrase
information other people see about you. To modify
your profile, please follow the instructions below. “weblog.”
Edit your profile
> On the top right corner, click your name
and click View profile.
> Now you can fill in the information you
want.
Fig 2.6
2.2.3 Posting on your blog and making comments
It’s a simple task to add a new post to your blog once you’ve established it.
Fig 2.7 27
02 Computer Networking Computing Wonders
2.2.4 Update your post
You may want to update your posts from time to time by adding or removing information.
Use the Post Editor to handle this.
2.2.5 Post a comment Fig 2.8
You may leave a comment on your own post or respond to someone else’s.
Fig 2.9
28
02 Computer Networking Computing Wonders
2.2.6 Insert images and links from YouTube to your post
It is advised that you include photos and links from sites such as Youtube.com to make
your article more alive and engaging. We’ll look at how you can accomplish such things
here.
Fig 2.10
29
02 Computer Networking Computing Wonders
Now you can see the option of YouTube under the upload videos section:
Fig 2.11
To remove a video, just click on it and delete.
Just do it!
Now, Select a topic of your choice (i.e. sports, entertainment, history etc.) and create a
blog with Blogger.com. Create a new post and type an article including images and videos.
Get comments by your friends and reply them.
30
02 Computer Networking Computing Wonders
2.3 Social Media
2.3.1 Facebook
Facebook is one of the largest social network for individuals who have similar interests,
hobbies, backgrounds, or in-person relationships. Each user has a virtual representation,
defined as a profile, as well as social connections, known as a network. Facebook offers
ways for users to communicate through the Internet, such as email and instant messaging.
People can also share events, news, or ideas with others in their network from anywhere
around the world.
Users must register in order to build a personal profile, add other users as friends, and
exchange messages, including automatic alerts when their profile is updated.
You can also do business from Facebook by creating your business account, Millions of
business accounts are registered on Facebook and it really helps to boost them because
audience from all around the world can see what you are selling and interested audience
can directly contact.
In order to use Facebook, you need to have an account or if you have it so just log in.
Fig 2.12
31
02 Computer Networking Computing Wonders
Friends
Now, Select a topic of your choice (i.e. sports, entertainment, history etc.) and create a
blog with Blogger.com. Create a new post and type an article including images and videos.
Get comments by your friends and reply them.
Fig 2.13
Or you can search for someone by his/her profile names from search option and send
them a Friend Request, they will be notified by Facebook and will have an option to “
accept” or “decline” your Friend Request and so do you whenever you will have a Friend
Request.
You can get Friend requests from people all over the globe that does not imply
that you must accept everyone as a friend. Avoid strangers, even if they don’t
appear to be suspicious.
32
02 Computer Networking Computing Wonders
Chat
You can chat with friends on Facebook.
Fig 2.14
Fig 2.15
33
02 Computer Networking Computing Wonders
Fig 2.17
Fig 2.16
Facebook has a website and its own application on Windows/ Android and iOS. So
everyone could use it through their phones. Also, they have an application for chatting
called ‘Messenger’, which is embedded with Facebook so you can have a totally different
environment for chatting and enjoying with friends. You can also do Voice and Video Calls
on Messenger.
Post
You may also upload messages to your Facebook page that you want to share with others.
That message is called a ‘Post’.
Fig 2.18
34
02 Computer Networking Computing Wonders
You can add pictures, videos, location, voice, emoji, and you can also tag your friends on
your post. ‘Tag’ is basically to mention anyone by their Facebook name.
Fig 2.19
Restrictions
By tapping Filters, you may specify who can see your posts, photographs, and videos. You
only need to pick who will be able to view what you posted from the list
Fig2.20
Fig 2.21 35
02 Computer Networking Computing Wonders
A good idea is to group your friends into categories. This way, when you post a link, a
photo or a video, you can easily decide who is going to see, repost or make a comment on
your post.
Since Facebook is a worldwide social media platform, keep in mind that not everyone who
wants to communicate to you is a close friend or someone you know. Consider who you
accept as a “friend” and chat to, and think hard before exposing your life on the Internet
2.3.2 Twitter
Twitter is a microblogging and social networking website, windows/mobile application that
allows users to post and receive brief text-based communications known as “tweets.”
Twitter provides several features to its users. It lets you to send and view tweets from
other users. Tweets are limited to 280 characters, and the process is also known as mi-
croblogging since they resemble short blog posts. The Twitter website, application, SMS
(text messaging), and emails may all be used to send and receive updates. You can limit
distribution to your friends’ circle (delivery to everyone is the default). Finally, you may
search for individuals by name or user name, import friends from other networks, or send
email invitations to pals.
Followers are people who have opted to receive your Tweets via Twitter. You “follow”
someone if you add them to your list of people to read.
Fig 2.22
36
02 Computer Networking Computing Wonders
Fig 2.23
Basic Rule of dialog:
1. Respect other’s opinions, whether you agree with it or not.
2. Put your point of view in a polite way after listening to other’s
3. Don’t use bad language with your closed ones too
4. Use punctuations. Even a comma can change the meaning of your words.
5. Don’t delete posts that you don’t agree with. Instead try to explain your point of
view. Only delete posts if someone says bad things to you or your friends.
6. Immediate report to your parents or delete / block, if a person is threatening or
bullying you
Just do it!
Fill the missing words:
> The message you upload on Facebook is called a __________.
> There are unwritten _________________ norms that every blogger should obey.
> In Twitter, You ________ someone if you add them to your list of people to read.
> You can also do business from Facebook by creating your ___________ account
> Facebook is one of the largest ____________ ___________ for individuals who have similar
interests.
> Tweets are limited to ____ characters, and the process is also known as _________________
37
02 Computer Networking Computing Wonders
2.4 Communication Tools
It’s time to figure out how to utilize the Internet to interact with your buddies. You may
use a variety of free programs to chat, conduct phone calls, or make video conversations.
All of these systems operate on the basis of a contacts list. All you have to do is add a
buddy as a contact and then select one of the alternatives provided by the application.
2.4.1 SKYPE
Skype is a communication application that allows users to interact with others via voice,
video, and instant messaging via the Internet. Traditional telephone networks allow you
to call pals. Calls to other Skype users are free, however calls to landlines and cell
phones are paid using a debit-based user account system. You will learn how to add
contacts to Skype, how to exchange instant messages with pals, and how to make voice
and video conversations in this section.
Skype is free to use and may be downloaded from the Internet. To utilize it, though, you
must first register a Skype account. You may also use your Facebook or Windows Live
account to access Skype.
Get notify
from here
Fig 2.24
Chat with
your friends.
You can call your Add
contacts or anyone Contacts
who has given you from here
the code to join the
call.
Fig 2.25
38
02 Computer Networking Computing Wonders
Fig 2.26
Fig 2.28
It is easier to search for a user by using Full name and Skype Name.
HISTORY
Scott Fahiman was the first documented
person to use the emoticons and :-( with
the specific suggestion that they be used to
express emotion.
39
02 Computer Networking Computing Wonders
Just do it!
Ask all your friends sign up for Skype or any comparable free service. Exchange instant
messages and make audio and video conversations to communicate with one another.
Make a list of the benefits and drawbacks of the two communication tools and compare
them. Send the report to your contacts and share the file with them using these
methods.since they resemble short blog posts.
‘Tag’ is basically to __________ anyone by their Facebook profile name.
Immediate report to your parents or delete / block, if a person is __________ or ________
you.
2.5 Digital Citizenship
2.5.1 Personal data
Personal data is any information about a person that may be used to identify him or her.
Personal data includes things like a name and surname, a phone number, an identity num-
ber, and so on. There are several hazards nowadays, with so many individuals chatting
online. As a result, we must take precautions. Never offer your name, address, phone
number, or any other sensitive information to strangers or unknown websites.
If the site is well-known, you may provide some information, but always exercise discre-
tion. There are websites, such as those offering free email services, that may request
your name and maybe other personal information. It is entirely up to you whether or not
to provide accurate information.
Sensitive personal data is defined in the US Data protection Act as any personal data
about
> The racial or ethnic origin, the political opinions or the religious or philosophical beliefs
of the person.
> Whether the person is a member of a trade union.
> The physical or mental health or condition or personal life of the person.
> The commission of any offence by the person.
> Any proceedings for an offence committed by the person, the course of such
proceedings or the sentence of any court in such proceedings.
> You must also be careful with such personal data, especially when you refer to other
people.
40
02 Computer Networking Computing Wonders
2.5.2 Digital citizenship
“Digital citizenship” refers to the notion of teaching instructors, students, and parents on
how to utilize technology correctly. Essentially, digital citizenship is a method of preparing
kids to live and work in a technologically advanced society.
Students and adults alike frequently overuse and abuse technology. The problem that
digital citizenship is attempting to solve is not only what users do not know, but also what
is deemed proper technological usage.
One example is intellectual property (IP), which is everything unique that someone’s mind
generates. There is a wealth of information available on the Internet. There are so many
excellent items to share, and so many individuals have generously donated their time. As a
result, it’s critical that they get some of their valuable spare time. As a result, it is
important that we respect it.
To respect Intellectual Property
> Cite the source of any photos or information.
> Before using other people’s work, get permission first.
> nclude connections to your websites rather than simply downloading and reposting in-
formation as if it were yours.
> Share your own stuff with others.
> Avoid using pirated software, movies, or music.
2.5.3 Intellectual property law
A law is a collection that everyone must abide by. These norms are enforced by the
courts and police, and those who violate them are punished. Intellectual Property (IP)
law governs people’s rights to the things they produce, such as art, music, and literature.
This is known as copyright. It also protects people’s innovations using a specific type of
law known as a patent. Copyright infringement is the unauthorized use of copyrighted
content, such as copying or distributing it. The act of copying and selling non-free movies
and music is referred to as “piracy.” People who cannot afford the higher prices of orig-
inal items find illicit copies more enticing because they are frequently supplied at a low
price. However, this does not make “piracy” correct.
Copyrighted material: It’s important to remember
> Literary work: books, articles, poetry. that the creator is the owner
> Music, songs and MP3 files. of their work. This gives him
> Computer software. Art: graphics, drawings, sculptural or her rights that have to be
works, etc.
> Animations and videos. Architectural works. recognized and protected.
41
02 Computer Networking Computing Wonders
2.5.4 License
A software license is a contract made by the product’s producers that governs the use
and redistribution of the software. This license is designed to protect software against
unauthorized usage. When using proprietary software, you should always obtain a license
that allows you to use it. Maintenance is included with software license. This is typically
for one year and might be included or optional. It is frequently purchased in conjunction
with software. The maintenance agreement (contract) includes minor updates (e.g., from
version 1.1 to 1.2) as well as big updates (e.g., from version 1.2 to 2.0) and is known by
many names such as Update or Software Assurance. If a substantial update to the
application is not already included, the buyer must generally purchase an “upgrade.”
Besides the proprietary license, there are also two other
types of licenses:
Free-software license.
Open-source license.
A free software license is a software license that allows anyone to use and redistribute
software that would otherwise be illegal under copyright law. The open source license is
similar to a free software license, except it also includes the program’s source code. You
may simply examine the code or make modifications and share the “new” application as
open source software.
2.5.5 Freeware HISTORY
The origins of the notion of intellectual proper-
Freeware is software that is offered to users for ty are unknown. Henry VI gave the first patent
free or for a small price, but generally with one or
more limiting usage rights. In contrast, commercial in England to John of Utynam of Flanders in
software is often sold for a profit. However, free- 1449. Utynam received a 20-year monopoly on
ware may be offered for a business or commercial the production of stained glass at Eton College
purpose and is licensed at no cost in some situa-
tions. as a result of the patent.
2.5.6 Shareware
Shareware is offered to users for free and on a trial basis. Shareware is frequently
available as a download from a website or as a compact disc bundled with a newspaper or
magazine. The idea behind shareware is to provide purchasers the opportunity to evaluate
the program’s utility before acquiring a license for the full version of the software.
42
02 Computer Networking Computing Wonders
NOTE
“Plagiarism is copying someone else’s work
word for word or paraphrasing it and saying
that it is your own work. Don’t copy just
anything from the Internet to do your home-
work, even if it’s free content!”
Just do it!
Fill in the missing word.
> ___________ data is any information about a person that may be used to identify him or
her.
> Literary work: _______, _________, ________.
> Types of licenses: 1. ________________________, 2. __________________________, 3.
____________________________.
> _____________ is copying someone else’s work word for word or paraphrasing it and
saying that it is your own work.
> Software that is offered to users for free and on a trial basis is called
__________________
2.6 Project
This is an individual’s project, you have to search on the internet for the Northern tourist
areas of Pakistan and collect as much information as you can. Discuss it with other class-
mates just to get some more information and give them some knowledge from your side
too.
Ask your teacher for help when you are collecting information. Ask to provide you with
information about books and magazines that can help you with your project.
When you get the information, write a report on how we can attract more tourist to our
Beloved country and what are our mistakes and their solutions.
Create a blog and post your article on blogger.com.
Make your article more exciting and visual by using images and videos where they are
relevant.
43
02 Computer Networking Computing Wonders
WRAP UP!
Now you know:
~ How a network works.
~ How to create a blog by expressing your own ideas and share them with others.
~ How to use Social Media platforms like Facebook and Twitter to stay in touch with your
friends.
~ How to connect and communicate with people via Skype.
~ How a digital citizen should behave and respect other people’s work.
44
End Of Sectionv - 02 Communicating Online
Choose The Right One!
1. A _________________ is a combination of two or more computer con-
nected together.
a. Computer Network.
b. Internet.
c. WAN.
d. World Wide Web.
2. ______________ refers to how computers are connected together.
a. Computer Network.
b. Network Structure.
c. Network Topology.
d. None of the above.
3. LAN stands for?
a. Local Access Network.
b. Large Access Network.
c. Local Area Network.
d. Large Area Network.
4. A __________ is the fundamental digital unit?
a. A Byte.
b. A Bit.
c. A Nibble.
d. None of the above.
5. Which of the following are social media platforms?
a. Facebook.
b. Twitter.
c. Instagram.
d. All of the above.
45
End Of Sectionv - 02 Communicating Online
Answer the following!
1. Define ADSL and VSDL?
2. Write the steps for creating a blog?
3. Define what is Skype and why it is used?
4. List all the copyrighted material?
5. Define what is a software license and its types?
46
STEM Wonders
0 3S e ct i o n
CREATING A
DOCUMENT
Students will learn :
1. Formatting text
2. Advanced font formatting
3. Images and graphics
4. Working with tables
5. Project
03 Computing Numbers Computing Wonders
3.1 Formatting text
Writing text is one of the most common actions we perform on computers. It could be
a simple message or an email from a school project to a friend. Because text is so im-
portant, several applications have been created to create and edit it. Microsoft Word
is a powerful application that can be used for not just writing but also formatting text,
creating tables and labels, and even playing with photos and shapes. Microsoft Word
has a basic and intuitive user interface.
To open Word:
> Click Start
> In the Search programs and files text box, type Word and press Enter. The program
will appear on screen.
1.
2.
3.
4.
5.
6.
Fig 3.1
1. The Quick Access Toolbar lets you access common commands no matter which tab is
selected. By default, it includes the Save, Undo, and Redo commands.
2. The Ribbon contains all of the commands you will need to perform common tasks in
Word. It has multiple tabs, each with several groups of commands.
3. Each group contains a series of different commands. Simply click any command to
apply it. Some groups also have an arrow in the bottom-right corner, which you can click
to see even more commands.
4. The Ruler is located at the top and to the left of your document. It makes it easier
to make alignment and spacing adjustments.
5. This is where you’ll type and edit text in the document
6. Click and drag the slider to use the zoom control. The number to the right of the
slider bar reflects the zoom percentage.
48
03 Computing Numbers Computing Wonders
3.2 Start typing
Starting to type in Microsoft Word is extremely simple. Simply click the white page, then
use your keyboard to text as soon as the cursor begins to flash.
To learn how to write quickly and accurately, you must first understand how to position
your hands on the keyboard. First and foremost, you must use both hands.
Consider dividing your keyboard into two sections. In this section, you utilize your left
hand. Your left hand is used in the TGB keys and to the left, and your right hand is used
in the YHN and to the right.
Fig 3.2
Fig 3.3
49