Tekie_G8_Main_CBSE_AY24_Final

Page 1

Computer Science

About the Book This book embodies the principles outlined in the National Curriculum Framework (NCF) and the National Education Policy (NEP) 2020. It unveils the world of computer science through a unique and captivating pedagogical approach— seamlessly integrating curriculum content into the mesmerizing adventures of Mel and Conji, fictional figures hailing from the enchanting world of Avora. Our aim is to prepare learners for the dynamic and technology-driven landscape of the 21st century, equipping them with the essential skills they need to thrive in an ever-evolving world.

Special Features • Explore More: QR codes to explore an exciting application of the concept. This element builds curiosity in children and helps them grasp concepts through digital visual aids. 8

• Discuss: Questions to trigger engaging group discussions in the classroom. • Think and Tell: Probing questions to stimulate thinking at an individual level. • Did You Know? Interesting facts related to the application of a concept. • Points to Remember: Chapter end summary. • Do It Yourself: Milestone exercises to practice specific concepts. • Chapter Checkup: A pool of questions catering to all topics and skills covered in the chapter.

About Uolo Uolo partners with K-12 schools to bring technology-based learning programs. We believe pedagogy and technology must come together to deliver scalable learning experiences that generate measurable outcomes. Uolo is trusted by over 10,000 schools across India, South East Asia, and the Middle East.

Singapore

CS_CB_Grade8_Cover.indd All Pages

|

Gurugram

|

Bengaluru

|

hello@uolo.com �550

© 2024 Uolo EdTech Pvt. Ltd. All rights reserved.

NEP 2020 based

|

NCF compliant

|

Technology powered

30/11/23 7:31 PM



COMPUTER SCIENCE Grade 8

A Journey in Time and Space

UT24CB_G8.indb 1

11/24/2023 6:51:55 PM


Foreword

Standing at the forefront of the digital and AI revolution, the importance of coding and computational skills has reached unprecedented heights. In today’s professional landscape, whether it’s in the fields of medicine, space exploration, education, science, or business, no sector remains untouched by this transformative wave. To not just survive but thrive in the 21st century, basic computer literacy is no longer sufficient. Learners must evolve into “digital natives” who can fluently read, write, and communicate in the languages that machines and AI comprehend. Recognizing this imperative, the National Education Policy of 2020 (NEP 2020) has strongly recommended the integration of coding skills, computational thinking, critical analysis, and problem-solving abilities into the curriculum. Moreover, forward-looking subjects like AI, Data Sciences, Computer Applications, and IT have been introduced as elective subjects from grade 9 onwards. It wouldn’t be surprising if further transformative measures are taken even at the elementary education level. Uolo has introduced an innovative 360-degree program for a coding-focused computer science curriculum, known as Tekie, spanning grades 1 to 8. Tekie is a significant stride towards STEM education that aims at making learners future ready—enabling them with skills needed in the ever-changing, technology-driven, and dynamic 21st-century world. Tekie adopts a captivating and engaging approach to learning, in line with the recommendations of the National Curriculum Framework (NCF) 2023 and NEP 2020. The curriculum is ingeniously woven into the thrilling adventures of Mel and Conji, fictional characters from the enchanting land of Avora. The Mel and Conji series epitomizes a modern method of acquiring Computer Science knowledge and honing coding skills and computational thinking. Tekie is a technology-empowered curriculum that encompasses a few key components: • • • •

Main Content Books: These introduce learners to the theory of computer science and the tools used in the field. Topics in AI are also covered, along with experiential and curiosity-based learning resources. Coding Book: Specifically designed to nurture coding skills, this booklet aligns with the experiential and contextual learning approach of the curriculum, fostering critical thinking and problem-solving abilities.

Animated Learning Videos: The program is powered by high-quality animation-based learning videos that deliver learning in an engaging manner. Teacher Manual: This valuable resource supports classroom instruction, ensuring that educators can effectively deliver the curriculum.

Welcome to the captivating realm of Tekie! We hope you relish this educational journey as it equips you with the tools you need to thrive in the exciting and ever-changing world of the 21st century.

ii

UT24CB_G8.indb 2

11/24/2023 6:51:55 PM


Key Chapter Elements Each chapter has been divided into two key sections. Section A: Story-based Comic In every grade, students embark on an immersive experience in the “Adventures of Mel and Conji”. Within each chapter, in the initial section (Section A), the story unfolds, enveloping learners in an exciting journey. Through the story, students actively connect with fundamental concepts in the realm of Computer Science. Section B: Computer Science Concepts This section of the chapter focuses on the essential academic content. It provides the learning goals and assists teachers in their classroom instruction. This section also includes the following academic assets: QR codes to explore an exciting application of the concept.

HOTS questions to trigger engaging group discussions in the classroom.

This element builds curiosity in children and helps them

Discuss!

grasp concepts through digital visual aids.

How is a tree topology better than a ring topology?

Explore More!

Data units start from one bit and can go up to yottabytes. Scan this QR code to know more about data units.

Interesting facts related to the application of a concept.

Did You Know? TCP/IP was developed in the year 1970.

This is the chapter summary. It enables learners to glance through all key concepts covered in the chapter. Probing questions to stimulate HOTS at individual level.

Think and Tell

What is the maximum capacity of data transfer nowadays?

Milestone exercises to practise specific concepts.

A pool of questions catering to all topics and skills covered in the chapter.

iii

UT24CB_G8.indb 3

11/24/2023 6:51:57 PM


Introduction to Avora

iv

UT24CB_G8.indb 4

11/24/2023 6:51:59 PM


Places in Avora

v

UT24CB_G8.indb 5

11/24/2023 6:52:01 PM


vi

UT24CB_G8.indb 6

11/24/2023 6:52:03 PM


Meet the Characters

vii

UT24CB_G8.indb 7

11/24/2023 6:52:05 PM


viii

UT24CB_G8.indb 8

11/24/2023 6:52:06 PM


Contents

1

2

3

4

5

Computer Networks

1

Robotics and 3D Printing

Introduction to Computer Networks

Biotechnology

Network Terminologies and Devices

Brain-Computer Interfaces

Types of Computer Networks

Network Architecture and Protocols

Accessing a File From a Shared Drive

Network Security

Cyber Ethics

6

22

Database Management System 88 

Understanding Databases

Database Management System

SQL Queries

Introduction to Cyber Ethics

Creating Views

Unethical Practices

Data Retrieval in MySQL

Online Safety Measures

Digital Footprints

Digital Citizenship

omputational and Algorithmic C Thinking

7

36

Introduction to Computational Thinking

Concepts in Computational Thinking

App Development 

Introduction to Apps

Accessing Apps

Classification of Mobile Apps

Developing an App

New Tech Advancements

52

8

9 72

Web Application with Database 105 

Web Application

MySQL Server

Python

Working of a Web Application

Creating Videos with Canva

120

Creating a Blank Video in Canva

Components of Video Editor in Canva

Downloading and Sharing Videos

AI—Natural Language Processing 149 

Artificial Intelligence (AI)

New Technologies

Types of AI (Artificial Intelligence)

Augmented Reality and Virtual Reality

Language Translator-App Development

ix

UT24CB_G8.indb 9

11/24/2023 6:52:07 PM


UT24CB_G8.indb 10

11/24/2023 6:52:07 PM


1

UT24CB_G8.indb 1

11/24/2023 6:52:07 PM


2

UT24CB_G8.indb 2

11/24/2023 6:52:09 PM


Chapter 1 • Computer Networks

UT24CB0801.indd 3

3

12/4/2023 12:24:39 PM


4

UT24CB0801.indd 4

12/4/2023 12:25:05 PM


Introduction to Computer Networks Suppose you are going on a family road trip. Observe how roads connect different places, like villages, cities, and towns. In a similar way, our world is linked through computer networks. Just like you talk to your friend on the phone and share messages with him, computers use networks to share information. These networks are like digital roads that help messages and data travel between devices, irrespective of their location. In simpler terms, a computer network is a way to connect computers using communication devices so that they can exchange data and resources with each other.

Need of a Computer Network When several people are working on the same project under one roof or at remote places, they need to communicate with each other, and this is possible only with the help of a network. If different people are living in different places, they share messages with each other. If they are all located in one building, they can easily share hardware resources with each other, such as one printer, which can be shared among many team members. Therefore, there is a great need for computer networks in our lives, even for sending a small message to another person to communicate with people across the globe, for storing huge amounts of information, making video calls, sending audio messages, sharing software among many people, etc.

Uses of Computer Networks Computer networks are used for different purposes in our daily lives. File Sharing: With the use of networks, users can share their data and documents with each other. For example, you can share any file with your friend who is located remotely in a different country.

Chapter 1 • Computer Networks

UT24CB_G8.indb 5

5

11/24/2023 6:52:12 PM


Resource Sharing: Suppose all the students in your class are in the Computer Lab, each using an individual computer. The teacher has asked all the students to print an article on a topic “Importance of Communication in Our Lives”. Will you want a separate printer for every computer? The answer is No. You can observe that only one printer in the lab will be shared with all the students, and this is possible only because of the computer network. This is called resource sharing. Communication: Suppose your teacher has assigned a project to you with two other team members. One of your team members has gone to some other city for a week. You can then connect to your team members using a computer network and complete the project on time. This is only possible with the help of computer networks. Database Access: Computer networks help to access the same database from multiple computers. This further enhances the storage capacity of data and access to the stored data.

Security: Suppose you have stored your class assignments on the network. Your data is secured on the network because in the network, a key (password) is provided to the user to access that data. Backup: What will happen if you accidentally delete your project files from your individual computer on the network? Do not worry about that. In computer networks, the data is stored on a central computer, known as a server. This server has a backup utility enabled on it. So, taking the backup of data is also a benefit of computer networks. In case of data loss, you will have the backup copy of your data.

Advantages of Computer Networks Computer networks are beneficial to us in many ways. Some of the advantages of computer networks are discussed: Cost Reduction: Because the hardware resources (printers and scanners) are shared among all the computers on the network, the cost of additional equipment is saved. Less Data Redundancy: Data redundancy occurs when the same piece of data exists in multiple places. All the data on the computer network is stored on the server. Therefore, there is less redundancy in the network. Less Data Inconsistency: Data inconsistency means when the same data exists in different formats at different places. Since data redundancy is reduced, so it also reduces the data inconsistency. Data Centralisation: In a computer network, the server provides services to all the other computers. All the data in a computer network is stored on a server at a centralised location. This centralised storage of data provides easy accessibility to all users. Data Recovery: The server’s capability of taking regular data backup helps with easy data recovery in case of data loss or network failure. 6

UT24CB_G8.indb 6

11/24/2023 6:52:13 PM


Disadvantages of Computer Networks Apart from many advantages, there are also some disadvantages of computer networks. Let us learn about them. Security Concerns: Network security is a major concern as the data is being shared in a wired and wireless medium which can be stolen by some tricky people, leading to data loss or change of data. High Maintenance Cost: Just think about it that sometimes your gadgets need some fixing and cleaning for smooth functioning. Likewise, a computer network also needs timely maintenance by a special team of experts. The maintenance cost of a computer network is higher than that of an individual computer. Complex Architecture: Computer networks have a complex architecture, for which a specific type of setup is required. Purchasing the necessary equipment (such as cables and other devices) for network architecture can be expensive.

Compatibility Issues (Hardware and Software): To be a part of the network, you should have the same version of hardware and software as all the other computers that are supposed to be part of the network.

Data Loss (In Case of Network Failure): If the server computer that stores all the data of individual computers fails, what will happen? Yes, you are right. All the data will be lost. This is a major disadvantage of a computer network.

Need for Skilled Personnel: Managing a large network is complicated, requires training, and a network manager usually needs to be employed. To maintain a large network, a special team of skilled technical persons is required. Hence, it bears an extra maintenance cost.

Do It Yourself 1A 1

Which of the following is not an advantage of a computer network?

a

Communication

b

File Sharing

c

Backup of Data

d

Network Maintenance

Chapter 1 • Computer Networks

UT24CB_G8.indb 7

7

11/24/2023 6:52:17 PM


2

The computer teacher has assigned a project to Sneha and Priyanka. Due to some emergency, Priyanka has to go to New Zealand. How will Priyanka and Sneha complete their project together on time?

3

Suppose there is only one scanner in your computer lab at school. All the subject teachers want to scan their documents while sitting at their own computers in the computer lab. Is this one scanner sufficient, or is there a need for a separate scanner for every computer?

Network Terminologies Some important network terms are discussed as follows: Term

Meaning

Node

A device in computer network which is used to send or receive data. A computer, mobile, tablet, laptop, etc., are called nodes.

Link

It is a connection between two computers or devices, such as cable, Wi-Fi, fibre optic, etc.

Packet

A unit of data or information that is transferred over the internet. For example, you send an email or message to a friend.

Protocol

These refer to a set of rules which are to be followed for sending data on a network.

Topology

The physical arrangement of computers or devices to link with each other. For example, star topology, bus topology, etc.

Bandwidth

The amount of data or information that can be transmitted over the internet or network. For example, 1 Gbps or 1 Mbps (bps-bits per second, G stands for Giga and M for Mega).

Latency

The time taken for a message to travel from one end of the network to the other end.

Think and Tell

What is the maximum capacity of data transfer nowadays?

Explore More!

Data units start from one bit and can go up to yottabytes. Scan this QR code to know more about data units.

Network Devices Computer network devices are hardware components that are required for computers to communicate with one another over the network. Some of these are discussed as follows: 

Network interface card (NIC): It is a hardware component installed on a computer to connect a computer to a network. It is a circuit board or a chip without which a computer cannot connect with another computer on a network.

8

UT24CB0801.indd 8

12/5/2023 5:50:33 PM


Ethernet networking cable: It is a hardware cable which is required to connect one computer with another computer to share information and devices like printers or scanners. This cable connects wired devices in a Local Area Network.

Hub: It is a networking device that transmits the received information to all the devices on the network. A hub has many ports in it. A computer that intends to be connected to the network is plugged into one of these ports. 

Modem: Modem stands for Modulator-Demodulator. It is a hardware device which sends and receives data over a telephone line, cable, or fibre optic. A modem converts digital signals from a computer into analog signals which can travel over telephone lines. It also re-converts analog signals back into digital signals.

Switch: A switch is a device that connects different computers on a network. It transfers data from one computer to another. A switch receives data from one computer, processes that data, and forwards that data to the destination device.

Router: It is a device which routes the data or information over a network. Routers may also be used to connect two or more logical groups of computer devices known as subnets or subnetworks.

Did You Know? A router needs the IP address of a computer to which the data is to be sent. The IP address of every computer is unique (does not match with any other computer), like one phone number for one person.

Do It Yourself 1B 1

2

Fill in the blanks.

a

is a device that converts one type of signal to another.

b

is used to connect multiple computers and devices directly to the network using cables.

Name different computer network devices.

Chapter 1 • Computer Networks

UT24CB0801.indd 9

9

12/5/2023 5:50:36 PM


Types of Computer Networks There are different types of networks, which are categorised according to the geographical area they cover. Let us discuss the types one by one.

Types of Computer Network

PAN

LAN

MAN

WAN

Personal Area Network (PAN): A PAN, which is the most fundamental kind of network, consists of a wireless modem, one or two PCs, smartphones, tablets, printers, etc., working within a range of 10 metres. These networks are usually controlled by a single person or business from a single device and they are generally found in small scale workplaces or houses. They can be categorised into wired and wireless, based on the type of connectivity among the networking devices. Local Area Network (LAN): It is a computer network that only extends up to a few metres across a relatively limited region, such as a school or a college building. LANs are commonly used to link desktop computers and workstations in corporate settings, to share resources. LAN ranges between 100 and 1000 metres. Metropolitan Area Network (MAN): It is a computer network that connects devices within a metropolitan city or a small town. Two or more connecting LANs form a MAN. A MAN ranges up to an area of 100 km. MAN is costlier than LAN. A cable TV network is an example of a MAN. Wide Area Network (WAN): Wide Area Network connects the computers from various countries and continents. WAN connects different LANs and MANs from across the globe. The internet is an example of WAN.

Wireless Network: A wireless network can be created in a small area such as a room or a house. The technology used to create a wireless network is known as Wi-Fi. Wi-Fi stands for Wireless Fidelity. It is a type of Local Area Network (LAN) that uses wireless communication technology to connect various devices like computers, smartphones, tablets, and other gadgets to the internet using a Wi-Fi router. These devices can be connected to each other without the need for physical cables. 10

UT24CB_G8.indb 10

11/24/2023 6:52:23 PM


Think and Tell

Which type of network will you recommend in your school to share hardware devices?

Types of Network Topologies Topology is a physical and logical layout of different devices (nodes) and connections in a network. The configuration of how computer systems or network devices are connected to one another is known as a topology. Different types of network topologies are discussed as follows: Bus Topology: In a bus topology, all the nodes are connected to a single common cable. A node puts a message on the cable, that is sent to all other nodes in a network. The disadvantage of it is that the messages clash when multiple nodes try to send data at the same time. Terminator removes data from the line.

Star Topology: In star topology, the nodes are connected to a centralised hub, switch, or a computer forming a star. The central computer is called the server, while other computers are called the clients. The disadvantage of the star topology is that if the central computer fails, the whole network will be disabled.

Ring Topology: In ring topology, the nodes are connected to each other forming a ring. A node forwards the message received from the previous node to the following node. Data flows unidirectionally, in a clockwise direction. The disadvantage of it is that if any one node fails, the entire network will fail.

Tree Topology: In tree topology, nodes are connected in a parentchild hierarchal manner. Tree topology is a combination of star and bus topology. The disadvantage of this topology is that the entire communication depends upon bus and if bus fails, the entire network will fail.

Chapter 1 • Computer Networks

UT24CB0801.indd 11

11

12/5/2023 5:51:13 PM


Mesh Topology: In mesh topology, every node is directly connected to every other node forming a mesh. The disadvantage of mesh topology is that the network is costly, due to the large number of cables used and it is difficult to find a faulty node. An example of mesh topology is the internet.

Discuss!

How is a tree topology better than a ring topology?

Network Architecture The following architectures are used to design networks: Network Architecture

Peer-to-Peer Architecture

Client-Server Architecture

Peer-to-Peer (P2P) Architecture: It is a type of networking architecture in which all the connected computers have equal abilities. All computers in this network are of the same level. Bitcoin () is an example of P2P architecture.

 Client

Client

Server Client

Client-Server Architecture: It is a type of network in which a central computer manages most of the resources. This computer, which has all the resources and provides services to others, is called a server and the computers which use services provided by the server are known as clients. That is why the name of this architecture is clientserver architecture.

Client

12

UT24CB_G8.indb 12

11/24/2023 6:52:28 PM


Difference Between Peer-to-Peer and Client-Server Architecture The following table summarises the differences between peer-to-peer and client-server architecture: Peer-to-Peer

Client-Server Architecture

In this architecture, every node serves as a client and server.

In this architecture, one or more nodes serve as a server and all other nodes behave as clients.

Peer-to-Peer network is less secure, because as the number of nodes increases in this network, the chances of vulnerability also increase.

Client-server network is more secure, because the server can validate the client’s access.

Every node participates in equal management of the network. Therefore, client growth may affect the performance.

Most of the work is managed by the server. Therefore, client growth does not affect the performance.

The server is not bottlenecked, because the service requests are distributed among all clients.

The server may become overloaded with an increase in the number of service requests by the clients.

Network Protocols A network protocol is a set of rules which governs the communication between the computers over a network, i.e., it describes how the information will be transmitted over the network. Let’s learn about some of the main network protocols.

Transmission Control Protocol / Internet Protocol (TCP / IP) The TCP/IP stands for Transmission Control Protocol/Internet Protocol. TCP/IP is a combination of two separate protocols: Transmission Control Protocol (TCP) and Internet Protocol (IP). TCP provides end-to-end communication between computers and specifies how the data will be divided into small packets. Then, those packets will be transferred to the destination, where all packets will be assembled again to recreate the original message. IP assigns a sequence number to every packet so that packets can be assembled in the correct order at the destination. Server Client

Chapter 1 • Computer Networks

UT24CB_G8.indb 13

Sender

Server

Receiver

Did You Know? TCP/IP was developed in the year 1970.

Hypertext Transfer Protocol (HTTP): HTTP is used to transfer data such as texts, images, videos, and other multimedia files over WWW (World Wide Web). When you want to open any website such as www.flipkart.com, HTTP protocol sends a request to the web server to open that website. The message sent by the client (Web Browser) is called the request and the message responded by the server is called the response.

13

11/24/2023 6:52:29 PM


Simple Mail Transfer Protocol (SMTP): This is the simplest protocol used to send emails between computers. SMTP is used to send messages from mail client to mail server. The email at the receiver’s end is received using IMAP. Internet Message Access Protocol (IMAP): It is a popular internet protocol for retrieving emails. Its usage varies according to the environment. While using an email application, it is essential to specify the sending protocol (SMTP) and the email receiving protocol (IMAP). File Transfer Protocol (FTP): FTP is the simplest method to transfer files from one computer to another over a network, using FTP client and FTP server software. This protocol is used for uploading and downloading files from a computer to the internet. It makes use of TCP/IP connections for transmitting files.

Accessing a File From a Shared Drive Nowadays, you can share your data with other users even if they are living in a remote area or at a very faraway place. This sharing or transferring of data is possible only through a shared drive or Google Drive. It allows you to share your data on Google Cloud Servers. Google Drive offers 15 GB of free storage capacity.

Did You Know? Google Drive was launched on 24 April, 2012.

Storing a File on Google Drive Follow the steps mentioned below to store a file on Google Drive: 1. Sign in with your Google Account. If you do not have a user ID and password, first register yourself on Google. 2. Click on the Google apps icon button located on the top right-hand corner of the Gmail account. 3. Click on the Google Drive icon. Google Drive window will open. 4. Click on the New button. For uploading a single file, click on File upload button. For uploading a folder, click on Folder upload option.

14

UT24CB_G8.indb 14

11/24/2023 6:52:29 PM


5. The Open dialog box will appear. Select the file you want to upload.

6. Click on the Open button. The selected file will be uploaded on Google Drive.

Sharing a File on Google Drive Follow the steps to share a file on Google Drive: 1. Select My Drive, and select the file you want to share with another user.

Chapter 1 • Computer Networks

UT24CB_G8.indb 15

15

11/24/2023 6:52:29 PM


2. After selecting a file, click on the Share icon. Type the email addresses of recipients in the Add people and groups box. If you want, you can also add a message that will be emailed to the recipients.

3. You can select whether the other user can edit, comment, or simply view the shared file or folder.

Viewer: Allows the recipient to only view the file. Commenter: Allows the recipients to add their comments only on the shared file. Editor: Allows the recipients to edit the shared file. By clicking on the Send button, the file will be shared. You can also click on Copy Link option to get the link of the shared file and then you can share it with the recipient through email or message. Select your profile icon and click on the Sign Out button to get signed out of Google Drive. 16

UT24CB_G8.indb 16

11/24/2023 6:52:30 PM


Network Security Because of security breaches on the network, it is necessary to use some network security measures. Some common network security measures are discussed below: Firewall: A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organisation’s previously established security policies. It protects unauthorised access to a computer by blocking unsolicited communication. Firewalls come in both hardware and software forms. Some examples of the latest firewalls are Sophos Firewall, Check Point Firewall, pfSense Plus, WatchGuard, etc. Antivirus: Computers are vulnerable to attacks or viruses when they are connected to a network. Therefore, it is necessary to install antivirus software on the computer system. A number of antivirus software programs are available in the market. For example, AVG, Quick Heal, Norton, McAfee, Avast, Kingsoft, etc. These antivirus software programs scan all the drives of a computer to detect any malicious virus in any file or folder. They get rid of that virus, either by deleting it or making it inactive.

Safe Online Practices When you access the internet to perform some online activities such as shopping or transferring of money, etc., your computer is at high risk. Therefore, some online protective measures must be followed, some of which are as follows: 

Clear browser cookies.

Remove unknown or unwanted applications.

Regularly update all applications and software.

Perform secure transactions on the portals with padlock sign.

Keep passwords safe and strong.

Points to Remember 1

A computer network is a way to connect computers using communication devices so that they can exchange data and resources with each other.

2

Computer networks have many uses such as file sharing, communication, database access, data backup, etc.

3

There are many advantages of computer networks like security, reducing data inconsistency, less data redundancy, and communication.

4

There are many disadvantages of computer networks like network failure, stealing of data, maintenance cost and complex architecture.

5

Computer networks are of many types: PAN, LAN, MAN, WAN and wireless.

6

There are different network devices such as hub, switch, router, NIC, and Ethernet networking cable.

Chapter 1 • Computer Networks

UT24CB_G8.indb 17

17

11/24/2023 6:52:30 PM


7

Different topologies of computer networks are: bus, star, ring, tree, and mesh topology.

8

Different internet protocols are: TCP/IP, HTTP, FTP, SMTP, and IMAP.

9

A firewall is a network security device that monitors and filters incoming and outgoing network traffic.

10 To keep your system safe while doing online activities, always browse the sites with a padlock sign, clear browser cookies and history, keep strong passwords, etc.

Chapter Checkup A. Fill in the Blanks. Hints 1 2

computer network

MAN

antivirus

bus

is a group of two or more computers connected to exchange information/data and to share resources. In a

3 4

inconsistency

topology, all the nodes are connected to a single common cable. connects devices within a city or a small town.

Data

5

means when same data exists in different formats at different places. software scans all the drives of a computer to detect any malicious virus in the computer.

B. Tick () the Correct Option. 1

2

3

4

5

Which of the following is not an advantage of a computer network?

a Cost reduction

b Less data redundancy

c High maintenance cost

d Less data inconsistency

A computer network is a group of two or more computers connected together to exchange share .

a Data, Resources

b Devices, Secrets

c Software, Connections

d Hardware, Communication lines

Data

and to

occurs when the same piece of data exists at multiple places.

a Inconsistency

b Differentiation

c Consistency

d Redundancy

Which of the following is not a network topology?

a LAN

b Star

c Mesh

d Bus

A

routes the data on a network.

a Hub

b Switch

c Router

d NIC

18

UT24CB_G8.indb 18

11/24/2023 6:52:30 PM


C. Write T for True and F for False. 1

MAN is costlier than LAN.

2

PAN connects people across the globe.

3

Hub uses only a single port.

4

No data recovery is possible in case of computer networks communication.

5

There is no single point of failure in case of mesh topology.

D. Answer the Following. 1

Define WAN.

2

Write the advantages of computer network.

3

Explain the terms hub and router.

4

Discuss star topology and state one disadvantage of it.

5

Differentiate between bus and ring topologies.

E. Apply Your Learning. 1

Ms Anju wants to open her new office branch in Pune and wants to connect with previously opened branches in Haryana and Mumbai. Which network type will she prefer?

2

Ram wants to create a computer network in a circular way. Which type of topology will you suggest to him?

Chapter 1 • Computer Networks

UT24CB_G8.indb 19

19

11/24/2023 6:52:30 PM


3

In a household, wireless networks (Wi-Fi) are commonly used. Describe the advantages of having a wireless network at home as compared to a wired network.

4

Arun is the technology officer in an organisation. What are three potential disadvantages or challenges that he might face when managing a computer network?

5

Imagine you are a businessperson. Why do you think it is a good idea for you to connect all the computers in your company on a network?

20

UT24CB_G8.indb 20

11/24/2023 6:52:31 PM


Chapter 1 • Computer Networks

UT24CB0801.indd 21

21

12/4/2023 12:25:33 PM


22

UT24CB_G8.indb 22

11/24/2023 6:52:33 PM


Chapter 2 • Cyber Ethics

UT24CB_G8.indb 23

23

11/24/2023 6:52:34 PM


24

UT24CB_G8.indb 24

11/24/2023 6:52:36 PM


Chapter 2 • Cyber Ethics

UT24CB_G8.indb 25

25

11/24/2023 6:52:37 PM


Introduction to Cyber Ethics Imagine you have the habit of diary writing. You write all your secrets in the diary and keep it hidden in your room. What if someone steals it or reads it? This is a violation of your privacy. Similarly, while using the internet, you have to be very careful and respect others’ privacy. Let’s learn more moral principles in this chapter.

Dear diary, Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nunc vitae feugiat elit, dignissim porttitor tellus. Vestibulum metus velit. Facilisis tempus tempor eu, tincidunt et ligula. Aenean vehicula turpis varius est commodo ultrices. Vivamus nec dui nunc. Aenean non imperdiet sapien. P hasellus non semper ipsum. Cras aliquet risus ac lacus vulputate pulvinar. Nunc nec arcu consectetur, scelerisque lacus id, luctus eros. Aenean aliquet lorem justo, eget gravida lacus consequat a. Cras rutrum, arcu et posuere fermentum, nibh risus facilisis ligula, quis pretium metus dui quis nunc. Sed varius luctus sollicitudin.

et Secr My iary D

The uses of the internet and other technical breakthroughs have made the world more interconnected in the current digital era. Even though this connectivity has many advantages, it has also raised some ethical questions about how people behave and interact online.

Aenean a odio eu lacus finibus pellentesque. Donec quis orci mi. Sed purus turpis, mollis id enim lacinia, congue gravida dolor. Sed lacus sapien, euismod eget mauris vitae, commodo congue libero. Aenean neque mi, tristique vel ex nec, ornare luctus neque. Cras fringilla, lacus eu scelerisque facilisis, eros nisi gravida libero, id interdum augue diam eget metus. Ut elementum tortor diam, et bibendum nibh ultricies vel. Maecenas eu magna augue. .

The study of appropriate behaviour and moral principles in the digital sphere is known as cyber ethics, also referred to as internet ethics or online ethics. This chapter will discuss several facts of cyber ethics, with an emphasis on unethical behaviour and its effects.

Key Aspects of Cyber Ethics Cyber ethics outline moral principles for good human behaviour and interaction in the digital world. These ethical principles are essential to ensure responsible and ethical conduct in the use of technology and the online environment. Cyber ethics include: Privacy Safeguards: Cyber ethics places a strong emphasis on the value of protecting people’s privacy online. Every individual’s private data and personal details should remain safe. This therefore includes respecting user consent, handling sensitive data securely, and preventing unauthorised access or data breaches. Online Behaviour: Ethical behaviour in cyberspace includes promoting respectful and responsible online communication. This involves refraining from cyberbullying, hate speech, harassment, and other harmful types of behaviour that can negatively impact on individuals or communities. Digital Security: The digital devices as well as the data need to be protected against any theft or damage. This means that intellectual property should remain secured. Intellectual property refers to the ownership and protection of creative and unique ideas, inventions, and digital works over the internet. As you would not take someone’s artwork or story without permission, it is very important to respect and not use people’s digital work online, such Patents as videos, music, and software, without permission. Patents Respecting the rights to one’s intellectual property is a fundamental value.

Copyright

Franchises

Brand

Copyright

Franchises

Brand

Software

Trademarks

Goodwill

Customer Data

Software

Trademarks

Goodwill

Customer Data

26

UT24CB_G8.indb 26

11/24/2023 6:53:33 PM


Bridging the Digital Divide: Not all sections of society have the same access to technology. The poor, for example, have no access at all. Ethical use of technology promotes equitable access to technology for all members of society. Accountability: People and organisations need to be accountable for their online behaviour in the digital age. This includes taking responsibility for errors, making changes for harm done, and upholding moral principles in all online activities.

Problems in Achieving Cyber Ethics We now know that bad practices exist in the cyber world. We also understand that cyber ethics tell us how the world should be. There are some issues in achieving cyber ethics: 1. Restriction: Following cyber ethics online is always good. However, if restrictions are too srict, then they can limit the freedom of expression and innovation. 2. Interpretation: One cannot determine that following what type of behaviour online is acceptable or not. People may agree on some points and disagree on others. 3. Enforcement: Due to the international nature of the internet and the fact that several nations have their own laws and regulations, it can be difficult to implement cyber ethics on a global scale. 4. Anonymity: Cyber ethics may conflict with people’s desire for online anonymity. It may be required for the people to expose their identity in order to be held accountable. 5. Evolving technology: As technology evolves rapidly, cyber ethics must adapt, which can be challenging to keep up with.

Discuss!

Think of issues on which people might disagree regarding online behaviour.

Unethical Practices There are many unethical practices that are prevalent in society these days. Let us learn about them.

Cyberbullying Using the internet to harass, scare, or hurt people is referred to as cyberbullying. Cyberbullying can happen if you send or receive messages to humiliate or threaten someone, spread untrue rumours, post embarrassing images, or create fake profiles. The victims of cyberbullying may suffer severe emotional and psychological effects.

Chapter 2 • Cyber Ethics

UT24CB_G8.indb 27

Cyberbullying

27

11/24/2023 6:53:38 PM


Cyberstalking Cyberstalking is the practice of constantly following someone’s online activity, mostly with the intention of frightening or upsetting them. Keeping an eye on someone’s social media pages, sending unwelcome messages, and issuing threats are some examples of cyberstalking. In many places, cyberstalking is prohibited and can lead to serious legal action.

Plagiarism When someone copies another person’s ideas, work, or content without giving proper credit or getting permission, it is called plagiarism. This immoral behaviour can be seen in a variety of circumstances, including online content creation and academic content. It damages the worth of original work and may have negative effects on one’s Is it ethical to copy any data for your project from the internet? academic or professional career.

Discuss!

Phishing Phishing is a dishonest internet practice in which attackers pretend to be reliable organisations and trick people into disclosing personal information, such as passwords or financial information. The attackers can then use your personal information to do malicious things, like steal your money or identity. The most common form of phishing is email phishing.

Hacking Hacking involves unauthorised access to computer systems, networks, or devices. Hackers generally have bad intentions to engage in malicious activities such as data theft, spreading viruses, or disturbing digital infrastructure. Another form of hacking called ethical hacking, or “white hat” hacking, is performed by professionals to fix the problems in a computer system or network to keep them safe from hackers.

Spamming Spamming refers to sending lots of unwanted and annoying messages to many people, often to make money or promote something. It is like getting too many advertisements in your inbox or on your phone, even if you did not ask for them. Spamming is considered unethical because it interferes with digital communication. 28

UT24CB_G8.indb 28

11/24/2023 6:53:39 PM


Identity Theft Identity theft happens when someone pretends to be someone else. He/she does this often to steal money, data, or other important information, like credit card details, bank details, etc. This can really hurt people, causing them emotional and financial problems.

Do It Yourself 2A Match the following. Spamming

Pretending to be a reliable source in order to trick others into disclosing their passwords or personal information.

Phishing

Sending emails or messages that are meaningless and unnecessary.

Identity theft

When an unauthorised person tries to access a computer system, a network, or data.

Hacking

Stealing someone’s personal information to commit fraud.

Online Safety Measures Online safety measures are safeguards and behaviour designed to keep your security, privacy, and personal information safe when using the internet. Here are some important tips for online safety: Use Secure Passwords: Create strong, challenging passwords for each of your accounts and change them frequently. Use a combination of symbols, numbers, and letters. Phishing Alert: Be wary of emails, messages, or websites that request private data, such as passwords or credit card numbers. Before sharing any personal information, make sure the sender or website is genuine. Regularly Update Software: Update your operating system, antivirus program, and other programs on a regular basis. Security fixes are frequently included in software updates. Use Secure Wi-Fi: Avoid accessing sensitive accounts or disclosing personal information when using public Wi-Fi networks. Protect Personal Information: Exercise caution while disclosing personal information on websites and social media. Do not disclose too much personal information to the public. Privacy Settings: To limit who can view your information, review and modify the privacy settings on social media sites and online accounts. Educate Yourself: Keep yourself updated about frequent internet hazards and frauds. The best defence against cyberattacks is awareness.

Chapter 2 • Cyber Ethics

UT24CB_G8.indb 29

29

11/24/2023 6:53:39 PM


Secure Your Devices: Use screen locks, PINs, or biometric authentication to secure your PCs, cell phones, and tablets to avoid illegal access. Data Backup: To prevent data loss due to hacker attacks or hardware failures, regularly backup vital data to an external source or a cloud service.

Think and Tell

What measures should you follow while shopping online?

Digital Footprints An online activity trail is what a digital footprint looks like. It includes everything you do online, including sending emails, publishing on social media, and even just surfing websites. Your digital footprint reveals where you have been online, just like your footprints in the sand do. Because your digital footprint can impact your reputation and privacy, it is crucial to be cautious online. Think before you click, always! Some examples of a digital footprint are as follows: 1. Social media posts 2. Online shopping 3. Emails 4. Search history 5. Online comments and review

Digital Citizenship Digital citizenship is the term used to describe the ethical and responsible use of technology. By engaging in good digital citizenship, we help create a more secure and civilised online community for everyone. Here are a few examples: 1. Respecting others: A good digital citizen should avoid cyberbullying when making comments on social media or participating in online forums. 2. Privacy protection: Digital citizens should keep their information private, including passwords and communications. 3. Using reliable sources: Always verify the reliability of information before sharing it to stop the spread of false information. 4. Responsible posting: Avoid posting any kind of offensive or dangerous material on social media. 5. Online etiquette: Always use appropriate language and avoid the use of uppercase letters while communicating online. 30

UT24CB_G8.indb 30

11/24/2023 6:53:52 PM


6. Copyright awareness: Be aware of copyright and refrain from using other people’s work frequently. Do not use anybody else’s work without their consent or due attribution. 7. Cybersecurity: Follow the practices such as using secure passwords and keeping software up-to-date to attain a secure working environment.

Did You Know? In India, when someone writes a book, creates music, or makes art, their work is protected by copyright. This protection lasts for their whole life, and then an additional 60 years. If there are many authors, it lasts for 60 years after the last author passes away.

Do It Yourself 2B Tick () the activity that will contribute to the digital footprint:

1

Shopping for a school bag

2

Posting a comment on a friend's picture on social media

3

Watching a movie on television

4

Searching for a topic on the internet

5

Talking to a friend over the phone

Points to Remember 1

The study of appropriate behaviour and moral principles in the digital sphere is known as cyber ethics, also referred to as internet ethics or online ethics.

2

While using the internet, you have to be very careful and respect others’ privacy.

3

Using the internet to harass, scare, or hurt people is referred to as cyberbullying.

4

Cyberstalking is the practice of constantly following someone’s online activity, mostly with the intention of frightening or upsetting them.

5

When someone copies another person’s ideas, work, or content without giving proper credit or getting permission, it is called plagiarism.

6

Phishing is a dishonest internet practice in which attackers pretend to be reliable organisations and trick people into disclosing personal information, such as passwords or financial information.

7

Hacking involves unauthorised access to computer systems, networks, or devices.

8

Spamming refers to sending lots of unwanted and annoying messages to many people, often to make money or promote something.

Chapter 2 • Cyber Ethics

UT24CB_G8.indb 31

31

11/24/2023 6:53:53 PM


9

Identity theft happens when someone pretends to be someone else.

10 A digital footprint includes everything you do online, including sending emails, publishing on social media, and even just surfing websites.

11 Digital citizenship is the term used to describe the ethical and responsible use of technology. 12 Observe the online safety measures to keep your security, privacy, and personal information safe when using the internet.

Chapter Checkup A. Fill in the Blanks. Hints

sensitive

harass

permission

Identity

1

Cyberbullying is the act of using digital platforms to

2

Plagiarism involves using someone else's work or ideas without proper

3

Phishing is a deceptive online practice that aims to trick individuals into revealing

4

Cyberstalking is an illegal and

5

harmful

, scare, or harm others. . information.

internet activity.

theft happens when someone pretends to be someone else.

B. Tick () the Correct Option. 1

2

3

4

5

What is the primary goal of phishing attacks?

a To promote online safety

b To imitate trusted entities

c To spread awareness about cybersecurity

d To encourage ethical hacking

Which of the following is not an unethical practice?

a Identity theft

b Ethical hacking

c Plagiarism

d Cyberbullying

What is the purpose of digital footprints?

a To hide your online activities

b To track your online actions

c To protect your identiy

d To stop online communication

What is the main reason behind identity theft?

a Drive for fame

b Requirement for social interaction

c Financial gain and dishonest behaviour

d Individual curiosity

What is the meaning of the term "digital citizenship"?

a Being a citizen of a digital nation

b Owning a digital device

c Acting ethically and responsibly online

d Having a digital footprint

32

UT24CB_G8.indb 32

11/24/2023 6:53:53 PM


C. Who Am I? 1

Protecting every person’s data.

2

Being kind to others online.

3

It is the act of harassing someone online.

4

It is the act of copying another person’s work.

5

Traces of your online behaviour.

D. Write T for True and F for False. 1

Cyberstalking involves constantly monitoring someone’s online activities.

2

Spamming refers to sending unwanted emails for promotional purposes.

3

Digital footprints cannot be traced to a specific person.

4

Digital citizenship is the term used to describe the ethical and responsible use of technology.

5

Plagiarism is defined as the act of copying another person’s idea, work, or content giving proper credit or taking permission.

E. Answer the Following. 1

What are some common signs of cyberbullying, and how can you deal with it effectively?

2

Explain the concept of digital citizenship and why it is important for young internet users.

3

List three online safety measures that can help protect your personal information and privacy.

4

Describe how phishing attacks work and provide tips on how to recognise and avoid them.

5

What are the advantages of Cyber Ethics?

Chapter 2 • Cyber Ethics

UT24CB_G8.indb 33

33

11/24/2023 6:53:53 PM


F. Apply Your Learning. 1

Sneha has received some messages from her classmates that are not appropriate. What type of behaviour are her classmates showing? Is it ethical or unethical?

2

Arvind is very upset as he receives many unwanted emails daily. What is the name of this activity?

3

Prabha has received an email asking for her bank account details. Should she respond to that email or not?

4

Ravi uses the internet daily to search for information for his studies. What ethical practices should he be aware of and follow while being online?

5

You have received an email stating that you have won an iPhone. Should you believe such emails and respond to them or not?

34

UT24CB_G8.indb 34

11/24/2023 6:53:54 PM


Chapter 2 • Cyber Ethics

UT24CB_G8.indb 35

35

11/24/2023 6:53:55 PM


36

UT24CB_G8.indb 36

11/24/2023 6:53:56 PM


Chapter 3 • Computational and Algorithmic Thinking

UT24CB_G8.indb 37

37

11/24/2023 6:53:58 PM


38

UT24CB_G8.indb 38

11/24/2023 6:53:59 PM


Chapter 3 • Computational and Algorithmic Thinking

UT24CB_G8.indb 39

39

11/24/2023 6:54:01 PM


Introduction to Computational Thinking Computation means performing mathematical or logical calculations to solve a problem or process data. When we apply this concept to solve a particular problem, we must investigate the other aspects of problem solving, which also involves breaking down complex problems, applying logic, and designing algorithms to solve them. This approach is called computational thinking. Let us do this activity. Solve this magic square by following the rule that the sum of all the numbers in every row and every columns should be equal to 110.

While solving this problem, you must follow certain steps, like dividing the problem into sub-problems, then applying a method to solve the sub-problem, and then finally combining all the solutions together to provide the solution to the main problem. These steps are essential for computational thinking. Let us learn these steps one by one.

Think and Tell

Where can you apply computational thinking to solve real-life problems?

Explore More!

To learn more about computational thinking, scan the QR code.

Did You Know? Computational thinking is a problem-solving method that can be used to solve problems in any area, not just computer science.

Concepts in Computational Thinking Following are the basic concepts of computational thinking: 

Decomposition: Break a problem into smaller, easier parts.

Pattern recognition: Identify links or repeated parts in a situation.

Abstraction: Focus on the important details while ignoring useless information.

Algorithm design: Create a step-by-step plan to solve the problem.

Let us learn about these concepts one by one. 40

UT24CB_G8.indb 40

11/24/2023 6:54:02 PM


Decomposition Decomposition means breaking down a big, difficult task into smaller, easier ones. Think about your mother cooking food for dinner. She cuts the vegetables into smaller, bite-sized pieces to make them easier to chew and swallow.

Think and Tell

In a similar manner, on computers, large programs are also divided into smaller, easier tasks to reach the solution.

Why is decomposition important?

Advantages of Decomposition Decomposition is a basic skill in computer science and problem-solving. Here are some of its advantages:

1. Simplicity: By breaking a big problem into smaller parts, it becomes easier to understand and solve. It is like fixing several tiny problems instead of one big one. 2. Collaboration: Decomposition makes collaboration more feasible. Various individuals may work on various portions of an issue, and when you bring all the solutions together, you solve the complete problem. 3. Reusability: Once you have solved a significant piece of an issue, you may apply that answer again and again in other situations. This saves time and work. 4. Efficiency: Smaller hurdles are typically simpler and faster to handle than major ones. It is like eating little bites of your food—faster and less stressful!

Explore More!

Scan this code to know more about decomposition.

Applying Decomposition Now, let us learn how to apply decomposition to solving issues: Step 1: Identify the big problem First, determine the main problem you wish to solve. Step 2: Break it down

Next, split the major problem into smaller, more manageable sub-problems. These sub-problems should be simpler and easier to address on their own. Make Starter

Make Dinner

Make Main Course

Make Dessert

Chapter 3 • Computational and Algorithmic Thinking

UT24CB_G8.indb 41

Make Meat Course Make Vegetable Course

Make Mashed Potatoes Make Other Vegetables

41

11/24/2023 6:54:03 PM


Step 3: Solve each sub-problem Tackle each sub-problem one by one. Write methods or step-by-step tips to solve them. Step 4: Combine solutions Once you have solved all the sub-problems, merge their solutions together to solve the original, huge problem at hand. Step 5: Test and refine Test your answer to make sure it works as planned. If you find any challenges, go back and change your techniques.

Examples of Decomposition Let us look at some everyday examples of decomposition: Example 1: Making a sandwich 

Big Problem: Make a delicious sandwich.

Decomposition:

-

Chop vegetables.

-

Prepare the sauce for sandwich filling.

Put it all together to make a delicious sandwich.

Example 2: Solving a math problem 

Big Problem: Solve a complex math equation.

Decomposition: -

Break it into smaller equations or steps.

-

Solve each small equation.

-

Combine the solutions to get the final answer.

Pattern Recognition Now, let us discuss Pattern Recognition. Look at the adjoining picture. Can you find the next image in this given pattern? In computer science, it is about discovering links or patterns in data. Computers use mathematical formulas to find patterns in data. Let us look at some examples of pattern recognition.

Examples of Pattern Recognition Pattern recognition is the process of identifying patterns in data or information. Here are a few examples of pattern recognition in different contexts: 42

UT24CB_G8.indb 42

11/24/2023 6:54:04 PM


1. Speech recognition: Software that identifies speaking patterns by listening to spoken language and turns it into text are examples of speech recognition. For instance, voice assistants like Alexa, Siri, and Google Assistant detect speaking patterns to understand and carry out your requests. 2. Handwriting recognition: There are software applications that study handwriting patterns and turn scribbled characters into digital text. This is a common method for digitising handwritten notes or signing digital documents. 3. Image recognition: Many applications and software are there for image recognition to find patterns and items in pictures and videos. This is applied in several ways, like face recognition in smartphones, recognising objects in self-driving cars, or even in medical imaging for spotting diseases. 4. Natural language processing (NLP): To find trends in written or spoken material, NLP methods are applied. For instance, sentiment analysis examines the text’s emotional tone, while robots apply pattern recognition to grasp and respond to human contacts. 5. Credit card fraud detection: To find abnormal credit card buying trends, banks and credit card companies apply pattern recognition software. The system may flag a transaction as a likely scam if quick and bulk purchases are made with it somewhere else.

Abstraction Now, you have solved some small problems by decomposing them into small parts. Think of a huge, complex problem with hundreds of small sub-parts. To solve it step-by-step would be impossible. However, at times, if you look at the larger picture and ignore the minute unnecessary detailing, then your bigger problem may seem easy to solve. This is called abstraction. Abstraction refers to disregarding the minute details of a problem and focusing on its major issues.

Abstractions in Daily-life Situations Abstraction is applied in our daily-life situations without us ever knowing about it. Let us look at a few common examples: 1. Maps: Maps are simple images of realworld places. It is not possible to show each and every place and landmark on the map. For teaching, they show roads, towns, and essential information rather than every tree and building.

Chapter 3 • Computational and Algorithmic Thinking

UT24CB0803.indd 43

43

12/1/2023 6:06:31 PM


2. Recipes: By splitting the cooking process into steps, we may make it easy to follow a process. We focus on which materials to use and how to mix them, rather than having to focus on the chemistry processes working behind them. 3. Language: Language is a great example of abstraction. Language and words make it easier for us to express difficult ideas and feelings without going into the details of the formation of words and sentences.

Advantages of Abstraction The following are the advantages of abstraction: 1. Simplification: Abstraction simplifies difficult problems, making them more understandable and doable. 2. Reusability: Abstracted components can be reused in different situations, saving time and effort. 3. Modularity: Abstraction supports modular design, where each part of a system can be built and tested separately. 4. Scalability: As problems become more complicated, abstraction helps us grow our answers successfully.

Algorithms Let us think about baking a cake. We can divide the entire process into the following steps: 

Collect the ingredients.

Mix them in proper proportions.

Switch on the oven.

Bake for the suggested period of time.

This step-by-step procedure for baking a cake is called an algorithm. Algorithms can be defined as step-by-step instructions to be followed for a machine to carry out a particular task. Algorithmic design is the process of designing and analysing algorithms to solve computational problems. It involves creating a step-by-step set of instructions or a well-defined sequence of operations that can be followed to solve a specific problem or perform a task. These algorithms can be implemented in various programming languages and executed by a computer. Algorithms may have multiple solutions to a problem and can be adapted or modified according to the situation.

Discuss!

Can we solve all problems by creating algorithms for them?

Explore More!

To learn more about algorithms, scan the QR code.

44

UT24CB_G8.indb 44

11/24/2023 6:54:07 PM


Real-life Applications Now, let us explore some real-life examples of algorithmic design that impact on our daily lives: 1. GPS navigation: When you use a GPS device or a smartphone app to find directions, it estimates the best way for you to reach your location. This includes complicated computations and programs that consider things like traffic, road limits, and your chosen mode of transportation. 2. Online shopping: When you shop online, websites offer product recommendations based on your previous purchases and viewing habits. They study your preferences to offer things you might like, making your buying experience more customised. 3. Social media feeds: Social media sites like Facebook and Instagram use algorithms to decide which posts to show you. They consider things like your connections, hobbies, and the reach of the content to create a customised page for you. 4. Search engines: When you search the internet using a search engine like Google, it uses algorithms to scan billions of web pages and show you the most appropriate results. This needs fast processing and organising methods to give quick and accurate results.

Rules for Writing an Algorithm Follow the rules while writing an algorithm: 

An algorithm must start with a Start step.

It must end with a Stop step.

The language should be simple.

There should be proper sequence marking for all the steps of a problem.

If there are some steps that need to be repeated, then this should be marked properly in an algorithm.

Designing an Algorithm Let us design an algorithm for grocery shopping: 1. Start 2. Make a shopping list 3. Go to the grocery store 4. Collect the items that you want to buy 5. Pay the amount 6. Get the items packed 7. Return home 8. Stop Let us look at another example: 1. Start 2. Input two numbers, num1 and num2

Chapter 3 • Computational and Algorithmic Thinking

UT24CB_G8.indb 45

45

11/24/2023 6:54:07 PM


3. Take another variable sum 4. Initialise the sum to 0 5. Perform the calculation, sum=num1+num2 6. Display the result 7. Stop

Do It Yourself 3A 1

Design an algorithm for getting ready for school.

2

Design an algorithm for making a cup of tea.

3

Design an algorithm to convert a temperature in Celsius to Fahrenheit. 9 [Hint: °F = (°C × ) + 32] 5

Points to Remember 1

Computation means performing mathematical or logical calculations to solve a problem or process data.

2

The main concepts in computational thinking are decomposition, pattern recognition, abstraction, and algorithm design.

3

Decomposition means breaking down a big, difficult task into smaller, easier ones.

4

Pattern recognition is the process of identifying patterns in data or information.

5

Abstraction refers to disregarding the minute details of a problem and focusing on its major issues.

6

Algorithms can be defined as step-by-step instructions to be followed for a machine to carry out a task.

Chapter Checkup A. Fill in the Blanks. Hints 1

simple

sub-problems

pattern

algorithm

decomposition

In computational thinking, we break down a complex problem into smaller easier to solve.

2

to make it

means breaking down a big, difficult task into smaller, easier ones.

3

An problem.

4

When writing an algorithm, it is important to use understands the instructions.

language to ensure that the computer

5

Computers use mathematical formulas to find a

in data.

is a set of step-by-step instructions that a computer can follow to solve a specific

46

UT24CB_G8.indb 46

11/24/2023 6:54:08 PM


B. Tick () the Correct Option. 1

2

3

What is an algorithm?

a A type of computer hardware

b A step-by-step procedure to solve

c A computer program

d A mathematical equation

a problem

Which of the following is NOT an example of an algorithm?

a A recipe for baking a cake

b Instructions for assembling a piece

c A to-do list

d A list of your favourite movies

of furniture

In computational thinking, what does “decomposition” mean?

a Breaking down a problem into smaller,

b Making something more complex

c Combining two problems into one

d Ignoring unnecessary details

manageable parts

4

5

Which of the following is an example of abstraction?

a Following a map

b Watching a TV serial

c Using a recipe to make dinner

d All of these

Handwriting recognition is an example of

.

a Abstraction

b Pattern recognition

c Decomposition

d Algorithm design

C. Match the Following. Column A

Column B

Algorithm

Includes moving away from the detailed details and focusing on the important aspects of a problem

Computation

By breaking a big problem into smaller parts

Decomposition

The process of solving a problem using a computer

Abstraction

A step-by-step procedure for solving a problem

D. Write T for True and F for False. 1

An algorithm is a step-by-step set of instructions for solving a specific problem.

2

Computation refers to the process of performing calculations and solving problems using computers only.

3

Algorithms can be used to solve real-life problems, such as finding the shortest path between two locations on a map.

Chapter 3 • Computational and Algorithmic Thinking

UT24CB_G8.indb 47

47

11/24/2023 6:54:08 PM


4

Pattern recognition involves breaking down complex problems into smaller, manageable steps that can be solved systematically.

5

Algorithms always have a single, fixed solution to a problem and cannot be adapted or modified.

E. Answer the Following. 1

What is an algorithm? Provide a simple example of an everyday algorithm.

2

Imagine you are given a task to pack your bag for a day trip. List the step-by-step algorithm to complete this task.

3

Why is it important to break down complex problems into smaller, manageable steps when solving them?

4

Can you name three common tasks in your daily life that can be simplified or improved with the help of algorithms? Explain how algorithms can be applied to these tasks.

5

How can decomposition help you in solving a complex problem?

F. Apply Your Learning. 1

Anamika’s father has been financially duped by some criminals. Which step of computational thinking would be helpful for him to find out about this fraud?

2

Arun wants to prepare for a competition. How can the decomposition steps of computational thinking be helpful for him to prepare?

3

Lovey has applied a face lock in her mobile phone. Which example of pattern matching is this?

48

UT24CB_G8.indb 48

11/24/2023 6:54:08 PM


4

Taran uses Alexa at his home for managing devices. His mother gives instructions to Alexa to perform various tasks. What types of patterns does Alexa recognise here?

5

Pari is trying to write an algorithm to solve a mathematical problem, but she does not know the rules of writing an algorithm. Suggest some rules to her to design the algorithm.

Chapter 3 • Computational and Algorithmic Thinking

UT24CB_G8.indb 49

49

11/24/2023 6:54:08 PM


50

UT24CB_G8.indb 50

11/24/2023 6:54:09 PM


Chapter 3 • Computational and Algorithmic Thinking

UT24CB_G8.indb 51

51

11/24/2023 6:54:11 PM


52

UT24CB_G8.indb 52

11/24/2023 6:54:11 PM


Chapter 4 • App Development

UT24CB_G8.indb 53

53

11/24/2023 6:54:13 PM


54

UT24CB_G8.indb 54

11/24/2023 6:54:14 PM


Chapter 4 • App Development

UT24CB_G8.indb 55

55

11/24/2023 6:54:16 PM


Introduction to Apps Suppose you are ordering food for dinner tonight. You will fetch your phone, use a food ordering app, and place the order. It is that simple! Your smartphone must have a variety of apps. Do you ever realise how these apps are created and how they work? Well, you will learn about apps in this chapter. Apps or Applications are software programs or mobile applications that can be downloaded and installed on electronic devices like smartphones, tablets, and computers. These apps serve various purposes and can be used for playing games, accessing social media, learning, productivity, communication, and many other activities. You are likely to be familiar with popular apps and may use them regularly for entertainment, education, or communication. In short, an app refers to a program or software application designed to perform specific tasks or functions on a computer, smartphone, tablet, or other kinds of digital devices.

Did You Know? The first mobile app store was launched by Apple in July 2008, alongside the release of the iPhone 3G. It was called the “App Store,” and it initially featured 500 apps.

Different Types of Apps 1. Social networking apps: Social networking apps are apps that help people connect and share with others online. They let you make friends, post updates, and chat. Facebook, Instagram, LinkedIn, Snapchat, and Twitter are some of the commonly used Social Networking Apps.

2. Productivity apps: Productivity apps are apps that help you get things done and be more organised. Microsoft Word, Google Drive, Snapseed, Analytics, and YT Studio are a few examples of productivity apps.

3. Gaming apps: Gaming apps are apps where you can play fun games. These apps provide entertainment and challenges, allowing you to explore virtual worlds, solve puzzles, or compete with others. Temple Run, Angry Bird, Sportify, MineCraft, and Fruit Ninja are few examples of gaming apps.

4. Food delivery and cooking apps: Food and cooking apps are apps that help you discover recipes, cook delicious meals, learn about food, and order food. Zomato, Swiggy, DoorDash, Insta Mart, and Zepto are few examples of food delivery and cooking apps. 56

UT24CB_G8.indb 56

11/24/2023 6:54:25 PM


Think and Tell

What are the most popular apps according to you?

Discuss!

Why do you think apps were invented? How do they make our lives easy?

Accessing Apps You can access apps from your mobile phone, desktop, or directly from the web. Let us learn all these methods to access the apps.

Desktop Apps Desktop apps are like the computer version of the apps you use on your phone, but they are designed to work on your computer and do all sorts of different things, from writing documents to playing games or editing pictures. Desktop apps are like special programs or software applications that you can use on your computer, just like you use games or apps on your smartphone. They are like tools or games that you can open and use while you are on your computer. Desktop apps can be used on a computer or a laptop where they are installed and run locally. Desktop applications do not require an internet connection to run. For example, Microsoft Word is a desktop app that helps you write essays and stories on your computer. There are also games like Minecraft that you can play on your computer. Skype, Microsoft Power Point, Paint, Microsoft Excel, and iTunes are a few examples of desktop apps.

Web Apps A web app is a software application that operates on web servers and is accessed by users through web browsers over the internet. Web apps, short for web applications, are software applications that run on web servers and are accessed through web browsers over the internet. These applications provide a user interface and functionality similar to traditional desktop applications but are designed to be used within a web browser. Since web apps are hosted on web servers, users can access them from anywhere, using various devices, without the need for installation. This ease of accessibility is a significant advantage for both users and developers. Web apps can be accessed from any device with a web browser and an internet connection. They are not tied to a specific operating system, making them platform-independent. Padlet, YouTube, Gmail, and Google Drive are few examples of web apps.

Padlet

Gmail

Youtube YouTube

X Google Twitter Drive

Pinterest

Snapchat

Telegram

Facebook

57

Chapter 4 • App Development linkedin

UT24CB_G8.indb 57

Whatsapp

Instagram

11/24/2023 6:54:28 PM


Mobile Apps Mobile apps are programs you install on your phone to make it more fun or helpful for whatever you want to do. A mobile app is a tiny computer program that you can download and used on your smartphone or tablet. It is like having a special tool or game that makes your phone do fun or useful things beyond making calls or sending texts. Mobile apps can be games you play, tools that help with homework, maps that show you where to go, or even things like filters that make your photos look cool. Mobile apps can be downloaded from the app stores available on your mobile. An app store can host large numbers of mobile apps. You can check the various features of the app you want to download and compare it with other related mobile apps available on the app store. Instagram, Camera, Telegram, iMusic, and Google Maps are few examples of mobile apps.

Explore More!

To know more about web apps, scan this code.

Do It Yourself 4A Fill in the blanks.

1 2 3 4 5

and Apps can be

are social media apps. and installed on electronic devices.

run on web servers and are accessed through web browsers over the internet. You can download a mobile app from

available on your phone.

are like special programs or software applications that you can use on your computer.

Classification of Mobile Apps Apps can be classified based on the technology used to create them, and their usage.

58

UT24CB_G8.indb 58

11/24/2023 6:54:34 PM


Based on How They Are Created There are two types of apps based on how they are made. They are:

Native Apps Native apps are specifically designed for a particular type of phone, such as iPhones or Android phones. They are known for their high speed and excellent performance because they are designed exclusively for your phone. Examples of native apps include Camera, Gallery, Clock, Maps, and Settings.

Hybrid Apps Hybrid apps can work on different types of phones and use web technologies, allowing them to work on multiple platforms and access device features. They are compatible with both iPhones and Android phones and can be downloaded and installed from their respective app stores, such as the Google Play Store for Android phones and iTunes for iPhones. Although they may not match the speed and smoothness of native apps, they offer versatility by running on a wide range of smartphones. Examples of hybrid apps include Uber, Zomato, Instagram, Telegram, and X (formerly known as Twitter).

Difference Between Native Apps and Hybrid Apps Native Apps

Hybrid Apps

Native apps are built specifically for one type of mobile operating system, such as iOS (for Apple devices) or Android (for Android devices).

Hybrid apps are developed using web technologies like HTML, CSS, and JavaScript and can run on multiple platforms (iOS, Android, etc.) with some modifications.

They typically offer the best performance and responsiveness because they are optimised for the particular device and its features.

Hybrid apps might not feel as fast or quick as regular apps because they use a part that is like a web browser to show things, and that can be a bit slow.

Native apps have complete access to device Hybrid apps can access device features to some features, like the camera, GPS, and sensors, allowing extent using plugins, but not as exclusively as native them to take full advantage of these capabilities. apps. They are distributed through platform-specific app Hybrid apps can be distributed through web stores like the Apple App Store and Google Play browsers as web applications. They can also be distributed through app stores. Store.

Did You Know? Native apps can sometimes be used even without an internet connection! That is because they are installed directly on your device, and many of them store information on your phone. It is like having a little piece of the internet right on your device!

Chapter 4 • App Development

UT24CB_G8.indb 59

Discuss!

How can we get hybrid apps onto our phones? Is it similar to how we get native apps?

59

11/24/2023 6:54:35 PM


Based on Usage There are many apps based on their usage. They are:

Educational Apps

DriveDrive Drive Drive

Evemote Evemote Evemote Evemote

Hangouts Hangouts Hangouts Hangouts

Educational apps are software applications designed to facilitate learning and provide educational content on various subjects and skills. These apps are Minecraft Math Fact MathMaster FactMaster Master Trello Trello TrelloTrello Minecraft MathMath Fact Master Fact Minecraft Minecraft developed to make learning more engaging, interactive, and accessible for users of all ages, from children to adults.

Social Networking Apps

Google+ Google+ Adobe Adobe Adobe VoiceVoice Voice Google+ Google+ Adobe Voice

Social networking apps are like virtual platforms where you can meet and talk to your friends and even make new ones. They are special apps on your phone or computer that help you connect with people, share things about your life, and see what your friends are up to.

Duolingo Duolingo Duolingo Duolingo

YouTube

X Twitter

Pinterest

Snapchat

Telegram

Facebook

linkedin

Whatsapp

Instagram

Entertainment Apps Entertainment apps are online portals for having fun and enjoyment on your phone or tablet. They are special apps that offer all sorts of things to make you happy and have a great time.

Banking Apps

YouTube

Netflix

Hotstar

YouTube TV

Prime Video

YouTube Kids

MX Player

Jiocinema

Sony Liv

Banking apps are like a virtual bank branch on your phone or tablet. They are the special apps provided by your bank to help you do immediate money transactions without going to the bank in person.

E-commerce E-commerce apps are online stores on your phone or tablet. They are special apps that let you shop for all sorts of things without having to go to a physical store.

Did You Know? Did you know that the "Like" button on Facebook was originally going to be called the "Awesome" button? Facebook's founder, Mark Zuckerberg, considered different names for it before settling on "Like". So, every time you click "Like" on a post, you are giving it a little touch of awesomeness!

Discuss!

In your opinion, from the various categories of apps, which ones are most widely used and by whom?

Explore More!

To know more about mobile applications, scan this QR code.

60

UT24CB_G8.indb 60

11/24/2023 6:54:41 PM


Do It Yourself 4B 1

Name five native apps and five hybrid apps. Which one between the two categories do you use the most?

2

Who am I?

a

These apps can help users develop a wide range of skills, including reading, writing, maths, and problem-solving.

b

These apps are like virtual platforms where you can meet and talk to your friends.

c d e

These apps provide you with help when you do important financial transactions. These apps let you shop for all sorts of things without having to go to a physical store. These apps are the portals for fun and enjoyment on your phone or tablet.

Developing an App MIT App Inventor is a visual development platform that allows users to create mobile applications for Android devices without the need to write traditional codes. It is designed to make app development more accessible to a wide range of people, including those who do not have extensive programming experience. MIT App Inventor provides a visual, drag-and-drop interface for designing the user interface and functionality. Users can assemble components and connect blocks to create the app’s logic. Let us create a simple app using MIT App Inventor.

Idea of the App The name of this app will be Magic_Button. The app will have the following components: 1. A button 2. An image (Download any image from the internet and save it on your computer for later use.) These two components will be added in the app design. Initially, the image will not be visible. The idea is to display the image only after the user clicks on the button. Let us design the app now.

Creating an App 

Visit the following link to open MIT App Inventor: https://appinventor.mit.edu/

The following screen appears:

Chapter 4 • App Development

UT24CB_G8.indb 61

61

11/24/2023 6:54:41 PM


Click on the Create Apps! Button.

A sign-in screen appears. You can use your Gmail ID to login, or you can create a new one as well.

After signing in, the Welcome to MIT App Inventor pop-up box appears. Click on the Continue button at the bottom of the screen.

Another screen appears, from which you can choose to view the tutorials or start a new blank project.

Click on START A BLANK PROJECT.

Continue Button

Click here to start a blank project

The Project View window appears.

A dialog box appears, asking you to give a project name to your project.

Give an appropriate name to your project, for example, Magic_Button and click on OK.

A new project with the same name will be created.

The Project View window will open.

62

UT24CB_G8.indb 62

11/24/2023 6:54:42 PM


Sections of the Project View Window The Project View window is divided into four sections:

Palette

Viewer

Components

Properties

Palette: Various components are presented under different categories in the palette. Viewer: You can select any component from the palette and drag and drop it onto the screen in the Viewer section. Components: The Components section shows the various components that are placed in the Viewer. Properties: The Properties section shows the properties of the selected components.

Working With the Palette Section Let us now create the interface of the app.   

From the Palette section, click on the Layout tab.

Drag the VerticalArrangement component and place it on the screen in the Viewer section.

Now, click on the VericleArrangement1 component in the Components section and go to the Properties section.

Chapter 4 • App Development

UT24CB_G8.indb 63

63

11/24/2023 6:54:42 PM


Scroll down to the Height property and click on it.

Select the Fill parent option and click on OK.

Similarly, select the same option for the Width property. The VerticalArrangement component will fill the whole screen.

Now, from the User Interface tab, drag the Button component and drop it on the screen.

You can also observe that the Button1 component is added under the Components section.

Setting the Properties of the Button 

Now in the Properties section, scroll down to the Text property of the button. Replace the text “Text for Button1” with “Magic_Button”.

64

UT24CB_G8.indb 64

11/24/2023 6:54:42 PM


From the Palette section, drag the Button component and place it in the Viewer section on Screen1.

Now, change some more properties of the button in a similar way from the Properties section: o

Font Size: 20

o

Background Colour: Cyan

o

Text Colour: Blue

o

Shape: Rounded

o

Height: 10 percent

o

Width: Fill parent

Now, drag an Image component from the User Interface section and place it on the screen.

From the Components section, select Image1 and click on the Picture option in the Properties section. A drop-down will appear. Click on the Upload File option.

The Upload File dialog box will open. Click on the Choose File button.

An Open dialog box appears. Select the picture that you have downloaded from the internet and click on Open.

The image will appear on the screen.

Setting the Properties of an Image 

You can now set the properties of the image. o

Height: Fit to parent

o

Width: Fit to parent

o

Visible: Uncheck (to hide the image initially)

After setting all the properties of both objects, the screen will look as shown here: Chapter 4 • App Development

UT24CB_G8.indb 65

65

11/24/2023 6:54:43 PM


Creating Code for the App After that, you have arranged your components on the screen. Let us now create the code for the app. Coding in MIT App Inventor is very easy and user-friendly. You can create code for your app by using various blocks present in the Blocks Editor. To create code for your app, follow the given steps: 

Click on the Blocks Editor button on the right-hand upper corner of the Project View window.

The Blocks Editor will open with the Blocks section on the left and the Viewer section on the right.

Click on Screen1 > Button1 from the Blocks pane.

The blocks related to Button1 will appear.

Drag when Button1.Click block from the Blocks drawer and drop it in the Viewer pane.

66

UT24CB_G8.indb 66

11/24/2023 6:54:43 PM


Now, click on the Image1 component in the Blocks panel. The blocks related to the image are displayed.

Drag set Image1.Visible to block and drop it inside the when Button1.click block.

Now, from the Built-in > Logic drawer, drag the true block and snap it together with the set Image1. Visible to block.

The code for your app is complete.

Now, when you click on the Magic_Button on your mobile app, you will see a picture of a flower.

Testing the App 

To test your app, you will need a mobile phone.

Go to the Google Play Store of your android phone and search MIT AI2 Companion App.

Install the app by clicking on “Install”.

After installation, open the app. You have to provide a six-character code to connect.

Now, to get the code, go to your computer where you have created your app.

Go to the Connect menu and select the AI Companion option.

Explore More!

You can scan this QR Code to get the MIT AI2 Companion App on your mobile phone.

Magic_Button

Chapter 4 • App Development

UT24CB_G8.indb 67

67

11/24/2023 6:54:43 PM


A Connect to Companion window will open with a six-character code.

You can now fill in this six-character code on the mobile phone app.

The app will now open on your mobile.

Click on the button that you have created, which is the Magic_Button.

You will be able to see an image of the flower.

Do It Yourself 4C Create an app on MIT App Inventor to show your name when you click on a button.

Points to Remember 1

Apps or applications are software programs or mobile applications that can be downloaded and installed on electronic devices like smartphones, tablets, and computers.

2

Social networking apps, productivity apps, gaming apps, food delivery and cooking apps are different types of apps.

3

You can access apps from your mobile phone, desktop, or directly from the web.

4

Desktop apps are like special programs or software applications that you can use on your computer, just like you use games or apps on your smartphone.

5

Web apps, short for web applications, are software applications that run on web servers and are accessed through web browsers over the internet.

6

A mobile app is a tiny computer program that you can download and use on your smartphone or tablet.

7

Native apps are specifically designed for a particular type of phone, such as iPhones or Android phones.

8

Hybrid apps can work on different types of phones and use web technologies, allowing them to work on multiple platforms and access device features.

9

MIT App Inventor is a visual development platform that allows users to create mobile applications for Android devices without the need to write traditional codes.

Chapter Checkup A. Fill in the Blanks. Hints 1

An

2 3

palette

app

e-commerce

social networking

hybrid

is a computer program that you can download and use on your smartphone or tablet. are special apps that let you shop for all sorts of things without having to go to a physical store.

platforms.

apps are developed using web technologies like HTML, CSS, and JavaScript and can run on multiple

68

UT24CB_G8.indb 68

11/24/2023 6:54:44 PM


4 5

In MIT App Inventor, various components are present under different categories in

.

apps are apps that help people connect and share with others online.

B. Who Am I? 1

I am like a virtual bank branch on your phone or tablet.

2

I can assist you to design and make the app of your dreams.

3

I am a computer program that you can download and use on your smartphone.

4

I can show the properties of the selected components.

5

I am a type of app that can work on different types of phones, like both iPhones and Android phones.

C. Write T for True and F for False. 1

Apps are software programs that can be installed on your desktop.

2

There are two types of apps: hybrid and native.

3

Web apps do not operate on web servers and are not accessed by users through web browsers.

4

Native Apps provide the best performance as they are optimised for the particular device.

5

The Components section shows the various components that are placed in the Viewer.

D. Answer the Following. 1

What are banking apps?

2

What are hybrid apps? How are they useful?

3

How are desktop apps different from web apps?

4

What are Native Apps? Give examples.

5

What is MIT App Inventor?

Chapter 4 • App Development

UT24CB_G8.indb 69

69

11/24/2023 6:54:44 PM


E. Apply Your Learning. 1

Ramesh wants to learn how to design an app on MIT App Inventor. Which website should he visit?

2

Tia wants to understand the e-commerce apps and know a few examples. Can you explain it to her?

3

Umang wants to download a specific app for his iPhone. Where can he get the app?

4

Geet is using her computer and wants to learn about web apps. Can you help her understand about them?

5

Meher has installed an app on her phone that was not a pre-loaded app. What type of app has she downloaded?

70

UT24CB_G8.indb 70

11/24/2023 6:54:44 PM


Chapter 4 • App Development

UT24CB_G8.indb 71

71

11/24/2023 6:54:46 PM


72

UT24CB_G8.indb 72

11/24/2023 6:54:46 PM


Chapter 5 • New Tech Advancements

UT24CB_G8.indb 73

73

11/24/2023 6:54:48 PM


74

UT24CB_G8.indb 74

11/24/2023 6:54:50 PM


Chapter 5 • New Tech Advancements

UT24CB_G8.indb 75

75

11/24/2023 6:54:51 PM


New Technologies Have you ever experienced putting on a special pair of glasses and suddenly started exploring a totally different world? It can be a forest, an ocean, or even in a gaming environment. Also, imagine having a robot friend. How would you interact with it? What type of tasks would you like it to do? Welcome to the amazing world of technology! In recent years, innovative advancements like Augmented Reality (AR), Virtual Reality (VR), 3D Printing, and Robots have taken place, changing the way we play, learn, and work. To understand how these technologies have transformed our lives. Let's go on an adventure to explore the amazing things of today's world.

Augmented Reality Augmented Reality, or AR for short, is like magic through technology. It’s when you use a special device, like a smartphone or AR glasses, to add cool and fun things to the real world you see around you. Imagine pointing your phone at a book, and suddenly, the characters in the book come to life on your screen, moving and talking. That’s AR! It’s like a mix of the real world and a computer game. AR can help you learn in exciting ways, play games that blend with your surroundings, or even try on virtual clothes without actually wearing them. AR makes your world more fun and interactive with the help of gadgets and clever computer tricks!

Did You Know? In 2016, the popular game Pokémon GO introduced millions of people to augmented reality. It got players out and about, hunting for digital Pokémon creatures in the real world using their smartphones. It's like a global treasure hunt that brought AR to the masses and became a huge craze!

76

UT24CB_G8.indb 76

11/24/2023 6:54:55 PM


Uses of Augmented Reality Here are some practical uses of AR: Gaming: With AR games, you can see and interact with virtual objects in your real surroundings.

Shopping: You can try on clothes, makeup, or spectacles, etc., virtually without going to a store. You can check how furniture looks in your room before buying it. Also, you can search for products by pointing your smartphone at them.

Navigation: Using AR, you can find easy way in a new city, discover nearby places of interest, or get real-time information while driving.

Science and Experiments: AR helps you understand complex ideas by showing them visually. You can explore the human body in 3D, see how planets move in the sky, or watch chemical reactions happen right before your eyes.

Advantages and Disadvantages of Augmented Reality Here are some advantages and disadvantages of Augmented Reality: Advantages

Disadvantages

Fun and Engaging: AR makes learning and playing Screen Time: Using AR often involves staring at more fun by adding exciting digital elements to the screens for a long time, which can be tiring and not real world. good for your eyes. Enhanced Learning: It helps students understand complex topics better with interactive 3D models and visual aids.

Cost: Some AR devices and apps can be expensive, and not everyone can afford them.

Exploration: AR can take you on adventures without leaving your room, like exploring the depths of the ocean or the surface of Mars.

Privacy: AR can sometimes track your location and what you’re doing, which might make you worry about your privacy.

Creativity: You can create your own AR experiences, like drawing in 3D space or making your own virtual world.

Distraction: While AR is fun, it can also be distracting. It’s important to use it responsibly, especially in school or while walking outside.

Practical Uses: It can be used for practical things like trying on clothes before buying them or finding your way with helpful directions.

Technical Issues: AR might not work well if your device has a low battery or if there are problems with the app, which can be frustrating.

Chapter 5 • New Tech Advancements

UT24CB_G8.indb 77

77

11/24/2023 6:54:55 PM


Think and Tell

What is one experience that you would like to have throughout augmented reality?

Discuss!

How can augmented reality be used to save Mother Nature?

Explore More!

To watch how augmented reality works, scan this QR code.

Do It Yourself 5A Fill in the blanks.

1

Augmented Reality is like a mix of the

2

One advantage of AR is that you can create your own AR own .

3

AR can sometimes track your .

4

AR makes your world more fun and interactive with the help of

and a computer game. , like drawing in 3D space or making your

and what you’re doing, which might make you worry about your and clever

tricks!

Virtual Reality Virtual reality, or VR, is like stepping into a whole new world without actually going anywhere. It is a technology that uses special pairs of glasses or headsets and sometimes even gloves or controllers to make you feel as if you are inside a computer-generated environment. When you put on a VR headset, it covers your eyes, and you cannot see the real world anymore. Instead, you see and hear everything in the virtual world. Imagine you are playing a video game, but instead of just watching it on a screen, you are inside the game. You can look around in all directions, and it feels as if you are really there. VR can be used for gaming, of course, but also for other cool stuff like exploring places you have never been to, learning in an interactive way, or even training for jobs like flying aeroplanes or performing surgery. It is like a super immersive and exciting way to experience different things! 78

UT24CB_G8.indb 78

11/24/2023 6:54:57 PM


Where Is Virtual Reality Being Used

Gaming: VR is used for bewitching gaming experiences. You can put on a VR headset and feel as if you’re inside the game, whether it’s exploring magical worlds, solving puzzles, or battling virtual monsters.

Education: VR can be used in classrooms to make learning more engaging. Students can take virtual field trips to historical sites, explore the human body in 3D, or even travel to space to learn about planets and stars.

Training: VR is used to train people for different jobs. Pilots can practise flying in a virtual cockpit, medical students can simulate surgery, and firefighters can learn how to handle emergencies in a safe virtual environment.

Did You Know?

Virtual Tours: You can use VR to take virtual tours of famous landmarks, museums, and cities around the world. It’s like travelling without leaving your home.

Architecture and Design: Architects and designers use VR to create virtual models of buildings and spaces, allowing them to walk through and make changes before construction begins.

Discuss!

Some people may experience motion sickness when using VR, which is often referred to as “cybersickness.” It’s similar to motion sickness experienced in vehicles.

Can you think of any industries or fields that the use of VR will really help flourish or where it will be particularly useful?

Do It Yourself 5B 1

2

Fill in the blanks.

a

Students can take virtual field trips to even travel to space to learn about

b

You can use VR to take virtual tours of famous world.

,

, and

around the

Choose the picture that is showcasing VR and explain why.

a

Chapter 5 • New Tech Advancements

UT24CB_G8.indb 79

, explore the human body in 3D, or .

and

b

79

11/24/2023 6:54:57 PM


Robotics Robotics is a field that involves creating and working with robots. Robots are like machines with the ability to move and perform tasks on their own, often controlled by computer programs. They can come in all shapes and sizes, from small robotic toys to large industrial machines. In robotics, we learn how to design, build, and program these robots to do specific jobs. It is not just about building something that moves; it is about making robots that can think and make decisions. We use various sensors and programming languages to make robots smart. Robotics is used in many different areas, such as manufacturing, medicine, space exploration, and even in our everyday lives. For example, some robots help assemble cars in factories, while others can assist surgeons in delicate surgeries. Robotics is a field that combines technology, engineering, and creativity to make our lives easier and more efficient.

Did You Know? Robots like Sophia and Atlas are designed to look like humans and can also move just like humans. These robots can express themselves with proper emotions.

Think and Tell

Are robots a boon or a bane to humans?

Explore More!

Scan this code to learn how Atlas robot helps in industry.

Robots That We See Everyday Vacuum Cleaners: These are autonomous vacuum-cleaning robots that navigate your home and clean the floors without human intervention. Medical Devices: In some healthcare settings, robots assist in surgeries, deliver medications, or help with rehabilitation exercises. Drones: Unmanned aerial vehicles (UAVs) or drones are used for tasks such as aerial photography, surveillance, and even package delivery. Traffic Lights and Road Signs: Some traffic management systems use sensors and automation to optimise traffic flow and improve safety. Automated Coffee Machines: Coffee shops and vending machines often use robotic systems to grind beans, brew coffee, and serve drinks.

80

UT24CB0805.indd 80

12/5/2023 5:57:05 PM


Do It Yourself 5C What robot is this and how does it make our daily life easy?

3D Printing A 3D printer is like a magical machine that can create real, tangible objects from a computer design. 3D printing is like using a special machine to create toys, objects, and even food by adding material layer by layer from a computer design. It’s like making things one tiny piece at a time until you have a real thing you can touch and play with.

Working of a 3D Printer Step 1: You start with a special computer program where you create a 3D model of the object you want to make. It’s like making a digital blueprint. You can design anything you want to make into a physical product. Step 2: Then, you load this design into the 3D printer. The printer reads the design and starts making the object layer by layer. It’s a bit like building a tall tower with tiny bricks, but the bricks are really, really small, and the printer does all the work. Step 3: The printer uses a special material, usually plastic, but it can be other things like metal or even chocolate. This material is melted and pushed out of a nozzle, like toothpaste from a tube. The melted material quickly hardens and becomes solid as the printer moves back and forth, layer by layer. Step 4: Gradually, as each layer is added, your object starts to take shape. It is like magic! When the printing is done, you have a real, physical object that you can touch and use. It is an exact copy of what you designed on the computer. Chapter 5 • New Tech Advancements

UT24CB_G8.indb 81

81

11/24/2023 6:55:00 PM


Did You Know? Astronauts on the International Space Station can use 3D printers to make tools and parts they need. It’s like having a space toolbox that can create new tools whenever they want!

Explore More!

To watch how 3D printers work, scan this QR code.

Do It Yourself 5D Arrange the order in which the 3D printing is done:

1

The printer reads the design and starts making the object layer by layer.

2

You start with a special computer program where you create a 3D model.

3

As each layer is added, your object starts to take shape.

4

The melted material quickly hardens and becomes solid as the printer moves.

Write the correct order -

Biotechnology Biotechnology is a stream of science that uses living things, like cells and bacteria, to make useful things. It is like using tiny living factories to create medicines, food, and other amazing things that can help people and the environment. Computer scientists create software and algorithms to process and analyse biological data. This includes studying genetic information, identifying patterns in biological processes, and predicting how organisms might respond to different conditions.

Role of Computers in Biotechnology 1. Machine learning and artificial intelligence are increasingly used in biotechnology. They can help in drug discovery, predicting disease outbreaks, and even analysing medical images like X-rays and MRIs. 2. DNA sequencing, which is crucial for understanding genetics, relies heavily on computer algorithms. High-performance computing is used to process the enormous amount of data generated during DNA sequencing. 82

UT24CB_G8.indb 82

11/24/2023 6:55:01 PM


3. Biotechnology labs often use automated equipment controlled by computers. Robots can perform repetitive tasks like mixing chemicals, running experiments, and even handling samples, making research more efficient and accurate.

Did You Know? Scientists have used biotechnology to create a type of bioluminescent plant. That means they made a plant that can glow in the dark, just like fireflies! It’s not only super cool to look at, but it could also help reduce the need for electric lighting in the future.

Do It Yourself 5E Fill in the blanks.

1

Computer scientists create

2

Robots can perform repetitive tasks like making research more efficient and accurate.

3

High-performance computing is used to process the enormous amount of sequencing.

and

to process and analyse biological data. ,

, and even handling

,

generated during

Brain-computer Interfaces Brain-computer Interfaces, or BCIs, are like magic hats for our brains. They let our thoughts and brains talk to computers and machines. It’s as if you could move things or play games on a computer just by thinking about it! BCIs can help people who can’t use their bodies very well, and they’re also really cool for science and games. The primary purpose of BCIs is to enable individuals to control and interact with computers, robotic systems, or other devices directly using their brain activity without the need for traditional input methods like keyboards or mouse.

Did You Know? Brain-computer Interfaces (BCIs) can help people control robotic arms with their thoughts. It’s like having a superpower where your brain tells a robot what to do!

Chapter 5 • New Tech Advancements

UT24CB_G8.indb 83

83

11/24/2023 6:55:01 PM


Discuss!

In case you get an opportunity to use a BCI what game would you like to play and what commands would you give the computer through this technology?

Explore More!

To know more about how BCI works, scan this QR code.

Points to Remember 1

Augmented Reality uses a special device, like a smartphone or AR glasses, to add cool and fun things to the real world you see around you.

2

Two demerits of Augmented Reality are:

a AR can sometimes track your location and what you’re doing, which might make you worry about your privacy.

b While AR is fun, it can also be distracting. It’s important to use it responsibly, especially at school or when walking outside.

3

Virtual reality is a technology that uses special goggles or headsets and sometimes even gloves or controllers to make you feel as if you’re inside a computer-generated environment.

4

Virtual Reality is being used for:

a Gaming

b Education c Training

d Virtual Tours

e Architecture and Design

5

Robotics is used in many different areas, such as manufacturing, medicine, space exploration, and even in our everyday lives.

6

This how a 3D printer works:

7

a

You start with a special computer program where you create a 3D model.

b

The printer reads the design and starts making the object layer by layer.

c

The melted material quickly hardens and becomes solid as the printer moves.

d

As each layer is added, your object starts to take shape.

Computers make biotechnology easy in the following ways:

a High-performance computing is used to process the enormous amount of data generated during DNA sequencing.

b Computers can help with drug discovery, predicting disease outbreaks, and even analysing medical images like X-rays and MRIs.

8

Brain-computer Interfaces let our thoughts and brains talk to computers and machines.

84

UT24CB_G8.indb 84

11/24/2023 6:55:02 PM


Chapter Checkup A. Fill in the Blanks. Hints

automated

Augmented Reality

1

BCIs enable individuals to

2

Biotechnology labs often use

3

A 3D printer is a magical machine that can create real,

4 5

headset

and

control, interact

tangible

with computers directly using their brain activity.

equipment controlled by computers. objects from a computer design.

makes your world more fun and interactive with the help of gadgets and clever computer tricks. When you put on a VR

, it covers your eyes, and you can’t see the real world anymore.

B. Who Am I? 1

I come in lots of shapes and sizes and you see me almost every day in your day-to-day life.

2

I let your thoughts talk to the computer and give commands.

3

I show you a mix of the real world and computer.

4

I can make a tangible product from a design.

5

I am used to make training and virtual tours more fun and real.

C. Write T for True and F for False. 1

The first step in 3D printing is to load the design into the 3D printer.

2

BCIs do not need inputs like a keyboard or mouse.

3

Robots are used in space exploration.

4

Biotechnology is the science of non-living things.

5

VR technology uses special headsets to see the virtual world.

D. Answer the Following. 1

What are the uses of Augmented Reality?

2

Where do we see robots in our lives every day?

Chapter 5 • New Tech Advancements

UT24CB_G8.indb 85

85

11/24/2023 6:55:02 PM


3

What are Brain-Computer Interfaces?

4

Explain the concept of Virtual Reality.

5

What is Biotechnology?

E. Apply Your Learning. 1

Meenal wants to know where we all see robots in our daily life and how they make our lives easier. Help her to understand this.

2

Kriti does not understand the difference between AR and VR. Can you help her to understand?

3

Soumya has to make a presentation about Brain Computer Interfaces. What points do you think he should include in the presentation?

4

Manish wants to operate a 3D printer in the lab. What are the steps he must take to ensure that he is successful in making his design physically?

5

How will Misha tell her friends how computers make biotechnology research easy and quick?

86

UT24CB_G8.indb 86

11/24/2023 6:55:03 PM


Chapter 5 • New Tech Advancements

UT24CB_G8.indb 87

87

11/24/2023 6:55:05 PM


88

UT24CB_G8.indb 88

11/24/2023 6:55:05 PM


Chapter 6 • Database Management System

UT24CB_G8.indb 89

89

11/24/2023 6:55:07 PM


90

UT24CB_G8.indb 90

11/24/2023 6:55:08 PM


Chapter 6 • Database Management System

UT24CB_G8.indb 91

91

11/24/2023 6:55:10 PM


Understanding Databases When you visit your school library, you can observe that the books are organised in a very systematic manner. You go to the particular bookshelf and fetch the book that you need. Then you ask the librarian to issue it to you. How do you think these books are organised in such a manner? Yes, they have been given a unique number, and then they are arranged according to their genre, author, date of publication, etc. Now, think of the same data being organised on a computer. This data can be maintained on a computer, also known as a database. When we maintain data in an organised and structured manner in digital form on a computer, it is called a database. It is a group of related facts organised together so that they can be accessed, controlled, and modified. It is an organised method of saving and finding information. A database is a collection of tables, where each table consists of rows and columns. Each row represents a single record, and each column denotes a single piece of information surrounding that record. For example, a table of student information may have columns for the student’s name, location, phone number, and date of birth. Student_Name

Location

Phone Number

Date of Birth

Shreya

Delhi

9988776655

12-03-2010

Asmi

Noida

3344556677

23-09-2011

Aarna

Gurgaon

7867564534

04-04-2011

Databases are used to store several types of information, such as customer records, product data, and medical records. They are used by almost all organisations, governments, and businesses to keep their records in a systematic manner.

Did You Know? In the 1960s, the first databases emerged with hierarchical models. Relational databases, introduced in the 1970s by E.F. Codd, revolutionised data management, leading to modern database systems.

Think and Tell

Where have you seen the use of a database in your daily life?

Discuss

Is it important for data to be organised?

92

UT24CB_G8.indb 92

11/24/2023 6:55:11 PM


Advantages of Database Here are some of the advantages of using a database: 

It can carry vast quantities of data.

It can organise data in a manner that makes it easier to retrieve.

It can be used to modify and erase data rapidly.

It can be used to share data with others.

Now, let us learn about database management systems.

Database Management System A database management system (DBMS) is a software application that enables you to construct, operate, and interact with databases. Some common examples of DBMSs are MySQL, Microsoft SQL Server, and Oracle.

Role of DBMS Here are some of the key roles or functions of a DBMS: Storing Data: A DBMS can retain a huge amount of data in an organised form. This makes it easy and simple to access and recover the data when necessary. Managing Data: A DBMS can manage the data in a database, such as adding, removing, modifying, and restoring data. It may also help to ensure that the data is genuine and consistent. Protecting Data: A DBMS can protect the data in a database from unauthorised entry, change, or loss. It can do this by applying security measures such as user login and encryption. Querying Data: You can access a specified piece of information from the database by making use of queries. This means that users may ask questions about the data, and the DBMS will deliver the results of the query.

Did You Know? A database is a structured data storage system used to store, organise, and retrieve information. It has evolved from manual systems to digital databases, playing a crucial role in modern data management.

Think and Tell

Do you think that a person with special knowledge of databases is required to handle it?

Chapter 6 • Database Management System

UT24CB_G8.indb 93

93

11/24/2023 6:55:12 PM


Types of DBMS Here are the various types of DBMS systems: Hierarchical Database Management System (HDBMS) keeps data in a tree-like structure. Each record may have one or more child records, and each child record might have one or more grandchild records. HDBMS are well-suited for maintaining data that has a natural order, such as the structure of a corporation or the arrangement of plants and animals. Some examples of HDBMSs include IBM’s Information Management System (IMS) and the Integrated Data Store (IDS). Relational Database Management System (RDBMS) are the most commonly used type of DBMS. They hold data in the form of tables, which are made up of rows and columns. Each row represents a record, and each column indicates a field. RDBMS are highly efficient in preserving and locating data, and they are also quite adaptable. Some notable RDBMSs include MySQL, Oracle, and Microsoft SQL Server. Object-Oriented Database Management System (OODBMS) stores data in the form of objects. Objects are like records, but they may also have methods, which are like functions. OODBMS is wellsuited for keeping complicated data, such as data that is tied to things in the real world. Network Database Management System (NDBMS) stores data in a network-like structure. Each record may have one or more parent records, and each parent record might have one or more child records. NDBMS are well-suited for maintaining data that involves a complicated connection between records, such as airline routes between cities.

Components of a DBMS Database Management System consists of six main components. These are: Data Hardware Software Users Procedures Database Access Language

Software Hardware

Data Components

Procedures

of DBMS

Users

Database Access Language

Data: This is the most significant component of a database. It is a collection of fundamental facts and figures that are recorded in the database. Hardware: The hardware consists of the real computers that store and manage data in the database. This includes the computer, the hard disk drive, and the RAM. Software: The software is the tool that operates the information. It is responsible for storing, obtaining, and managing data. The most common database application is termed a database management system (DBMS). Users: The users are the individuals who connect with the database. They might be end-users who use the database to see data or database managers who operate the database.

94

UT24CB_G8.indb 94

11/24/2023 6:55:12 PM


Procedures: A procedure is a form of general instructions or guidelines for using a DBMS. These instructions include how to set up the database, install it, log in and out, manage it, create a backup, and generate reports from the database. Database Access Language: Database Access Language is a language that allows users to give commands to a database to operate the data stored. You can use this language to ask the database to do many things, such as getting data, modifying it, or removing it.

Did You Know?

Discuss

Your favourite streaming service, like Netflix, uses big data and databases to recommend movies and shows to you.

What does a table look like?

Do It Yourself 6A Answer the following.

1

Name the components of a DBMS.

2

Name the different types of DBMS.

SQL Queries SQL is the language used to interact with the database. You have learnt MySQL in the previous class. Let us revise some basic queries in MySQL. Query

Meaning

Syntax

Create Database

To create a database

create database database_name;

Show Databases

To view the existing databases

show databases;

Use Database

To use the created database

use database_name;

Create

To create a table

create table table_name (attribute1 datatype1, attribute2 datatype2, …);

Insert

To insert values into the table

insert into table_name values (value1, value2, …)

Select

To view records in a table

select * from table_name;

Chapter 6 • Database Management System

UT24CB_G8.indb 95

95

11/24/2023 6:55:12 PM


Types of SQL Statements SQL statements are classified into the following two categories: Data Definition Language (DDL): The SQL statements or commands that are used to create or delete tables are called DDL commands. These are necessary for creating, altering, and deleting the table. For example, create database, create table, add, modify, drop, etc. Data Manipulation Language (DML): The SQL statements or commands that are used to insert, delete, or update data in the table of the database are called DML commands. For example, insert, delete, update, etc.

SQL DDL

DML Create

Insert

Alter

Update

Drop

Delete

Creating Views In a database, a “view” is a virtual table that does not store any data on its own. It is based on the result of a SQL query.

Advantages of Creating Views 

Views are created to simplify complex database operations.

They enhance data security and improve query performance.

They provide a structured and simplified way to access data from database tables.

Syntax: create view view_name as select column1, column2, … from table_name where condition1; Example: create view Student_View as select Student_ID, Student_Name from Student where Marks>= 330; This query will create a view named Student_View. It is a virtual table and does not store any data on its own.

Difference Between Table and View Both tables and views can be used to represent data in a structured manner. However, there are some basic differences that are summarised in the following table: 96

UT24CB_G8.indb 96

11/24/2023 6:55:12 PM


Table

View

Tables are used to store and manage data.

A view is only a virtual representation of data.

Data in tables can be inserted, updated, and deleted.

Views are read-only by default. That means you cannot insert, update, or delete data into views.

Tables consume storage space to store data.

Views do not consume additional storage space beyond the query definition.

Data Retrieval in MySQL The Structured Query Language (SQL) is used to interact with the database. Here are some fundamental concepts and SQL commands related to data retrieval: Let us consider an example and create a table “Student” with the following attributes: Attribute Name

Data Type

Student_ID

int

101

Student_Name

varchar(40)

Gender

Student_ID

Student_Name

Gender

Marks

DOB

Akshay

M

322

2008-12-04

102

Diksha

F

343

2007-07-07

char(1)

103

Payal

F

345

2008-10-12

Marks

int

104

Shreya

F

321

2007-09-11

DOB

date

105

Prateek

M

332

2008-07-02

Using Select Statement The select statement is used to retrieve data from a table in a database.

From Clause The from clause specifies the table from which you want to retrieve data. Example: select * from Student; This SQL statement retrieves all columns from the “Student” table.

Sorting Data (Ascending/Descending) Sorting means arranging data in a particular order. You can arrange data in ascending and descending order by using the order by command. Let us see how to do it.

Chapter 6 • Database Management System

UT24CB_G8.indb 97

97

11/24/2023 6:55:12 PM


Sorting Data in Ascending Order Sorting data in ascending order means arranging it from the smallest value to the largest value. To sort data in ascending order, we use the order by clause in our SQL query. Example: select Student_Name from Student order by Marks asc; This SQL statement retrieves student names and their marks from the “Student” table, ordered by marks in ascending order.

Sorting Data in Descending Order

Output Shreya Akshay Prateek Diksha Payal

Sorting data in descending order means arranging it from the largest value to the smallest value. To sort data in descending order, you can use the order by clause with the desc keyword. Example: select Student_Name from Student order by Marks desc;

Searching Data

Output Payal Diksha Prateek Akshay Shreya

To search for specific data in a MySQL database, you can use SQL queries by specifying some conditions.

Using the Where Clause: The where clause is used to filter the rows returned by a query based on specified conditions. Syntax: select * from table_name where condition; Example: select Student_Name from Student where Gender = ’F’; This SQL statement retrieves the Student_Name of the girl students.

Output Diksha Payal Shreya

Using the Wildcard Operators Wildcard operators in SQL are special characters for pattern matching in text data. They help in finding data that matches a pattern, not just an exact value. They are used with the 'like' clause in an SQL query. Two main wildcard characters used in SQL are '%' (matches multiple characters) and '_' (matches a single character). Let us look at their usage. Using '%' Character: The percent sign (%) represents zero, one, or multiple characters.

98

UT24CB_G8.indb 98

11/24/2023 6:55:13 PM


Syntax: select column_name from table_name where column_name like '%pattern'; Example:

Output

select Student_Name from Student

Akshay

where Student_Name like '%s%';

Diksha

Using '_' Character: The underscore (_) represents a single character.

Shreya

Syntax: select column_name from table_name where column_name like 'pattern_pattern'; Example:

Output

select Student_Name from Student

Payal

where Student_Name like 'P_yal';

Do It Yourself 6B Match the following. Create

Descending order

View

Filter rows

Where

Create a new table

Desc

Virtual Table

Points to Remember 1

A database is a structured collection of related data that can be easily accessed and managed.

2

Databases use tables to organise data, with rows for individual records and columns for specific information.

3

Components of a DBMS include data, hardware, software, users, procedures, and database access language.

4

Advantages of databases include handling large data volumes, efficient data organisation, quick data changes, and data sharing.

5

A Database Management System (DBMS) is software that helps create, operate, and interact with databases.

6

SQL is the language used to interact with the database.

7

Two types of SQL statements are Data Definition Language (DDL) and Data Manipulation Language (DML).

Chapter 6 • Database Management System

UT24CB_G8.indb 99

99

11/24/2023 6:55:13 PM


Chapter Checkup A. Fill in the Blanks. Hints

percent

data

column

DBMS

1

A database is a structured collection of

2

In a database, each piece of information is stored in a

3

The software used to manage and organise databases is called a

4

The

5

To retrieve specific information from a database, you can use a special language called

SQL

. . .

sign represents zero, one, or multiple characters in a value. .

B. Tick () the Correct Option. 1

2

3

4

5

What is a database?

a A place to store variables

b A collection of organised information

c A storehouse for data

d A kind of tree structure

What is the main purpose of a database?

a To store commands

b To organise and store data

c To run a program

d To run a query

Which of the following is NOT a component of DBMS?

a Users

b Data

c Hardware

d Network

What is a record in a database?

a A collection of rows

b A collection of books

c A row in a database table

d A column of information

Why is it important to keep a database organised?

a It helps to change the data

b It helps find information quickly and easily

c It makes a lot of noise

d It is not important at all

C. Who Am I? Column A

Column B

1

Wildcard operator

A column in a database table

2

DBMS

Relational, hierarchical, and network

3

Different types of DBMS

A software application that helps users create, manage, and access databases

4

Components of a DBMS

A special character for pattern matching in text data

5

Attribute

Data, hardware, software, users, procedures, and database access language

100

UT24CB_G8.indb 100

11/24/2023 6:55:14 PM


D. Write T for True or F for False. 1

A database is a collection of data organised in a way that makes it easy to retrieve, manage, and update.

2

In a database, information is stored in tables, which are made up of rows and columns.

3

The where clause is used to filter the rows returned by a query based on specified conditions.

4

Databases are only used by businesses and organisations; they have no relevance in our everyday lives.

5

Sorting and searching are common tasks performed on a database to organise and retrieve specific information.

E. Answer the Following. 1

How is data stored in RDBMS?

2

What do you mean by DML commands?

3

What are the advantages of using a database?

4

What is a database management system (DBMS)?

5

What are the wildcard operators used in SQL? Explain them.

F. Apply Your Learning. Consider the following Employee table and answer the queries given below:

1

Emp_ID

Emp_Name

Salary

1

Amaan

25000

2

Reema

23000

3

Sanjay

21000

4

Ravi

20000

Display the IDs and names of all the employees.

Chapter 6 • Database Management System

UT24CB_G8.indb 101

101

11/24/2023 6:55:14 PM


2

Display the names of the employees whose salary is less than ₹23000.

3

Display the names and IDs of the employees whose salaries are more than ₹23000.

4

Create a view from the table to display the IDs of the employees whose names start with ‘R’.

5

Insert two more rows in the table.

102

UT24CB_G8.indb 102

11/24/2023 6:55:14 PM


Chapter 6 • Database Management System

UT24CB_G8.indb 103

103

11/24/2023 6:55:15 PM


104

UT24CB_G8.indb 104

11/24/2023 6:55:17 PM


105

UT24CB_G8.indb 105

11/24/2023 6:55:17 PM


106

UT24CB_G8.indb 106

11/24/2023 6:55:19 PM


Chapter 7 • Web Application with Database

UT24CB_G8.indb 107

107

11/24/2023 6:55:21 PM


108

UT24CB_G8.indb 108

11/24/2023 6:55:22 PM


Web Application A web application is a software application that runs on your web browser. Businesses need to exchange information and deliver services remotely. They use web applications to connect with customers conveniently and securely. Common website features like shopping carts, product item search and filtering, instant messaging, and social media news feeds are all web applications in their design.

Some Common Web Applications There are many types of web applications. Here are some of the well-known ones. Workplace Collaboration Web Applications: The web apps allow team members to access documents, shared calendars, business instant messaging services, and other enterprise tools. Ecommerce Web Applications: Ecommerce web apps such as ‘Amazon.com’ enable users to browse, search, and pay for products online. Email Web Applications: Webmail apps are widely used by enterprises and personal users to access their emails. They often include other communication tools such as instant messaging and video meetings. Online Banking Web Applications: Business and personal users widely use online banking web apps to access their accounts and other financial products such as loans and mortgages. Technical Documentation: You can use web applications to create and share technical documentation such as user manuals, how-to guides, and device specifications. Google Office Suite

Microsoft Office 365

Amazon

Pinterest

Netflix

Canva

Spotify

WhatsApp

Uber

Zoom

Working of Web Applications Web applications work on client-server architecture. Their code is divided into two components: client-side scripts and server-side scripts. Let us learn more about these.

Client-side Architecture The client-side script deals with user interface functionalities like buttons and drop-down boxes. When an end user clicks a web app link, the web browser loads the client-side script and renders the graphic elements and text for user interaction. It is called front end of an application. For example, a user can read content, watch videos, or fill in details on a contact form. Actions such as clicking a Submit button go to the server as a client request. Chapter 7 • Web Application with Database

UT24CB_G8.indb 109

109

11/24/2023 6:55:24 PM


Server-side Architecture The server-side means everything that happens on the server. Server-side code is often written in languages such as Python, Java, or JavaScript (Node.js) and is executed on the server. It is called the back end of an application. For example, large-scale services like Facebook, Amazon, and Netflix rely on server-side architecture to efficiently handle millions of user requests, process data, and deliver content.

Collect Data

Request

Display Results

Response

Users

What the User Sees and Interacts with HTML, CSS, JavaScript

Front End

Contains App Logic PHP, JavaScript, Python, Java

Web Server

File System HTML, CSS, Images

Database MySQL, PostgreSQL, MariaDB

Back End

So, let us discuss front end and back end to understand their relationship clearly. Front End

Back End

1. The front end of a web application is the part that users directly see and interact with.

1. The back end of a web application collects data from its front end.

2. It includes the user interface (UI) elements, design, and presentation layer.

2. It is responsible for handling data storage, retrieval, and the application’s core logic.

3. In Python web development, popular front end frameworks like Flask or Django are often used to create the user interface and render dynamic web pages based on user input and data from the back end.

3. In the context of MySQL, the back end can involve creating a database schema, establishing a connection to the MySQL server, and performing CRUD (Create, Read, Update, and Delete) operations on the data.

In this chapter, we will explore the process by which web applications send and receive information. Let us now create a web application using the front end and back end. For this, the following are required:

110

UT24CB_G8.indb 110

11/24/2023 6:55:25 PM


Front end

Point of Contact—Your Website

Data

Data

Interface Content

Design

Content

Administrators • Staff • Executives • Contractors

Data

Content

Web User • Customers • Suppliers • General Public

Back end

Behind The Scenes—IgnitionWeb This is How You Control Your Site

Programming

MySQL Server MySQL server provides a database management system (DBMS) with querying and connectivity capabilities, as well as the ability to have excellent data structure and integration with various platforms. This DBMS can handle large databases reliably and quickly in high-demand production environments. MySQL server also has features such as connectivity, speed, and security that make it suitable for accessing databases. Let us understand it through an example. Imagine that you are the owner of an online store that sells various products. To efficiently manage your business, you use MySQL as your database system. Here’s how MySQL is applied in this scenario: 1. Database creation: In MySQL, you create a database named ‘OnlineStore’ to store all your business data. 2. Tables: In the OnlineStore database, you create tables to represent various aspects of your business. For example:   

Products table to store product details such as name, price, and availability Customer table to store customer information Orders table to track customer orders

3. Data insertion: Insert data into these tables. For instance, add product listings, customer profiles, and order records. 4. Querying: MySQL allows you to perform queries to retrieve specific information. You can:   

Retrieve a list of all products in stock.

Find out which customers have made the most orders. Calculate the total revenue for a specific period.

5. Updating and managing data: You can easily update product prices, customer details, and order statuses as your business evolves.

Chapter 7 • Web Application with Database

UT24CB_G8.indb 111

111

11/24/2023 6:55:25 PM


6. Security: MySQL provides user authentication and authorisation features, ensuring that only authorised personnel can access and modify data. 7. Scalability: As your online store grows, MySQL allows you to scale your database infrastructure to handle increased traffic and data. In this real-life example, MySQL serves as the backbone of your online business, helping you store, manage, and retrieve data effectively, which is crucial for running a successful e-commerce operation.

Do It Yourself 7A 1

Create a table Student in the School database. Each row represents a student, and each column represents a piece of information (name, age, grade, and favourite subject).

2

Insert the student information into the database.

Python Python is a programming language that helps communicate with database easily. Python is commonly used to build both the front end and back end of web applications. The front end focuses on the user interface and presentation, whereas the back end handles data management, including interactions with a MySQL server for data storage and retrieval. The relationship between Python and a MySQL server is like a conversation between two friends: 1. Python as the speaker: Python is like a friend who wants to communicate and share information. 2. MySQL Server as the listener: MySQL Server is like a friend who listens carefully and stores information. My SQL specialises in storing and managing data efficiently. Here is how their conversation works: Python speaks to MySQL Server by sending messages (commands) in a language that both understand. MySQL server listens, processes Python’s requests, and stores data securely, like a note-taker who jots down important information. When Python needs information (data), it asks MySQL Server, and MySQL Server responds with the requested data. They continue this friendly exchange, allowing Python to access, manage, and update data stored on MySQL Server, just like friends sharing and updating their notes. Let us create a small web application using HTML. You need a database, which we will create using MySQL. Then, a Python script will be used to connect the HTML form to the database. The idea of the project is as follows:

Think and Tell

Who invented Python, and what was the motivation behind its creation?

112

UT24CB_G8.indb 112

11/24/2023 6:55:25 PM


Working of a Web Application 1. An HTML form is created. 2. The HTML form collects the information. 3. The Python script ‘app1.py’ uses Flask to handle form submissions. 4. Using SQL queries, form data is inserted into the MySQL database. 5. The Python script uses the mysql.connector library to connect the form to a MySQL database. 6. When the form is submitted, the data is inserted into a table. To connect an HTML form to a MySQL database using Python: Step 1: Install Flask and MySQL connector.

Ensure that you install Flask and the MySQL Connector Python library by executing the following commands on the prompt: pip install Flask pip install Flask mysql-connector-python Step 2: Create MySQL database and table.

We need to create MySQL database webapp and then the item table to store user information. To create and use the webapp database: mysql> create database webapp; mysql> use webapp; To create the item table: mysql> create table item (id int not null primary key, name varchar(15)); Step 3: Insert values in the table. mysql> insert into item

values (1001, ‘Item 1’); Step 4: View records from the table. mysql> select * from item;

Step 5: Create a Python script to handle form submission

To write the Python code, you need to install the necessary Python packages, including a MySQL connector library such as mysql-connector-python or pymysql.

Think and Tell

What is the purpose of the <html> tag in an HTML document for the formation of a web app?

Chapter 7 • Web Application with Database

UT24CB_G8.indb 113

113

11/24/2023 6:55:26 PM


Code # import all libraries here from flask import Flask, render_template, request, redirect, url_for, session from flask_mysqldb import MySQL import MySQLdb.cursors # MySQL Configuration db = mysql.connector.connect( host=”localhost”, user=”root”, password=””, database=”webapp” ) cursor = db.cursor() cursor.execute(“SELECT id, name FROM item”) items = cursor.fetchall() cursor.close() item_name = request.form[‘item_name’] cursor = db.cursor() cursor.execute(“INSERT INTO item (name) VALUES (%s)”, (item_name,)) db.commit() cursor.close() Step 6: Create the HTML form ‘index.html’. HTML is a programming language used to define the structure and content of web pages. To create a form with the fields that you will use to collect data, create the ‘index.html’ file in the ‘templates1’ directory. Code <!DOCTYPE html> <html> <head> <title>Simple Web App</title> </head> <body> <h1>Items</h1> <ul> {% for item in items %} <li>{{ item[1] }}</li> {% endfor %} </ul> <h2>Add Item</h2> <form method=”POST” action=”/add”> <input type=”text” name=”item_name” required> <button type=”submit”>Add</button> </form> </body> </html>

Output

Items {% for item in items %}  {{ item[1] }} {% endfor %}

Add Item

114

UT24CB_G8.indb 114

11/24/2023 6:55:26 PM


Did You Know? The first web application was created by Tim Berners-Lee in 1991. Tim Berners-Lee, a British computer scientist, developed the World Wide Web (WWW) while working at CERN, the European Organisation for Nuclear Research.

Step 7: Run the application. 1. Run the Python script. 2. Extract the data submitted through the form, using the request object (Flask or Django) or the CGI library. 3. Access the HTML form from your web browser by navigating to http://localhost:5000/. You can type the information and submit it to store it in the MySQL database. Step 8: Close the database connection. >>> mysql.connection.commit()

Step 9: Run the HTML web application. 1. Open the HTML file in the web browser. 2. Type the name of the item in the text box on the form. 3. Click Add. 4. Check the table using the Select * from item query in MySQL. 5. You can observe the newly added item in your table.

Do It Yourself 7B Use HTML to create a form related to library information. Type the name of your favourite book in the form and save the entry in the library database.

Points to Remember 1

A web application is a software application that runs on your web browser. There are many web applications available, such as ecommerce, online banking, email, workplace collaboration, etc.

2

Web applications work on client-server architecture. Their code is divided into two components: client-side scripts and server-side scripts.

3

The client-side script deals with user interface functionalities like buttons and drop-down boxes.

4

Server-side code is often written in languages such as Python, Java, or JavaScript (Node.js) and is executed on the server.

Chapter 7 • Web Application with Database

UT24CB_G8.indb 115

115

11/24/2023 6:55:26 PM


5

MySQL server provides a database management system (DBMS) with querying and connectivity capabilities.

6

Python is a programming language that helps communicate with database easily.

Chapter Checkup A. Fill in the Blanks. Hints 1

server-side

A

MySQL

client-side

HTML

is a software application that runs on your web browser.

2 3

web application

is used to collect information. The

script deals with user interface functionalities like buttons and drop-down boxes.

4

code is often written in languages such as Python, Java, or JavaScript.

5

can handle large databases reliably and quickly in high-demand production environments.

B. Tick () the Correct Option. 1

2

3

4

5

Business and personal users widely use online

web apps to access their accounts.

a

Banking

b

Fitness

c

Business

d

Shopping

On which architecture do the web apps work?

a

Server-side

b

Client-server

c

Client-side

d

None of these

Server-side architecture of a web application is also known as its

.

a

Server-end

b

Client-end

c

Back end

d

Front end

Which server has features such as connectivity, speed, and security that make it suitable for accessing databases?

a

YourSQL

b

Free-SQL

c

MySQL

d

MyServer

Which programming language is commonly used to build both the front end and back end of web applications?

a

Fortran

b

C Language

c

D Language

d

Python

116

UT24CB_G8.indb 116

11/24/2023 6:55:27 PM


C. Who Am I? 1

I am a type of web app that enables users to browse, search, and pay for products online.

2

I am a server that provides a database management system (DBMS) with querying and connectivity capabilities.

3

I am a management system that can handle large databases reliably and quickly in high-demand production environments.

4

I am a component of the web app that includes the user interface (UI) elements, design, and presentation layer.

5

I am a type of database management system that stores data in a structured format using tables. I am known for my reliability and ease of use.

D. Write T for True and F for False. 1

Python is a programming language commonly used for web development.

2

MySQL is a type of database management system used to store data for web applications.

3

HTML is a language used to define the structure and content of web pages.

4

In web development, CSS is primarily used for database management.

5

MySQL has the ability to have excellent data structure and integration with various platforms.

E. Answer the Following. 1

What is a web application?

2

Differentiate between front end and back end applications.

3

What are some common web applications?

4

How do web applications work?

Chapter 7 • Web Application with Database

UT24CB_G8.indb 117

117

11/24/2023 6:55:27 PM


5

How does the choice of database technology impact on the performance and scalability of a modern web applications?

F. Apply Your Learning. 1

Create a simple HTML form that collects a user’s name and email address. Implement validation to ensure that both fields are filled before submission.

2

Design an HTML form for the registration page of a website. Include fields for user name, password, email, and a drop-down menu for selecting the user’s country. Ensure that the password input is masked for security.

3

Develop an HTML form that allows users to upload an image file. Implement a file type validation to accept only image files (e.g., .jpg, .png). Upon submission, display the uploaded image on the same page.

4

Build an HTML form with a check box group for selecting multiple programming languages. When the user selects languages and submits the form, display a message listing the chosen languages.

5

Create a contact form with fields for name, email, subject, and a text area for the message. On submission, validate that the email is in the correct format and that the message is not empty. If the validation passes, send form data to a server using an appropriate HTTP method (e.g., POST).

118

UT24CB_G8.indb 118

11/24/2023 6:55:27 PM


Chapter 7 • Web Application with Database

UT24CB_G8.indb 119

119

11/24/2023 6:55:29 PM


120

UT24CB_G8.indb 120

11/24/2023 6:55:30 PM


Chapter 8 • Creating Videos with Canva

UT24CB_G8.indb 121

121

11/24/2023 6:55:31 PM


122

UT24CB_G8.indb 122

11/24/2023 6:55:33 PM


Chapter 8 • Creating Videos with Canva

UT24CB_G8.indb 123

123

11/24/2023 6:55:34 PM


Creating a Blank Video in Canva Welcome to the exciting world of video creation with Canva! In this chapter, you will discover how we can make videos with the help of Canva, which is an amazing tool for creating videos. Let us start a video project from scratch. Steps to create a blank video in Canva: 1. Log in to www.canva.com and create an account if you do not have one. 2. Click on the Create a design button on the home page. 3. A drop-down list of options will appear. 4. Click on the Video option.

Did You Know? You can also click on the Video icon

on the home page and select from the various options.

124

UT24CB_G8.indb 124

11/24/2023 6:55:34 PM


5. A blank video will be created, and the following window will appear:

6 7 1 8

12

9 10 11

2

3

4

5

Components of Video Editor in Canva 1. Canvas: The canvas is your workspace, where you build and design your video. It’s where you add and arrange all the elements of your video project, including text, images, videos, and audio. 2. Timeline: The timeline is a critical component that allows you to control the timing of your video. You can arrange elements on the timeline to determine when they appear and for how long. It helps you arrange objects like text, images, and videos in the desired sequence. 3. Zoom controls: Canva offers zoom controls that allow you to zoom in and out of your canvas. This feature helps you focus on specific details while working on your video. 4. Grid view: Grid view provides an overview of all the pages in your video project, helping you visualise the structure and flow of your video. It is a useful tool for organising your content effectively. 5. Preview: The Preview option allows you to see how your video will appear to your audience. It is a valuable tool for reviewing your video before finalising it, ensuring everything looks and sounds just right. 6. Elements: The Elements option offers a wide range of design elements, including photos, videos, stickers, shapes, and icons. You can search and browse for elements to enhance the visual appeal of your video project. 7. Text tool: Canva’s Text tool enables you to add text to your video. You can choose from various fonts, colours, sizes, and styles to customise your text elements. This is essential for creating titles, captions, and on-screen messages. 8. Uploads: This feature allows you to upload your own media files, such as images, videos, and audio clips, to incorporate them into your video project. It is a way to personalise your content and add unique elements. 9. Draw: You can draw any shape in your video by using the tools present under this drawer. Chapter 8 • Creating Videos with Canva

UT24CB_G8.indb 125

125

11/24/2023 6:55:35 PM


10. Projects: You can view all your projects that you have created up to now under this option. You can select any one of them to work upon. 11. Notes: You can add notes to your project to keep track of ideas, reminders, or specific instructions. Notes are useful for collaborating with others on your video project. 12. Canva assistant: This is a very interesting artificial intelligence tool that helps you with your queries during the project. You can ask any query by clicking on the Canva Assistant button.

Adding Background Adding background is the initial step in creating any video. It creates a base for all elements inside the video. Steps to add background in Canva: 1. Click on the Elements option in the side bar.

2. Type "environment" in the Search bar displayed at the top and press Enter. The backgrounds related to environment are displayed.

126

UT24CB_G8.indb 126

11/24/2023 6:55:35 PM


3. Click on the background to add it to your blank video.

4. Adjust the size of the image as you want it to be.

5. The background will be added to your video.

Adding Text Adding text in Canva is like writing words on your video to explain or highlight something. Steps to add text in the video: 1. Click text: On the left side bar, click Text.

Chapter 8 • Creating Videos with Canva

UT24CB_G8.indb 127

127

11/24/2023 6:55:36 PM


2. Choose a text style: Pick a text style you like by clicking on it. 3. Add text: Click on the text box that appears in the video and start typing according to your video project.

4. Edit text: You can change the font, size, colour, and more by clicking on the text box.

5. Position text: Drag the text to where you want it in your video. 128

UT24CB_G8.indb 128

11/24/2023 6:55:36 PM


Adding Photos You can add more pictures in your video as you want to make it interesting and informative. Steps to add photos in the video: 1. Click Elements: On the left, click Elements.

2. Choose Graphics: Under Elements, scroll down and select Graphics to find graphics for your video project.

Chapter 8 • Creating Videos with Canva

UT24CB_G8.indb 129

129

11/24/2023 6:55:36 PM


3. Search and select the graphic: Search for the graphic that you want in your video and click on it to add it to the video.

4. Move and resize: Drag the photo to where you want it and adjust the size as needed.

5. Customise: If you want, you can make the photo look different by cropping, changing colours, or adding filters.

For instance, this is the video after dragging and resizing. You can change it according to your needs. 130

UT24CB_G8.indb 130

11/24/2023 6:55:37 PM


You can also flip the added picture horizontally as well as vertically, as shown above. 6. Add more photos: Repeat these steps to add more photos to your video.

Adding Videos Adding videos in Canva is similar to including moving clips in your video project to make it more vibrant and engaging. Steps to add videos to your video project in Canva: 1. Click Elements: On the left, click Elements.

Chapter 8 • Creating Videos with Canva

UT24CB_G8.indb 131

131

11/24/2023 6:55:37 PM


2. Choose Videos: Under Elements, select Videos.

3. Select a video: Click on a video you like, and it will appear in your project.

4. Add page: You can also add a new page and then add the video on that page.

132

UT24CB_G8.indb 132

11/24/2023 6:55:37 PM


5. Adding the video: Now you can select any video according to your video project.

6. Resize it: You can resize it from the ends of the video to fit it according to the dimensions.

Do It Yourself 8A Write T for True and F for False.

1

You cannot add a new page into your Canva video.

2

You can make the photo look different by cropping, changing colours, or adding filters.

3

Canva Assistant is artifical intelligence enabled.

Adding Audio Adding audio in Canva means putting sound, like music or talking, into your video to make it more exciting. 1. Click Elements: On the left, click Elements. Chapter 8 • Creating Videos with Canva

UT24CB_G8.indb 133

133

11/24/2023 6:55:38 PM


2. Choose Audio: Under Elements, select Audio.

3. Select an audio: Click on an audio you like, and it will be added to your project.

4. Position the audio: Drag the audio to where you want it in your video. 5. Adjust volume: You can make the audio louder or quieter if needed.

134

UT24CB_G8.indb 134

11/24/2023 6:55:38 PM


6. Preview your video: Click on the video to hear how it sounds in your project.

Adding and Moving Pages Adding and moving pages in Canva is like organising your video project into different parts and deciding where each part goes. Here’s how to do it: Steps to add and move pages in Canva: 1. In your video’s timeline (the part at the bottom of your project), hold the cursor in the gap between two pages for a moment, and the Add page option will be visible to you.

Chapter 8 • Creating Videos with Canva

UT24CB_G8.indb 135

135

11/24/2023 6:55:38 PM


2. Add a page: Click on Add page to create a new page in your video project. It’s like adding a new scene.

3. Arrange pages: You can click and drag the pages to change their order. Move them up or down to change how your video flows.

4. Edit each page: Click on a page to edit what’s on it, like text, images, or videos.

Splitting Audio

Discuss!

What are the different types of audio effects you can use in Canva?

Splitting audio in a video project in Canva is like cutting a sound into smaller parts to use them at different times. Here’s how you can do it: Steps to split audio in Canva: 1. Click on the audio: Find the audio you want to split on your video’s timeline (the part at the bottom of your project) and then right-click on it. You will find a Split audio option.

136

UT24CB_G8.indb 136

11/24/2023 6:55:38 PM


2. Click Split audio: Click on the Split audio option, and your audio will split into two parts at that point.

3. Drag and adjust: You can now drag and adjust the two audio pieces separately on the timeline.

Arranging Objects in Timeline Arranging objects in the timeline of a video project in Canva is like organising the order of things in your video. Here is how you can do it. Steps to arrange objects in the timeline in Canva: 1. Access the timeline: Look for the timeline at the bottom of your video project. It shows all the elements in your video.

2. Select an object: Click on an object, like text, an image, or video, in the timeline that you want to move. 3. Drag and drop: Click and drag the selected object to a new position in the timeline. This changes when it appears in your video. 4. Arrange all objects: Repeat steps 3 and 4 for each object until they are in the order you want.

Chapter 8 • Creating Videos with Canva

UT24CB_G8.indb 137

137

11/24/2023 6:55:39 PM


Setting Audio Volume and Effects Setting audio effects and volume in a video project in Canva is like making the sound in your video more interesting and easier to hear. Here’s how you can do it: Steps to set audio volume and effects in Canva: 1. Access the audio: Find the audio you want to adjust on the timeline (the part at the bottom of your project). 2. Select the audio: Click on the audio to select it. 3. Adjust volume: Right-click on the audio and you can see a Volume option. Click on it and move the slider to make the audio louder or softer. 4. Apply effects: If you want to add effects, like making it sound like an echo or changing the pitch, find the audio effects options and apply them as needed.

Either you can right-click on the audio to find the “audio effects” or you can just click on the audio and you will find Audio effects option on the top of your canvas.

138

UT24CB_G8.indb 138

11/24/2023 6:55:39 PM


5. Preview: Click the audio to hear how it sounds with the changes you made.

Adding Notes Adding notes in a video project in Canva is like leaving reminders or comments for yourself or others while working on your project. Here’s how you can do it. Steps to add notes in Canva: 1. Find notes: Either you can select the page in the video timeline and right-click on it where you want your notes to be. or You can just click on the timeline where you want the notes, and you can see a Notes option at the bottom of the video timeline.

Chapter 8 • Creating Videos with Canva

UT24CB_G8.indb 139

139

11/24/2023 6:55:39 PM


2. Add a note: Click on Notes. 3. Write your note: A box will appear where you can type your note. Write down any ideas, reminders, or comments you have. 4. View your notes: You can usually see your notes in the Notes section whenever you need to refer to them.

Discuss!

How can adding notes in Canva assist in collaboration with others when working on a video project?

Zoom In and Out Pages and Thumbnails Zooming in and out of pages and thumbnails in a video project in Canva is like getting a closer or wider view of your work to see details or the big picture. Steps to zoom in and out pages and thumbnails in Canva: 1. Look for zoom controls: You can find zoom controls below the video timeline. 140

UT24CB_G8.indb 140

11/24/2023 6:55:39 PM


2. Zoom in and out pages: You can drag right or left to zoom in and zoom out the pages.

3. Zoom in and out thumbnails: To change the Zoom controls of the page to thumbnails, you have to click on the icon

you find below the video timeline and before the zoom control slide bar. After

clicking, it will be changed to a different icon . Now you can zoom the thumbnails. You can drag right or left to zoom in and zoom out in the thumbnails.

4. Adjust as needed: You can adjust them as you want to see the wider or closer look of your work.

Grid View and Preview Grid view and preview in a video project in Canva to help you see your work differently and check how it will appear to others. Grid view: Grid view is like looking at all the pages of your video project at once, like a grid of small pictures. It helps you organise and see the structure of your project.

Chapter 8 • Creating Videos with Canva

UT24CB_G8.indb 141

141

11/24/2023 6:55:40 PM


Steps to access grid view: 1. In your video project, look for an option that says “Grid View” or an icon that looks like a grid of squares. You will find it below the video timeline.

2. Click it to switch to grid view. Preview:

Preview lets you watch your video to see what it will look like and sound to your audience before you finish it. Steps to preview your video: 1. In your video project, find a button or option that says Preview or Play. You will find it below the video timeline bar.

2. Click it to watch your video. Using grid view helps you organise your project, while preview helps you check how your video will turn out. Both are important for creating a great video in Canva!

142

UT24CB_G8.indb 142

11/24/2023 6:55:40 PM


Downloading and Sharing Videos Downloading and sharing a video in Canva means saving your video project to your computer or sharing it with others. Here’s how to do it: Steps to download and share a video in Canva: 1. Click Share option: You can find the Share option on the top right corner of the canvas. Click on it. 2. Click Download: When you click on the Share option, you will find the Download option.

3. Choose File type: Click on it and choose the format you want, like MP4 or MOV. 4. Select Quality: Pick the quality you prefer, such as HD or standard.

5. Click Download: Finally, click the Download button to save your video to your computer.

Chapter 8 • Creating Videos with Canva

UT24CB_G8.indb 143

143

11/24/2023 6:55:40 PM


6. Click Share: Find a button or option that says Share. It is located at the top right corner of the canvas. 7. Choose share settings: Set the sharing options, like who can see your video and if they can edit it.

8. Copy Link: Click to get a shareable link or choose how you want to share it, like through email or social media. Downloading lets you save your video, while sharing helps you show it to others or collaborate on it. It’s a great way to get your video out there!

Think and Tell

Think about the Canva feature you like the most (for example, adding photos, splitting audio, or using text). Tell your friends why you find it interesting.

Do It Yourself 8B Write the names of the following icons of Canva:

144

UT24CB_G8.indb 144

11/24/2023 6:55:40 PM


Points to Remember 1

You can create, modify, and share interesting videos using Canva.

2

Key components of Canva’s video editor include the canvas, timeline, text, elements, uploads, and audio controls.

3

You can add text in your video to express your thoughts along with the video.

4

You can add pictures in your video in Canva to enhance the presentation of the video.

5

Adding videos in Canva brings motion to your project, with options to resize and preview.

6

You can insert audio in Canva for background music, sound effects, or voiceovers, with volume control.

7

You can organise your project by adding and moving pages, changing their order as needed.

8

You can split audio in Canva to cut and arrange sound clips for precise timing.

9

You can arrange objects in the timeline to control the order of text, images, and videos.

10 You can adjust audio effects and volume, add notes, and use zoom controls for detailed work.

Chapter Checkup A. Fill in the Blanks. Hints

styles

audio

sequence

pages

preview

1

The key components of the Canva video editor include the canvas, timeline, text tool, elements, uploads, and controls.

2

To add text to your video in Canva, you can choose from various fonts, colours, sizes, and

3

When adding videos to your project, you can position, resize, and

4

The timeline in Canva helps you arrange objects like text, images, and videos in the desired .

5

The grid view in Canva provides an overview of all the

. them as needed.

in your project.

B. Tick () the Correct Option. 1

2

What is the purpose of adding photos in Canva?

a Creating audio effect

b Enhancing visuals

c Adding text

d Adding pages

What can you add using the text tool in Canva?

a Images

b Videos

c Audio

d Text

Chapter 8 • Creating Videos with Canva

UT24CB_G8.indb 145

145

11/24/2023 6:55:41 PM


3

What is the purpose of “Grid View” in Canva video editor?

a To add text to the video

b To arrange elements on

c To see an overview of all the

d To apply audio effects

pages in the video project

4

5

the timeline

Which component of the Video Editor in Canva allows you to control the timing of your video?

a Canvas

b Timeline

c Text Tool

d Grid View

What can you add to your video in Canva to create background music or voiceovers?

a Elements

b Text

c Audio

d Canvas

C. Who Am I? 1

I help you get a closer or wider view of your work in Canva, allowing you to focus on specific details or see the big picture.

2

I enable you to upload your own media files, such as images, videos, and audio clips, to personalise your video project.

3

I am the workspace in Canva where you create and design your video project from scratch.

4

I am a feature in Canva that allows you to leave reminders or comments for yourself or collaborators during your video project.

5

I am the feature in Canva that allows you to watch your video to see what it will look like and sound to your audience.

D. Write T for True and F for False. 1

This icon is for grid view.

2

You cannot download your video project in Canva.

3

Adding and moving pages in Canva has no impact on organising your video project or changing the order of elements.

4

Splitting audio in a video project in Canva is like cutting a sound into smaller parts to use them at different times.

5

You cannot add more than one video to your video project in Canva.

E. Answer the Following. 1

What is the use of the Draw tab in Canva?

146

UT24CB_G8.indb 146

11/24/2023 6:55:41 PM


2

What do you mean by downloading a video in Canva?

3

What is Canva Assistant?

4

How can you share your video?

5

How can you adjust the audio volume in Canva’s video editor?

F. Apply Your Learning. 1

Rahul wants to add text to his Canva video. How can he customise the text elements to create engaging titles and captions?

2

Neha is enhancing her Canva video by adding photos. What are the steps she should follow to resize the video clips effectively?

3

Vikram is arranging objects in the timeline to control their appearance. Why is the timeline useful for this, and how can he rearrange objects?

4

Kavita wants to make her Canva video more exciting with background music. How can she add effects, like making it sound like an echo or changing the pitch?

5

Arjun is including videos in his Canva project to make it dynamic. How can he position and resize the video clips effectively?

Chapter 8 • Creating Videos with Canva

UT24CB_G8.indb 147

147

11/24/2023 6:55:41 PM


148

UT24CB_G8.indb 148

11/24/2023 6:55:43 PM


149

UT24CB_G8.indb 149

11/24/2023 6:55:43 PM


Artificial Intelligence (AI) Have you ever talked to your phone or a smart speaker to get information or set reminders? Or when you watch a video on YouTube or a show on Netflix, have you noticed how they recommend other videos or shows you might like? Yes! There is a technology behind all of this called Artificial Intelligence. AI is all around us, making our lives more convenient and efficient. It is a rapidly growing field with endless possibilities, from voice assistants in our smartphones to self-driving cars and even in healthcare. A robot is capable of recognising voices, playing games, and even doing household chores. Let us learn more about artificial intelligence in this chapter. Artificial intelligence is the process of giving a computer the capability to think, learn, and make decisions, just like humans do.

Did You Know?

John McCarthy was an American computer scientist who coined the term “Artificial Intelligence” in 1956.

Applications of AI From enterprise to home, AI technology has not only helped people but also opened the door to the entire human being by bringing new business opportunities for small as well as large companies. For example, Uber became a billion-dollar company just by using the technology through which riders are connected to the taxis. Let us discuss more about the usage of AI in our daily lives. Chatbots: AI-powered chatbots in education can assist both students and teachers with various tasks, such as preparing study material, doing school work, answering questions, etc. They also help in the customer service industry. Recommendation Systems: AI can suggest books, movies, or music based on users’ tastes. It learns from their preferences. Voice Assistants: AI is used in voice assistants like Siri or Alexa to recognise and carry out spoken orders. They can play music, answer queries, store schedules, and set alarms. Image Recognition: AI can identify objects in pictures. For example, it can help to sort photos or even recognise animals and plants on the basis of their facial features. This technique is also used in object recognition. Language Translation: AI has the ability to translate languages, making it simpler to communicate with individuals throughout the world. Game Development: AI can be used in game development to generate non-player characters who act intelligently, increasing the difficulty level of the game. 150

UT24CB_G8.indb 150

11/24/2023 6:55:45 PM


Medical Diagnosis: AI helps doctors analyse medical images like X-rays and MRIs to detect diseases.

Autonomous Vehicles: Self-driving cars use AI to navigate and make decisions, like avoiding obstacles.

Predicting Weather: Artificial intelligence analyses data to improve the accuracy of weather forecasts. Agriculture: Artificial Intelligence assists farmers in optimising their crop production by making use of drones. It ensures efficient water usage for plants and aids in the early detection and control of pests, resulting in increased food production and environmental benefits.

Virtual Reality (VR) and Augmented Reality (AR): Artificial intelligence improves virtual reality (VR) and augmented reality (AR) experiences by allowing virtual objects to interact with the real environment. These are just a few examples of how AI is applied in our daily lives. Recently, India landed successfully on the Moon due to this amazing technology.

Think and Tell

How has artificial intelligence helped India in the Chandrayan-3 mission?

Do It Yourself 9A Match the following. Healthcare

Using drones to monitor crop health

Customer service

Self-driving cars and traffic management

Transportation

Helping doctors diagnose diseases

Agriculture

Chatbots answering questions on website

Chapter 9 • AI—Natural Language Processing

UT24CB_G8.indb 151

151

11/24/2023 6:55:48 PM


Types of Artificial Intelligence Artificial intelligence is used in a variety of applications, either at home, in offices, or elsewhere. A general question might come to your mind: can one type of AI be able to handle this wide range of applications? Certainly not. Based on its functionality and capability, AI is divided into different categories: 

Narrow AI

General AI

Super AI Narrow Dedicated for AI one task

General Perform like AI human

Super AI

More intelligent than human

Narrow AI (Artificial Narrow Intelligence or ANI) Imagine you have a robot vacuum cleaner at home. It cleans your house with utmost accuracy. It even cleans up in your absence. It can move around the house with the help of its sensors and avoid any types of obstacles. But apart from cleaning, it does not know how to do anything else. It cannot make you a sandwich, it cannot drive a car, and it cannot even tell you a joke. This is an example of a weak AI. Narrow AI, also known as Weak AI, is good at doing one specific task, but it does not understand or think like humans do. Voice assistants such as Alexa, Apple Siri, and Google Assistant are all examples of narrow artificial intelligence because they only do a small set of predefined tasks. Narrow AI includes playing chess, getting suggestions for goods on an e-commerce site, speech recognition, and image identification.

Explore More! Scan this QR code to watch the robots at restaurants.

General AI (Artificial General Intelligence or AGI) General AI, also known as Artificial General Intelligence or AGI, is like a super-smart computer that can learn, understand, and do many different tasks just like human beings. This kind of machine intelligence is not limited to a single task, like a voice assistant or a robot vacuum cleaner, but it can do all sorts of things, from solving problems to talking and learning new things on its own. It is like having a robot friend that can do almost anything you teach it to do! The worldwide researchers are now focused on developing machines with General AI. A self-driving car is an example of general AI.

Explore More! To know how a self-driving car works, scan this QR code.

152

UT24CB_G8.indb 152

11/24/2023 6:55:50 PM


Super Artificial Intelligence (Strong AI) Super AI (Super Artificial Intelligence) is like a super-smart computer program that can think, learn, and solve really complicated problems all on its own. It is far more intelligent than typical computer programs and is even capable of understanding and performing tasks that only humans can do, including making decisions, having conversations, and other activities. Super AI is like a super-brain for computers! Super AI is still an imaginary concept of Artificial Intelligence. It is still a hard effort to develop such systems in the real world.

Did You Know?  Narrow AI is highly specialised and cannot perform tasks outside its designed scope.  Achieving AGI would mean creating machines with human-like cognitive abilities.

Domains of AI The various domains of AI that are working as driving forces for this wide range of applications are used to solve problems, automate tasks, and make predictions. Some key domains of AI are: Computer Vision: With computer vision, computers have the ability to interpret and understand visual information from the world, including images and videos. It is mostly used in facial recognition, object detection, and autonomous vehicles. Machine Learning (ML): Using machine learning, AI-enabled models are created that make computers learn from data, make predictions, and improve their performance over time. It includes sub-domains like supervised learning, unsupervised learning, and reinforcement learning. Natural Language Processing (NLP): The superpower of AI is research NLP, or the ability to understand and communicate with humans in their own languages. It is similar to teaching your robot friend to understand your speech in Spanish, English, or another language. Google Assistant is an app found on smartphones and other devices that is capable of having conversations with people and responding to their questions in a helpful manner. Let us use this concept of NLP to design an app that translates the text written in one language to another.

Did You Know? Can art be produced by AI? Some AI programs can come up with music, artwork, and even poetry!

Chapter 9 • AI—Natural Language Processing

UT24CB_G8.indb 153

153

11/24/2023 6:55:50 PM


Language Translator—App Development In the previous class, you created an app using MIT App Inventor that is capable of recognising text and converting it into speech. Let us now create another app that can translate the text written in one language to another. Before starting, let us learn what MIT App Inventor is.

MIT App Inventor MIT App Inventor is an online platform for creating apps for mobile phones and tablets. It is a very easy and simple platform to learn app creation and coding. This platform focuses on making everyone, especially young children, create their own apps. No coding skill is required to build your own app using MIT App Inventor. Apps are software programs that can be downloaded and installed on electronic devices. MIT app inventor can be accessed from the link: https://appinventor.mit.edu/ Here, you will learn the easy steps to design a guide app that will convert text to speech and translate languages from English to Spanish. Step 1: Set Up MIT App Inventor

1. Go to the MIT App Inventor website (https://appinventor.mit.edu/). 2. Log in with your Google account. If you do not have one, ask your teacher or parents to help you create one. 3. Click Start new project and give your project a fun name, like “ToggleTutorial”.

Step 2: Design your app

1. You will see a screen where you can design your app. This is like drawing a picture. 2. From the left-hand side, drag the following things to the screen: 

Text Box

Label

Translate Button

Translator

Text to Speech

154

UT24CB_G8.indb 154

11/24/2023 6:55:50 PM


3. Arrange these on the screen the way you like. Give them names or change their colours if you want. Step 3: Add Translator component

1. Click on the Palette tab on the left side. 2. Find Translate in the list of components under Media and drag it onto your screen.

Step 4: Make your app translate and talk Now, let the app translate English to Spanish and speak it when you tap the button! 1. Click on the Blocks button to switch to the Blocks Editor window. 2. You will see various blocks that you can use in your app on the left-hand side of your screen. 3. Click on the TextToSpeech button on the left-hand side of the screen. 4. Find the block when TextToSpeech1.BeforeSpeaking and drag it onto the screen.

Chapter 9 • AI—Natural Language Processing

UT24CB_G8.indb 155

155

11/24/2023 6:55:50 PM


5. Next, click on the Translator option and drag out the label call Translator1.Request Translation language To Translate To Text To Translate. 6. Drag this component and place it in front of the do label of when Translate block.

7. Click on Text in the Blocks palette and find an empty component to write the code “en-es”, which are the codes for English-Spanish. 8. Next, click on TextBox1 and drag the TextBox1.Text.

Now, we must add the translation codes: 1. Click on Translator and select when Translator1.GotTranslation. 156

UT24CB_G8.indb 156

11/24/2023 6:55:51 PM


2. From the Label1 button, drag out set Label.Text to block. 3. When you hover your mouse over the Translator1 button, you will be able to see get translation block. Drag it and connect it to the set Label1.Text to block.

Now, let us create the code that will translate and recite our text: 1. Click on the Translate_Button and select the when Translate_Button.Click 2. Next, click the TextToSpeech button and drag out the call TextToSpeech1.Speak and place it in front of the label do. 3. Next, take a blank component from Text and place it in front of the message label. 4. Drag another call TextToSpeech1.Speak block and place it under the previous call TextToSpeech1. Speak block. Now, select the Label1.Text component from under the Label option and place it in front of the message label.

Step 5: Test your app To test your app, you will need a mobile phone. 1. Go to the Google Play Store on your Android phone and download the MIT AI2 Companion App. Chapter 9 • AI—Natural Language Processing

UT24CB_G8.indb 157

157

11/24/2023 6:55:51 PM


2. Install the app by clicking on Install. 3. After installation, open the app. You have to provide a six-character code to connect. 4. Now, to get the code, go to your computer where you have created your app. 5. Go to the Connect menu and select the AI Companion option. 6. A Connect to Companion window will open with a six-character code.

7. You can now fill this six-character code in the mobile phone app. 8. The app will now open on your mobile. 9. Click on the button that you have created. 10. Your app is now ready. You have created a simple translation app to convert Text-to-Speech and do language translation from English to Spanish using MIT App Inventor. 11. Type something in English in your app, click the button, and see and hear it in Spanish!

Discuss

Problems or causes that affect your education, and how you can use the technology or build an app to solve it.

Explore More!

To know more about MIT App Inventor, scan this QR code.

Did You Know? MIT App Inventor was initially developed by Google and later released as an open-source project.

158

UT24CB_G8.indb 158

11/24/2023 6:55:52 PM


Explore More!

To know how Text Sentiment Analysis is done by using AI, scan this QR code.

Do It Yourself 9B Tick () odd one out.

1

2 1

3

4 1

Points to Remember 1

Artificial intelligence is the process of giving a computer the capability to think, learn, and make decisions, just like humans do.

2

AI is used in voice assistants like Siri or Alexa to recognise and carry out spoken orders.

3

YouTube and Netflix recommend other videos or shows you might like based on your past preferences.

4

Weak AI, also known as Narrow AI, is good at doing one specific task, but it does not understand or think like humans do.

5

General AI, also known as Artificial General Intelligence or AGI, is like a super-smart computer that can learn, understand, and do many different tasks just like human beings.

6

Super AI (Super Artificial Intelligence) is like a super-smart computer program that can think, learn, and solve really complicated problems all on its own.

7

The three domains of AI are machine learning, computer vision, and natural language processing.

8

MIT App Inventor is an online platform for creating apps for mobile phones and tablets.

Chapter 9 • AI—Natural Language Processing

UT24CB_G8.indb 159

159

11/24/2023 6:55:54 PM


Chapter Checkup A. Fill in the Blanks. Hints

assistants

1

in education can assist both students and teachers with various tasks.

AI-powered

2 3

chatbots

weak

strong

recommendation

systems learn from your preferences. Voice

can play music, answer queries, store schedules, and set alarms.

4

AI is good at doing one specific task.

5

AI is still an imaginary concept of artificial intelligence.

B. Tick () the Correct Option. 1

2

3

4

5

Voice assistants such as Alexa and Siri are examples of narrow artificial intelligence because:

a They can perform any task that you ask them to do.

b They only do a small set of

c They can think on their own.

d They have very narrow thinking.

pre-defined tasks.

Which of the following does not represent an application of AI?

a A chatbot

b Autonomous vehicles

c Microwaves

d Voice assistants

What is the primary purpose of a recommendation system in AI?

a To send spam emails

b To suggest products or content

c To play video games

d To control traffic lights

based on user preferences

Which domain of AI focuses on creating machines that can think and reason like humans?

a Machine Learning

b Natural Language Processing

c Robotics

d Cognitive Computing

A self-driving car is an example of

AI.

a Weak

b Strong

c Narrow

d General

C. Who Am I? 1

I am a type of AI that allows computers to understand and translate human language.

2

I am an application of AI that can help sort photos or even recognise animals and plants on the basis of their facial features.

3

I am in the domain of AI, using which AI-enabled models are created to make computers learn from data.

160

UT24CB_G8.indb 160

11/24/2023 6:55:55 PM


4

I am a type of AI that will make machines think on their own and take decisions in really complicated situations.

5

I am an intelligent flying machine that helps farmers in agriculture.

D. Write T for True and F for False. 1

AI machines cannot think on their own.

2

Artificial intelligence analyses data to improve the accuracy of weather forecasts.

3

Any language can be easily understood and spoken by AI.

4

AI has improved AR and VR experiences by allowing virtual objects to interact with the real environment.

5

AI machines can perform only one type of specific task.

E. Answer the Following. 1

What is artificial intelligence? Write its two applications.

2

What is the difference between weak AI and strong AI?

3

What is general AI? Give one example.

4

What is MIT app inventor?

5

Is it possible to have strong AI machines? Why/why not?

F. Apply Your Learning. 1

Ankita is learning AI. Tell her the names of different domains of AI.

Chapter 9 • AI—Natural Language Processing

UT24CB_G8.indb 161

161

11/24/2023 6:55:55 PM


2

Sahil does not know how AI is used in everyday life. Can you tell him?

3

Diya wants to know about an exciting future possibility for Strong AI. Tell her how strong AI machines will help mankind.

4

Rohan has a robot pet dog. Is it an example of strong AI or weak AI? Explain the reason.

5

Lovey wants to open her restaurant, for which she needs to create an app that can understand the language of foreign customers as well. Which platform can she use to create this app?

162

UT24CB_G8.indb 162

11/24/2023 6:55:55 PM



Computer Science

About the Book This book embodies the principles outlined in the National Curriculum Framework (NCF) and the National Education Policy (NEP) 2020. It unveils the world of computer science through a unique and captivating pedagogical approach— seamlessly integrating curriculum content into the mesmerizing adventures of Mel and Conji, fictional figures hailing from the enchanting world of Avora. Our aim is to prepare learners for the dynamic and technology-driven landscape of the 21st century, equipping them with the essential skills they need to thrive in an ever-evolving world.

Special Features • Explore More: QR codes to explore an exciting application of the concept. This element builds curiosity in children and helps them grasp concepts through digital visual aids. 8

• Discuss: Questions to trigger engaging group discussions in the classroom. • Think and Tell: Probing questions to stimulate thinking at an individual level. • Did You Know? Interesting facts related to the application of a concept. • Points to Remember: Chapter end summary. • Do It Yourself: Milestone exercises to practice specific concepts. • Chapter Checkup: A pool of questions catering to all topics and skills covered in the chapter.

About Uolo Uolo partners with K-12 schools to bring technology-based learning programs. We believe pedagogy and technology must come together to deliver scalable learning experiences that generate measurable outcomes. Uolo is trusted by over 10,000 schools across India, South East Asia, and the Middle East.

Singapore

CS_CB_Grade8_Cover.indd All Pages

|

Gurugram

|

Bengaluru

|

hello@uolo.com �550

© 2024 Uolo EdTech Pvt. Ltd. All rights reserved.

NEP 2020 based

|

NCF compliant

|

Technology powered

30/11/23 7:31 PM


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.