Page | 45 KVS DELHI REGION 2021
Blur/Sharpen Tool [Shift + U]
This tool is used to blur or sharpen the image using the brush.
Dodge/Burn Tool [Shift +D]
This tool is used to lighten and darken the image color.
Path Tool [B]
This tool is used to create or edit path.
Text Tool [T]
The Text tool is used to place text into an image or to write text directly on the canvas.
Color Picker Tool [O]
This tool is used to set color from image pixels.
Measure Tool [Shift + M]
This tool is used to measure distance and angles.
Zoom Tool [Z]
This tool is used to adjust zoom levels.
Active Foreground / Background Color.
This option is consist of two colors the foreground and the background. When click it
will open Color Editor Dialog, which permits you to change color.
5.2 EDITING THE IMAGES
How to change the Size of an Image (Scale)
By using GIMP, you can easily resize your image. Following are the methods by which
you can resize your mage.
❖ By setting the Resolution of image
❖ Click on “Scale” to confirm.
Page | 46 KVS DELHI REGION 2021
❖ By scale image option, you can reset height, weight, X,Y resolution and
Interpolation.
Page | 47 KVS DELHI REGION 2021
5.3 GIMP web Image
If you want to save, image for your webpage. Use the following steps.
Step 1: Click on File menu -> select Export
Step 2: Change the name of the file. Choose file format and click on export.
Page | 48 KVS DELHI REGION 2021
5.4 How to Crop an Image
Crop means to remove the part of the image. Following are the method to perform crop
function in GIMP.
1. By using Crop tool from Toolbox.
Select the required area and press enter key in the center or on any corner
Page | 49 KVS DELHI REGION 2021
Crop to selection
Step 1 : Select the area to crop using Rectangle Select Tool with add to current select
option.
Page | 50 KVS DELHI REGION 2021
Step 2.: Click on image option->select Crop to selection .
5.5 HOW TO MAKE CIRCLE SHAPED IMAGE
Following are the steps to make circle shaped image:-
Step 1: Click on File->click on Open->Select the Photo and click on Open.
Step 2: Click on Layers->click on Transparency->click Add Alpha Channel.
Page | 51 KVS DELHI REGION 2021
Step 3: Click on Ellipse Select Tool->Make a circular selection with Ellipse Tool->Use
the fixed option ->select Aspect ratio and enter 1:1->You can enter or select width and
height.
Step 4: Click on select->click on Invert.
Step 5: Click on Edit->click on clear.
Step 6: Click on image->click on Zealous Crop.
Page | 52 KVS DELHI REGION 2021
Step 7: Click on File->click on Export As->save the file with <filename>.png extension-
>click on Export.
Page | 53 KVS DELHI REGION 2021
5.6 HOW TO CREATE A TEXT LOGO IN GIMP
Step 1: Create a New Document/Image.
Step 2: Click on Layers->click New Layer.
Step 3: Click on Text Tool->Add Your Text(Style Your Tex).
Page | 54 KVS DELHI REGION 2021
Step 4: Remove background Layer.
Step 5: Save Logo.
Exercise
Something to do
A. Multiple Choice Questions:
1. Crop means to remove the part of the …………………?
a. Tool
b. Layer
c. Brush
d. Image
2. ………. tool is use to make Text Logo.
a. Pencil
b. Text
c. Air Brush
d. None of these
3. The ________ tool allows you to select a drawing with the free-hand.
a. Fuzzy Selection
b. Lasso
c. Text
d. Bucket Fill
4. Shift+ C is the shortcut to _______ the image.
a. Duplicate
b. Delete
c. Copy
d. Crop
5. Scale option is used to change the _________ of an image.
a. Colour
b. Size
Page | 55 KVS DELHI REGION 2021
c. Area
d. All of the above
B. STATE TRUE(T) / FALSE(F)
1. Canvas is the part of the image window where the image is displayed.
2. The Free Selection tool is known as fuzzy selection tool.
3. Layers are transparent sheets stacked one on top of the other.
4. The Eraser tool is used to remove the image from the canvas.
5. The Bucket Fill tool places text into an image.
C. ANSWER THE FOLLOWING QUESTIONS:
1. What is image editing?
2. List few image-editing tools available.
3. Write down the steps to create Text Logo?
4. Explain any four tools used in GIMP.
5. What is the way to change the size of an image?
SOMETHING TO DO
1. Download GIMP on your PC/Laptop and create Text Logo of your name.
2. Take an image and make use of different tool.
3. Take a group picture of your class and crop your image
Page | 56 KVS DELHI REGION 2021
6. MORE APPLICATION OF INTERNET
6.1 Internet of Things (IoT)
6.2 Online collaboration
6.3 Google Sheet
6.4 Cloud Computing
Introduction
An Internet application is vast in nature, compiled application that can be
accessed through the Internet. Internet applications perform complex data
processing for business on either the client or the server. The application follow
the various protocol e.g. Transmission Control Protocol (TCP)/Internet
Protocol(IP) to receive requests from a client, typically a Web browser, process
associated program, and return data to the browser.
6.1 Internet of Things (IoT)
Fig. 6.1: Internet of Things (IoT)
The internet of things (IoT) is a smart system of computer gadgets/devices,
electrical, Mechanical devices, animals and human being that have unique identifier
Page | 57 KVS DELHI REGION 2021
(UIDs) and the ability to send the data using Internet/network without requiring any
human-to-human or human-to-computer interface.
A thing over the internet of things may be a person with a heart monitor implant,
an animal with a biochip transponder, an automobile has built-in sensors to alert the
driver about the environment or vehicle information or any object that can be have an
Internet Protocol (IP) address and is able to transfer information over a network.
How IoT works?
An Internet of Things (IoT) consists of many web enabled devices, like
microprocessor, sensors, LED, ICs etc. These devices collect the information from the
surrounding and make a database for the information in memory. Then mechanical
devices also connected with these devices for doing some mechanical activities based on
instruction. IoT works on the smart technology and use Artificial Intelligence (AI).
Fig. 6.2: Internet of Things (IoT) Working
The internet of things help in living smart way. The IoT enables the system
automatic which help to save our time and energy. It also provides the real time analysis.
Following are the example of Internet of Things (IoT) Technology
1. Operation of Automatic home system, operation of door by
smart gadgets, handling electrical equipment by smart phone.
2. Automatic Collection the weather Information
Page | 58 KVS DELHI REGION 2021
3. Automatic road Traffic control
4. Smart farming etc.
6.2 Online collaboration
Internet usage is increasing day by day ,it has become the main source of
communication around the world. With ever-increasing growth rates, the technology is
increasing day by day to support the structure of the Internet.
Online collaboration can be defined as a technology that uses a collaboration
software like Google document, Google sheet, Microsoft document etc. to allow multiple
people to work together to achieve the same goal. The members of the collaborating
group can use the collaboration software to coordinate, communicate, cooperate, share,
negotiate and even compete with each other to solve problems.
Fig. 6.3: Online Collaboration
6.3. Google Sheet
Google Sheets is a free, cloud-based spreadsheet application. You can use it in
your browser like a webpage, you have all the functionality of a full spreadsheet
application for doing powerful data analysis. It really is the best of both worlds.
Why use Google Sheets?
1. It’s free!
2. It’s collaborative, so teams can all see and work with the same spreadsheet in
real-time.
3. It has enough features to do complex analysis.
Page | 59 KVS DELHI REGION 2021
How to Create Google Sheet
Step 1: Go to the following link:
https://www.google.com/sheets/about/
Step 2: click on Go to Google sheet
Fig. 6.4: Google Sheet Interface
Page | 60 KVS DELHI REGION 2021
Step 3: Click the Colorful plus button to create a new Google Sheet
Step 4: Then new Google sheet will open
How to Share a Google Sheets File?
Sharing a Google Sheets file is easy. You add the email addresses of your invitees,
include a note, and then send the invitation. You can determine whether recipients may
just view your spreadsheet, or also comment on, or edit it.
Step 1: Log in to Google Sheets and create or open the spreadsheet you want to
share.
Step 2: In the top-right corner of the screen, select Share.
Fig. 6.5: Google Sheet editing permission
Page | 61 KVS DELHI REGION 2021
Fig. 6.6: Sending Google Sheet
Step 3: In the Share with others dialog box, add the email addresses of the people you
want to invite to view, comment on, or edit your Google Sheets file.
Step 4: Next to the email address field, select the pencil icon and choose one of the
three options: Can edit, Can comment, or Can view.
Step 5: Add a note to accompany the invitation.
Step 6: Select Send.
6.4 Cloud Computing
Cloud computing is system of different services through the Internet. These
resources include various tools and applications like database, software, application and
data analysis etc.
Rather than keeping files
on a computer hard drive or local
storage device, cloud-based
storage makes it possible to save
them to a remote database. As
the electronic device can access
the web, it may access the data
and the software program to run
it.
Fig. 6.7: Cloud Computing
Cloud computing is a good option for cost savings, increased productivity, speed
and efficiency, performance, and security.
Page | 62 KVS DELHI REGION 2021
Fig. 6.8: Application of Cloud Computing
Types of Cloud Services
The following are the common services provided by Cloud Technology
1. Email
2. Storage, backup, and data retrieval
3. Creating and testing apps
4. Analyzing data
5. Audio and video streaming
EXERCISE
SOMETHING TO KNOW
A. Answer the following questions.
1. What is IoT?
2. Write some advantages of Online Collaboration.
3. What is Google Sheet?
4. What is Cloud Computing?
5. Differentiate between IoT and Cloud computing.
B. Fill in the Blanks
1. _______________describes the network of physical objects—“things”—that
are embedded with sensors, software, and other technologies
2. _______________ sharing with many users is an example of Online Collaboration.
3. The most important things required for online things is ________________.
4. Intersection area of rows and columns is called __________.
5. _____________is the delivery of different services through the Internet,
including data storage, servers, databases, networking, and software.
Page | 63 KVS DELHI REGION 2021
C. Match the Following:
1. IoT a) Store the Data on Cloud
2. Cloud Computing b) Provides a powerful tool to
create Spreadsheet online.
3. Google Sheet c) necessary for sharing the Data
4. Email d) Internet of Things
D. Select the correct option for each question :
1. Internet of Things (IoT) consists of _____________________.
(a) Things, Sensors & software etc. (b) Email account
(c) Google Sheet (d) None of these.
2. Which of the following not provide online collaboration
(a) Google (b) Microsoft (c)CBSE (d) Amazon
3. Cloud computing is a type of abstraction which is based on the notion of
combining physical resources and represents them as _______resources to
users.
(a) Real (b) Cloud (c) Virtual (d) None of these
4. which of following is not advantages of Online collaboration
(a) Time Saving
(b) Cost Saving
(c) Video conferencing
(d) Offline meeting
E. State True or False
1. IoT is the future Smart Technology
2. The first audio and video are part of online Collaboration.
3. We cannot share/download Google Sheet.
4. Cloud computing provides as much storage freely.
SOMETHING TO DO
1. Find any IoT (Internet of Things) smart Technology used near you.
2. Create a Table of your marks statement by Google sheet and share with your
friend for entering their marks.
Page | 64 KVS DELHI REGION 2021
7. COMPUTER SECURITY
7.1 Threats to Computer
7.2 How to Protect Your System
7.3 Anti-Virus Software and Examples
7.4 Firewall and Its Use
7.5 Cyber Crime and Computer Ethics
7.6 Hackers and Crackers
7.7 Cyber Law and Importance
7.8 Backup and Restore
ARYAN: Hello DEAR, what we are going to learn in this chapter?
GOWRI: Hello. In this chapter we are going to study about security of computer,
threats to it, solutions to the threats etc.
ARYAN: Threats???. What do you mean by threat?
GOWRI: A threat is something that may or may not happen, but has
the potential to cause serious damage.
ARYAN: Then, What are Threats to computer?
GOWRI: A threat to the computer is a potential negative action or
event that results in an unwanted impact to a computer system. A threat
can be “accidental" or “intentional” or otherwise a circumstance,
capability, action, or event.
ARYAN: What are the different types of Threats?
GOWRI: Different threats to computer are:
1.Virus: Computer Virus are nothing but a computer program that does unwanted
things with your computer resources e.g. you are working on PC and you
are repeatedly receiving annoying message.
2. Worms: Worms are self-replicating viruses and consume the
system resources.
3. Trojan Horse: A Trojan horse is simply a computer program. It is
like a program that claims to do one thing like it is a game but instead
does damage when you run it like it may erase your hard disk. Trojan
horses do not replicate automatically.
4. Spyware: Spyware is a software program that secretly gathers
personal information and sends it without the user's knowledge from a
computer, when it is online.
5.Phishing:Phishing is an attempt to acquire sensitive information such as username,
password or credit card details.
Page | 66 KVS DELHI REGION 2021
Always put passwords on your system, so that no unauthorized person can use it in
your absence.
ARYAN: Why Computer Viruses are called as Viruses?
ARYAN:
GOWRI: Computer viruses are called viruses because they share
some of the traits of biological viruses. A computer virus passes
from one computer to computer just like a biological virus passes
from person to person. Similar to the way a biological virus need a
cell to ride, a computer virus must need a program or document to
launch. And once computer virus starts running, it can infect other
programs or documents too.
OK, What are these Antivirus Softwares?
GOWRI: Antivirus software is a program or set of programs that are
designed to prevent, search for, detect, and remove software viruses,
and other malicious software like worms, trojans, adware, and more.
Examples of Antivirus softwares are: Norton Antivirus Plus, Avira
Antivirus, Kaspersky, Quick Heal etc.
ARYAN: Now Please tell something about Firewall.
GOWRI: A firewall is a system designed to prevent unauthorized
access to or from a private network. All messages entering or
leaving the intranet pass through the firewall, which examines
each message and blocks those that do not meet the specified
security criteria.
ARYAN: Is it a hardware device?
GOWRI: Firewalls can be either hardware or software but the ideal firewall
configuration will consist of both.
ARYAN: Then how it works?
GOWRI: There are several types of firewall techniques that will
prevent potentially harmful information from getting through:
1. Packet Filter : Looks at each packet entering or leaving the network
and accepts or rejects it based on user-defined rules.
2. Application Gateway Applies security mechanisms to specific applications,
such as FTP and Telnet servers. This is very effective, but can degrade
performance
3. Circuit-level Gateway It Applies security mechanisms when a connection is
established (TCP or UDP). After the setup of connection, packets can flow
between the hosts without further checking.
Page | 67 KVS DELHI REGION 2021
4. Proxy Server It intercepts all messages entering and leaving
the network. The server effectively hides the true network
addresses
ARYAN: Thank you friend for such an elaborate discussion about
firewall. Now I want to know something about Cyber Crime.?
GOWRI: OK, Firstly I will tell you what actually cyber crime is:
Cybercrime is defined as the crime that is facilitated by the use of electronic
gadgets such as computer, smartphone etc. involving communications or
information systems through internet.
In simple terms we can also say that Cybercrime is criminal activity that either
targets or uses a computer, a computer network or a networked device.
Cybercrime is carried out by individuals or organizations. These types of crimes
are committed daily on the internet.
ARYAN: Oh… , What are different cybercrimes?
GOWRI: Let us discuss some common cybercrimes:
1. Cyber Bullying: Cyberbullying includes sending, posting, or
sharing negative, harmful, false, or mean content about
someone else through social media, email, instant messaging etc.
2. Identity theft: Criminals usually steal identity information of others
such as credit card information, addresses, email addresses and more. By
using this information they can pretend to be someone else
and can create new bank accounts etc.
3. Ransomware : Ransomware enters your computer network
and encrypts files, meaning you don’t have any access to
them. The attacker will send you a notification regarding
demand of a large sum of money to get your data back.
4. Email Bombing: An email bomb is another form of internet abuse. Email
bombing is an overloading of emails directed to one email address; this will
cause the person receiving the emails server to become sluggish or even
crash.
5. Malware: It is a piece of software written with the intent of causing harm to
data and devices. Malware is often done through a range of viruses that will
get into your computer to cause problem, by damaging your computer, or
phone etc., so that the culprits can steal credit card details and other
personal information.
6. Online Scams: Online scams are basically scams that happen online. Whether
that’s tricking you into giving out personal details online by an ad popping up,
telling you that you have won something and asking for your card details to
pay for shipping. You’ll never receive anything instead of that you’ll start
noticing weird transactions done through your bank account.
Page | 68 KVS DELHI REGION 2021
And there are many more.
ARYAN: Oh, Then it’s very dangerous to work on internet.
GOWRI: Yes, it’s risky but always use internet with precautions.
ARYAN: Do you know something about computer Ethics.
GOWRI: Yes, Computer Ethics is set of moral principles that regulate
the use of computers.
Some common issues of computer ethics include intellectual property
rights (such as copyrighted electronic content), privacy concerns, and how
computers affect society.
1. One should not use computer to harm anyone.
2. One should not interfere with other people's computer work.
3. One should not look secretly in other people's computer files.
4. One should not use a computer to steal information.
5. One should not copy or use proprietary software for which
you have not paid.
6. One should not use other people's computer resources
without authorization or proper compensation.
7. One should think about the social consequences of the
program you are writing or the system you are designing.
8. One should always use a computer in ways that ensure
consideration and respect for your fellow humans.
ARYAN: Hello, tell me something about Hacking. What is this?
Who does hacking?
GOWRI: Hacking may be defined as the technique which is done to get an access to
unauthorized systems. Simply we can say it is a way to gain access to a network
or to a computer for illegal purposes. The persons who do hacking are very
intelligent and skilled in computers.
The people who are skilled in Hacking are divided into 2 categories :
1.Hackers :
Hackers are good people who do this for the good purpose and to obtain more
knowledge from it and have no intention to harm anyone . They generally find loop
holes in the system and help them to cover them.
.
2.Crackers :
Crackers are kind of bad people who break or violate the system with bad intentions
like to harm the data or steal it. Crackers harm or destroy the data by gaining an
unauthorized access to the network. Their works are always hidden as they are doing
illegal stuff.
Page | 70 KVS DELHI REGION 2021
Select Start-> then Settings -> Update & Security -> Backup -> Add a drive, and
then choose an external drive or network location for your backups.
Restore your files with File History
You can get back your missing important file or folder that you've backed up, here's
how to get it back:
1. In the search box on the taskbar, type restore files, and then select Restore
your files with File History.
2. Look for the file you need to get back and then use the arrows to see all its
versions.
3. After finding the version you want, select Restore to save it in its original
location. And if you want to save it in a different place, then right-click Restore,
select Restore to, and then choose a new location.
4. Find your backups created on previous versions of Windows
5. If you used Backup and Restore to back up files or create system image backups
in previous versions of Windows, your old backup is still available in Windows 10.
In the search box on the taskbar, type control panel.
select Control Panel -> System and Security -> Backup and Restore (in
Windows 7).
Fig. 7.3
Page | 71 KVS DELHI REGION 2021
EXERCISE
SOMETHING TO KNOW
A. Short Answer Questions.
1. Define computer virus?
2. What is firewall?
3. Define Phishing?
4. Give one difference between Trojan horse and Worm?
5. Why we need backup?
B. Fill in the Blanks
1. IT ACT 2000 notified on ________________.
2. ______________includes sending, posting, or sharing negative, harmful, false,
or mean content about someone else.
3. _____________destroy data by gaining an unauthorized access to the
network.
4. _____________ is set of moral principles that regulate the use of computers.
5. Packet Filter looks at each __________entering or leaving the network.
C. Match the Following.
1. Backup and Restore a) Fake website
2. Identity theft b) Unauthorized access
3. Norton c) Credit card information
4. Firewall d) System and Security
5. Pharming e) Anti Virus
A. State True or False
1. Crackers are good people.
2. Ransomware demand a large sum of money for you to then get your data back.
3. Proxy Server hides the true network addresses.
4. Spyware is self-replicating viruses
5. Firewall is hardware device.
SOMETHING TO DO
1. Go to lab and find the Anti-virus installed in your computer lab.
2. Take the backup of your file and then restore it.
Page | 72 KVS DELHI REGION 2021
APPENDIX
ANSWERS OF EXERCISE
EXERCISE 1.1
A. Answer the following questions.
1. Explain the terms:
a. Algorithm
b. Flowchart
Ans: (a) Algorithm: Algorithm is process of writing all the steps required to solve
a particular problem. These steps are written in English language to describe
each statement.
(b) Flowchart: Flowchart is pictorial representation of steps involved in solution
of a problem.
2. Why do we require Coding?
Ans: Coding is process of writing code in a programming language to resolve daily
life problems, automate tasks and developing games.
3. List various symbols used in flowchart development.
Ans: Various symbols used in development of flowcharts are :
Start /Stop Input/Output Process Decision Box Flow line Connector
4. Differentiate between Flowchart and Algorithm.
Ans: Difference between flowchart and algorithm:
Algorithm Flowchart
Includes sequence of steps which An information diagram made up of
depicts the procedure of the solution. different shapes shows the data flow.
Text is used Symbols are used
Difficult to interpret Easily interpreted
5. Write any two advantages of flowchart.
Ans: Advantages of flowchart are:
1. Simple and easily understandable.
2. Visual Clarity
Page | 73 KVS DELHI REGION 2021
B. Fill in the blanks:-
1. Flowchart 2. Visual Clarity , problem solving 3. Flowline 4. Coding
5. Algorithm
C. Match the following: B
3. Flowchart
A 4. Algorithm
a. Used to depict process visually 5. Python
b. As easy as to write in English
c. Used to develop a computerized 1. Terminator
2. Coding
solution of a problem
d. start/stop of a program is known as
2. It is a process of creating
computerized solution of a problem
D. Select the correct answer for each question:
1. b 2. c 3. c 4. a 5. C
E. State True / False:-
1. True 2. True 3. False 4. True 5. False
EXERCISE Chapter 2
A. Answer the following questions.
1. What is Python?
Ans: Python is an open source, high level programming language which has simple
syntax similar to the English language. Python was created by Guido Van Rossum in
December 1989.
2. Write the steps to install python in your computer.
Ans: We can do the following steps to install python in our computer:
Step 1: Select Version of Python to Install.
Step 2: Download Python Executable Installer.
Step 3: Run Executable Installer
3. Write any three features of Python.
Ans: Features of Python:
1. Python is portable
Page | 74 KVS DELHI REGION 2021
2. Python is open source and free
3. Python is easy to understand
4. How will you check whether your Operating system is 32 bit or 64 bit?
Ans: Do the following steps to check Operating System:
1. Click on Start button on Windows 10
2. Right Click on Computer
3. Choose Properties Option
4. We can see Operating System name and System Type
5. Python can be downloaded from which website?
Ans: Python can be downloaded from official website of python – www.python.org
B. Fill in the blanks
1. Interpreted 2. Guido Van Rossum 3. Monty Python’s Flying Circus
4. Interpreter 5. NASA, Google
C. Match the Following:-
a. (2) b. (5) c. (1) d. (3) e. (4)
D. Select the correct answer for each question:-
1. b 2. c 3. c 4. c 5.d
E. State True / False:-
1. True 2. False 3. False 4. True 5. True
ANSWERS OF EXERCISE
Chapter 2
A. Answer the following questions:-
1. What do you mean by a keyword? Write two characteristics of keyword.
Ans: A keyword is a pre-defined reserved word in a programming language which has
fixed function and cannot be changed. E.g. if, else, etc.
Characteristics of Keyword:
1. Python keywords are case sensitive
2. Python keywords can’t be used as identifier (Variable Name).
2. Write any three variable naming conventions.
Ans: Variable naming convention:
1. A variable name can include alphabets, digits and underscore.
Page | 75 KVS DELHI REGION 2021
2. Variable name should be user friendly.
3. Variable names are case sensitive.
3. Why do we require variables?
Ans: In computer Programming, variables are required to store user inputs,
intermediary results and output.
4. What is data type? How many types of data type supported by python?
Ans: Data types are means to identify the type of data and associated operations.
Data types allocate the memory required to store the variable.
Python supports 5 standard data types.
1. Number- The data types which store numeric values are called Python numbers.
Python has three numerics: int, float and complex
2. String: means sequence of characters. These set of characters are represented
in either single quote(‘’) or double quotes(””).
3. List
4. Tuple
5. Dictionary
5. Differentiate between Keyword and Variable.
Ans: Keywords are reserve words having some special meaning attached to it.
Variables are named storage location whose contents can be changed during
execution of program.
B. Fill in the blanks:-
1. Keyword 2. Variable 3. Invalid 4. Data type
5. Alphabets, digits and underscore ( _ )
C. Match the following:-
a. 3 b. 2 c. 5 d. 1 e. 4
D. Select the correct answer for each question:-
1. (a) 2. (d) 3. (b) 4. (b) 5. (a)
E. State True/False:-
Page | 76 KVS DELHI REGION 2021
1. False 2. False 3. True 4. False 5. False
ANSWERS OF EXERCISE
Chapter 2
A. Answer the following questions:-
1. What do you mean by the operators in Python?
Ans. Operators are the symbols that are used to perform operations on operands. For
Example +,-,/,* are arithmetic operators.
2. Explain the terms?
Operand
Expression
Ans. Operands: The values that the operator operates on are called operands.
Expression: Expression is combination of operator and operands.
3. What is relational operator?
Ans. Relational operators are used to define some kind of relationship between values or
variables.
4. Explain the purpose of modulus operator?
Ans. Modulus operator is used to get remainder of a division operation. % symbol is
used in python to represent modulus operator.
5. Differentiate between division and floor division operators.
Ans: Division operator is used to get division of two numbers while floor division is used
to get integer portion of quotient.
For example, 5/2 will return 2.5 whereas 5//2 will return 2.
B. Fill in the blanks:-
1. Operands 2. 0 3. Expression 4. Relational 5. 4.0
C. Match the Following:-
a. 3 b. 1 c. 2 d. 5 e. 4
D. Select the correct answer for each question:-
Page | 77 KVS DELHI REGION 2021
1. b 2. c 3. c 4. c 5. B
E. State True / False:-
1. False 2. True 3. True 4. True 5. False
ANSWERS OF EXERCISE
Chapter 3
A. Answer the following questions:-
1. Write the steps required to create and run a program?
Ans. To create and run a python program, we need to do the following steps:
1. To open an IDLE text editor to write a program
2. Save your program with .py extension
3. Compile and execute a program by pressing F5
2. What is full form of IDLE?
Ans. IDLE stands for Integrated Development Learning Environment. It allows
programmers to easily write, edit, compile and execute Python code.
3. Which function key is used to execute a program in python?
Ans: Function key (F5) is used to execute a python program using IDLE.
4. What is purpose of print() function?
Ans. print() function is used to print the given message/variable value to the standard
output device i.e monitor.
5. What is comment? Which symbol is used to define a comment?
Ans: Comment is a remark/statement that is given within a program to define purpose
and ownership program. These statements are ignored by compiler during compilation
process. # symbol is used to represent single line comment.
B. Fill in the blanks:-
1. F5 2. # 3. print() 4. Process 5. .py
C. Match the Following:-
a. 3 b. 4 c. 1 d. 5 e. 2
D. Predict/Select the correct OUTPUT for each question:-
Page | 78 KVS DELHI REGION 2021
1. (c) 2. (c) 3. (c) 4. (c) 5. (a)
E. State True or False.
1. False 2. False 3. True 4. True 5.True
ANSWERS OF EXERCISE
Chapter 3
A. Answer the following questions:-
1. Which function is used to take user input at run time?
Ans. Input Function: input() is a function that is used to take user input at run time.
Return value of input function will be always of String type.
2. Ravita wrote a program to find the sum of marks of 03 subjects. She is getting
error in her program. Help her to resolve errors?
Sub1=input(“Enter marks of Subject1”)
Sub2= input(“Enter marks of Subject2”)
Sub3= input(“Enter marks of Subject3”)
Total=Sub1+Sub2+Sub3
print(Total)
Ans. Ravita is applying arithmetic operator (+) on variable Sub1, Sub2 and Sub3. She
should convert these values to integer or float using int() or float() function. By default
input function return string value and arithmetic operation could not applied on string.
Corrected code will be :
Sub1=float(input(“Enter marks of Subject1”))
Sub2= float(input(“Enter marks of Subject2”))
Sub3= float(input(“Enter marks of Subject3”))
Total=Sub1+Sub2+Sub3
print(Total)
3. When do you use decision statement?
Ans. Decision statement will be used whenever we have to choose out of two or more
than two alternative paths based on a condition.
4. What is if..else statement? Write it’s syntax?
Ans. if…else statement is a decision structure and it is used whenever we have to choose
from the set of statements based on a defined condition. If condition evaluates to true,
one set of statements executed otherwise another.
Page | 79 KVS DELHI REGION 2021
Syntax: if<condition>:
Statements
else:
Statements
5. Why do you use int() and float() function?
Ans: int() and floar() functions are type conversion function. These are used to do
explicit type conversion from one data type to another.
B. Fill in the blanks:-
1. block 2. input(). 3. else 4. Test expression 5. Decision statement
C. Predict/Select the correct OUTPUT for each question:-
1. (a) 2. (d) 3. (b) 4. (a) 5. (c)
CHAPTER 4
A. Multiple Choice Questions:
1. GNU Image Manipulation Program
2. Open Source
3. Paintbrush
4. 2.10.22
5. www.gimp.org
B. State True(T) / False(F)
1. GIMP is proprietary software. False
2. Microsoft Windows (XP, Vista, Windows 7) is GIMP compatible Platform. True
3. BMP is one of the file format of GIMP. True
4. GIMP cannot be use as paintbrush. False
5. GIMP provides different tools for image editing. True
C. Answer the following questions:
1. Write down any four features of GIMP?
Answer:
● It is Open and Free software.
● It supports different file formats such as gif, jpeg, tiff etc.
● It works with different operating systems such as Linux, Mac OS and Microsoft
Windows.
● It is use for used for image manipulation (retouching) and image editing.
● GIMP provides different tools for image editing.
● GIMP paintbrush tool is use to draw images easily.
● It is a memory efficient graphic tool.
Page | 80 KVS DELHI REGION 2021
● Combining different images in GIMP to create animation.
● There are several ways of creating colors in GIMP.
2. List GIMP Compatible Platforms.
Answer:
❖ GNU/Linux (i386, PPC)
❖ Microsoft Windows (XP, Vista, Windows 7)
❖ Mac OS X
❖ Sun OpenSolaris
❖ FreeBSD
3. Explain GNU Image Manipulation Program ?
Answer:
GNU Image Manipulation Program is free and powerful open source image editing
tool that
provides retouching of photos, authoring of photos and composition of photos. It
is free and
consists of many similar features provided by the Photoshop. It is available for
free download.
4. Write down the expansions of the following :.gif (b) .png (c) .tiff (d) .jpeg
Answer :
(a) .gif : Graphics Interchange Format
(b).png: Portable Network Graphics
(c).tiff: Tagged Image File Format
(d).jpeg:Joint Photographic Image Format
5. Write down the steps to open image in GIMP?
Answer: Click on file->click Open->Select Location and file->click Open option.
CHAPTER 5
A. Multiple Choice Questions:
1. Image
2. Text
3. Lasso
4. Crop
5. Size
B. State True(T) / False(F)
1. Canvas is the part of the image window where the image is displayed. True
2. The Free Selection tool is known as fuzzy selection tool. False
3. Layers are transparent sheets stacked one on top of the other. True
4. The Eraser tool is used to remove the image from the canvas. False
5. The Bucket Fill tool places text into an image. False
C. Answer the following questions:
Page | 82 KVS DELHI REGION 2021
2. Ans.
Advantages of Online Collaboration. Convenience in Organizing Meetings.
One of the key advantages of online collaboration is that it makes it easier for
people who aren't in the same location to work together. Easier Management of
Projects. Fast completion of projects. Significant Cost Savings.
3. Ans. Google Sheets is an online spreadsheet app that lets users create and format
spreadsheets and simultaneously work with other people. Google Sheets isn't only
for consumers: it's used every day by businesses and schools to manage
spreadsheet data.
4. Ans. Cloud computing is the delivery of different services through the Internet.
These resources include tools and applications like data storage, servers,
databases, networking, and software
5. Ans. The role of cloud computing in IoT works as part of a collaboration and is
used to store IoT data, allowing easy access when it is required. Cloud computing
is an easy method of travel for the large data packages generated by the IoT
through the Internet.
B. Fill in the Blanks
1. Internet of Things (IoT)
2. Google Sheet
3. Internet
4. Cell
5. Cloud computing
C. Match the Following.
1 ---- d
2 ---- a
3 ---- b
4 ---- c
D. Select the correct answer for each question.
1. a
2. c
3. c
Page | 83 KVS DELHI REGION 2021
4. d
E. State True or False
1. True
2. True
3. False
4. False
Chapter 7
A. Short Answer Questions.
1. Computer Virus is computer program that do unwanted things with your computer
resources e.g. you are working on PC and you are repeatedly receiving annoying
message.
2. A firewall is a system designed to prevent unauthorized access to or from a private
network
3. Phishing is an attempt to acquire sensitive information such as username, password or
credit card details.
4. Worms are self-replicating viruses and consumes the system resources whereas A
Trojan horse is simply a computer program that claims to do one thing (it may
claim to be a game) but instead does damage when you run it (it may erase your
hard disk).
5. Back up is needed, if system got damaged by some means, then still we can recover
the lost data.
B. Fill in the Blanks
1. 17october 2000
2. Cyberbullying
3. Crackers
4. Computer Ethics
5. packet
C.Match the Following.
1-d, 2-c, 3- e, 4-b, 5-a
D. State True or False
1. False
Page | 84 KVS DELHI REGION 2021
2. True
3. True
4. False
5. False