Class IX

Monday, 21 November 2016

Chapter 15 Class 9

Chapter – 15
Societal Impact of Information Technology

Part II

I Objective type questions:

Part A Fill int he blanks:
1. communication
2. Plagiarism
3. Hacking
4. piracy
5. programmer

Part B Multiple Choice Questions:
1. Plagiarism
2. Back up
3. Antivirus
4. Encryption
5. Data entry operator

II. Descriptive Type Questions:

Part A    Very short answer questions

             1.        EFTPOS ( Electronic Funds Transfer at Point of Sale)
      2.       Agricultural and Automative Industries
      3.       Password
      4.     The security system to protect a computer from hacker attacks is firewall.
      5.      The technology that involves masking important data to prevent unauthorized access is data masking.


Part B  Short answer questions:

1.  ICT has helped in education in the following ways:
a.       It creates interactive classroom teaching; students enjoy the environment and it results in improved concentration
b.       An e-learning program allows students to learn at their own pace, at any time, and from any place.

2. (i) Trademark - It is a word, a name , or a symbol used to identify and distiguish the product of one manufacturer or seller from that of others.
(ii) Patent - It is a legal right that allows the creator of an invention the sole right to make, use, and sell that invention for a set period of time.
3. a. Back data regularly
    b. Data encryption and password protection
4. In order to avoid plagiarism, one needs to obtain written permission from a copyright owner and/or cite the source when using that information.
5. Two skills required to make a career in the field of IT industry are:
    a. Logical Thinking                       b. Creative thinking

Part C  Long Answer questions
      1.       ICT stands for Information Communication Technology.  It deals with the use of computers and other electronic means to store, process, transmit, and retrieve data or information.
 ICT in governance is used in the following manner:
a)       Greater attention to improve the service delivery mechanism
b)      Enhancing the efficiency of departments.

       2.       In the context of IT, Privacy refers to the ability to control the information revealed by someone about him/her online and to control who can access that information. This information includes one’s Web surfing habits, IP address etc.It is affected by spyware, phishing, and e-mail web bugs as the often deliver specific advertisements or cookies to collect personal information by unlawful means and is used to cheat users and/ or harm their computers.
   
     3.       Security of information means preventing unauthorized access to it and ensuring that it is kept safe from corruption (i.e., errors occurring during its transmission or retrieval).
Integrity of Information refers to the authenticity and reliability of information.
The following are the technologies are used to prevent the security and integrity of information:
a)       Password – it is a secret sequence of characters
b)      Antivirus Software – To detect  and remove viruses and other malicious software
c)       Firewall – it is a security system designed to protect a computer from hacker attacks.
   
     4.       Intellectual Property Rights are the legal rights over creations of mind such as asliterary or artistic works, music, ideas, discoveries, and designs.
a.       Copyright – This law typically protect creative works such as books, movies, music, paintings, photographs and software. They give the creator/ owner the exclusive right to control the reproduction or adaption of such works for a certain period for time.
b.       Patent – It is a legal right that allows the creator of an invention the sole right to make, use, and sell that invention for a set period of time.

      5.       Difference between:
Knowledge Engineers
Networking Engineers
1.       Design computer systems with artificial intelligence.
1.       They are responsible for designing and management of computer networks and implementation of support and services for the same.
2.       They should be trained in fifth- generation languages such as LISP, Prolog, and STRIPS, and should have sound numerical and statistical ability.
2.  They should have knowledge of the ports, hardware components,  device drivers, and compatibility options of hardware and software.

Part D Application Based Questions:

1. The teacher instructs rightly to the students to change their passwords. The new passwords should be strong so that no other person can hack into any student's account.

2. The teacher understands that copying someone's work without their consent s illegal.
The term related is plagiarism.
 In order to avoid plagiarism, one needs to obtain written permission from a copyright owner and/or cite the source when using that information.

3. To prevent unauthorized access of fees and academic data, the school should get data masking implemented on the important data.

4. Data encryption should be done to send important information over the internet safely. Data encryption is a technology that protects information by converting it into an unreadable code that cannot be deciphered easily by unauthorized people.

5. The principal has instructed the office incharge to make a copy of the fee data so as to maintain a proper database regularly and avoid data conflicts.

Class 9Chapter 10


Pending things:
The images for C1 and C2 :-



C2


Saturday, 19 November 2016

Chapter 10 Class IX

1.       Fill in the blanks:
a.       Slide
b.       Outline
c.       Ctrl+M
d.       F5
e.       Escape
2.       Multiple Choice question
a.       (b) Handout
b.       (b) Outline
c.       (b) Placeholder
d.       (d) All of these
e.       (b) Ctrl + D
II Descriptive type question:
A.      Very short answer questions:
a.       Design tab can be used in Background group.
b.       Footer
c.       Quick Note
d.       Slide Sorter View
e.       Ctrl + X for cutting and Ctrl + V for pasting.
B.      Short answer question:
a.       Its on page 207. Use the whole paragraphs of Handout and Speaker notes in tabular form.
b.       Steps to insert a text box are:
                                                               i.      Click on nsert tab.
                                                             ii.      N te text group, click test box option.
                                                           iii.      Cursor appears inside the dotted box.
                                                           iv.      Place the mouse pointer and start typing.
c.       i. By clicking the slide show icon on the Status bar.  
 Ii. Click the slide show tab and click the from Beginning button in the start slide show group.
d.       To delete the last slide, follow these steps:
                                                               i.      Select the slide(s) and press the DELETE key.
                                                             ii.      Select the slide(s), click home tab and then click DELETE Slide in the Slides group.
e.       To apply a theme to the slide master are:
                                                               i.      Click the slide master tab.
                                                             ii.      In the Edit themes group, click the Themes an then select the desired theme.
C.      Long answer question:
a.       The steps to create a new presentation from the a template are as follows:
b.       To change the background style, do the following:
c.       Page 213 & 214 under the heading Adding Headers and Footers, write all the points.
d.       The different views available in MS PowerPoint 2007 are as follows:
                                                               i.      Normal – in this view, you can create and edit slides. You can see how your slides will appear during the presentation.
                                                             ii.      Slide Sorter – This view is used to see all the slides of a presentation in miniature form on the screen. This view also allows you to reorder the slides.
                                                           iii.      Notes Page – This view shows a smaller version of a slide within an area below speaker’s notes.
                                                           iv.      Slide Show – this view displays each slide full screen one by one.
                                                             v.      Slide Master - This view allows you to make changes to the slide master. The slide master is the main slide that stores information about formatting commands for all slides.
                                                           vi.      Notes Master – This view allows you to edit the Notes Master, which specifies the look and layout of the note page within the presentation.
                                                          vii.      Handout Master – this view allows you to edit the Handout Master that has settings to specify the style of the printed handouts in power point.
e.       Slide Master view allows you to make changes to the slide master. The slide master is the main slide that stores information about formatting commands for all slides.
To add a placeholder to a layout, do the following:                 

Use page 221. Point 6 (a to e)

Friday, 15 July 2016

Chapter 3 class IX


Class IX
Chapter 3

Application Based Questions

Q.2        a Pg -63
              b. By placing the cursor in the first line and double clicking with the left mouse button.
              c. By triple clicking the selection bar
               d. CTRL + A
Q.3         a. Quick Access Toolbar
               b.           i. Save   ii. Undo                                iii. Redo
Q.4         a. By placing the cursor just after ‘Homes’ and typing the word ‘Hospital’.
                b. By placing the cursor before ‘cartoons’ and typing the word ‘films’.
                c. By selecting the last line and pressing delete key from the keyboard.
                d. By selecting the overtype option, the word songs can be replaced with music in the third                     row.
5.            a. Select the second sentence and pressing the cut option from the clipboard group. Then                           place the cursor at the last line and press paste.
                b. Yes we can reverse the action.
                i. By pressing Undo command from Quick Access Toolbar

                ii. By doing cut and paste again.

Sunday, 10 July 2016

Class X Chapter - 3

Class X
Chapter – 3
Introduction to Databases
Application Based questions
1.
Field Name
Data Type
Roll_No.
Auto Number
St_Name
Text
Father’s_Name
Text
Contact_No.
Number
E-mail_Id
Text
Activities_involvedIn
Memo

2.
Field Name
Data Type
VoterId
Auto Number
VoterName
Text
VoterAddress
Memo
VoterDOB
Date/ Time

3.
Field Name
Data Type
BookID
Text
BookName
Text
Author
Text
NoOfCopies
Number
IssuedNoOfCopies
Number
AvailableCopies
 Number

4.
Field Name
Key
Account No.
Primary Key
Name
Alternate Key
Mobile
Alternate Key
PAN
Candidate Key
Account Type
Alternate Key
Address
Alternate Key
E-mail
Alternate Key

5.
a. Four
b. Six
c. PlayerId