The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.
Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by agriya.3025, 2023-04-12 10:41:58

TECHNOFUN 7

TECHNOFUN 7

P a g e | 4 5 KVS DELHI REGION 2021 Blur/Sharpen Tool [Shift + U] This tool is used to blur or sharpen the image using the brush. Dodge/Burn Tool [Shift +D] This tool is used to lighten and darken the image color. Path Tool [B] This tool is used to create or edit path. Text Tool [T] The Text tool is used to place text into an image or to write text directly on the canvas. Color Picker Tool [O] This tool is used to set color from image pixels. Measure Tool [Shift + M] This tool is used to measure distance and angles. Zoom Tool [Z] This tool is used to adjust zoom levels. Active Foreground / Background Color. This option is consist of two colors the foreground and the background. When click it will open Color Editor Dialog, which permits you to change color. 5.2 EDITING THE IMAGES How to change the Size of an Image (Scale) By using GIMP, you can easily resize your image. Following are the methods by which you can resize your mage. ❖ By setting the Resolution of image ❖ Click on “Scale” to confirm. Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 4 6 KVS DELHI REGION 2021 ❖ By scale image option, you can reset height, weight, X,Y resolution and Interpolation. Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 4 7 KVS DELHI REGION 2021 5.3 GIMP web Image If you want to save, image for your webpage. Use the following steps. Step 1: Click on File menu -> select Export Step 2: Change the name of the file. Choose file format and click on export. Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 4 8 KVS DELHI REGION 2021 5.4 How to Crop an Image Crop means to remove the part of the image. Following are the method to perform crop function in GIMP. 1. By using Crop tool from Toolbox. Select the required area and press enter key in the center or on any corner Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 4 9 KVS DELHI REGION 2021 Crop to selection Step 1 : Select the area to crop using Rectangle Select Tool with add to current select option. Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 5 0 KVS DELHI REGION 2021 Step 2.: Click on image option->select Crop to selection . 5.5 HOW TO MAKE CIRCLE SHAPED IMAGE Following are the steps to make circle shaped image:- Step 1: Click on File->click on Open->Select the Photo and click on Open. Step 2: Click on Layers->click on Transparency->click Add Alpha Channel. Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 5 1 KVS DELHI REGION 2021 Step 3: Click on Ellipse Select Tool->Make a circular selection with Ellipse Tool->Use the fixed option ->select Aspect ratio and enter 1:1->You can enter or select width and height. Step 4: Click on select->click on Invert. Step 5: Click on Edit->click on clear. Step 6: Click on image->click on Zealous Crop. Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 5 2 KVS DELHI REGION 2021 Step 7: Click on File->click on Export As->save the file with <filename>.png extension- >click on Export. Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 5 3 KVS DELHI REGION 2021 5.6 HOW TO CREATE A TEXT LOGO IN GIMP Step 1: Create a New Document/Image. Step 2: Click on Layers->click New Layer. Step 3: Click on Text Tool->Add Your Text(Style Your Tex). Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 5 4 KVS DELHI REGION 2021 Step 4: Remove background Layer. Step 5: Save Logo. Exercise Something to do A.Multiple Choice Questions: 1. Crop means to remove the part of the …………………? a. Tool b. Layer c. Brush d. Image 2. ………. tool is use to make Text Logo. a. Pencil b. Text c. Air Brush d. None of these 3. The ________ tool allows you to select a drawing with the free-hand. a. Fuzzy Selection b. Lasso c. Text d. Bucket Fill 4. Shift+ C is the shortcut to _______ the image. a. Duplicate b. Delete c. Copy d. Crop 5. Scale option is used to change the _________ of an image. a. Colour b. Size Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 5 5 KVS DELHI REGION 2021 c. Area d. All of the above B. STATE TRUE(T) / FALSE(F) 1. Canvas is the part of the image window where the image is displayed. 2. The Free Selection tool is known as fuzzy selection tool. 3. Layers are transparent sheets stacked one on top of the other. 4. The Eraser tool is used to remove the image from the canvas. 5. The Bucket Fill tool places text into an image. C. ANSWER THE FOLLOWING QUESTIONS: 1. What is image editing? 2. List few image-editing tools available. 3. Write down the steps to create Text Logo? 4. Explain any four tools used in GIMP. 5. What is the way to change the size of an image? SOMETHING TO DO 1. Download GIMP on your PC/Laptop and create Text Logo of your name. 2. Take an image and make use of different tool. 3. Take a group picture of your class and crop your image Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 5 6 KVS DELHI REGION 2021 6. MORE APPLICATION OF INTERNET 6.1 Internet of Things (IoT) 6.2 Online collaboration 6.3 Google Sheet 6.4 Cloud Computing Introduction An Internet application is vast in nature, compiled application that can be accessed through the Internet. Internet applications perform complex data processing for business on either the client or the server. The application follow the various protocol e.g. Transmission Control Protocol (TCP)/Internet Protocol(IP) to receive requests from a client, typically a Web browser, process associated program, and return data to the browser. 6.1 Internet of Things (IoT) Fig. 6.1: Internet of Things (IoT) The internet of things (IoT) is a smart system of computer gadgets/devices, electrical, Mechanical devices, animals and human being that have unique identifier Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 5 7 KVS DELHI REGION 2021 (UIDs) and the ability to send the data using Internet/network without requiring any human-to-human or human-to-computer interface. A thing over the internet of things may be a person with a heart monitor implant, an animal with a biochip transponder, an automobile has built-in sensors to alert the driver about the environment or vehicle information or any object that can be have an Internet Protocol (IP) address and is able to transfer information over a network. How IoT works? An Internet of Things (IoT) consists of many web enabled devices, like microprocessor, sensors, LED, ICs etc. These devices collect the information from the surrounding and make a database for the information in memory. Then mechanical devices also connected with these devices for doing some mechanical activities based on instruction. IoT works on the smart technology and use Artificial Intelligence (AI). Fig. 6.2: Internet of Things (IoT) Working The internet of things help in living smart way. The IoT enables the system automatic which help to save our time and energy. It also provides the real time analysis. Following are the example of Internet of Things (IoT) Technology 1. Operation of Automatic home system, operation of door by smart gadgets, handling electrical equipment by smart phone. 2. Automatic Collection the weather Information Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 5 8 KVS DELHI REGION 2021 3. Automatic road Traffic control 4. Smart farming etc. 6.2 Online collaboration Internet usage is increasing day by day ,it has become the main source of communication around the world. With ever-increasing growth rates, the technology is increasing day by day to support the structure of the Internet. Online collaboration can be defined as a technology that uses a collaboration software like Google document, Google sheet, Microsoft document etc. to allow multiple people to work together to achieve the same goal. The members of the collaborating group can use the collaboration software to coordinate, communicate, cooperate, share, negotiate and even compete with each other to solve problems. Fig. 6.3: Online Collaboration 6.3. Google Sheet Google Sheets is a free, cloud-based spreadsheet application. You can use it in your browser like a webpage, you have all the functionality of a full spreadsheet application for doing powerful data analysis. It really is the best of both worlds. Why use Google Sheets? 1. It’s free! 2. It’s collaborative, so teams can all see and work with the same spreadsheet in real-time. 3. It has enough features to do complex analysis. Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 5 9 KVS DELHI REGION 2021 How to Create Google Sheet Step 1: Go to the following link: https://www.google.com/sheets/about/ Step 2: click on Go to Google sheet Fig. 6.4: Google Sheet Interface Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 6 0 KVS DELHI REGION 2021 Step 3: Click the Colorful plus button to create a new Google Sheet Step 4: Then new Google sheet will open How to Share a Google Sheets File? Sharing a Google Sheets file is easy. You add the email addresses of your invitees, include a note, and then send the invitation. You can determine whether recipients may just view your spreadsheet, or also comment on, or edit it. Step 1: Log in to Google Sheets and create or open the spreadsheet you want to share. Step 2: In the top-right corner of the screen, select Share. Fig. 6.5: Google Sheet editing permission Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 6 1 KVS DELHI REGION 2021 Fig. 6.6: Sending Google Sheet Step 3: In the Share with others dialog box, add the email addresses of the people you want to invite to view, comment on, or edit your Google Sheets file. Step 4: Next to the email address field, select the pencil icon and choose one of the three options: Can edit, Can comment, or Can view. Step 5: Add a note to accompany the invitation. Step 6: Select Send. 6.4 Cloud Computing Cloud computing is system of different services through the Internet. These resources include various tools and applications like database, software, application and data analysis etc. Rather than keeping files on a computer hard drive or local storage device, cloud-based storage makes it possible to save them to a remote database. As the electronic device can access the web, it may access the data and the software program to run it. Fig. 6.7: Cloud Computing Cloud computing is a good option for cost savings, increased productivity, speed and efficiency, performance, and security. Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 6 2 KVS DELHI REGION 2021 Fig. 6.8: Application of Cloud Computing Types of Cloud Services The following are the common services provided by Cloud Technology 1. Email 2. Storage, backup, and data retrieval 3. Creating and testing apps 4. Analyzing data 5. Audio and video streaming EXERCISE SOMETHING TO KNOW A. Answer the following questions. 1. What is IoT? 2. Write some advantages of Online Collaboration. 3. What is Google Sheet? 4. What is Cloud Computing? 5. Differentiate between IoT and Cloud computing. B. Fill in the Blanks 1. _______________describes the network of physical objects—“things”—that are embedded with sensors, software, and other technologies 2. _______________ sharing with many users is an example of Online Collaboration. 3. The most important things required for online things is ________________. 4. Intersection area of rows and columns is called __________. 5. _____________is the delivery of different services through the Internet, including data storage, servers, databases, networking, and software. Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 6 3 KVS DELHI REGION 2021 C. Match the Following: 1. IoT a) Store the Data on Cloud 2. Cloud Computing b) Provides a powerful tool to create Spreadsheet online. 3. Google Sheet c) necessary for sharing the Data 4. Email d) Internet of Things D. Select the correct option for each question : 1. Internet of Things (IoT) consists of _____________________. (a) Things, Sensors & software etc. (b) Email account (c) Google Sheet (d) None of these. 2. Which of the following not provide online collaboration (a) Google (b) Microsoft (c)CBSE (d) Amazon 3. Cloud computing is a type of abstraction which is based on the notion of combining physical resources and represents them as _______resources to users. (a) Real (b) Cloud (c) Virtual (d) None of these 4. which of following is not advantages of Online collaboration (a) Time Saving (b) Cost Saving (c) Video conferencing (d) Offline meeting E. State True or False 1. IoT is the future Smart Technology 2. The first audio and video are part of online Collaboration. 3. We cannot share/download Google Sheet. 4. Cloud computing provides as much storage freely. SOMETHING TO DO 1. Find any IoT (Internet of Things) smart Technology used near you. 2. Create a Table of your marks statement by Google sheet and share with your friend for entering their marks. Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 6 4 KVS DELHI REGION 2021 7. COMPUTER SECURITY 7.1 Threats to Computer 7.2 How to Protect Your System 7.3 Anti-Virus Software and Examples 7.4 Firewall and Its Use 7.5 Cyber Crime and Computer Ethics 7.6 Hackers and Crackers 7.7 Cyber Law and Importance 7.8 Backup and Restore ARYAN: Hello DEAR, what we are going to learn in this chapter? GOWRI: Hello. In this chapter we are going to study about security of computer, threats to it, solutions to the threats etc. ARYAN: Threats???. What do you mean by threat? GOWRI: A threat is something that may or may not happen, but has the potential to cause serious damage. ARYAN: Then, What are Threats to computer? GOWRI: A threat to the computer is a potential negative action or event that results in an unwanted impact to a computer system. A threat can be “accidental" or “intentional” or otherwise a circumstance, capability, action, or event. ARYAN: What are the different types of Threats? GOWRI: Different threats to computer are: 1.Virus: Computer Virus are nothing but a computer program that does unwanted things with your computer resources e.g. you are working on PC and you are repeatedly receiving annoying message. 2. Worms: Worms are self-replicating viruses and consume the system resources. 3. Trojan Horse: A Trojan horse is simply a computer program. It is like a program that claims to do one thing like it is a game but instead does damage when you run it like it may erase your hard disk. Trojan horses do not replicate automatically. 4. Spyware: Spyware is a software program that secretly gathers personal information and sends it without the user's knowledge from a computer, when it is online. 5.Phishing:Phishing is an attempt to acquire sensitive information such as username, password or credit card details. Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 6 6 KVS DELHI REGION 2021 Always put passwords on your system, so that no unauthorized person can use it in your absence. ARYAN: Why Computer Viruses are called as Viruses? GOWRI: Computer viruses are called viruses because they share some of the traits of biological viruses. A computer virus passes from one computer to computer just like a biological virus passes from person to person. Similar to the way a biological virus need a cell to ride, a computer virus must need a program or document to launch. And once computer virus starts running, it can infect other programs or documents too. ARYAN: OK, What are these Antivirus Softwares? GOWRI: Antivirus software is a program or set of programs that are designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, trojans, adware, and more. Examples of Antivirus softwares are: Norton Antivirus Plus, Avira Antivirus, Kaspersky, Quick Heal etc. ARYAN: Now Please tell something about Firewall. GOWRI: A firewall is a system designed to prevent unauthorized access to or from a private network. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. ARYAN: Is it a hardware device? GOWRI: Firewalls can be either hardware or software but the ideal firewall configuration will consist of both. ARYAN: Then how it works? GOWRI: There are several types of firewall techniques that will prevent potentially harmful information from getting through: 1. Packet Filter : Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules. 2. Application Gateway Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can degrade performance 3. Circuit-level Gateway It Applies security mechanisms when a connection is established (TCP or UDP). After the setup of connection, packets can flow between the hosts without further checking. Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 6 7 KVS DELHI REGION 2021 4. Proxy Server It intercepts all messages entering and leaving the network. The server effectively hides the true network addresses ARYAN: Thank you friend for such an elaborate discussion about firewall. Now I want to know something about Cyber Crime.? GOWRI: OK, Firstly I will tell you what actually cyber crime is: Cybercrime is defined as the crime that is facilitated by the use of electronic gadgets such as computer, smartphone etc. involving communications or information systems through internet. In simple terms we can also say that Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device. Cybercrime is carried out by individuals or organizations. These types of crimes are committed daily on the internet. ARYAN: Oh… , What are different cybercrimes? GOWRI: Let us discuss some common cybercrimes: 1. Cyber Bullying: Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else through social media, email, instant messaging etc. 2. Identity theft: Criminals usually steal identity information of others such as credit card information, addresses, email addresses and more. By using this information they can pretend to be someone else and can create new bank accounts etc. 3. Ransomware : Ransomware enters your computer network and encrypts files, meaning you don’t have any access to them. The attacker will send you a notification regarding demand of a large sum of money to get your data back. 4. Email Bombing: An email bomb is another form of internet abuse. Email bombing is an overloading of emails directed to one email address; this will cause the person receiving the emails server to become sluggish or even crash. 5. Malware: It is a piece of software written with the intent of causing harm to data and devices. Malware is often done through a range of viruses that will get into your computer to cause problem, by damaging your computer, or phone etc., so that the culprits can steal credit card details and other personal information. 6. Online Scams: Online scams are basically scams that happen online. Whether that’s tricking you into giving out personal details online by an ad popping up, telling you that you have won something and asking for your card details to pay for shipping. You’ll never receive anything instead of that you’ll start noticing weird transactions done through your bank account. Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 6 8 KVS DELHI REGION 2021 And there are many more. ARYAN: Oh, Then it’s very dangerous to work on internet. GOWRI: Yes, it’s risky but always use internet with precautions. ARYAN: Do you know something about computer Ethics. GOWRI: Yes, Computer Ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how computers affect society. 1. One should not use computer to harm anyone. 2. One should not interfere with other people's computer work. 3. One should not look secretly in other people's computer files. 4. One should not use a computer to steal information. 5. One should not copy or use proprietary software for which you have not paid. 6. One should not use other people's computer resources without authorization or proper compensation. 7. One should think about the social consequences of the program you are writing or the system you are designing. 8. One should always use a computer in ways that ensure consideration and respect for your fellow humans. ARYAN: Hello, tell me something about Hacking. What is this? Who does hacking? GOWRI: Hacking may be defined as the technique which is done to get an access to unauthorized systems. Simply we can say it is a way to gain access to a network or to a computer for illegal purposes. The persons who do hacking are very intelligent and skilled in computers. The people who are skilled in Hacking are divided into 2 categories : 1.Hackers : Hackers are good people who do this for the good purpose and to obtain more knowledge from it and have no intention to harm anyone . They generally find loop holes in the system and help them to cover them. . 2.Crackers : Crackers are kind of bad people who break or violate the system with bad intentions like to harm the data or steal it. Crackers harm or destroy the data by gaining an unauthorized access to the network. Their works are always hidden as they are doing illegal stuff. Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 7 0 KVS DELHI REGION 2021 Select Start-> then Settings -> Update & Security -> Backup -> Add a drive, and then choose an external drive or network location for your backups. Restore your files with File History You can get back your missing important file or folder that you've backed up, here's how to get it back: 1. In the search box on the taskbar, type restore files, and then select Restore your files with File History. 2. Look for the file you need to get back and then use the arrows to see all its versions. 3. After finding the version you want, select Restore to save it in its original location. And if you want to save it in a different place, then right-click Restore, select Restore to, and then choose a new location. 4. Find your backups created on previous versions of Windows 5. If you used Backup and Restore to back up files or create system image backups in previous versions of Windows, your old backup is still available in Windows 10. In the search box on the taskbar, type control panel. select Control Panel -> System and Security -> Backup and Restore (in Windows 7). Fig. 7.3 Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 7 1 KVS DELHI REGION 2021 EXERCISE SOMETHING TO KNOW A. Short Answer Questions. 1. Define computer virus? 2. What is firewall? 3. Define Phishing? 4. Give one difference between Trojan horse and Worm? 5. Why we need backup? B. Fill in the Blanks 1. IT ACT 2000 notified on ________________. 2. ______________includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. 3. _____________destroy data by gaining an unauthorized access to the network. 4. _____________ is set of moral principles that regulate the use of computers. 5. Packet Filter looks at each __________entering or leaving the network. C. Match the Following. A. State True or False 1. Crackers are good people. 2. Ransomware demand a large sum of money for you to then get your data back. 3. Proxy Server hides the true network addresses. 4. Spyware is self-replicating viruses 5. Firewall is hardware device. SOMETHING TO DO 1. Go to lab and find the Anti-virus installed in your computer lab. 2. Take the backup of your file and then restore it. 1. Backup and Restore a) Fake website 2. Identity theft b) Unauthorized access 3. Norton c) Credit card information 4. Firewall d) System and Security 5. Pharming e) Anti Virus Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 7 2 KVS DELHI REGION 2021 APPENDIX ANSWERS OF EXERCISE EXERCISE 1.1 A. Answer the following questions. 1. Explain the terms: a. Algorithm b. Flowchart Ans: (a) Algorithm: Algorithm is process of writing all the steps required to solve a particular problem. These steps are written in English language to describe each statement. (b) Flowchart: Flowchart is pictorial representation of steps involved in solution of a problem. 2. Why do we require Coding? Ans: Coding is process of writing code in a programming language to resolve daily life problems, automate tasks and developing games. 3. List various symbols used in flowchart development. Ans: Various symbols used in development of flowcharts are : Start /Stop Input/Output Process Decision Box Flow line Connector 4. Differentiate between Flowchart and Algorithm. Ans: Difference between flowchart and algorithm: Algorithm Flowchart Includes sequence of steps which depicts the procedure of the solution. An information diagram made up of different shapes shows the data flow. Text is used Symbols are used Difficult to interpret Easily interpreted 5. Write any two advantages of flowchart. Ans: Advantages of flowchart are: 1. Simple and easily understandable. 2. Visual Clarity Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 7 3 KVS DELHI REGION 2021 B. Fill in the blanks:- 1. Flowchart 2. Visual Clarity , problem solving 3. Flowline 4. Coding 5. Algorithm C. Match the following: A B a. Used to depict process visually 3. Flowchart b. As easy as to write in English 4. Algorithm c. Used to develop a computerized solution of a problem 5. Python d. start/stop of a program is known as 1. Terminator 2. It is a process of creating computerized solution of a problem 2. Coding D. Select the correct answer for each question: 1. b 2. c 3. c 4. a 5. C E. State True / False:- 1. True 2. True 3. False 4. True 5. False EXERCISE Chapter 2 A. Answer the following questions. 1. What is Python? Ans: Python is an open source, high level programming language which has simple syntax similar to the English language. Python was created by Guido Van Rossum in December 1989. 2. Write the steps to install python in your computer. Ans: We can do the following steps to install python in our computer: Step 1: Select Version of Python to Install. Step 2: Download Python Executable Installer. Step 3: Run Executable Installer 3. Write any three features of Python. Ans: Features of Python: 1. Python is portable Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 7 4 KVS DELHI REGION 2021 2. Python is open source and free 3. Python is easy to understand 4. How will you check whether your Operating system is 32 bit or 64 bit? Ans: Do the following steps to check Operating System: 1. Click on Start button on Windows 10 2. Right Click on Computer 3. Choose Properties Option 4. We can see Operating System name and System Type 5. Python can be downloaded from which website? Ans: Python can be downloaded from official website of python – www.python.org B. Fill in the blanks 1. Interpreted 2. Guido Van Rossum 3. Monty Python’s Flying Circus 4. Interpreter 5. NASA, Google C. Match the Following:- a. (2) b. (5) c. (1) d. (3) e. (4) D. Select the correct answer for each question:- 1. b 2. c 3. c 4. c 5.d E. State True / False:- 1. True 2. False 3. False 4. True 5. True ANSWERS OF EXERCISE Chapter 2 A. Answer the following questions:- 1. What do you mean by a keyword? Write two characteristics of keyword. Ans: A keyword is a pre-defined reserved word in a programming language which has fixed function and cannot be changed. E.g. if, else, etc. Characteristics of Keyword: 1. Python keywords are case sensitive 2. Python keywords can’t be used as identifier (Variable Name). 2. Write any three variable naming conventions. Ans: Variable naming convention: 1. A variable name can include alphabets, digits and underscore. Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 7 5 KVS DELHI REGION 2021 2. Variable name should be user friendly. 3. Variable names are case sensitive. 3. Why do we require variables? Ans: In computer Programming, variables are required to store user inputs, intermediary results and output. 4. What is data type? How many types of data type supported by python? Ans: Data types are means to identify the type of data and associated operations. Data types allocate the memory required to store the variable. Python supports 5 standard data types. 1. Number- The data types which store numeric values are called Python numbers. Python has three numerics: int, float and complex 2. String: means sequence of characters. These set of characters are represented in either single quote(‘’) or double quotes(””). 3. List 4. Tuple 5. Dictionary 5. Differentiate between Keyword and Variable. Ans: Keywords are reserve words having some special meaning attached to it. Variables are named storage location whose contents can be changed during execution of program. B. Fill in the blanks:- 1. Keyword 2. Variable 3. Invalid 4. Data type 5. Alphabets, digits and underscore ( _ ) C. Match the following:- a. 3 b. 2 c. 5 d. 1 e. 4 D. Select the correct answer for each question:- 1. (a) 2. (d) 3. (b) 4. (b) 5. (a) E. State True/False:- Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 7 6 KVS DELHI REGION 2021 1. False 2. False 3. True 4. False 5. False ANSWERS OF EXERCISE Chapter 2 A. Answer the following questions:- 1. What do you mean by the operators in Python? Ans. Operators are the symbols that are used to perform operations on operands. For Example +,-,/,* are arithmetic operators. 2. Explain the terms? Operand Expression Ans. Operands: The values that the operator operates on are called operands. Expression: Expression is combination of operator and operands. 3. What is relational operator? Ans. Relational operators are used to define some kind of relationship between values or variables. 4. Explain the purpose of modulus operator? Ans. Modulus operator is used to get remainder of a division operation. % symbol is used in python to represent modulus operator. 5. Differentiate between division and floor division operators. Ans: Division operator is used to get division of two numbers while floor division is used to get integer portion of quotient. For example, 5/2 will return 2.5 whereas 5//2 will return 2. B. Fill in the blanks:- 1. Operands 2. 0 3. Expression 4. Relational 5. 4.0 C. Match the Following:- a. 3 b. 1 c. 2 d. 5 e. 4 D. Select the correct answer for each question:- Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 7 7 KVS DELHI REGION 2021 1. b 2. c 3. c 4. c 5. B E. State True / False:- 1. False 2. True 3. True 4. True 5. False ANSWERS OF EXERCISE Chapter 3 A. Answer the following questions:- 1. Write the steps required to create and run a program? Ans. To create and run a python program, we need to do the following steps: 1. To open an IDLE text editor to write a program 2. Save your program with .py extension 3. Compile and execute a program by pressing F5 2. What is full form of IDLE? Ans. IDLE stands for Integrated Development Learning Environment. It allows programmers to easily write, edit, compile and execute Python code. 3. Which function key is used to execute a program in python? Ans: Function key (F5) is used to execute a python program using IDLE. 4. What is purpose of print() function? Ans. print() function is used to print the given message/variable value to the standard output device i.e monitor. 5. What is comment? Which symbol is used to define a comment? Ans: Comment is a remark/statement that is given within a program to define purpose and ownership program. These statements are ignored by compiler during compilation process. # symbol is used to represent single line comment. B. Fill in the blanks:- 1. F5 2. # 3. print() 4. Process 5. .py C. Match the Following:- a. 3 b. 4 c. 1 d. 5 e. 2 D. Predict/Select the correct OUTPUT for each question:- Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 7 8 KVS DELHI REGION 2021 1. (c) 2. (c) 3. (c) 4. (c) 5. (a) E. State True or False. 1. False 2. False 3. True 4. True 5.True ANSWERS OF EXERCISE Chapter 3 A. Answer the following questions:- 1. Which function is used to take user input at run time? Ans. Input Function: input() is a function that is used to take user input at run time. Return value of input function will be always of String type. 2. Ravita wrote a program to find the sum of marks of 03 subjects. She is getting error in her program. Help her to resolve errors? Sub1=input(“Enter marks of Subject1”) Sub2= input(“Enter marks of Subject2”) Sub3= input(“Enter marks of Subject3”) Total=Sub1+Sub2+Sub3 print(Total) Ans. Ravita is applying arithmetic operator (+) on variable Sub1, Sub2 and Sub3. She should convert these values to integer or float using int() or float() function. By default input function return string value and arithmetic operation could not applied on string. Corrected code will be : Sub1=float(input(“Enter marks of Subject1”)) Sub2= float(input(“Enter marks of Subject2”)) Sub3= float(input(“Enter marks of Subject3”)) Total=Sub1+Sub2+Sub3 print(Total) 3. When do you use decision statement? Ans. Decision statement will be used whenever we have to choose out of two or more than two alternative paths based on a condition. 4. What is if..else statement? Write it’s syntax? Ans. if…else statement is a decision structure and it is used whenever we have to choose from the set of statements based on a defined condition. If condition evaluates to true, one set of statements executed otherwise another. Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 7 9 KVS DELHI REGION 2021 Syntax: if<condition>: Statements else: Statements 5. Why do you use int() and float() function? Ans: int() and floar() functions are type conversion function. These are used to do explicit type conversion from one data type to another. B. Fill in the blanks:- 1. block 2. input(). 3. else 4. Test expression 5. Decision statement C. Predict/Select the correct OUTPUT for each question:- 1. (a) 2. (d) 3. (b) 4. (a) 5. (c) CHAPTER 4 A. Multiple Choice Questions: 1. GNU Image Manipulation Program 2. Open Source 3. Paintbrush 4. 2.10.22 5. www.gimp.org B. State True(T) / False(F) 1. GIMP is proprietary software. False 2. Microsoft Windows (XP, Vista, Windows 7) is GIMP compatible Platform. True 3. BMP is one of the file format of GIMP. True 4. GIMP cannot be use as paintbrush. False 5. GIMP provides different tools for image editing. True C. Answer the following questions: 1. Write down any four features of GIMP? Answer: ● It is Open and Free software. ● It supports different file formats such as gif, jpeg, tiff etc. ● It works with different operating systems such as Linux, Mac OS and Microsoft Windows. ● It is use for used for image manipulation (retouching) and image editing. ● GIMP provides different tools for image editing. ● GIMP paintbrush tool is use to draw images easily. ● It is a memory efficient graphic tool. Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 8 0 KVS DELHI REGION 2021 ● Combining different images in GIMP to create animation. ● There are several ways of creating colors in GIMP. 2. List GIMP Compatible Platforms. Answer: ❖ GNU/Linux (i386, PPC) ❖ Microsoft Windows (XP, Vista, Windows 7) ❖ Mac OS X ❖ Sun OpenSolaris ❖ FreeBSD 3. Explain GNU Image Manipulation Program ? Answer: GNU Image Manipulation Program is free and powerful open source image editing tool that provides retouching of photos, authoring of photos and composition of photos. It is free and consists of many similar features provided by the Photoshop. It is available for free download. 4. Write down the expansions of the following :.gif (b) .png (c) .tiff (d) .jpeg Answer : (a) .gif : Graphics Interchange Format (b).png: Portable Network Graphics (c).tiff: Tagged Image File Format (d).jpeg:Joint Photographic Image Format 5. Write down the steps to open image in GIMP? Answer: Click on file->click Open->Select Location and file->click Open option. CHAPTER 5 A. Multiple Choice Questions: 1. Image 2. Text 3. Lasso 4. Crop 5. Size B. State True(T) / False(F) 1. Canvas is the part of the image window where the image is displayed. True 2. The Free Selection tool is known as fuzzy selection tool. False 3. Layers are transparent sheets stacked one on top of the other. True 4. The Eraser tool is used to remove the image from the canvas. False 5. The Bucket Fill tool places text into an image. False C. Answer the following questions: Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 8 2 KVS DELHI REGION 2021 2. Ans. Advantages of Online Collaboration. Convenience in Organizing Meetings. One of the key advantages of online collaboration is that it makes it easier for people who aren't in the same location to work together. Easier Management of Projects. Fast completion of projects. Significant Cost Savings. 3. Ans. Google Sheets is an online spreadsheet app that lets users create and format spreadsheets and simultaneously work with other people. Google Sheets isn't only for consumers: it's used every day by businesses and schools to manage spreadsheet data. 4. Ans. Cloud computing is the delivery of different services through the Internet. These resources include tools and applications like data storage, servers, databases, networking, and software 5. Ans. The role of cloud computing in IoT works as part of a collaboration and is used to store IoT data, allowing easy access when it is required. Cloud computing is an easy method of travel for the large data packages generated by the IoT through the Internet. B. Fill in the Blanks 1. Internet of Things (IoT) 2. Google Sheet 3. Internet 4. Cell 5. Cloud computing C. Match the Following. 1 ---- d 2 ---- a 3 ---- b 4 ---- c D. Select the correct answer for each question. 1. a 2. c 3. c Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 8 3 KVS DELHI REGION 2021 4. d E. State True or False 1. True 2. True 3. False 4. False Chapter 7 A. Short Answer Questions. 1. Computer Virus is computer program that do unwanted things with your computer resources e.g. you are working on PC and you are repeatedly receiving annoying message. 2. A firewall is a system designed to prevent unauthorized access to or from a private network 3. Phishing is an attempt to acquire sensitive information such as username, password or credit card details. 4. Worms are self-replicating viruses and consumes the system resources whereas A Trojan horse is simply a computer program that claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). 5. Back up is needed, if system got damaged by some means, then still we can recover the lost data. B. Fill in the Blanks 1. 17october 2000 2. Cyberbullying 3. Crackers 4. Computer Ethics 5. packet C.Match the Following. 1-d, 2-c, 3- e, 4-b, 5-a D. State True or False 1. False Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


P a g e | 8 4 KVS DELHI REGION 2021 2. True 3. True 4. False 5. False Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


Copyright Number:- L-101962/2021 Registered With:- KVS Delhi Region


Click to View FlipBook Version