Approved by the Government of Nepal, Ministry of Education, Science and Technology Curriculum Development Centre, Sanothimi, Bhaktapur as an additional material for school Anamnagar, Kathmandu, Nepal Phone: 0977-01-4313205 Author Subodh Kumar Upadhyaya M.Sc. Ph.D. Editor Chinta Mani Panthee M.Sc. Ph.D. 8
Publisher and Distributor: Oasis Publication Pvt. Ltd. Tel: 00977-1-4313205 Author: Subodh Kumar Upadhyaya Editor: Chinta Mani Panthee Language Editor: Romharsh Panthi Edition: Eleventh : 2080 Copyright : Author and Editor Price : Rs. 493 /– Print Quantity : 10,000 Computer layout: Zeeta Computer Service Pvt. Ltd. Printed in Nepal 8
Kathmandu, Nepal Author Oasis School Science and Technology for Grade 8 is an attempt to make learning a joyful experience. This textbook has been written in strict conformity with the latest syllabus prescribed by the Curriculum Development Centre, Sano Thimi, Bhaktapur, Nepal. This book has been designed to help students develop their conceptual thinking and scientific skills. I think this book is an excellent introduction to experimentation and practical application of Science. I hope it will greatly facilitate teaching learning process in an easy and enjoyable manner. The beauty of this textbook lies in having high resolution pictures, attractive layout, and clear illustrations with lucid language. It emphasises concept building rather than merely focusing on providing and collecting information without critical thinking. I expect this book will assist students to make them eager and quizzical learners that reinforces their conceptual learning in the classroom. Alongside the learning process of the students, this book will help teachers with their teaching in the class. Each unit of this book presents the subject matter in an interesting, understandable and enjoyable manner. The exercise at the end of each unit includes a variety of questions to facilitate the integration of various concepts taught. Above all, I sincerely believe that this book will be helpful in imparting the understanding of science among students in an interesting manner. It is not a hidden fact that modern era is the era of science and technology. Science is a part of the world we live in and an avenue to the technology we use. A good textbook in science should assist the learners to realise different activities and events around us that encourage them for further discovery and innovation. I strongly believe that students should enjoy science and this book will be a means of enjoying and learning science in the modern era of science and technology. I wish to express our sincere gratitude to Mr. Surendra Karki, Managing director of Oasis Publication Pvt. Ltd. for publishing this book. Similarly, thanks are due to Mr. Deepak Bahadur Bista, Ashim (Indra) Rijal, Deepak Banjade, Dilip Belbase, Srijan Pasachhe and Srijan Adhikari for their valuable help during the preparation and content editing of the book. In my opinion, the real judges of a book are the teachers concerned and the students for whom it is meant. Despite all my efforts, there might be textual as well as technical errors. Therefore, constructive suggestions for rectification and improvement of the book would be gratefully acknowledged and incorporated in further editions. Author Kathmandu, Nepal. Preface
Contents Unit 1 Scientific Learning ............................................................................. 1 Unit 2 Information and Communication Technology ..............................16 Unit 3 Structure of Living Beings................................................................ 45 3.1 Cell and Tissue ........................................................................... 46 3.2 Classification of Living Beings ..................................................61 Unit 4 Environment and Bio-diversity.........................................................80 Unit 5 Life Process .........................................................................................97 Unit 6 Force and Motion .............................................................................127 6.1 Motion..........................................................................................128 6.2 Simple Machines.........................................................................143 6.3 Pressure .......................................................................................155 Unit 7 Energy in the Dailly Life .................................................................170 7.1 Heat .........................................................................................171 7.2 Light .........................................................................................188 7.3 Sound ......................................................................................202 Unit 8 Electricity and Magnetism ............................................................. 216 8.1 Magnetism ..................................................................................217 8.2 Electricity .....................................................................................231 Unit 9 Matter ............................................................................................. 244 Unit 10 Materials Used in Dailly Life ....................................................... 275 10.1 Acid, Base and Salt ..................................................................276 10.2 Water ........................................................................................292 Unit 11 Earth and Universe ......................................................................... 303 10.1 Earth in Universe and Minerals............................................ 304 10.2 Evolution of Life on the Earth ..............................................322
Oasis School Science and Technology - 8 1 UNIT 1 SCIENTIFIC LEARNING Estimated teaching periods Theory 7 Practical 3 Introduction, importance and example of practical work of science. Precaution while doing practical works of science Steps to do survey research (Selection of objective, sampling, formation of hypothesis, selection of methods for collection of hypotheses, collection of required materials, data collection, scientific listing of information, analysis, conclusion, report writing) The Sequence of Curriculum Issued by CDC Galileo Galilei is well known as the father of observational astronomy, modern physics, scientific method and modern science. He was born in Italy on 15th February 1564 and died on 8th January 1642. He was an astronomer, physicist and engineer. He is popular for analytical dynamics, heliocentrism, kinematics and observational astronomy. He graduated from the University of Pisa. About the Scientist Galileo Galilee Key terms and terminologies 1. Scientific learning : The process of following systematic ways to learn the facts is called scientific learning. 2. Science process skills : The sets of skills that must be followed while learning scientific processes are called science process skills. 3. Practical work of science : The activity in which students must involve themselves to understand the key knowledge of the theory by using all known science process skills are called practical work of science. 4. Scientific investigation : The process of finding the answer to a question using various research methods is called scientific investigation. 5. Research : A creative and systematic science practical work undertaken to find new knowledge is called research. 6. Survey : A research method used for collecting data from a predefined group of respondents to gain information and insights into various topics of interest is called survey. 7. Hypothesis : An idea or plan that can be tested by experiments is called a hypothesis. 8. Observation : The act of noticing tiny details by using our sense organs is called observation.
2 Oasis School Science and Technology - 8 9. Analysis : The process of understanding, interpreting and linking the information to get result is called analysis. 10. Report : The complete description of a science practical work is called a report. 11. Communication : The process of relaying key messages of the research survey to the public is called communication. 1.1 Introduction Sometimes we believe a tell, thing or phenomenon without actual evidence. It is called superstition. A superstition believes everything without any real proof. But, doctrine is the kind of knowledge that everyone agrees on. But it has no scientific evidence to prove it. Science is simply a process of searching of answer by curious people to know the fact about natural processes. Thus, scientific learning is a process of following systematic ways to learn the facts. The person who does science is called a scientist. They do not randomly study the natural processes. They use scientific learning skills while doing scientific research. The rules that must be followed while learning scientific processes are called science process skills. The first scientific skill is observation. Everything starts with observation. Other scientific skills are asking questions, collecting information, analyzing, predicting, experimenting, report writing and communication. They come in sequence. The systematic way of learning is essential for removing superstitions. It is also important to introduce newertechnology in various fields such as in medicine, agriculture, education, space exploration, environmental conservation, and transportation. Fig 1.1 : modern technologies such as tractor in fields Fig 1.2 modern satellites Fig 1.3 kids observing flower with hand lens Reasonable Facts Scientific learning is important for society. Scientific learning is important for society because it helps to develop new technologies, medicine and hybrid crops for society. Fact File Observation is the most important and first skill of scientific learning.
Oasis School Science and Technology - 8 3 Activity 1 Visit a site of honey bee hive or an apiary in apiculture site. Take papers, pencils and erasers with you. Study the behaviour of different kinds of bees, their structure and hive cells. Draw pictures of what you see by studying the site. 1.2 Practical work of science Practical work can stimulate the interest of people in scientific learning. Learning science may be difficult for many of us. This is because, it has complex principles, laws, numerical, derivations, machines, etc. Practical works of science can help to counter those problems. A student must actively involve himself or herself in practical work. So, they have to think a lot, collect information, design models, learn the principles, observe models, make reports and explain them to others. So, it will obviously help to develop teamwork, creativity and problem-solving skills in students as well as in researchers. The activity in which students must involve themselves to understand the key knowledge of the theory by using all known science process skills is called practical work of science. It is very important because of the following reasons. i. It generates lifelong interest in science. ii. It involves everyone in doing scientific work. iii. It is more interesting than theoretical classes. iv. It helps all to understand the theories. Though, it is not without drawbacks. It needs huge spaces, laboratories, chemicals and lots of time. There are some chances of accidents as well. Reasonable Facts Practical works are very important for students. Practical works are very important for students because it helps to improve their understanding and develop problem-solving ability. Activity 2 Instead of learning about parts of plants by looking at pictures in the book, visit school garden and observe the parts of plants with a hand lens. Tell your findings in the class. Few examples of experimental or practical work of science In the field of science and technology, the experiments can be conducted either indoors or outdoors. It depends upon the conditions that are required for the experiment. For Fact File Practical work develops teamwork, cooperation and critical thinking in the person.
4 Oasis School Science and Technology - 8 example, experiments are usually indoors. Filtration, distillation, electric circuits, observation of microscope slides of onion etc. are indoor practical works. Observation of plants and animals in botanical gardens, field excursions on ICIMOD orfarms, observation of natural resources etc. are some outdoor practical works. They are conducted out of the laboratory. a. Observation practical works When we see something, it is called observation. So, observation practical works include visiting school gardens and observing models or experiments. Thus, observation is the act of collecting information from surrounding environment, events, processes, objects etc. It helps to form hypothesis, analyze experiments etc. b. Experiment practical works This kind of practical work includes replication of experiments in a science laboratory or conducted new experiments to test a hypothesis. Such as filtration and dissection of earthworms, mixing hot water with cold water to explain the principle of calorimetry etc. Thus, the activities that are designed to test a hypothesis is called an experiment. Scientific test can be done inside or outside the laboratory. c. Survey practical works The practical works which include a field visit to collect information is called survey. Such as visiting and observing vegetable farms to know the effects of bio-insecticides on agriculture. Or find out, what ICT tools are used in the school. d. Model preparation practical works Model preparation practical works include the preparation of models of machines, organs, natural processes, soil profiles and constellations. e. Project work To make project work is a wider type of practical work. It includes almost everything. It can be a replication of experiments or models, collection of various materials, research and experiments. Such as putting moist bread in dark and observing changes, enlisting positive or negative effects of microbes and demonstrating that air exerts pressure. Fig 1.4 filtration in laboratory Fig 1.5 model of lungs Fig 1.6 kids on field excursion Safety measures while doing practical work of science Accidents are one of the most serious drawbacks of scientific research. To avoid accidents and injuries we must strictly follow safety measures. i. In case we are doing observation practical works, we should never touch the models, animals or plants.
Oasis School Science and Technology - 8 5 ii. In case we are doing experiment project work, we should follow the instruction of teachers. We should not play or eat in the laboratory. We must use safety apparatuses such as gloves and masks. We should not touch or misplace chemicals and we should never play with fire. iii. If we are doing model preparation practical work, we should not play with sharp tools, electricity and hot objects. iv. If we are doing survey practical work, we should properly wear and use safety tools based on the survey. v. If we are on a field excursion, we should not tease animals, fall or get lost. Fig 1.7 students in aprons, wearing gloves Fig 1.8 fire extinguisher and emergency exit on laboratory Reasonable Facts We should follow safety rules in the laboratory. We should follow safety rules in the laboratory to avoid accidents such as burns, cuts, electric shocks, fire and death. Activity 3 Learn the location of a fire extinguisher in your science laboratory. Also, learn how to use it during an emergency. 1.3 Scientific investigation, research and survey Ascientific investigationusuallybeginswhensomeone observes the world around them and asks questions to which they do not know the answer. Then, they make more observations, make a hypothesis or develop an experiment to test a hypothesis. By collecting and analyzing data, the researcher can present findings that attempt to answer their questions. The researcher may also modify their experiment to test for Fact File Drinking any chemicals in the science laboratory is dangerous. Fact File The scientific method is an empirical method of acquiring knowledge that has characterized the development of science since at least the 17th century.
6 Oasis School Science and Technology - 8 conditions they did not initially consider. The results of the investigation are mentioned in a report. The report is used to communicate key knowledge to an audience. Thus, a scientific investigation is a process of finding the answer to a question using various research methods. Reasonable Facts Why is research carried out? The research is carried out to gather evidence and help to develop knowledge. Activity 4 Use scientific investigation methods to find out if stale food can or cannot be eaten. Research is a creative and systematic science practical work which is conducted to find new knowledge. It develops greater problem-solving skills and confidence in students. A survey is a research method used for collecting data from a predefined group of respondents to gain information and insights into various topics of interest. Scientific survey is a common method used by a team to collect data for a particular objective and can be an effective tool to gain information from a target audience. The information gathered by students from their survey should be able to help the team either prove or disprove their hypothesis. The collection of information from a sample of people via their responses to questions is known as survey research. Importance of research survey i. To discover new facts, survey research is essential. ii. Itis importantto find errors in previous theories. iii. It is important for students to be involved in learning science. Fig 1.9 Robots on the mars Fig 1.10 biologist researching for vaccine of monkey pox Fact File The survey method is the technique of gathering data by asking questions to people who are thought to have desired information.
Oasis School Science and Technology - 8 7 Steps of Research or Survey a. Selection of the objective We must choose a research topic for the survey. Example, sunlight is necessary for the growth and development of plants. b. Sampling For the survey, we should choose a specific group of people. We can select a certain population of animals, objects or plants for a survey. Example, few seeds of beans are collected and divided into three sample groups. Reasonable Facts Why is sampling done? Sampling is done because it is difficult to collect data from an entire population. Activity 5 There are always some animals living in our surroundings. Let's use survey techniques to find out what types of animals live around our village. c. Formation of hypothesis We can observe and form a hypothesis after deciding on a research topic and a sample group. A hypothesis is an idea or plan that can be tested by observations or experiments. Many questions will arise. We can list them and use them on a survey. Example, plants need three basic things to survive. They are carbon dioxide, water and sunlight. So, our predictions can be: "Plant cannot grow without sunlight." d. Selection of methods for collection of information We can choose the methods of information collection once the questionnaire is completed.We can either visit the site, meet people and ask questions, observe samples, collect information from mail, use Online survey forms or use scientific reports from previous experiments. Example, since we are going to survey research on the effects of sunlight on growth of plants, "observation" is a better method to collect information than the interview, focus group and an Online survey. e. Collection of required materials To carry out a research survey, it is necessary to collect required materials. It can be skilled manpower, computers, transportation, chemicals, scientific tools, laboratory apparatuses and safety tools. Example, materials required for the above survey are three small plastic cups, soil, water and seeds. f. Data collection First of all, we should choose the method for collecting information. Then we use the same method to observe models and samples to collect information. We can
8 Oasis School Science and Technology - 8 interview people to collect information. We can collect information from Online surveys too. Example, we chose observation method for this research survey. The act of noticing tiny details by using our sense organs is called observation. So, we can collect data by observing the plants growing in the pot for a few weeks. For this, we have to sow the seeds in three cups. Put one of them in sufficient sunlight. Put another in shade and put the last one in a closed dark container or room with no light. Let the plants grow for two weeks. Observe them every day, click pictures, count the number of seedlings, measure the length of the stem, and count the number of leaves and buds. In this case, i. Most seedlings in the cup kept in the bright sunlight were taller and had more leaves and more buds. ii. Most seedlings in the cup kept in the shade were shorter and had fewer leaves. iii. Most seedlings in the cup kept in a closed dark container died. g. Scientific listing of information After collection of information from various sources, it is necessary to organize them scientifically. Example: The various information are collected from the observations of plants growing in the pots. Arrange the information obtained from the observation in charts, bar graphs or tables. Reasonable Facts Why is a scientific listing of information important? The scientific listing of information is very important to organize information so that it will be easy to analyze. Activity 6 The listed information should be analyzed to produce a result. Analysis means trying to understand, interpret and link the information to get results. Fact File Pie charts and bar graphs are used to present information in research.
Oasis School Science and Technology - 8 9 h. Analysis Analysis is very important step in research survey. In this step, the listed information are analyzed in order to reach a conclusion. In order to get outcomes, analysis is done to compare, interpret and link to the information. Example: Analysis of the information of the above research. i. Most seedlings in the cup kept in the bright sunlight were taller and had more leaves. It can be because it received sufficient sunlight which helped them to make enough food to grow properly. ii. Most seedlings in the cup kept in the shade were shorter and had fewer leaves. It can be because they received insufficient sunlight so they made insufficient food for their growth. iii. Most seedlings in the cup kept in a closed dark container died. It can be because they received no sunlight so they could not produce food to survive. i. Conclusion To get conclusion, it is necessary to compare the result with a hypothesis. On the basis of comparison between result and hypothesis, survey is concluded. Example: From the analysis above, we can see that the sunlight helps plants in photosynthesis to produce food and use it to live and grow. In the absence of sunlight, they cannot prepare food and die. Therefore, sunlight is necessary for growth and development of plants. j. Report writing Areport is made when the survey is finished. So, report is a complete description of the survey. The complete description of a science practical work is called a report. It is used for communication. Communication means relaying key messages of the research survey to the public. Reports can be written in various formats. Some important parts of the report are topic, objective, materials required, procedure, observation, analysis, calculations, result, conclusion and caution. Example: The above survey research should be written in simple words in a report. Reasonable Facts Why is a scientific report written? A scientific report is written to relay key knowledge to the audience. Fact File Reports are fact-based, structured pieces of writing.
10 Oasis School Science and Technology - 8 Activity 7 Conduct research to find out the essential materials for germination of the seeds and write its report. Title : Essential materials for the germination of the seeds. Introduction : Germination is the process in which a seed changes into a seedling. Germination needs oxygen, water and a suitable temperature. Objective : To find out what is necessary for germination. Hypothesis : Seeds need oxygen, water and a suitable temperature to germinate. Materials required : a beaker, a glass rod, three bean seeds, thread and water Procedure : i. We first collected three beans and tied them in a glass rod 3 cm apart. ii. We put the glass rod in the beaker and poured water into the beaker. iii. We immersed the first bean completely under water. We immersed half part of the second bean in the water. We kept third bean far away from the water. iv. We kept the beaker along with the seeds in the glass rod in sunlight for a week. Observation : We found that the first bean underthe water did not germinate. The second bean that was immersed half in the water changed into a seedling. The third bean that was far away from water did not germinate at all. Analysis : We noted this observation in a notebook. We discussed this among our group members. The result of our discussion was: i. The first bean under the water might have not germinated because there was too much water but no oxygen gas for respiration. ii. The second bean which was half immersed in the water might have germinated because it has received sufficient water, enough oxygen and a suitable temperature. iii. The third bean which was far away from the water might have not germinated because there was oxygen and suitable temperature but no water. Result : From the above analysis and discussion, the result of the research is all three materials oxygen, water and suitable temperature are necessary for germination. Conclusion : The result was in favour of the hypothesis. Therefore, we concluded that enough water, sufficient oxygen and suitable temperature are compulsory for germination. Seed in air Water Seed inside water Seed partially in water
Oasis School Science and Technology - 8 11 Activity 8 A model of survey report writing Title A survey about the solid waste management in the new road area of Kathmandu. Introduction Almost in all cities, there is dense population. There are varieties of industries, tourism areas, playgrounds, public walking areas, shopping markets, temples, schools, hospitals, etc. Solid waste management is a vital issue in these urban areas. The solid waste management in these areas involves the collection, transportation, treatment and disposal of waste which is generated by households, commercial market, hospital, industries, schools, temples, playground, roads, tourism areas, public places, etc. The purpose of this survey report is to evaluate the current situation of solid waste management in the capital city. The study of this survey will help solid waste management in other cities too. Objective To study the method of solid waste management in the study area. Methodology The survey was conducted through questionnaires distributed to residents of the new road area. A total of 200 responses were collected and analyzed. Findings: 1. Waste Collection: The majority of respondents (75%) reported that waste collection services were provided regularly. However, 20% reported irregular or insufficient waste collection services. 5% reported that they were not aware of any waste collection services. 2. Waste Segregation: Only 40% of respondents reported segregating their waste at the source. The remaining 60% did not segregate their waste and disposed of it in mixed form. 3. Recycling: Only 25% of respondents reported recycling their waste. The remaining 75% did not recycle their waste and disposed of it in mixed form. 4. Waste Disposal: The majority of respondents (80%) reported that waste was disposed of in landfills. 15% reported that waste was incinerated, and 5% reported that waste was composted. 5. Public Awareness: Only 30% of respondents reported being aware of the importance of solid waste management. The remaining 70% did not consider it a priority.
12 Oasis School Science and Technology - 8 Conclusion: We can draw following conclusions regarding the above findings and analysis. i. The survey result indicates that the city needs to improve its solid waste management practices. ii. Waste segregation and recycling should be promoted to reduce the amount of waste sent to landfills. iii. The government should implement more effective law, order, policies and regulations to increase public awareness to encourage public participation in waste management initiatives. iv. The survey findings can be used to develop a broad range solid waste management plan for the city to ensure a cleaner and healthier environment for its residents. Questionnaires for the survey 1. How is solid waste collection done by the municipality? i. Solid waste is collected regularly by the municipality. ii. Solid waste is collected irregularly by the municipality. iii. Solid waste is collected occasionally by the municipality. iv. I have no idea about the solid waste collection. 2. Do you segregate degradable and non-degradable waste? i. I segregate degradable and non-degradable waste. ii. I do not segregate degradable and non-degradable waste. 3. Do you recycle solid waste? i. I recycle the solid waste. ii. I do not recycle the solid waste. 4. How do you dispose solid waste? i. I dispose solid waste in the landfill site using municipal vehicle. ii. I incinerate solid waste. iii. I segregate, recycle and compost solid waste. 5. Do you have knowledge about the importance of solid waste management? i. Yes, I have knowledge about the importance of solid waste management. ii. No, I do not have knowledge about the importance of solid waste management. 10 5 15 80 X Composted Incinerated Dispose in Land field side Y 20 30 40 50 60 70 80 90 100 Waste Management Number of People
Oasis School Science and Technology - 8 13 Reasonable Thinking Skill Reasonable Thinking Skill R T S 1. Name the person that works on science is called. The person that works in science is called scientist. 2. The practical work in science is important. Practical work in science is important to widen the perspective of the student and increase problem-solving ability. 3. Why is an experiment designed? The experiment is designed to test the hypothesis. 4. What is the objective of a report? The objective of the report is to let the audience know the importance of the outcome of the research. 5. We should follow the science processes skills while learning about any events. We should follow the science processes skills while learning about any events because it helps to get a reliable result. 6. Differentiate between observation and hypothesis. SN Observation SN Hypothesis 1 The act of noticing tiny details by using our sense organs is called observation. 1 A hypothesis is an idea or proposal that can be tested by experiments. 2 It is the act of collecting information. 2 It is the act of predicting probable answers to our research. 7. Let’s suppose one of our friends is carrying a lunch box while going to the chemistry laboratory. How can we convince him not to bring lunch to the chemistry laboratory? Explain. If one of our friends brings a lunch box to the chemistry lab, we can tell him to leave it at class by telling him how dangerous it is. We can tell him that the chemistry laboratory is full of chemical substances. Most chemicals are poisonous, and some of them can kill us. If the chemicals mix with our food, it could be very poisonous for our health. During the experiment, we might get chemicals on our hands. When we eat with our hands, chemicals can get into the food. Some things, like strong acids and bases, can kill us if we eat them. So, we should never bring food into the chemistry laboratory. In the chemistry lab, we should never eat, chew gum, drink juice, or drink water. 8. If one of our friend thinks that practical works are waste of time and focus on memorising notes only, how can we motivate him to involve in practical works of science? Most students are used to study and memorize notes but that is not the right way to learn. To understand is the meaning of learning. If one of our friend thinks that the practical works of science are waste of time and focus on memorize notes, we should educate him or her about the benefits of practical works. We should involve him or her in practical works of science so that he or she can realize that practical works of science are better than memorizing. It helps to increase thinking ability, problem solving ability and helps to understand the concept. It also improves team work.
14 Oasis School Science and Technology - 8 Exercises 1. Select the best answer from the given alternatives. a. What is the main objective of practical work? i. to actively demonstrate experiments to students. ii. to make students learn by doing themselves iii. to use the chemicals and tools iv. to utilize leisure b. Why should we know to use a fire extinguisher? i. to put our fire in a science laboratory. ii. to do practical work. iii. to learn by doing. iv. it builds up our confidence in science. c. Sampling is important for a survey. Why? i. it will give accurate data. ii. sampling is the only way to survey. iii. it is wrong to collect data from a large population. iv. It is difficult and expensive to collect data from a large population. d. What is the act of relaying important findings of survey called? i. report ii. scientific listing iii. communication iv. data collection e. Why should we never do unauthorized experiments? i. it is waste of time and resources. ii. it is against the rule. iii. it will reduce our intelligence. iv. it can cause accidents. 2. Define the following with required examples. a. Scientific learning b. Science process skill c. Practical work of science d. Scientific investigation e. Research f. Survey g. Hypothesis h. Observation i. Analysis j. Report k. Communication 3. Answer the following questions in very short. a. What are the set of skills used in scientific learning methods called? b. What are fact-based, structured pieces of writing called? c. Give an example of experimental practical works. d. What is the act of defining small groups for a survey called? e. What is the act of noticing tiny detail called? f. What is the act of believing everything without facts called?
Oasis School Science and Technology - 8 15 g. What is an effort to understand and interpret information is called? 4. Give reasons a. Observation is an important skill of scientific learning. b. Scientific learning is important for the development of the country. c. Practical work of science is very important for students. d. We should wear aprons and face masks in the science laboratory. e. Eating is prohibited in a science laboratory. f. We should write the report in very simple language. g. We should learn to use a fire extinguisher before doing practical work in the laboratory. h. We should never do unauthorized experiments. i. Listing information is an important scientific skill. j. Survey is widely used in scientific learning. 5. Differentiate between the following. a. Research and survey b. Hypothesis and prediction c. Observation and analysis 6. Answer the following in short. a. What is the first step of scientific learning? b. Give two examples each of practical work for observation, experimen tal practical work, survey practical work and model preparation. c. Write any two importance of the research survey. d. What is the objective of sampling? e. How is data collected during a survey? f. What is used to list the information during the survey? g. Define science process skills and list them. h. How is hypothesis formed? i. Write importance of analysis. j. What are advantages of observation? 7. Answer the following questions. a. What are the advantages and disadvantages of the practical work of science? b. How does practical work of science help in educating a child? c. Enlist the precautions that we should be aware of while doing practical works. d. The teacher asks us not to play or run in the lab. What might be the reasons? e. How is a scientific survey carried out? f. Describe the steps to perform a survey. g. Let’s survey to find out the ages of classmates. Prepare a questionnaire. For example, ask about the date of birth and age. Count their age. How many people had the same age? Write a survey report. h. Conduct a survey on the impact of social networking sites on the health of students. Research and write a survey report.
16 Oasis School Science and Technology - 8 Key terms and terminologies 1. Information : Information is a set of facts. 2. Communication: The exchange of information between two or more people is called communication. 3. ICT tools : The diverse set of tools that are used to collect, create, share, exchange, transmit, store and process information is called ICT tools. 4. ATM : The electronic device that allows bank account holders to perform quick money transactions is called an automated teller machine (ATM). 5. Photocopier : A photocopier is a machine that can create photocopies of any printed document. 6. Scanner : An ICT tool that scans a document and converts them into digital UNIT 2 INFORMATION AND COMMUNICATION TECHNOLOGY Estimated teaching periods Theory 20 Practical 10 Introduction and use of information and communication tools such as automated tailored machine, photocopier, scanner, printer, router, Wi-Fi device, and television set up box. Introduction to search engines, websites and internet service providers. Introduction and uses of social networking sites Introduction to cyber-crime, Computer ethics, cyber-law and Internet security Introduction to robotics and virtual reality Introduction and general uses of artificial intelligence and cloud computing. The Sequence of Curriculum Issued by CDC Claude Elwood Shannon is known as the father of information theory for his contributions to telecommunications. He was born in the United States of America on 30th April 1916 and died on 24th February 2001. He was a mathematician, electrical engineer and cryptographer. He invented the branch of science “information theory”. He contributed to enabling telecommunications to move from an analogue to a digital transmission system. He also designed Minivac 601 digital computer trainer. About the Scientist Claude Elwood Shannon
Oasis School Science and Technology - 8 17 data is called a scanner. 7. Printer : The machine that can print pictures and texts by receiving commands from computers is called a printer. 8. Router : A router is an electronic device that connects computers and mobiles to the Internet. 9. Wi-Fi : Wi-Fi is a wireless technology that connects computers and smartphones to the Internet. 10. Setup box : The information device that contains TV tuner input and displays out on the TV is called a setup box. 11. Internet : The global network that provides a variety of information and communication facilities using standardized communication protocols is called Internet. 12. ISP : It is a company that sells Internet facilities to common people and business customers. 12. Web pages : The hypertext documents on the World Wide Web are called web pages. 13. Website : The collection of multiple web pages under the same domain name is called a website. 14. Search engine: The software that can carry out web searches is called a search engine. 15. SNS : The Online platform where people can stay connected and create a social relationship with people of similar interests or careers is called social networking site (SNS). 16. Blogging : The act of publishing information on a certain topic, often an informal diary-style text post is called blogging. 17. Blog : A blog is a regularly updated website. 18. Cyber-crime : The use of a computer to harm other people is called cyber-crime. 19. Computer ethics: The set of moral standards that rules the use of computers is called computer ethics. 20. Cyber-law : The law which is used to stop cyber-crime and abuses is called cyber-law. 21. Internet security : The rules and measures to stop attacks over the Internet are called Internet security. 22. Robot : The programmable machine that can perform a series of complex works automatically is called a robot. 23. Robotics : The process to design, construct, operate and using robots is called robotics. 24. Virtual reality : The use of computer modeling and simulation that allows a person to interact with a three-dimensional computer-generated environment is called virtual reality. 25. Artificial intelligence : The software that can mimic human intelligence, critical thinking and problem-solving ability in the machine is called artificial intelligence. 26 Cloud computing: The delivery of various services, data storage facilities, access to servers and databases, networking and software through the Internet is called cloud computing.
18 Oasis School Science and Technology - 8 Introduction The present time is the age of science and technology. There is great revolution in the field of ICT. The Internet is one of the major changes in the field of information and communication technology. In ICT, we use a variety tools every day. The ATM, television set up box, television remote, fax machine, printers, photocopier, biometric scanner, router, digital camera, etc. are some ICT tools. We can access various websites through a URL address. If we do not know the web address, the search engine is a great way to find information. In the ICT age, people maintain social relationships and business relationships through social networking sites such as Facebook, Wikipedia, YouTube, zoom, SMS, blog, vlog etc. With increasing use of Internet and ICT tools, various fields such as education, banking, business, research, transportation and communication are benefited. However, cybercrime is also increasing every day. We need to follow computer ethics. We also need to use Internet security methods to make Internet safe for everyone. Many fields of science are well developed nowadays. As a result, humans can make robots that can do particular tasks. Artificial intelligence is used to operate various social networking sites, research and robots. Nowadays, there is no difficulty to store data. Software such as Google drive, one drive and many other cloud storages can be used to back up information from our mobile devices and computers. Fig. 2.1 ATM Fig. 2.2 icon of Facebook, YouTube etc. Fig. 2.3 VR headset 2.1 Information and Communication Tools The set of facts is called information. Similarly, the relay of facts is called communication. The information is now digitized. Taking pictures, scanning, typing, creating documents on computers etc. creates digital information. Digital information is very important in modern society. There are tons of digital information on the Internet. The information can be copied, replicated, transferred, edited, mailed and printed. The exchange of information between two or more people is called communication. Various tools are used to collect, process, store, transfer and work with digital information. For example, cameras, smart-phones, laptops, desktops, digital cameras, biometric scanners, automated teller machines, printers, software programs, data projectors, routers, Wi-Fi, television, T.V remote and T.V set up box work with Internet and digital information. These tools are called ICT Fact File ICT tools enable real-time communication among people and allow them to receive new information.
Oasis School Science and Technology - 8 19 tools. The diverse set of tools that are used to collect, create, share, exchange, transmit, store and process information is called ICT tools. Reasonable Facts The ICT tools are used widely in modern society. ICT tools are used widely in modern society because it has simplified the way we communicate. It has made communication easier in business, education, banking, etc. Automated teller machine (ATM) The ATM is an example of an ICT tool. It is a quick and easy way to do banking transactions. Thus, the electronic device that allows bank account holders to perform quick money transactions is called automated teller machines. It is a convenient tool. We do not need to visit the bank or meet an actual teller to do transactions. We can collect cash from any ATM throughout the country. ATM of some bank allows withdrawing cash in foreign countries too. Most ATMs are simple cash dispensers but some ATMs are advanced. Advanced ATMs can do complex transactions such as balance transfers check deposits and bill payments. Parts of ATM Similar to the computer, an ATM includes an input device, such as a keypad or touch screen. It is used by users to enter their banking information. The ATM also includes output devices, such as a screen, speaker, bill printer and cash dispenser. They are used to display account information and provide transaction receipts. In ATM, the processing device is usually a computer. It processes the user's input and communicates with the bank's servers to perform the requested transactions. Importance of ATM ATM helps to withdraw cash, check balance, check account, change PIN and some can help to deposit cash. Reasonable Facts ATM is connected to the Internet. ATM is connected to the Internet so that it can check our balance in our bank and process the transaction. How to use ATM? i. Generally, we need to insert our debit card into the card reader of automated teller machine. Information about our bank account will be sent Fig 2.5 various models of an ATM Fact File There are more than three million ATMs around the world. There is one in Antarctica as well.
20 Oasis School Science and Technology - 8 to the server from card reader. ii. It is important to confirm the transaction by entering Personal Identification Number (PIN) from the keyboard. iii. Then we should select the account (saving or current). iv. We should select fast cash or withdrawal at monitor. v. Then we can select the desired amount or input the amount we want to withdraw. vi. We have to choose if we want a printed report or not. The output device bill printer will print the receipt. Now the transaction will be processed. First of all, we have to collect our debit cards. Then the cash will come out of cash dispenser of the machine. If we do not collect in time, the cash will be drawn back into the machine. Usually, we are requested to remove the helmet and mask while using ATMs so that they can record our faces. Reasonable Facts We should not write PIN of debit card on it or anywhere. We should not write PIN of debit card on it or anywhere because other people will know it and can steal money from our account. Banks install ATMs in major city areas and hospitals. Banks install ATMs in major city areas and hospitals so that we can access money during emergency. Activity 1 Visit ATM with your parents and learn how to withdraw cash. Photocopy machine Have you done photocopy of any document? It is necessary to do photocopy of the various documents nowadays. These documents are necessary in schools, businesses and government offices. It is used to make copies of question papers, notes, pictures, forms, citizenship etc. A photocopier is a machine that can create photocopies of any printed document. When a hard copy is placed in a copier, then a light shines on it. Its digital copy will be made and printed on paper. We can make multiple photocopies at once. Some photocopier uses liquid ink or solid ink, ribbon ink or toner. Most photocopier use xerography technology. Fact File We should never share PIN with others or write in debit card or credit card. Fig 2.6 : various photocopiers Fact File The photocopy machine was designed by a man who had arthritis disease. He designed it so that he could avoid writing.
Oasis School Science and Technology - 8 21 Reasonable Facts We should never sit on a photocopy machine. We should never sit on a photocopy machine because pressure damages the glass of the machine. Activity 2 Use a photocopier to make a photocopy of your birth certificate. How to use a photocopier? i. Initially, we should start photocopier. It could be off or in sleep mode. We should feed paper in the paper tray. Usually A4 paper (8.5 x11 inch) is used. ii. We need to put a hard copy on the photocopier. The document is placed face down. iii. Then we should close the cover. iv. Now we should input the number of copies to be made. v. We can select colour preference and paper size too. vi. Then we can press the copy button. Photocopiers are used for photocopying only. However, modern photocopiers can do multiple functions such as photocopy, scanning and printing. Scanner The ICT tools also include a scanner. It can capture texts, documents and pictures from hard copies. It creates a digital copy of the hard copy. The digital copy can be printed, emailed or stored as an image or stored as a PDF. An ICT tool that scans documents and converts them into digital data is called a scanner. A bar code scanner is used in shops. It is also used in banks, schools and government offices to create soft copies of important documents. It works by using Optical Character Recognition (OCR) technology. Scanned document can be stored in computer or mobile. Mobile can use scanner applications to scan hard copies. Fig 2.7: various scanners Fact File Ray Kurzweil is an American inventor who invented scanner.
22 Oasis School Science and Technology - 8 Reasonable Facts Air vents of scanners should not be blocked. Air vents of scanners should not be blocked otherwise the device will overheat and start a fire. Activity 2 Use a scanner to make a digital copy of your birth certificate and passport-sized photo and save it in your Google drive. How to use a scanner? i. First of all, scanner should be connected to the computers. ii. We should keep the document in a scanner. The document is kept face down. iii. We should close the cover. iv. Now we should press scan button. v. A powerful beam of light hits the document and creates a digital copy. vi. The scanned document can be emailed or saved. Printer The printer is an output hardware. It is used to takeout print. In the market, it is available in various sizes, speeds and costs. It can receive information from a computer, photocopier, scanner or mobile device and print it on paper. It can print many copies at once. The machine that can print pictures and texts by receiving commands from computers is called a printer. The printing speed of the printer is measured as Character Per Second (CPS), Lines Per Minute (LPM) or Page Per Minute (PPM). The inkjet printers print slowly but give high-quality prints. The laser printers are very fast. Printers and photocopiers also produce certain noise, dust and other pollutants. So, using it for a long time could cause respiratory diseases. Reasonable Facts Printers should not be kept closer to source of heat. Printers should not be kept closer to the source of heat because the ink will become thinner, creating messy printing. Fig 2.8 : various printers Fact File PrintStik is the world’s smallest printer.
Oasis School Science and Technology - 8 23 Activity 4 Find your birth certificate in your Google drive then print it yourself. How to use a printer? i. First of all, printer must be connected to the computers. ii. To print word files, we can press Ctrl + P or we can go to File > Print > select printer and press print. Router and Wi-Fi devices For the Internet connection to our smart phones and PCs, it is necessary to receive signals from a device called router. Thus, a router is an electronic device that connects computers and mobiles to the Internet. The Internet service providers install them in our house. It is a device that forwards the Internet connections to our devices. It works based on Internet Protocol address. Some of the routers are wired and some are wireless. A wired router is preferred over a wireless one because a wired router does not lose signals. Most people use wireless routers because it is convenient. It provides us with Wi-Fi. Wi-Fi is a wireless technology that connects computers and smart-phones to the Internet. We can stay anywhere within the range to use Wi-Fi and access Internet. We need to select correct network and enter the password to connect to Wi-Fi. Loss of data packets occurs while using Wi-Fi. It might be due to distance, the tank, or the walls. Reasonable Facts Routers should not be placed near the aquarium. We should not place routers near the aquarium because it will weaken the wireless signal. The wireless router is installed in homes. The wireless router is installed in homes so that it will be easier to connect smart-phones and laptops to computers Activity 5 Connect your mobile device to the Wi-Fi and observe which room of your house has a better signal. What might be blocking Wi-Fi signals in some rooms? Discuss. Fig 2.9 : various models of routers Fact File Wi-Fi devices use radio waves to transfer information.
24 Oasis School Science and Technology - 8 How to use a router? i. First of all, select a place to fix router. ii. Plug it into a power source. iii. Connect the optical fiber to the router. iv. Arrange router gateway. ISPs gives it to us. Then connect router to gateway. We can do it by shutting down router, unplugging cables from LAN and then reconnect to WAN. Then we should plug in the router and wait few minutes. v. Connect the computers to the outgoing Ethernet cables or connect mobile and laptops to the router. vi. Set the Wi-Fi - user's name and password. vii. Update firmware of router, change Wi-Fi password. viii. We can make our internet safe by using applications of ISPs. Uses of router i. It connects our hardware to distant server. ii. It transfers data to and from our devices with or without wire. iii. It access the IP address of the recipient and sends email, data, audio video etc. iv. Wireless router can be used to share data, audio, video and internet by configuring Virtual Private Network (VPN). Wi-Fi The abbreviation of Wi-Fi is "wireless fidelity." Radio waves are essential to operate it. Without the use of wires or fibers, it is able to connect our various devices, such as mobile phones, laptops, printers, etc. to the internet. It was invented by NCR corporation in 1991. Wi-Fi signals can work by the help of base station network or ethernet connection, router and ICT tools such as mobile. TV setup box The TV setup box has been designed in such a way that it can receive an audio and video signal from a certain Internet video provider by using the Internet. The received signals are then passed to the television. The information device that contains TV tuner input and displays out on the TV is called TV setup box. It is also called a cable box. It can receive a signal from Ethernet cable, satellite dish, cable or telephone line. How to use a setup box? i. We should connect set up box to power cable. ii. Now, connect set up box to an Ethernet cable or telephone lines etc. iii. Connect the cables from set up box to the television. iv. Select the input (AV, PC, TV, HDMI etc.). v. We might need to input user name and password. vi. We can set volume, brightness and other settings from remote of setup box. vii. We can change channels and navigate from remote. Fig 2.10: TV setup box
Oasis School Science and Technology - 8 25 2.2 Introduction to Search Engines, Websites and Internet Service Providers Search engine At home, we can obtain information through the Internet. Updates in mobiles and PCs through the internet are possible. The websites and social media platforms are also available in the Internet. A web browser can be used to surf the Internet. We can visit any website if we know its URL address. But if we do not know the URL address of the website or social networking sites, then it will be difficult to access them. In such cases, we can use search engines. Search engines are software specially designed to search the information based on keywords. The software that can carry out web searches is called a search engine. Some popular search engines are the Google search engine, Bing search engine, yahoo search engine, ask.com etc. Whenever we input a keyword in a search bar, the search engine starts to search the information. The most search engine works on steps such as crawling, indexing and ranking. The search engine provides options under the search bar where we can select all or videos or news or images or maps. We are able to click the desired link whenever the result is shown on the homepage of the website. Fig 2.12 : icon of search engines Google search engine, Bing search engine, yahoo search engine, ask.com etc. Reasonable Facts Why is a search engine easy to use? A search engine is easy to use because it can search for information from keywords only. There is no need to remember web addresses. Fact File Google search is the most popular search engine.
26 Oasis School Science and Technology - 8 Activity 6 Open web browser Google chrome. Press three vertical dots on the top right > setting > search engine. Practice changing search engines. Website The Hypertext Markup Language is used to write the text files that are found on the World Wide Web. These types of materials are known as web pages. The hypertext documents on the World Wide Web are called web pages. It is stored on a web server. Whenever we access them, these files are downloaded and shown visually on the monitor. Numerous web pages are linked together under a common domain name to make a website. The collection of multiple web pages under the same domain name is called a website. Some popular websites are Google, TikTok, YouTube, Facebook, Instagram, Wikipedia etc. Each web page has a web address called URL. The URL stands for Universal Resource Locater. Web browser is necessary to access websites. Some common web browsers are Microsoft edge, Google chrome, Firefox and opera. There are various types of websites. They may be a personal website, corporate website, government website, or business company website. Hyper-links are present on a web page. They are blue. When we click them, they take us to another web page. Public websites can be accessed by anyone. However, some private websites can be used by owners only. Parts of the website i. Web hosting The activity of providing storage space and access for websites is called web hosting. ii. Web address The web address also called URL should be typed in address bar to reach the sites. iii. Homepage The first page that gives introduction of website and serves as table of content for the site is called homepage. iv. Digital materials The homepage contains multiple digital materials. v. Navigation design The website navigation design is architecture of all navigational elements of the website. It helps users to find what are they looking for. Fig 2.11: icon of website Fact File The first website was invented on August 6, 1991.
Oasis School Science and Technology - 8 27 Reasonable Facts We should remember URL of a web address. We should remember URL of a web address because it helps us to locate websites and web pages. Activity 7 Open the website https://moecdc.gov.np/ and surf the page. Internet service provider (ISP) The Internet is a technological revolution. It has changed our world. With the Internet, communication is so easy and cheap that the entire world is like a small village. The Internet is a global network that provides a variety of information and communication facilities using standardized communication protocols. The Internet has helped education, business, industries, entertainment industries, communication, transportation, banking, space exploration and many other fields. However, the Internet cannot be accessed easily. To be connected to the Internet we need to buy services from Internet service providers (ISP). It is a company that sells Internet facilities to common people and business customers. ISP helps in internet access, internet transit, domain name registration, In service provider (INSP), web hosting etc. When we buy an Internet package from any Internet service provider, they visit our house and install a router, special networking etc. They let us rent that equipment. They give us the user name and password of an account. For Internet service, we have to pay them periodically. In Nepal, some common internet service providers are CGNET, World link, Vianet, Subisu, classic tech etc. For the common people, internet was available since 1980 through World Wide Web (WWW). Telenet is the world's first internet service provider. It was launched in 1974. Mercantile company was the first internet service providerin Nepal. In Nepal, the Internet was first introduced in 1994. Importance of ISP i. IPS helps in webhosting. ii. It prevents malware from attacking its users. iii. It provides IP address to us. iv. It provides internet to us. Fact File ISP charges a fee for installing the connection and for maintaining it. Fig 2.13 : CGNET, World link, vianet, subisu, classic tech
28 Oasis School Science and Technology - 8 Reasonable Facts Why do most ISPs install fibre Internet over wireless Internet? Most Internet service providers prefer fibre Internet over wireless Internet because it offers faster Internet speed over longer distances. There is no packet loss through fibre. Activity 8 Install the mobile application of your Internet service providers. Learn to open a ticket to deal with problems with Internet in your house. 2.3 Social Networking Site We are all connected through the internet. People cannot be connected through the Internet on their own. The websites in the Internet are required in order to make a medium through which users can maintain their connections with one another. Some websites such as Facebook, Instagram, TikTok, YouTube, Wikipedia, Twitter, etc. allow people to share information. People can share photos, videos, text, ideas etc. Such websites are called social networking sites. The Online platform where people can stay connected and create a social relationship with people of similar interests or careers is called social networking site (SNS). There are varieties of social networking sites. These sites can be accessed from smart-phones, iPhones, Macs, tablets, laptops, desktops etc. Based on the nature of the site, it may allow sharing texts, posts, photos, videos, diary and information. Some of them allow us to directly communicate with other people through text messages, audio calls and video calls. SNS allow us to create and maintain social and professional relationships. They allow us to stay in touch with distant friends. It minimizes the necessity of minor meetings. The different types of websites used by government offices, national organizations, international organizations, social organizations and schools are also social networking sites. Importance of Social Networking i. It provides strong medium It is a powerful platform where people can express their opinion, communicate, access information, launch social, educational or political campaign etc. ii. It helps in brand development It is a platform where varieties of business organizations, educational organizations or social organizations can promote their companies, business etc. iii. It provides medium for costumer interaction Consumers can learn about various products of various companies. They can interact with companies through social networking. Fact File More than 4.2 billion people use mobile phones to access social networking sites.
Oasis School Science and Technology - 8 29 Fig 2.14: Youtube Fig 2.15: Facebook Fig 2.16: Instagram Reasonable Facts Why should we follow computer ethics while accessing social networking sites? We should follow computer ethics while accessing social networking sites so that we would not hurt each other through the Internet. Activity 9 Open a website of your school and download the school calendar or any other notices. For example: In a school, college or university, the website gives us space for interaction between ex-students, active students, parents and teachers. We can obtain information on various activities, programs, exam schedules, holiday notices and much other useful information on the school website. We can view or download school calendar, photos, videos, exam routines and notices from the website of the school, college or university. One of the strong sources of information is wikipedia. It is a free Online encyclopedia. It uses simple English words and grammar so that even children can understand it. In the same way, Twitter is another social networking site. People post tweets in it. The tweet may be their idea, photos, videos, links and texts. It helps people to communicate and stay connected. The shortmessage service (SMS) is another service provided by telephone companies, Internet and mobiles. It stands for Short Messages Services. We can use it to send short text messages to one or multiple receivers. Zoom, skype, messenger and Viber can be used for video conferences. Fig 2.17 : Wikipedia Fig 2.19 : twitter Fig 2.18 : skype Fact File Zoom can be used for online classes and webinars.
30 Oasis School Science and Technology - 8 Reasonable Facts Social networking sites are useful tools for education sector. Social networking sites are useful tools for education sector because they provide different ways that can be used to create classrooms and share information. They connect students, parents and teachers. Activity 10 Organize a video conference on any application such as zoom or Google meet etc. Practise using these applications. The importance of social networking sites can be listed as: i. The social networking site helps to stay connected with family members and relatives. ii. Business companies can connect with customers. iii. We can stay connected to our friends. iv. It helps to make audio calls and video calls. v. It helps to collect information from various websites. vi. It helps to learn about other people, companies or events. Disadvantages of social networking sites i. Cyber bullying: Since person do not need to directly face other people, the rate of bullying increases in social networking sites. ii. Fake accounts: Many people, hackers, terrorists etc. make fake accounts in social networking sites and use it to bully others or hack others for evil purposes. iii. Confidential information leak: Since people unknowingly upload information, use passwords and sometimes hackers use malware to steal information, SNS is hurting us by leaking private information. Blogging website Similar to the social networking site, a blog is a type of informational website. In a blog, the most recent post appears at the top of the web page. Usually, a blog contains text, images, web pages and hyper-links. However recently most of the blog contains videos. They are called vlogs. A blog is a regularly updated website. It is used for personal use. Business companies also use a blog to advertise themselves, take care of customers etc.Thus, the act of publishing information on a certain topic, often an informal diary-style text post is called blogging. Nowadays, the blog means the creation of a certain content and sharing it on social media. Many people make vlogs and share them on Facebook, Instagram, TikTok and YouTube. How to make a blog? i. To make a blog, first of all, select hosting company. Choose a hosting package and create a hosting account. Fig 2.20 : wordpress
Oasis School Science and Technology - 8 31 ii. Press ‘get started now’. Follow the lead. iii. Install the Word-press application. iv. My sites > Create site > start building under Word-press option. v. Enter Admin information. vi. Log in and choose a theme. Reasonable Facts A blog is very important for business companies. A blog is very important for business companies because it connects companies with customers. Customers can learn about company products and facilities. Activity 11 Make a blog about your classroom. 2.4 Introduction of Cyber crime, Computer Ethics, Cyber Law and Internet Security Cyber crime Computers and the Internet are very important tools. They help humans in a variety of ways. However, some people use them to harm others. It is called cyber crime. Thus, the use of computer and internet to harm other people is called cyber-crime. Criminals and terrorists use computers and Internet to carry out their illegal works. Some common types of cybercrime are: i. Hacking: The act of using virus, malware, worms etc. to steal information, hack ICT tools, cameras etc. is called hacking. ii. Defamation: Some people use computer and internet to defame other people or companies iii. Identity theft: The act of stealing personal and financial information to do fraud is called identity theft. iv. Cyber terrorism: The act of using internet and computers to hurt a person, company or the government is called cyber terrorism. v. Cyber bullying: the act of using computer and internet to hurt a person and harassment them is called cyber bullying. Safety measures from cyber crime i. We should back up our information every day. ii. We should keep antiviruses, windows defender and firewall updated. iii. We should never open random emails. iv. We should ignore random websites. v. We should remember our user-name and password. We should not auto-save passwords on devices.
32 Oasis School Science and Technology - 8 Computer ethics We have already discussed that, the computers and Internet can be used to harm to others. Sometimes, they can be used to steal data. Many people are found bullying others on social networking sites, which is a crime and against the law of computer ethics. To make the Internet a safe place for everyone, everyone must be responsible. All of us should follow certain moral standards. Computer ethics is the set of moral rules that tell people how to use computers.It is a psychological concept. It protects us from online cyberattacks. It deals with copyright, privacy and many more. Some of the common computer ethics are: i. We should not use pirated versions of the software. ii. We should not use any computer or computer applications without permission. iii. Computers should never be used to harm others. iv. We should never disturb other people’s computer work. v. We should never use a computer to steal others’ information. vi. We should never peek at other people’s files. vii. We should think about consequences when we do anything on the computer and the Internet. Reasonable Facts We should not use pirated versions of applications. We should not use pirated versions of applications because they may contain viruses, malware and worms that will harm our computers. Using pirated copies is also considered cyber-crime. Activity 12 Research on cyber-bullying. Check if any activity you are doing is cyber-bullying or any other cyber-crime. Avoid doing cyber-crime. Cyber laws Nowadays, many things are done digital. Some people use computers and Internet to harm others. So, cyber law is very important in the modern world. Thus, the law which is used to stop cyber-crime and abuses is called cyber law. The various digitat world like E-business, e-commerce, e-banking etc. are common nowadays. Online shopping is growing popular. Even though lots of us follow computer ethics, some people misuse computers to harm others. Cyber-bullying, phishing, stealing information, hacking banks, hacking government websites etc. are some cyber-crimes that can happen around us. To protect us from cyber-crimes, cyber-law is necessary. Fact File Computer ethics is a part of practical philosophy. Fig 2.22 : cyber laws
Oasis School Science and Technology - 8 33 If someone breaks cyber law, we can take action against them. Cyberlaw allows us to punish them and get compensation. Cyber act in Nepal To protect from cyber-crimes, Nepal police used Electronic Transactions Act 2063. According to section 9 of Electronic Transactions Act, i. In case, a person is found damaging any computer systems or data or pirating softwares, s/he is jailed for 3 years or is fined 2 lakhs or both. ii. In case, a person posts illegal contents, s/he is jailed for five years or fined 1 lakh or both. iii. In case, a person uses computer to fraud, s/he s/he is jailed for 2 years or is fined 1lakhs or both. Internet security Not only befit, the Internet can be harmful to us. We can get information from any place in the world. But, there is a chance that someone will find out about our private information.Phishing, malware, worms, trojan and viruses are common threats in cyberspace. So, there are rules and methods to counter cyber-crimes.The rules and measures to stop attacks over the Internet are called Internet security. It keeps away hackers and cyberthieves from stealing sensitive information. For Internet security, softwares such as firewall, email security, Microsoft defender, etc. are most popular. Fig 2.23 : email security Fig 2.24 : firewall Fig 2.25 : antivirus Reasonable Facts We should install a firewall on our computers. We should install a firewall on our computers to protect our computers from unwanted traffic, hackers and malware. It provides Internet security. Activity 13 Install software that provides Internet security on your computers and mobile phones. Some ofthe common risk ofinternet security are spams, worms, botnets, website spoofing, ransomware, phishing, malware, IoT hacking, etc. Fact File Email is the number one way to send malware.
34 Oasis School Science and Technology - 8 Website spoofing: To access social networking sites, computers along with the Internet are widely used. Certain websites can be stealing our private information. Fake websites that look identical to the real one is launched by hackers. It is called website spoofing. They steal user-names and passwords. With the stolen data they can steal money, digital property, copy right etc. Ransomware: Sometimes cyber criminals steal very important data of companies or people. Then they blackmail companies to pay a huge sum of money. It is called ransomware. Phishing scams: Sometimes malware comes along with emails. Those malware steal information from customers of the bank, military information etc. Then hackers use that information to damage the reputation of the company, military, people and government. It is called phishing scams. Malware: Malware is harmful software that allows hackers to access our computers. It can also physically damage our computers. It can spread the virus, damage operating software, corrupt files and steal our private information. Things (IoT) hacking: Various devices such as mobiles, tablets, Macs etc. are connected to the Internet. We use these tools to access various websites and applications. They autosave our user-names and passwords. This information is collected and exchanged by various devices and companies secretly. It is called the Internet of Things (IoT) hacking. Spam: Spam are harmful emails. It can install harmful software in our computers or mobiles. Computer worms: Computer worms are malwares that self-replicate and infect other computers while hiding in original infected computer. Botnet: Botnet is a group of internet-connected devices that can steal data, send spam and hack cameras. Reasonable Facts It is not wise to insert personal information on random websites. It is not wise to insert personal information on random websites because they can steal our information and use it against us. They may steal our money, blackmail us, damage our prestige etc. Activity 14 Open your computer. Go to start menu > all programs > windows security > run scan. Does your computer find any malicious files? Fig 2.21: Doing cyber crimes Fact File Phishing scams are the most common type of cybercrime.
Oasis School Science and Technology - 8 35 Some Internet security precautions i. We should use safe and trusted browser. ii. Every day, we should back up our information. iii. We should never read spam emails. iv. We should disregard and remove random websites. v. We should maintain updated antivirus, Windows Defender, and firewall software. vi. We should remember our login credentials. We should not save passwords automatically on gadgets. vii. We should use multiple security measures while accessing websites, ICT tools. We can use passwords, lock patterns, finger print, face scan etc. viii. We can use email security by encrypting emails to protect it from email virus, worms, phishing etc. 2.5 Introduction of Robotics and Virtual Reality Robotics We can see that, some machines are set up to do certain tasks automatically. A computer can tell them what to do. Some of them have remote controls. Most robots are machines made to do specific jobs, like break rocks, dig mines, etc. Some robots are made to look and act like people. For example, Ping Pong Playing Robot, Jia Jia, Sophia etc. Sophia is the most sophisticated humanoid robot. She is given citizenship in Saudi Arabia. The programmable machine that can perform a series of complex works automatically is called a robot. The microscopic robots are called nanorobots. The robot is made due to the combined effort of engineering and computer science. The process to design, construct, operate and using robots is called robotics. Some interrelated fields of science that helps in robotics are computer engineering, software engineering, mathematics, electronics, electrical engineering, mechanical engineering, mechatronic etc. Robotic Process Automation (RPA) can see and act like humans. It is used to do mechanize work. Use of robots A lot of the work in the mines is done by robots. This is because the mines are hot and full of carbon dioxide. It is not a safe place for people. We send a robot there. A robot can work there without any problem. Robots are also allowed for space exploration. For example, Perseverance is a robot that is navigating Mars. Robots also dive into the bottom of the sea. Military robots help in the war zone to supply medicines, carry wounded people etc. Robots also help in the industry to make complex machines, vehicles etc. Robots that help doctors to do surgery are called medical operating robots. Fact File Robot farmers are programmed to plant seeds, weed, water and spray without the help of a human.
36 Oasis School Science and Technology - 8 Fig 2.26: robots working on mines Fig 2.17: robots helping in surgery Fig 2.28: robots helping in military Reasonable Facts Robots are used in space travel. Robots are used in space travel because as they are non-living, they are less vulnerable to threats present in space than humans. Space travel is impossible for humans until to this date. Activity 15 Research on very simple robotics. Make a very simple model of a robot. Merits and demerits of robots Even though robots are non-living things, they can help us to do difficult jobs like mining, space travel, deep sea navigation, complex surgery, etc. Nowadays they are using more. However, the growing use of robots in various fields of society is increasing unemployment. Robots work for free and do not die. Robots can work fast, accurately and conveniently. Robots do not complain. So, industries use robots instead of humans. As a result, people are losing their job. Robots help in cooking, hospitality, medical fields, education and research. At the same time, terrorists and the military, can program robots to use weapons and bombs. In this case, robots can be used to kill people as a war machine. Virtual reality Virtual reality is a computer-made world. It is either the same as the real world or very different from it. With virtual reality, a person can dive into a digital world and interact with people and things. This technology uses virtual reality headsets or multi-projected environments to produce a virtual world. Virtual reality lets people engage with a threedimensional computer-generated environment via computer modeling and simulation. Fig 2.31: Weaponised robots
Oasis School Science and Technology - 8 37 Fig 2.29: VR sets Fig 2.30: VR world The virtual reality can simulate realistic images, sound and other physical aspects. There is a small screen in the VR headset before the eyes. Virtual reality is widely used in the fields of entertainment. It is particularly used by movie industries and video games. Reasonable Facts VR is being used by militaries to practice their missions. VR is being used by militaries to practise their missions because it can easily create an almost real world. It is cheaper and more convenient than engaging in the real world. Activity 16 Search information on virtual reality and robotics on the Internet and write a short report on it. The various companies such as meta are using VR technology to create a digital world called metaverse. We can use VR technology for virtual busies meetings, school meetings, perform group activities and do practical work together with friends from our own homes. It is also used in medical science to treat depression. In the field of military, virtual reality is used to treat people who has post-traumatic stress disorder(PSTD). It can be used to access educational materials for students. Such as digital planetarium where students can explore virtual solar system. Athletes and sportsman can practice in a virtual world. Physicians and dentists can practice surgeries in virtual samples. Merits and demerits of VR Virtual reality is an effective means of communication. It connects people together. Continuous use of VR may cause headaches, nausea, eyestrain and many more problems. Fact File VR technology is now being used in health care to treat depression and anxiety.
38 Oasis School Science and Technology - 8 2.6 Artificial Intelligence and Cloud computing Artificial intelligence We all know that Google search lets us find almost any kind of information. If we observe carefully, we can see that Google searches the links based on our past searches.They remember our choices and interests. If two people stay in the same place and scroll down their own Facebook, what are the chances that the same content is displayed on their mobile? If two different people open YouTube, will same content be available on their homepage? No, the contents on Facebook, Instagram, TikTok, YouTube etc. are personalized. The contents displayed are based on the preference, history and interest of the particular user. So how is it possible? How do YouTube, Google, Facebook, and TikTok know our interests and preferences? They know it because they are monitoring us. They are using powerful supercomputers with advanced artificial intelligence. The software that can mimic human intelligece, critical thinking and problem-solving ability in the machine is called artificial intelligence. The AI can track our preferences. AI can use deep learning and machine learning. They use algorithms to solve problems. AI can think rationally and take action to achieve a particular goal. They are almost like living beings. Merits and demerits of AI The main aim of an artificial intelligence is to concentrate on computer-enhanced learning, critical thinking, reasoning, and perception. An artificial intelligence is used in medicine, education, transportation, research, diagnosis of disease etc. AI is also able to create art and poem nowadays. Sophia is a social humanoid AI robot. She can think, chat, make a joke, tell poems, feel happy or be sad too. Alexa and Siri are chatbots with AI. Tesla is an AI-powered electric car. Even though AI is useful, many people worry that it could hurt society. AI can use deep fake. Millions of people lose their job every year to a robot and AI. AI can be weaponised to harm people. Use of AI 1. An artificial intelligence is very useful in education. 2. AI robots help in agriculture. 3. AI helps business organizations to analyze stock, provide customer service and suggest business plans. 4. AI is widely used in the study of outer space. Fig 2.31: AI Fact File AI pets are available. They act like real pet animals. Fact File The banks are the companies that use cloud computing the most.
Oasis School Science and Technology - 8 39 5. AI helps to diagnose diseases, find cure and suggest best treatment methods and develop vaccine. 6. AI is widely used in sports. Some of them work as referee in football competition or play chess against us. 7. Social networking sites uses AI to make it user friendly. 8. It can also use cloud computing to store information. 9. Robotics and AI are used combined to make powerful robots. Reasonable Facts Google use artificial intelligence. Google uses an AI system to monitor our preferences and improve the search results for us. The big business companies use artificial intelligence. Big business companies use artificial intelligence because AI can select the best possible channel for a company with the highest chance of success. Activity 17 Creativity is unique to humans. We can create art, music and poems. Can AI do this? Research. Cloud computing We can use 15 GB of free cloud storage if we have a Gmail account. When the backup service is turned on, Photos, videos, and contacts are automatically saved in our G-drive and Google photos. What does it mean? It means if the Internet is available, we can store information in Google Drive. Such a facility is called clod computing. The delivery of various services, data storage facilities, access to servers and databases, networking and software through the Internet is called cloud computing. People, schools, and businesses all need to know about cloud computing. This is because it is important for all. It is safer to store files in a remote database than save them on the hard disk of our computer. Reasonable Facts It is wise to save documents in cloud storage. It is wise to save documents in cloud storage because they will be preserved in clouds so that we can access them from any device. Data is not lost even if the device is destroyed. Fig 2.32: google drive Fig 2.33: one drive
40 Oasis School Science and Technology - 8 Importance of cloud computing Cloud computing is cheap. It does not use up the space. It makes work more productive, faster, and better. There is no risk in using the cloud computing. It can back up phone contacts, photos, videos and other files in cloud storage. We can download information from the cloud on any other device. Anyone as well as anywhere in the world, we can use cloud computing. Disadvantages of cloud computing Cybercrime is possible since all the information are stored online. If a natural disaster damages the main server, data may be lost forever. Reasonable Facts Cloud computing is useless without Internet. Cloud computing is useless without Internet because if there is no Internet, we can neither upload nor download our files. We cannot even use it. Activity 18 Click a photo from your smart-phone. Upload it in Google photos or other cloud computing software. Then download that photo to your computer from the cloud. [Do not use USB data cable, memory card, blue tooth etc. to transfer file] Reasonable Thinking Skill Reasonable Thinking Skill R T S 1. How do information and communication technology tools make our life easier? Information and communication technology tools make our life easier in the following ways: i. ICT tools help us easily access knowledge through the internet. ii. ICT tools such as scanners, photocopiers and printers are very useful in office work, government works etc. iii. Router, TV set up box etc. help us to enjoy movies, news, serials and documentaries. iv. Computers, robots and artificial intelligence help in various fields of society such as medicine, agriculture, space exploration, business, education etc. 2. Is it legal and ethical to download movies from pirated sites? What harm can happen to us from accessing such sites? It is neither legal nor ethical to download movies from pirated sites. If we download movies from pirated websites, we can suffer from many problems. Some of them are: i. Such sites can ask for our private information such as contact numbers, debit card numbers, bank accounts, passwords, social networking sites passwords etc. ii. They can steal our personal information, photos, videos or company information. iii. Pirated sites can install the malware in our devices and damage our software and hardware.
Oasis School Science and Technology - 8 41 iv. Such sites can redirect children or teenagers to unsafe sites, adult content etc. 3. Artificial intelligence is far too intelligent. They can process millions of information at once. Are they safe for us? Support your answer with three points. Artificial intelligence is very intelligent. They can perform millions of information at once. They are very useful in medicine, industries, education etc. however they could possess some threat to us. Some of them are: i. Many countries and terrorists could use weaponised AI in wars. ii. AI will cause automated jobs, so many people can lose their jobs. iii. AI could be conscious and take control of the entire world and dominate all life forms in it. 4. Radheshyam has a 6-year-old child. He has a lot of household work to do and still needs to go to the office. So, he plays cartoons on his mobile and gives them to the child for many hours so that he can work. Is it safe for a child? What are the harmful impacts of this social networking site on the child? Despite being disadvantageous, does it have any benefits? Discuss. Radheshyam is using cartoons from YouTube to keep his child engaged when he has lots of work to deal with. It is not safe for the child. Over-exposure to social networking sites, videos and screen time is harmful to kids. Some of them are: i. Most children develop behaviour problems and attention problems. ii. Kids who spent many hours on TV and mobile will do badly in their academic exams. iii. Most kids will have sleep disorders and obesity. Despite many disadvantages, social networking sites still have few benefits if used properly. Some of them are: i. It can enhance communication ability in kids. ii. Educational videos and programs can be a new source of information for kids. iii. It can keep kids connected with their relatives. 5. My parents always asked me to stay far away from television because it could damage my eyes. But nowadays VR sets are designed which are placed right before the eyes. Is it safe? Enlist the harmful effects if there are any. My parents always asked me to stay far away from the television because it could damage my eyes. But nowadays VR sets are designed which are placed right before the eyes. It is safe but has some side effects. Some harmful effects of VR are listed below: i. It could cause a defect in vision. ii. It can cause real-life injury because the user cannot see their surroundings. iii. It can be addictive. 6. Grandmother Rama Kumari does not know how to use a debit card at ATM. She asked for help from a stranger and gave him the password which was written on a piece of paper. Is it safe to do so? What mistakes did she do? What precautions should we follow if we are to use an ATM card? Grandmother Rama Kumari does not know how to use the debit card at ATM so she let
42 Oasis School Science and Technology - 8 a stranger use it for her. It is not a safe thing to do. Her mistakes in the above case are: i. She wrote the pin code on paper. One should never write it anywhere but memorise it. ii. She gave her pin code to the stranger. One should never share a pin code. iii. She let someone else use her ATM. Others could steal money from her. To use ATMs safely, we should follow the following precautions: i. We should not wear helmets while using ATMs. ii. We should not write pin codes on the debit card or anywhere. iii. We should not share pins or give cards to anyone. iv. We should not let others use our cards. 7. Differentiate between a scanner and a printer. The differences between a scanner and a printer are: SN Scanner SN Printer 1 Scanner is an input device. 1 A printer is an output device. 2 It makes digital copies of documents. 2 It produces hard copies from digital copies. 8. What things should we be aware of to prevent being a victim of cyber crime? We should be aware of the following things to prevent being a victim of cyber crime: i. We should regularly update our devices. ii. We should install antivirus and firewalls on our devices. iii. We should not auto save passwords, or use them on untrusted sites. iv. We should not open pop-up advertisements on the websites. v. We should use different passwords on each website, app, sms account etc. vi. We should be very careful about cameras. They could be hacked to steal our photos and videos. Exercises 1. Choose the best answer from the given alternatives. a. What is the collection of multiple web pages under the same domain called? i. web page ii. surfing iii. server iv. website b. What is the function of an ATM? i. giving money to the friend ii. helps to do bank transactions iii. emergency phone booth iv. ICT tool c. Which device helps us to convert the soft copy into the hard copy? i. scanner ii. router iii. printer iv. tv setup box d. Which language is used to write the webpage? i. Hypertext Markup language ii. Nepali language iii. English language iv. American sign language
Oasis School Science and Technology - 8 43 e. What is a blog? i. regularly updated videos on the website ii. webpages on the same domain iii. regularly updated websites iv. scanners 2. Define the following terms with required examples. a. Information and communication technology b. ATM c. Photo copy machine d. Scanner e. Printer f. TV Set-up box g. Router h. Search engine i. Website j. Social networking sites k. Blog l. Cybercrime m. Internet security n. Robotics o. Artificial intelligence p. Cloud computing 3. Very short questions a. What helps us to find a particular topic on the internet? b. What is the act of stealing information from others by secretly installing malware in their computer called? c. Which tool is used by ISPs to connect our laptops to the internet at our house? d. Write the full form of ISP, ATM and SMS. e. If we log in to our Gmail or apple ID on a new phone, our old photos and contacts easily appear on the new phone. Which technology is it? 4. Give reasons. a. ICT tools are widely used nowadays. b. Internet must be connected to the ATM. c. We should never leak the details of our ATM card. d. Photocopy machine should be kept in a well-ventilated place. e. Printers should be far away from the heat source. f. Wi-Fi is very useful in the home and office. g. Search engine is very useful software. h. We should use social networking sites for a limited time only. i. We should neither open random emails nor surf unsafe websites. j. We should update our devices and install firewalls regularly. k. Use of the robot is increasing every day. l. Virtual reality is widely used in the field of entertainment.
44 Oasis School Science and Technology - 8 m. Artificial intelligence is very important for big companies. n. Fibre nets are better than wireless internet. 5. Differentiate between : a. Printer and scanner b. ATM and photocopy machine c. Router and TV setup box d. Search engines and websites e. Blog and social networking site 6. Short questions a. Write down any two importance of ICT tools. b. What is an ATM used for? c. Mention the uses of the photocopier, scanner and printer. d. What is the function of Internet Service Providers? e. How is a search engine used? f. What is the function of a TV set-up box? g. How do social networking sites help education? h. How do blogs help companies? i. How are documents scanned and printed? 7. Long questions a. Enlist the advantages and disadvantages of social networking sites for teenagers. b. What are the procedures for creating a blog? Mention the importance of a blog for a company. c. Make a list of various forms of cyber attacks and enlist some precautions to avoid being a victim. d. Enlist some of the common computer ethics. e. Discuss the importance of internet security and cyber law. f. How has robotics helped humanity? What are its drawback? Discuss. g. Discuss the possible benefits of virtual reality. h. Artificial intelligence is a very important technology. Mention its usefulness and also discuss its possible disadvantages. i. Discuss the advantages and disadvantages of cloud computing. j. Internet has redefined information and communication. Explain.
Oasis School Science and Technology - 8 45 3 STRUCTURE OF LIVING BEINGS UNIT Cell wall Cell membrane Golgi apparatus Chloroplast Vacuole membrane Raphide crystal Druse crystal Mitochondria Cytoplasm Large central vacuole Rough (ER) Nucleus Nucleolus Endoplasmic reticulum (ER) Ribosome
46 Oasis School Science and Technology - 8 UNIT 3.1 CELL AND TISSUE Estimated teaching periods Theory 5 Practical 1 Cell organelles of plant cells and animal cells Function of cell organelles Differences between plant cells and animal cells Interrelationship among cells, tissues and organs in the human body The Sequence of Curriculum Issued by CDC Robert Hooke is popular for discovering cells. He was born in England on 18th July 1635 and died on 3rd March 1703. He was a physicist and biologist. He proposed Hooke’s law. He was an expert in microscopy. He discovered and coined the term cell. He studied at Wadham College, Oxford. About the Scientist Robert Hooke Key terms and terminologies 1. Cell : A cell is defined as the basic, structural and functional unit of life capable of independent existence. 2. Prokaryotic cell : The cell that lacks a well-organized nucleus is called a prokaryotic cell. 3. Eukaryotic cell : The cell having a well-organized nucleus is called a eukaryotic cell. 4. Cell wall : The outermost rigid and protective covering layer of plant cells is called the cell wall. 5. Plasma membrane : A thin semi-permeable living, elastic and delicate membrane that surrounds cells is called a plasma membrane. 6. Cytoplasm : The liquid that fills the space between the cell membrane and the nuclear membrane is called cytoplasm. 7. Nucleus : A round or spherical cell organelle present almost at the centre of a cell is called a nucleus.