G7_Main_AY25_ICSE

Page 1


COMPUTER SCIENCE ICSE

The Attack of the Dark Virus

Acknowledgements

Academic Authors: Jatinder Kaur, Ayushi Jain, Chandani Goyal, Kashika Parnami, Anuj Gupta, Simran Singh

Creative Directors: Bhavna Tripathi, Mangal Singh Rana, Satish

Book Production: Rakesh Kumar Singh, Sanjay Kumar Goel

Project Lead: Jatinder Kaur

VP, Learning: Abhishek Bhatnagar

All products and brand names used in this book are trademarks, registered trademarks or trade names of their respective owners.

© Uolo EdTech Private Limited

First impression 2023

Second impression 2024

Third impression 2025

This book is sold subject to the condition that it shall not by way of trade or otherwise, be lent, resold, hired out, or otherwise circulated without the publisher’s prior written consent in any form of binding or cover other than that in which it is published and without a similar condition including this condition being imposed on the subsequent purchaser and without limiting the rights under copyright reserved above, no part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of both the copyright owner and the above-mentioned publisher of this book.

Book Title: Tekie ICSE Computer Science 7

ISBN: 978-81-981442-0-1

Published by Uolo EdTech Private Limited

Corporate Office Address:

85, Sector 44, Gurugram, Haryana 122003

CIN: U74999DL2017PTC322986

Illustrations and images: www.shutterstock.com, www.stock.adobe.com and www.freepik.com

All suggested use of the internet should be under adult supervision.

Preface

Standing at the forefront of the digital and AI revolution, the importance of coding and computational skills has reached unprecedented heights. In today’s professional landscape, whether it is in the fields of medicine, space exploration, education, science, or business, no sector remains untouched by this transformative wave. To thrive in the 21st century, basic computer literacy is no longer sufficient. Learners must evolve into ‘digital natives’ who can fluently read, write, and communicate in the languages that machines and AI comprehend.

Recognising this imperative, the National Education Policy (NEP) 2020 has strongly recommended the integration of coding skills, computational thinking, critical analysis, and problem-solving abilities into the curriculum. Moreover, forward-looking subjects like AI, Data Science, Computer Applications, and IT have been introduced as elective subjects from grade 9 onwards. It wouldn’t be surprising if further transformative measures are taken even at the elementary education level.

Uolo has introduced an innovative 360-degree program for a coding-focused computer science curriculum, known as Tekie, spanning grades 1 to 8. Tekie is a significant stride towards STEM education that aims at making learners future-ready—enabling them with skills needed in the ever-changing, technology-driven, and dynamic 21st-century world.

Tekie adopts a captivating and engaging approach to learning, in line with the recommendations of the National Curriculum Framework (NCF) 2023 and NEP 2020. The curriculum is ingeniously woven into the thrilling adventures of Mel and Conji, fictional characters from the enchanting land of Avora. The Mel and Conji series epitomises a modern method of acquiring computer science knowledge and honing computational thinking skills. The program includes chapters that provide a deeper immersion in computer science that both learners and teachers may find interesting.

Tekie is a technology-empowered curriculum that encompasses the following components:

• Main Content Books: These introduce learners to the theory of computer science and computer tools. Topics in AI are also covered, along with experiential and project-based learning resources.

• Coding Books: Specifically designed to nurture coding skills, this booklet aligns with the experiential and contextual learning approach of the coding curriculum, fostering critical thinking and problemsolving abilities.

• Animated Learning Videos: The program is powered by high-quality animation-based learning videos that deliver learning in an engaging manner.

• Teacher Manual: This valuable resource supports classroom instruction, ensuring that educators effectively deliver the curriculum.

Welcome to the captivating realm of Tekie! We hope you relish this educational journey as it equips you with the tools you need to thrive in the exciting and ever-changing world of the 21st century.

Product Package at a Glance

Tekie is an interactive, engaging, and experiential computer science program. It enables learners to attain mastery in computer science theory, new-age computer tools and coding. These are delivered through a storytelling-based coursebook and an experiential learningoriented coding book.

The learning experience is augmented by a digital platform that gives learners access to learning videos and experiential activities and projects that are rooted in the curriculum.

PRINT

Engaging Textbooks

Comic Stories

Teacher Manual

ASSESSMENT

Test Papers

Additional Projects

Test-paper Generator

DIGITAL

Student and Teacher Platform

Learning Videos

Interactive Classroom and Homework Assignments

Byte-size Lesson Modules

Key NEP Recommendations

The National Education Policy (NEP) 2020, introduced by the Government of India, represents a transformative shift in the country’s education system. It aims to create a more holistic, dynamic and multidisciplinary approach to education. The NEP highlights the need for early development of computational thinking, coding, and digital literacy as vital skills for students’ holistic growth. UOLO is fully committed to actualising the vision of NEP 2020 by meticulously adhering to its outlined recommendations.

1. Focus on conceptual understanding

2. 21st century skills, values, and dispositions

3. Computational and critical thinking

4. Application in real life

5. Holistic and integrated learning

6. Experiential learning

7. Enjoyable and engaging

8. Artificial intelligence and coding concepts

9. Digital literacy and emerging technologies

10. Factoids on India

Competency-based Education

NEP Pages 12, 17 and 22

Teaching and Learning Pedagogy

NEP Pages 3, 5, 11, 12 and 56

National Pride

NEP Pages 15, 16 and 43

11. Assessment of core concepts and application skills Assessments

NEP Pages 12, 18 and 22

NEP Compliance: Features of Our Book

Project-based Learning

Engaging hands-on projects encouraging practical application of computer science and coding

Story-based Approach

Enchanting tales that bring learning themes to life, making education a captivating adventure 5 7

Latest Computer Tools

Equipping the students with future-ready skills through exposure to the latest tools and technologies

Fun with AI

Engaging chapters to deepen students’ understanding and engagement with AI concepts

Competency-based Assessments

Test papers designed to evaluate understanding of core concepts and application of skills 3 4 11

Experiential Digital Projects

Projects on the digital platform to deepen understanding and develop essential practical skills

Collaborative Learning

Invites learners to discuss in small groups and present different perspectives

Engaging Learning Videos

Story-style learning videos that deliver concepts to students.

HOTS

Intellectually stimulating questions designed to encourage deep, analytical, critical, and evaluative thought process

Interactive Quizzes

Interactive quizzes that reinforce learning and assess students’ understanding

Think It Through

Probing question related to the concept that arouses curiosity

Test-paper Generator

Tool to create customised assessments that align with the curriculum and help evaluate students’ progress effectively.

Assessment of core concepts and application skills

Mapping of Tools and Technologies Across Grades

The curriculum is thoughtfully mapped to introduce tools and technologies at each grade level, ensuring a smooth and progressive learning experience for students. Beginning with basic concepts in junior grades, the curriculum gradually incorporates more advanced tools and concepts in higher grades. This structured approach enables students to build on their knowledge each year, equipping them with essential skills in computer science and technology as they progress from grade 1 through grade 8. By the time they reach the higher grades, students are well-equipped to tackle complex projects, think critically, and apply their skills in real-world scenarios. The curriculum not only fosters technical proficiency but also encourages creativity, problem-solving, and a deeper understanding of the digital world.

Chapter at a Glance: Walkthrough of Key Elements

Advantages

of a Computer

Theme Page: Lists the chapters covered under a unit

Comic Story: To introduce key concepts in a fun way

Discuss: A multi-faceted probing question related to the concept that arouses curiosity

Did You Know: Interesting facts related to the topic

Disadvantages of a Computer

Computers are very useful but they also have some disadvantages. Some of them are:

Places Where Computers Are Used

Places Where Computers Are Used

Explore More: Short videos to find out more about the topic

Do It

Chapter Checkup: Chapter-end practice exercises aligned to different levels of Bloom’s Taxonomy

to foster an engaging and interactive learning experience

Apply Your Learning: Intellectually stimulating questions designed for higher-order thinking and analysis

Points to Remember: Summary of the chapter

How do you start MS Paint?

What are the parts of the MS Paint window?

How do you save your drawing in MS Paint? How can you reopen an

Artificial Intelligence: Chapters on Artificial Intelligence to explore the fundamentals of AI, including its principles and applications in various fields

Test Papers: Designed to evaluate understanding of core concepts and application of skills

A. Fill in the blanks.

Test Paper 1 (Based on Chapters 1 to 3)

1 Things that are present in nature are called things.

2 Some machines need to work.

3 Computers are used in to keep information of patients.

4 At restaurants, computers are used to order and pay for B. Tick () the correct answer.

Introduction to Avora

Places in Avora

Meet the Characters

• Introduction to Number Systems

• Converting Numbers from One System to Another

• Binary Addition

• Binary Subtraction

• Malware

• Virus

• Spread of Virus

• Antiviruses

• Safe Online Computing Practices

• Computing Ethics

• Spreadsheets and Their Uses

• Creating a Google Spreadsheet

• Entering Data

• Using Formulas and Functions

• Saving and Closing a Sheet

• Selecting Cells

• Changing Cell Data

• Copying and Moving Cell Data

• Deleting Cell Data

• Undo and Redo

• Inserting a Cell, Column, and Row

• Deleting a Cell, Column, and Row

• Applying Autofill

• Introduction to Database

• Database Management System (DBMS)

• MySQL

• Structure of a Table

• Queries and Data Retrieval in MySQL

• Designing with Canva

• Concept of Layers

• Animations

• Introduction to AI

• Natural Language Processing

• The MIT App Inventor

* This chapter is not a part of the prescribed ICSE curriculum. It has been added after consideration of the latest trends in the computer science field. Teaching this chapter or including it in the assessment process is entirely at the discretion of the school and the subject teacher.

Computer Hardware Components

We all use computers in our everyday lives—to play games, do homework, watch movies, and much more. But have you ever wondered what makes a computer work?

A computer comprises two components: software and hardware. Software and hardware work together to make the computer function properly.

Software is a set of instructions that tells a computer what to do. Software is intangible, which means you cannot touch it. Operating systems (Microsoft Windows, Linux, macOS, etc.), word processing applications (Microsoft Word, Google Docs, OpenOffice Writer, etc.), and web browsers (Google Chrome, Microsoft Edge, etc.) are all examples of software.

Hardware refers to the physical components and electronic devices that make up a computer system or any technological device. Hardware is tangible, which means you can touch and physically interact with it.

For software and hardware to work together in a computer system, software first identifies if they are compatible, that is, if software can function appropriately using the available hardware else either of the two needs to be replaced. Next, software tells the hardware which tasks to perform and hardware performs these tasks.

The hardware components can be classified into two categories: internal and external hardware.

Just like we have some internal and some external organs in our body that work together to help us perform various activities, a computer also has internal and external parts that team up to make it work. In this chapter, we are going to explore these hardware components and discover how they work together to turn the computer into a powerful machine.

Let us learn more about various hardware in detail:

External Hardware

The external hardware components, also known as peripherals, are attached to a computer outside the central processing unit (CPU) box. External hardware components can be categorised into three kinds:

Input devices: Input devices are used to give instructions to the computer. They convert data from the real world into a form that the computer can understand. Keyboards, mouse, and scanners are examples of input devices.

Output devices: Output devices are used to show the results of the information processed by a computer. They convert data from input and other devices into a form that can be understood by humans. Some common output devices include monitors, printers, speakers, headphones, and projectors.

Storage devices: Storage devices are used to store data and programs so that they can be accessed later. They are used to keep data even when the computer is turned off. Some common storage devices include hard drives, compact discs (CDs), and digital versatile discs (DVDs).

Let us learn more about these external hardware devices in detail:

Mouse

The mouse is an input device that controls a pointer or a cursor on the computer screen. A mouse has three parts:

1. Left button: This button is used to click, select, drag, or double-click.

2. Right button: The right button is used to display additional information or properties of an item.

3. Scroll wheel: It helps to move a page up or down.

There are two main types of mouses: mechanical mouse and optical mouse. Mechanical mouse has a metal or rubber ball beneath it that rolls on the surface below when we move the mouse. The movement of the ball is detected by the sensors inside the mouse. This information is used to move the cursor on the screen. A smooth and clean surface, similar to a mat, is critical for smooth functioning of this type of mouse. Nowadays, the mechanical mouse is majorly replaced by optical mouse.

Optical mouse uses a light source, typically a Light-Emitting Diode (LED), and a light detector to detect the movement of the mouse. The light detector measures the amount of light that is reflected from a surface, and this information is used to move the cursor on the screen.

Keyboard

A keyboard is one of the main input devices for computers. A keyboard is made up of buttons which are called keys. These keys can be classified into various groups of keys based on their uses, such as alphabet keys, numeric keys, control key, function keys, and navigation keys.

We can also use a combination of multiple keys to perform an action. These combinations of keys are called shortcut keys.

Printer

A printer is an output device that is used to copy digital information (like words or pictures) on a piece of paper or software (as a PDF or .XPS file). A printer is an external hardware device of a computer.

The digital version of the information is called the soft copy, and the printed version of the information on paper is called the hard copy. A computer can work with or without a printer, but a printer can be useful.

There are two main types of printers: impact printers and non-impact printers.

Impact printers: Impact printers create images through a direct contact by striking an ink-soaked strip against paper. They are relatively inexpensive, but they can be noisy and slow. Dot matrix and daisy wheel printers are the most common types of impact printers.

Non-impact printers: Non-impact printers create images without making a direct contact with the paper. They are quieter and faster than impact printers but are more expensive due to their high-quality output. Inkjet and laser printers are examples of non-impact printers.

Scanner

Did You Know?

Some printers, along with paper, can print on cloth, plastic, and leather as well!

A scanner is a device that is used to scan images and documents into a computer. The scanned data is then converted into a digital format and displayed on the screen.

There are various types of scanners available, each with its own advantages and disadvantages. Some of the most common types of scanners include:

Flatbed scanners: Flatbed scanners are the most common type of scanner. They use flat glass surfaces to scan objects, such as documents, photographs, and artwork.

Handheld scanners: Handheld scanners are small, portable scanners that can be held in the hand. They are used to scan objects such as books and magazines that are difficult to scan using a flatbed scanner.

Sheetfed scanners: Sheetfed scanners are used to scan individual sheets of paper. They are typically faster than flatbed scanners, but they can only scan one sheet at a time. The stack of papers is kept on top, and the scanner automatically scans them one by one.

Drum scanners: Drum scanners are the highest-quality type of scanners. They are expensive and are used to scan high-resolution images such as photographs and artwork for magazines and books.

Microphone

A microphone is an input device that is used to record voice, music, and sound. This device converts sound waves into a digital form that can be stored on a computer. A microphone is used in video conferencing, speech recognition, recordings, and music concerts.

Light Pen

A light pen is a pointing device that is used to interact with a computer screen. This device has a light sensor that detects the position of the pen on the screen. The light pen can be used to select items on the screen, draw lines, or write text. This device has better positional accuracy than a touch screen system.

Webcam

A webcam is a digital video camera that is connected to a computer. This camera can be used to capture images and videos, and to conduct video calls. Nowadays, web cameras are often used for online chatting and live streaming.

Plotter

Monitor

A monitor is the primary output device of a computer which displays images and text on a screen. A monitor is also known as a visual display unit (VDU). The images we see on a monitor are made up of tiny dots called pixels (picture elements). The image clarity depends on the number of pixels on the screen. The display is clearer if the number of pixels is high.

A plotter is a type of a printer that is used to draw graphs and charts. Plotters use pens or pencils to draw images on paper. They are like printers, but are much bigger in size. They are typically used by engineers, architects, and other professionals who need to create high-quality and detailed drawings.

Projector

A projector is an output device that projects images on a large screen. This device takes an image as an input from the computer and displays it on a big wide screen. They are often used for presentations, meetings, and in smart classes.

Think and Tell

We know that smartphones are also computers. Which input and output devices can you identify in them?

CD

CD stands for a compact disc. These are circular optical discs that are inserted into a CD player (a device designed to play CDs) to read the information that they store. Although these discs are cheap, they offer limited storage capacity (of up to 700 MBs) and can break easily.

Blu-ray Disc

DVD

DVD stands for a digital versatile disc. It is similar to a CD, but it can store from 4.7 GB to 17 GB of data. However, it is fragile like a CD and comes with limited storage capacity, which may not be enough for large files like 3D computer games and high-resolution movies.

Blu-ray discs are similar to CDs and DVDs, but they offer huge storage capacity. Blu-rays come in various storage capacities, depending on the number of layers of data storage they have. A single-layer Blu-ray disc can hold up to 25 GB, a double-layer disc can hold 50 GB, whereas a triple-layer disc can hold up to 100 GB of data.

Pen Drive

A pen drive, also called a USB flash drive, is a small and sturdy portable storage device. It comes in various shapes and sizes. Pen drives can store up to 1 TB of data. They are easy to use and are typically rewritable, meaning that you can use them multiple times for storing new files after deleting old files. However, they can be much more expensive than CDs, DVDs, and Blu-ray discs.

Discuss!

Why is it important to get rid of old computers and devices in a way that does not harm the environment?

Do It Yourself 1A

Choose the correct answer.

1 What does CD stand for in the context of storage devices?

a Compact disc b Computer display c Central device d Circular disc

2 What is the primary function of a printer in a computer system?

a To cool down the CPU when it generates heat.

b To convert digital information into physical copies on paper.

c To scan images and documents in a digital format.

d To connect to the internet.

3 Give one use of each of type of scanner:

a Flatbed scanner:

b Sheetfed scanner:

Internal Hardware

Internal hardware components are the parts of a computer located inside the CPU box. They include the motherboard, CPU, RAM, ROM, disk drives, and hard disk.

Motherboard

A motherboard is the central component inside a computer that connects all the other components, such as the CPU, RAM, and disk drives. The base of the motherboard consists of a board, which has several copper traces that connect all the other components and allow communication between them.

A motherboard contains:

1. A processor chip (CPU).

2. A basic input/output system (BIOS).

3. Memory chips (RAM and ROM).

CPU

The central processing unit (CPU) is like the brain of a computer. It is a small but powerful chip that helps a computer think and process information received from the hardware and software running on the computer.

It has three components:

1. Memory Unit (MU): The memory unit of a computer is like its storage space. It is where the computer keeps all the information, like programs, files, and data.

2. Arithmetic and Logical Unit (ALU): This unit performs arithmetic operations like addition and subtraction, and helps with logical operations like figuring out if something is true or false.

3. Control Unit (CU): It tells a computer what to do and in what order. It also helps move information smoothly among the various components of the computer.

RAM

Random access memory (RAM) stores information temporarily. This memory is a computer’s short-term memory that holds the data and programs that the computer is currently using. When you open a program, it goes into RAM so that the computer can work on it quickly. But when you turn off the computer, everything in RAM gets lost.

ROM

Read-only Memory (ROM) is a computer’s long-term memory, as it retains information even when the power is off. This memory consists of instructions needed initially when the computer starts. The information stored in this memory cannot be changed, but can only be read.

Disk Drives

A disk drive enables users to read, write, delete, and modify data on a storage disk. The disk input/output (I/O) activities are managed by either an internal or external component. There are various kinds of disk drives, including a hard disk drive, and CD and DVD players. A hard disk drive is the most frequently used disk drive.

Hard Disk

A hard disk is a high-capacity disk drive that stores data permanently. At present, hard disks are available in various capacities, 512 GB, 1 TB, 5 TB, and so on. This type of disk has a

collection of disks known as platters. Hard disks are made up of one or more platters that are coated with magnetic material. The platters are rotated at high speed, and the data is stored as a series of magnetic charges.

SMPS

Did You Know?

In 1956, the first hard disk was as big as two fridges and as tall as a person, but it could only store 5 megabytes of data!

Think and Tell

Switched-mode power supply (SMPS) is the hardware component used to control the power supply. SMPS takes electric power from a source (AC mains) and converts it into low voltage direct current (DC). Its primary function is to always supply well-regulated power to the motherboard and the other parts of the computer. It also has an in-built fan to reduce the heat produced by the computer.

What would happen if SMPSs are not used in a computer?

Modem

Modem stands for modulator-demodulator. It is a device that allows a computer to connect to the internet with the help of telephone lines or a wireless medium. Modems convert digital data from a computer to analog signals for transmission over communication channels and analog signals into digital data that the computer can understand.

The process of converting analog data to digital data is called modulation. The process of converting digital data to analog data is called demodulation.

Modems are of two types: internal and external. Internal modems are placed inside a CPU box, and external modems are devices that can be connected to a computer via a USB port.

Heat Sink

It is an electronic device designed to spread the heat generated by the CPU. The heat sink is generally made of aluminium or copper and uses a fan to keep the processor cool. This device helps prevent the CPU and other components from overheating.

Ports

A port is a slot on the motherboard that is used to connect hardware devices like keyboard, mouse, monitor, and speaker to the motherboard. The cables of these hardware devices are plugged into these ports so that they are attached to the computer and start functioning.

There are various types of ports on the motherboard.

Explore More!

Scan this QR code to take a tour of the parts inside a computer!

Picture Port

Serial port

Parallel port

Description

A serial port is a port that is used to connect devices such as mouse, keyboards, and printers to computers. This port transfers data 1 bit at a time, which makes it slower than other ports like USB.

Similar to a serial port, a parallel port is used to connect devices such as printers and scanners to computers. This port transfers data 8 bits at a time, which makes it faster than a serial port.

A universal serial bus (USB) is a modern port that is used to connect multiple devices to computers, including keyboards, mouse, printers, storage devices, and cameras. This is the most common port on current computers.

Personal System/2 or PS/2 is used to connect keyboards and mouse to computers. Now, USB ports are used in place of PS/2 ports.

FireWire is a high-speed port that is used to connect devices such as external hard drives and digital cameras to computers. This port is being replaced by USB 3.0 and Thunderbolt.

A Video Graphics Array (VGA) port is like a serial port. A VGA port has holes instead of pins. Nowadays, VGA is being replaced by HDMI and display ports. They are used to connect projectors to a computer. HDMI

High-Definition Multimedia Interface, or HDMI is a port that is used to connect a high-definition monitor or TV to a computer. This port can also be used to connect other devices, such as game consoles and HD cameras. Audio

Audio ports are used to connect speakers, headphones, and microphones to computers.

An Ethernet is a port that is used to connect a computer to a network. It is the most common way to connect computers to the internet.

VGA

1 Write T for true and F for false.

a  A CPU processes information from both hardware and software.

b  ROM retains data even when the computer is turned off.

c  A hard disk drive is a type of external hardware component.

d  RAM stores data permanently and does not lose data when the computer is turned off.

e  A motherboard is responsible for performing arithmetic operations in a computer.

2 Match the type of port with its description.

Port

VGA

USB

Ethernet

HDMI

Description

Used to connect a computer to a network.

Used to connect projectors to a computer.

Connects a high-definition monitor or TV to a computer.

A modern port used to connect a wide variety of devices to computers.

Hardware refers to the physical components and electronic devices that make up a computer system or any technological device.

The computer hardware components can be classified into internal and external hardware.

A mouse is a pointing device that is used to select and move objects on the screen.

A keyboard is an input device that is used to enter text and data into the computer.

A monitor is an output device that is used to display the output of the computer.

A printer is an output device that is used to print documents.

CDs can store up to 700 MB of data, DVDs can store from 4.7 GB to 17 GB of data, and Blu-ray discs can store from 25 GB to 100 GB of data.

Internal hardware components are located inside a CPU box, whereas the external hardware components are attached to the computer outside the CPU box.

A motherboard is the central component inside a computer that connects all the other components, such as the CPU, RAM, and disk drives.

The CPU is the brain of the computer which has three components: ALU, CU, and MU.

RAM is the short-term memory of the computer, and it stores the data that is currently being used.

ROM is the long-term memory of the computer, and it stores the data that is needed to start the computer.

The hard disk is the main storage device of the computer; and it stores all the data, including programs, files, and documents.

The SMPS is the power supply unit of the computer, and it converts the AC power into DC power.

The modem is a device that allows a computer to connect to the internet.

The heat sink is a device that helps keep the CPU cool.

The ports are the slots on the motherboard that are used to connect hardware devices.

Chapter Checkup

A. Fill in the Blanks.

Hints temporarily   brain   hardware   long-term   CPU

1 The physical parts of a computer system, such as the CPU, monitor, and keyboard, are called

2 consists of the ALU, CU, and MU.

3 The CPU, or the central processing unit, is often referred to as the computer’s .

4 Random access memory (RAM) stores data .

5 Read-only memory (ROM) is the computer’s memory that retains information even when the power is off.

B. Tick () the Correct Option.

1 Which hardware component connects all the other components of a computer?

a CPU b Monitor

c Motherboard d RAM

2 Which type of scanner is commonly used for scanning books and magazines?

a Flatbed scanner

c Sheetfed scanner

b Handheld scanner

d Drum scanner

3 Which type of printer creates images through a direct contact by striking an ink-soaked strip against paper?

a Inkjet printer

c Dot matrix printer

b Laser printer

d Non-impact printer

4 What is the purpose of a projector?

a To store data

c To project images on a screen

b To draw high-quality images

d To scan documents

5 Which optical disc format offers the highest storage capacity?

a CD b DVD

c Blu-ray disc

C. Who Am I?

d Pen drive

1 I am a hardware component responsible for converting sound waves into a digital format.

2 I am a part of the CPU that performs arithmetic operations like addition and subtraction, and helps with logical operations.

3 I am a high-capacity disk drive used for permanent data storage.

4 I am a pointing device used to select and move objects on a computer screen.

5 I am an output device commonly used for displaying images and text.

D. Write T for True and F for False.

1 An optical mouse uses a light source and a light detector to detect movement.

2 A USB is currently the most common port used to connect various devices to computers.

3 A microphone is an output device used for displaying images on a computer screen.

4 Blu-ray discs have a storage capacity of up to 100 GB.

5 A plotter is typically used by architects and engineers to create high-quality drawings.

E. Answer the Following.

1 Explain the difference between RAM and ROM.

2 Name two types of impact printers and two types of non-impact printers.

3 What are the advantages of an optical mouse over a mechanical mouse?

4 What are the primary differences between USB, HDMI, and VGA ports?

5 Why can a plotter be preferred over a regular printer for printing a wall-sized world map for a school?

F. Apply Your Learning.

1 Vivek wants to video call his friend who lives abroad. Which device must he connect to the computer to do this?

2 Suppose Veera is working on a project that requires high-quality images for a digital school magazine. What do you think she should choose: a flatbed scanner or a drum scanner? Justify your choice.

3 Aarav is preparing a presentation for his class. Name the device that he must use to effectively display his slides to the whole class on a large screen.

4 You are in charge of a computer lab and you need to connect various hardware devices such as keyboards, mouses, and monitors to computers. Explain which types of ports you would use and why.

5 Anika wants to store important data from her computer in a storage device that is portable, rewritable, and can store a large amount of data. Name the device she must use.

Introduction to Number Systems

We have learnt about measuring quantities in Science and Maths. We measure length in centimetres, metres, and kilometres. Similarly, we use grams and kilograms to measure weight.

But what do we use to measure and express these quantities? We use numbers.

But what are numbers made of? They are made of digits—0, 1, 2, 3, 4, 5, 6, 7, 8, and 9. These ten digits together form our Number System.

A Number System is a way of representing and expressing numbers using a set of symbols or digits.

Different number systems can use different symbols and rules to represent a number in that number system.

The base of a number system is the total number of digits the system uses.

The number system that we use is the decimal system, also known as the base-10 system. The numbers are expressed using ten different digits: 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9.

A question arises here: why do we need to learn about different number systems?

The answer is that the different number systems help us understand computers better as computers do not work on the decimal number system. We will later see which other number systems they work on.

Furthermore, learning about different number systems helps us to represent data in different number systems. They also help us to convert data represented in number system to another number system.

Types of Number Systems

There are four types of number systems that computers understand. Let us learn more about each one.

Decimal Number System

The Decimal Number System is the number system that we use every day.

The Decimal Number System is a base-10 number system that has combinations of the following 10 digits: 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9.

When we deal with a decimal number system, we write the base of the number system as the subscript of the number.

For example, if we want to write 70, 128, and 349 in a number system notation, we will write: (70)10, (128)10, and (349)10.

Digits used: 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9.

Binary Number System

The Binary Number System is a base 2 number system that uses only two digits—0 and 1. A binary number is called a Binary digit or a bit. We express binary numbers as (101)2, (1001)2, (101011)2, and so on.

Binary Number System

Base is 2.

Digits used: 0 and 1.

The Binary System forms the basis of data storage in computers. In fact, a bit is the fundamental unit of data storage. Different digital devices like calculators, TVs, cell phones, burglar alarms, and watches use this system. But how do these devices understand a bit?

Imagine you have a flashlight. It only has two buttons: one to switch it on and the other to switch it off. The state of an “on” flashlight is 1 and the state of an “off” flashlight is 0. If we want to store this information: The first flashlight is on and second one is off. It can be depicted as “10”. This is how these digital devices store information using the Binary Number

Explore More!

Computers store data in binary form using electronic switches that can either be on (representing 1) or off (representing 0). This binary storage is the basis of all digital memory. To know more about binary storage, scan this QR code.

Acharya Pingala, a Vedic Scholar, was the inventor of the Binary Number System. Did You Know?

Each number in the decimal number system can be represented in the binary number system as well. This table shows the decimal numbers 0 through 15 in their binary forms:

Octal Number System

The Octal Number System has a base of 8 and has eight digits: 0, 1, 2, 3, 4, 5, 6, and 7. We express numbers in the octal number system as (40)8, (214)8, (376)8, etc.

The Octal Number System is widely used in computer applications in the aircraft sector. The octal numbers are used in the form of codes.

Base is 8.

Digits used: 0, 1, 2, 3, 4, 5, 6, and 7.

Just like in the binary number system, all decimal numbers can be represented in the octal number system as well. This table shows the decimal numbers 0 through 15 and their octal forms:

Hexadecimal Number System

The Hexadecimal Number System has a base of 16 and has digits from 0 to 9 and letters of the alphabet A to F, where A is 10, B is 11, and so on up to F as 15. We express numbers in this system as (CD)16, (129A)16, (A56)16, etc.

Letters used: A, B, C, D, E, and F. Base is 16.

Digits used: 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9.

Imagine that you have a special way of counting on your fingers. Instead of just using your regular 10 fingers, you have 16 different symbols to count with. The first 10 symbols are just like your regular fingers, and they are represented by the numbers 0 to 9.

But this is where it gets interesting: after you’ve counted up to 9 on your regular fingers, you don’t stop. Instead, you start using your special symbols, represented by the letters A, B, C, D, E, and F. These symbols represent the numbers 10, 11, 12, 13, 14, and 15, respectively.

So, when you count with your fingers in hexadecimal, it goes like this: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A (which represents 10), B (which represents 11), C (which represents 12), D (which represents 13), E (which represents 14), F (which represents 15).

The Hexadecimal Number System is commonly used in computer programming and in microprocessors. It is used to describe locations in the computer memory.

Octal Number System
Hexadecimal Number System

This table shows the decimal numbers 0 through 15 and their hexadecimal forms.

Do It Yourself 2A

Identify the number systems that these numbers belong to.

Converting Numbers from One System to Another

A number in one particular number system can be converted into another with some specific rules. Let us learn how to do it.

Decimal to Binary, Octal, and Hexadecimal

Let us first learn to convert a decimal number into binary with an example. We will convert (35)10 to its binary form.

Step 1: Divide the number repeatedly by two and note down the remainders. See below:

Step 2: Write the remainders in reverse order.

The final number with only the 0 and 1 digits is the required number. So, (35)10  (100011)2.

We can also represent the above method in a different way. Remainders 110001

Step 1: Create a table and place the number to be converted in the first row.

Step 3: Now, divide the number by the base of the target number system and write the quotient in the next row. Write the remainder in the cell next to it.

Step 2: Write the base of the target number system, as shown. Here, we want to convert 35 into binary. So, we write 2.

Step 4: Repeat the process till you get a 0 as quotient.

Step 5: Take the remainder from bottom to top. That is the desired binary number. So, we again get (100011)2

Now, what if we want to convert a decimal number to an octal?

We will take the same step-by-step approach. This time, we will use 8 as divisor instead of 2. Let us write (435)10 in its octal form. We follow the same approach. So, (435)10 in octal is (663)8.

Now, what if we want to convert a decimal number to a hexadecimal?

We will repeat the same process. This time the divisor will be 16, because the base for hexadecimal is 16. We will try to write (846)10 in the hexadecimal form. So, (846)10 in hexadecimal is (34E)16.

Convert (442)10 into binary, octal and hexadecimal.

Any Other Base Into Decimal

To convert a number in a given base to a decimal, let us use (101011)2 to understand the step-by-step approach.

Step 1: Write the number in a row and note the position of the digits from right to left, as shown:

Step 2: Now make a third row and write the values of base to the power of the position. Notice the new row below.

Step 3: Make a fourth row and write the products of the digits in each place with the base power number. Notice the new row below.

Step 4: Find the sum of the numbers found in each place. In this case we get:

32 + 0 + 8 + 0 + 2 + 1 = 43.

So, we get (43)10.

Now, let us try to convert an Octal into a Decimal. What is the decimal equivalent of (1705)8?

We repeat the same process:

We get, 512 + 448 + 0 + 5 = 965.

So, (1705)8 is (965)10 in decimal.

Now, let us try to convert a Hexadecimal into a Decimal. What is the decimal equivalent of (1AC7)16?

We repeat the same process:

We get, 4096 + 2560 + 192 + 7 = 6855.

So, (1AC7)16 is (6855)10 in decimal.

Do It Yourself 2C

Convert the following numbers into the decimal form.

Binary to Octal and Hexadecimal

There is a standard method to convert a binary number into its octal or hexadecimal form.

Let us see this using an example. We will convert (1110101)2 into its octal form.

Step 1: We will group the digits of the binary number. We will form groups of 3, because:

Base of octal = 8

Base of binary = 2

23 = 8

So, we form groups of 3 starting from the right. If 1 or 2 digits are left, we put them in a new group. See below:

Step 2: Now, treat each group as a separate binary number and convert into the decimal form. So, we get:

Step 3: We join the decimal numbers formed from the grouped digits. The number formed is the desired number.

So, (1110101)2 = (165)8

Now, let us convert (110101011)2 into its hexadecimal form.

This time, we form groups of 4 starting from the right.

We get (1AB)16

So, (110101011)2 = (1AB)16.

Do It Yourself 2D

Convert (1001001001)2 into its octal and hexadecimal form.

Think and Tell

Hexadecimal and Octal into Binary

The method to convert hexadecimal and octal numbers into their binary form is also very similar. We will also use the concept of groups of digits that we learnt in the previous section.

Let us use the hexadecimal number (1A7)16 to go through the process.

Step 1: We take each digit of the number separately.

Step 2: We then convert each digit into its binary form.

Step 3: Write each derived binary number in groups of 4. Again, we are writing digits in groups of 4 because: Base of hexadecimal = 16

Base of binary = 2 24 = 16

So, we get:

form of digits in groups of 4 0001

Step 4: We now join the different 4-digit binary numbers derived. These final numbers are the desired binary number.

We get 000110100111.

So, (1A7)16 in the binary form is (000110100111)2 or simply (110100111)2. Similarly, we can convert an octal number into binary by making the groups of 3 digits from the right.

Why are we forming groups of 4?

Do It Yourself 2E

Convert the following numbers into binary form.

1  (174)8

2  (B12)16

Hexadecimal and Octal Conversions

Converting hexadecimal numbers into octal numbers, and vice versa, has to be done via other number systems.

Let us say we want to convert (721)8 into its hexadecimal form.

We first find its decimal form. The decimal form of (721)8 is (465)10.

Now, convert this decimal form into the hexadecimal form. The hexadecimal form of (465)10 is (1D1)16. So, the hexadecimal form of (721)8 is (1D1)16.

We follow the same steps while converting a hexadecimal number into its octal form.

Do It Yourself 2F

Convert the following:

1  (764)8 into its hexadecimal form.

Binary Addition

2  (2B1)16 into its octal form.

Binary addition is similar to the addition of decimal numbers. When we add (0)2 and (0)2, we get 0. So, (0)2 + (0)2 = (0)2. When we add (0)2 and (1)2, we get (1)2. So, (0)2 + (1)2 = (1)2.

But what happens when we add (1)2 and (1)2? (1)2 is basically 1 in decimal as well. So, (1)2 + (1)2 = (2)10 = (10)2. So, a new place is created and 1 is carried over.

We can summarise the rules of binary addition as follows: If we are adding x and y:

In a binary system, only 1 can be carried over. In the decimal system, what numbers can be carried over? Think and Tell

So now, we can add bigger binary numbers by this method. For example, let us add (101101)2 and (10110)2.

So, the sum of (101101)2 and (10110)2 is (1000011)2.

Binary Subtraction

Following from the previous section, the rules of binary subtraction are as follows:

For example, let us subtract (11010)2 and (1100)2

So, the subtraction of (11010)2 and (1100)2 is 01110.

Do It Yourself 2G

(101101)2 + (111111)2

(1110001)2 + (1010101)2

(1111)2 – (0001)2

(110011)2 – (01010)2

A Number System is a way of representing and expressing numbers using a set of symbols or digits.

Every number can be expressed in different number systems. But the value remains the same.

Base is the number of digits the number system uses. The base of binary is 2, octal is 8, decimal is 10, and hexadecimal is 16.

We use the Decimal Number System in our daily lives.

Binary Number System uses two digits: 0 and 1. Each binary digit is also called a bit.

The Octal Number System is a base-8 number system that uses digits from 0 to 7.

The Hexadecimal Number System has a base of 16. It uses digits from 0 to 9 and letters of the alphabet A to F where A is 10, B is 11, and so on.

We have different rules to convert the number expressed in one number system to another.

Chapter Checkup

A. Fill in the Blanks.

Hints

1 The Binary Number System uses two digits: and

2 The Binary digit is also known as a

3 The Decimal Number System is a base number system.

4 In Octal and Hexadecimal Number Systems, we have and digits, respectively.

5 When converting binary numbers to their octal form, we put digits together in groups of

B. Tick () the Correct Option.

1 Which of the following digits cannot be used in the octal number system?

a 8 b 7

c 0 d 1

2 Another name for the base-10 number system is number system.

a Octal b Decimal

c Binary d Hexadecimal

3 What does “A” represent in the Hexadecimal Number System?

a 7 b 9 c 10 d 12

4 Which number system is used by digital devices like computers and calculators? a Binary b Decimal c Octal d Hexadecimal

5 When converting a binary number into a hexadecimal number, we will form groups of how many digits? a 1 b 2

c 3 d 4

C. Who Am I?

1 I use only two digits, 0 and 1. Computers use me to store and process information.

2 I am used in counting and doing calculations every day. I have 10 digits, starting from 0 to 9.

3 I am a number system with base 8.

4 I am unique as I let you use letters of the alphabet as my digits too.

5 I am common to all number systems. My value is also the same in all the number systems.

D. Write T for True and F for False.

1 The Decimal Number System is based on the digits 0 to 10.

2 In the Hexadecimal Number System, the letter “D” represents the digit 10.

3 The Binary Number System is the foundation of how computers understand and process information.

4 Computers can only perform addition, not subtraction.

5 (D716240234)16 is an octal number.

E. Answer the Following.

1 What is a number system?

2 What is the base of a number system? Why is it important?

3 What does the term “hexadecimal” mean in the context of number systems?

4 Convert the hexadecimal number (6475)16 into binary.

F. Apply Your Learning.

1 Convert the following decimal numbers into their octal, hexadecimal, and binary forms.

2 Convert the following binary numbers into their decimal, octal, and hexadecimal forms.

3 Convert the following numbers into their decimal and binary forms.

4 Add the following binary numbers.

(101)2 and (110)2

5 Subtract the first binary number from the second binary number.

(11)2 and (110)2

and (10101)2

and (1110101)2

Malware

The term malware is a composite of malicious and software. Any malicious software or code that is designed to harm, exploit, or compromise computer systems, devices, or networks is called malware. It not only disrupts a computer’s usual operation but also steals vital information.

Types of Malware

Computer malware comes in various forms, each with its own set of characteristics and methods of attack. Here are some common forms of computer malware attacks:

1. Virus: A computer virus is a form of malicious software or malware that can infiltrate a computer system. The term VIRUS stands for Vital Information Resources Under Seize.

Computer viruses can spread through infected data via e-mail attachments, USB flash drives, and other sources. The essential resources of a computer, like memory, processing speed, data, and programs are hampered when a virus spreads into the system.

2. Worms: A computer worm is similar to a virus but can spread on its own without human help. This self-replicating activity frequently causes computers and networks to become unresponsive due to excessive memory or bandwidth usage. One famous example is the Blaster Worm, which affected Microsoft’s operating systems.

3. Spyware: Spyware is a harmful software that secretly enters your computer, watches what you do without your knowledge, and shares the gathered information with others who want it. This data can include things like your internet habits, visited websites, passwords, and even credit card numbers. It can also check your files and programs like messaging apps, all while quietly sending this information to someone else. They might sell this data or use it for advertising. Sometimes, spyware can mess up your computer settings, causing slow internet and problems with other programs.

4. Trojan Horse: The term Trojan Horse refers to the wooden horse used by the Greek Army during the Trojan War to enter the city of Troy. A Trojan horse may look like helpful software, but harms your computer once it’s installed. People are tricked into opening it. When Trojans enter your system, they can change your desktop, block programs (especially antivirus ones), and grant unauthorised access to outsiders who can steal your information. Unlike viruses and worms, Trojans don’t spread on their own, you need to open them.

Examples of Trojan Horses include the Beast and Zeus.

5. Sweeper: A sweeper is a malware that pretends to be an antivirus program, fooling users into downloading it unintentionally from malicious websites. Once installed on your computer, it creates fake malware files that start automatically when you log in to Windows. It secretly monitors your online activity, makes changes to your system files, and more, all without your knowledge. When you run it, it pretends to scan your computer and displays fake malware alerts to scare you into thinking your computer is infected.

In this chapter, we will study the computer virus in detail.

Do It Yourself 3A

1 Write T for true and F for false.

a Malware is a term that specifically refers to software that steals sensitive information from a computer.

b Worms require human intervention to spread from one computer to another.

c Trojan Horses can spread on their own, infecting multiple computers without user interaction.

d Spyware is a harmful software that secretly enters your computer.

2 Fill in the blanks.

a Computer viruses can spread through infected data via , USB flash drives, and other sources.

b Any malicious software or code that is designed to harm, exploit, or compromise computer systems, devices, or networks is called .

c Unlike viruses and worms, don’t spread on their own. You need to open them.

d A sweeper is a virus that pretends to be an antivirus program, fooling users into downloading it unintentionally from websites.

Imagine you have a fever caused by a human virus. This virus makes you weaker. In the same way, your computer can get sick too, but not with human viruses. Instead, it is something called a “computer virus”. A computer virus is like a harmful computer program that sneaks into your computer without your knowledge. Once it is in, it can cause all sorts of problems. It might slow down your computer, mess up your important files and programs, make your computer stop working properly, steal sensitive information, etc.

Just like you need medicine to get better from a real virus, your computer needs special software to get rid of a computer virus. This special software is called antivirus software.

Virus Symptoms

Computer viruses can cause different problems. Here are some common symptoms that may indicate that a computer is infected with a virus:

1. Slow performance: A virus in action can take up a lot of space in a computer’s memory, leading to slower performance. Your computer may take longer to boot up, open applications, or respond to your commands.

2. Pop-up windows: One may start getting too many pop-up windows on their screen which may be virus-affected and can harm the device even more.

3. Self-execution of programs: Malware can run in the background without your knowledge. This could include launching unauthorised programs. This behaviour may indicate a virus or other malware.

4. Account issues: Some viruses are designed to steal login credentials or manipulate your accounts. It could be a sign of a security breach caused by malware.

5. Crashing of the device: In most cases, if the virus spreads in multiple files and programs, there are chances that the entire device may crash and stop working.

Harm Caused by Virus

A computer virus is a type of harmful software that can sneak into your computer and cause trouble.

Let us learn about the harmful effects a computer virus might have.

1. Spread to others: Computer viruses can spread to other computers through various means, such as email attachments, infected files shared over networks, or compromised software installations. This can lead to a widespread outbreak of the virus.

2. Data loss: Some viruses can corrupt or delete your files and data, leading to permanent loss. This loss can be damaging, especially if you haven’t backed up your important information.

3. Stealing information: Certain viruses are designed to steal your personal information, like passwords, credit card numbers, and other sensitive data. This can lead to identity theft and other serious problems.

4. Spreading: Computer viruses often have the capability to replicate and spread to other computers through infected files. They can also take advantage of weaknesses in network connections, which can cause more harm.

5. Privacy breach: Some viruses are designed to collect personal or sensitive information from infected computers, including login credentials, credit card numbers, and more. This information can then be used for identity theft or other malicious purposes.

Types of Virus

There are different types of computer viruses:

1. Boot sector virus: This virus category targets the boot sector of a hard drive, which is made up of smaller units called sectors. The initial sector is referred to as the boot sector and contains the master boot record (MBR), responsible for initiating the process of reading and loading the operating system. Boot sector viruses become active during the machine’s boot-up sequence. Examples of such viruses include Disk Killer and Stoned virus.

2. Program file virus: A program file virus, also known as an executable file virus, is a type of computer virus that infects executable program files. These viruses attach themselves to executable files. Executable files usually have file extensions like .exe, .com, .dll, or .sys. When you run an infected program, the virus gets activated and can spread to other executable files on the same system or to other computers.

3. Multipartite viruses: A multipartite virus combines the characteristics of both boot sector and program file viruses. It infiltrates computer systems via contaminated media and subsequently lodges itself in the computer’s memory. Following this, the virus migrates to the hard drive, where it corrupts the boot sector and initiates its propagation throughout the system by infecting executable files. Examples of multipartite viruses include Invader, Flip Tequila, and others.

4. Macro viruses: This virus infects files created with software like Word, Excel, and PowerPoint that support Macros. Macros are sets of instructions that automate tasks. When you open an infected document, the virus enters the memory of your computer. Once active any document you create can get infected too. Examples of such viruses include Melissa A, Relax, Bablas, and more.

5. Polymorphic viruses: The term “polymorphic virus” (poly meaning many, morph indicating changing forms) refers to a virus that manifests in various forms each time it infiltrates a file, altering its binary structure (which is the way a file is organised and stored on a computer’s hard drive) to avoid detection by antivirus software. Some notable examples include Elkern, Marburg, and Satan Bag.

6. Network virus: A network virus can rapidly spread through a LAN (local area network) and sometimes across the internet. It multiplies using shared resources like drives and folders. When it infects a computer, it seeks out more targets, creating a repeating cycle. Examples include Nimda and SQL Slammer.

Do It Yourself 3B

1 Who am I?

Explore More!

Scan this QR code to know how you can verify whether your computer is infected with a virus or not.

a I am a type of virus that rapidly spreads through shared resources like drives and folders on a network.

b I am a type of virus that alters the binary structure of a file to avoid detection by antivirus software.

c I am a type of virus that corrupts the boot sector of a hard disk and also infects executable program files.

2 Write T for true and F for false.

a Slowing down a computer system is a common symptom of a computer virus infection.

b Computer viruses cannot delete or corrupt files on your computer.

c Viruses have the capability to interfere with computer systems resulting in crashes, data corruption, and loss.

d Pop-up ads are a symptom of a computer virus infection.

Spread of Virus

A computer virus spreads from one computer to another. It’s like when you have cold and you pass it on to your friends.

Here’s how a computer virus spreads:

1. Removable storage devices: Sharing files using pen drives is common today. If a pen drive has a virus, it can infect the computer it is connected to. If a virus-infected pen drive is inserted into another computer with the AutoRun feature enabled, it can spread the virus automatically. Even if AutoRun is disabled, a virus can still infect a computer when a file on the pen drive is opened.

2. Internet: Computer viruses spread quickly on the internet because they can infect many websites at once. Some websites try to install adware bugs, which flood your screen with pop-up ads. This adware often allows other harmful programs to be installed, filling your computer with unwanted content. Adware, short for “advertising-supported software”, refers to a type of software that displays advertisements on a user’s device, typically without their consent or in an intrusive and disruptive manner.

3. Email attachments: One of the most common ways viruses spread is through email attachments. Cybercriminals send infected files as email attachments, and when you open or download the attachment, the virus infects your computer.

Ways to Prevent a Virus

Today, data is as valuable as money or gold, so it’s crucial to protect it from loss or damage.

Computer viruses can be spread through infected data via email, USB flash drives, and other sources. To prevent virus attacks:

1. Use antivirus software and keep it updated.

2. Check if your antivirus detects spyware and install anti-spyware if needed.

3. Install a firewall to control network traffic. Always scan USB flash drives.

4. Avoid downloading pirated software.

5. Scan downloaded files before opening.

6. Regularly scan your hard disk.

7. Back up important files daily.

8. Be cautious with email attachments and only open trusted ones.

Did You Know?

Elk Cloner was one of the first microcomputer viruses to spread beyond its original computer or lab.

Antiviruses

An antivirus, is a type of computer program or software designed to detect, prevent, and remove malicious software, commonly known as malware, from a computer system. The primary purpose of antivirus software is to protect your computer and data from various types of threats, including viruses, worms, Trojans, ransomware, spyware, adware, and other forms of malicious software.

Did You Know?

Ransomware is a harmful program that locks a person’s files or computer and asks for money in exchange for the key to unlock them.

Working of Antivirus

Here’s an overview of how antivirus software works:

1. Scanning: Antivirus software works primarily by scanning files and programs on your computer or device for known patterns or signatures of malware.

2. Heuristic analysis: This technique looks for suspicious behaviour or code patterns that may indicate the presence of malware, even if no specific signature matches are found. It helps identify new and previously unknown threats.

3. Real-time protection: Many modern antivirus programs offer real-time protection. They monitor the system continuously and scan files as they are accessed, downloaded, or executed.

4. Quarantine: When the antivirus software detects a potentially malicious file or program, it typically quarantines it, isolating it from the rest of the system.

5. Scheduled scans: Users can schedule regular scans of their computer or specific directories to ensure that no malware has evaded real-time protection.

6. Behavioural analysis: Some advanced antivirus solutions use behavioural analysis to monitor the behaviour of programs and processes running on a system to detect viruses.

7. Email and web filtering: Many antivirus programs also offer email and web filtering features to block malicious attachments or websites that may distribute malware.

Did You Know?

The Morris worm, from November 2, 1988, was one of the first internet worms and the first to grab widespread media attention.

Using an Antivirus Software

Using antivirus software is crucial for protecting your computer and data from malware, viruses, and other security threats. Two common tasks when using antivirus software are:

1. Scanning your system.

2. Scanning external media.

Scanning Your System

1. Install antivirus software: Install antivirus software on your computer. There are many options available, both free and paid. Popular choices include Norton, McAfee, Bitdefender, Avast, and Windows Defender (built into Windows).

2. Update the antivirus database: Ensure that your antivirus software is up-to-date. Most antivirus programs regularly release updates to their virus definitions to detect the latest threats.

3. Open the antivirus program: Launch your antivirus software. You can typically do this by clicking on its icon in the system tray or by searching for it in your computer’s programs.

4. Initiate a full system scan: Most antivirus software provides an option for a full system scan. This scan checks all files and directories on your computer for viruses, malware, and other threats. You will find an option like “Full Scan,” “Complete Scan,” or something similar.

5. Review and take action: After the scan is complete, the software will provide a report. If any threats are detected, the software will provide options for quarantining or deleting infected files.

Scanning External Media

1. Connect the external media: Plug in the external media device (e.g., USB drive, external hard drive) that you want to scan into an available USB port on your computer.

2. Open the antivirus program: Launch your antivirus software.

3. Select the external media scan option: Look for an option that allows you to scan external media or removable devices. This option is often labelled “USB Scan” or something similar.

4. Choose the external media: Select the external media device you want to scan from the list of available drives.

5. Start the scan: Click the “Scan” or “Start Scan” button to begin scanning the external media, and the software will examine the files and folders to find any threats.

6. Review and take action: Once the scan is complete, the software will provide a report and recommended actions to quarantine or remove any detected threats.

7. Safely eject the external media: After scanning and ensuring that the external media is free from threats, safely eject it from your computer to avoid spreading malware to other devices.

Importance of Regular Updates

Regular updates are essential for antivirus software for several important reasons:

1. Virus definition updates: Regular updates ensure that your software has the latest virus definitions, enabling it to detect and remove the most recent threats effectively.

2. Protection against new threats: Cybercriminals are always inventing new types of harmful software and ways to attack your computer. If you don’t keep your antivirus program up to date, it might not be ready to protect your computer from these new threats.

3. Security fixing: Antivirus software sometimes needs to be fixed to keep it safe from bad people on the internet. These fixes are like updates that make sure your antivirus software stays strong and does not allow malware to enter.

4. Improved performance: When your antivirus program gets old, it might start to slow down or have trouble working with your computer and other programs. But when you do updates regularly, it can make your antivirus program work better and be more dependable.

5. Improved features: Antivirus companies frequently add new things and tools in their updates to offer users extra protection. Keeping your antivirus up to date ensures that you can use the newest features, which can make your online security even better.

Do It Yourself 3C

1 Number the following steps for scanning your system.

Initiate a Full System Scan

Review and Take Action

Update the Antivirus Database

Install Antivirus Software

Open the Antivirus Program

2 Match the following.

Column A

Identify new threats

Continuous monitoring

Isolation method

Updates to improve computer performance

Column B

Virus Definition Updates

Heuristic Analysis

Real-time Protection

Quarantine

Points to Remember

1 A computer virus is a type of malicious software designed to infect and spread from one computer to another, often with harmful intent.

2 Computer viruses can cause various issues, including slow performance, pop-up windows, self-execution of programs, account issues, and device crashes.

3 There are different types of computer viruses, including boot sector viruses, program file viruses, multipartite viruses, macro viruses, polymorphic viruses, and network viruses.

4 Computer viruses can spread via removable storage devices, the internet, and email attachments.

5 Other forms of malware include virus, worms, spyware, Trojans, and sweepers, each with its own methods of attack and consequences.

6 To prevent virus attacks, use antivirus software, keep it updated, and install anti-spyware and firewalls if necessary.

7 Avoid downloading pirated software, scan downloaded files before opening, and regularly scan your hard disk.

8 Back up important files daily to protect against data loss from virus infections.

9 Antivirus software is designed to detect, prevent, and remove various forms of malware from a computer system.

10 Antivirus software works through scanning, heuristic analysis, real-time protection, quarantine, scheduled scans, behavioural analysis, and email/web filtering.

11 Common antivirus software includes Norton, McAfee, Bitdefender, Avast, and Windows Defender.

12 Regularly update your antivirus software to ensure it can detect and remove the latest threats effectively.

13 Regular updates also provide security fixes, improved performance, new features, etc.

Chapter Checkup

Fill in the Blanks.

1 A computer virus is a type of designed to infect and spread from one computer to another. 2 One common symptom of a computer virus is a noticeable in computer performance. 3 A virus targets the boot sector of a hard drive.

is a virus that pretends to be an antivirus program, fooling users into downloading it unintentionally from malicious websites. 5 viruses attach themselves to executable program files.

1 What is a computer virus?

a A type of computer hardware

c A computer ’s operating system

b A type of malicious software

d A network protocol

2 Which of the following is NOT a common symptom of a computer infected with a virus?

a Faster performance

c Unexpected pop-up windows

3 What is the primary motive behind malware attack?

a Improving computer performance

c Stealing sensitive information or causing harm

4 What does the term “heuristic analysis” refer to in antivirus software?

a Real-time scanning of files

c Detecting suspicious behaviour or code patterns

5 What is a “Trojan horse” in the context of computer security?

a A type of antivirus software

c Malicious software that pretends to be helpful

C. Who Am I?

1 I am a type of software designed to detect and remove malicious programs from a computer.

2 I replicate myself by modifying other computer programs and can cause a computer to crash if I spread massively.

3 I am a type of malware that secretly enters your computer and steals your personal information.

4 I am a set of instructions that automate tasks.

5 I am a type of malicious software that pretends to be something useful but actually harms your computer when you install me.

D. Write T for True and F for False.

1 Computer viruses can slow down a computer’s performance.

b Slow performance

d Unauthorised program execution

b Enhancing data security

d Supporting open-source software

b Scanning of email attachments

d Quarantining infected files

b A self-replicating worm

d A type of firewall

2 Adware refers to a type of software that displays advertisements on a user’s device, typically without their consent.

3 Many antivirus programs also offer email and web filtering features.

4 The term “VIRUS’’ stands for Vital Information Resources Under Seize.

5 Antivirus software can scan and remove viruses from external media devices.

E. Answer the Following.

1 What is a computer virus?

2 Define any one method through which a computer virus spreads from one system to another.

3 What is the role of antivirus software in protecting a computer?

4 Write any two precautions one can take to prevent a virus infection.

5 How can users safely scan external media like USB flash drives using antivirus software?

F. Apply Your Learning.

1 Sree notices that his computer has become significantly slower over the past week. He also experiences frequent pop-up windows while browsing the internet. What could be causing Sree’s computer to slow down noticeably, and why?

2 Raj receives an email from an unknown sender with an attachment. The email claims to contain an important document, but he is worried it might be a virus. What precautions should he take?

3 Archi’s computer has been infected with a polymorphic virus. She has antivirus software installed but is struggling to remove the virus. Why is it that she is finding it difficult to remove polymorphic viruses from her system?

4 Raju unknowingly downloaded a program that claimed to be useful but is now experiencing issues with his computer. What type of malware could this be?

5 Tanya’s computer displays a message saying that her files have been locked and she needs to pay to unlock them. What type of malware is likely responsible for this?

Introduction to the Internet

Imagine exploring new places, paying bills, shopping for groceries, transferring money, ordering food, or chatting with friends from anywhere without having to leave home—all made possible because of the internet. The internet is a worldwide network of connected devices for sharing information and communication. Nowadays, the internet has become an essential part of our everyday lives. With its widespread availability, our dependency on the internet has grown significantly. The internet has its advantages, however, it also hosts various dangerous unethical practices if one is not aware of them.

Advantages of the Internet

The internet has several advantages:

Skill Enhancement

The internet is a huge library of information on every subject. You can use it to learn about different subjects and also learn different skills, such as using graphic design software, learning coding, improving communication skills, etc.

Global Updates

The internet provides access to news and current events from around the globe, helping us stay informed about what is happening in the world.

Effortless Shopping

We can shop for clothes, books, gadgets, and almost anything online, saving time and letting us choose from a wide range of options.

Instant Communication

Through the internet, we can talk to friends and family and even make new friends from around the world, breaking down geographical barriers. Email, messaging apps, and social media platforms enable instant communication, helping us stay in touch with loved ones.

Convenient Services

Internet-based services allow us to pay bills, book flights, transfer money, and schedule appointments, all from the comfort of our homes.

Business Growth

The rise of the internet has led to massive growth in businesses. Individuals and companies have embraced online platforms to reach wider audiences, resulting in increased sales, global expansion, and innovative ways of conducting commerce.

Media and Entertainment

The internet enhances media and entertainment experiences. People are drawn to the internet for activities like downloading songs, listening to music, watching movies, playing games, and reading newspapers, comics, and books online.

Discuss!

Lavanya has recently started a handmade jewellery business, but she is not attracting enough customers. How can the use of the internet help her?

Unethical Practices

The internet offers numerous benefits, but it is important to use it carefully because misusing it can create risks. Here are some of the internet’s threats:

Hacking

Hacking is the process of breaking into a computer system, a website, or an online account without permission. Think of having a box with a lock that only you can open. It is similar to hacking if someone tries to unlock it without your permission. Hackers have advanced knowledge of computers and technology and use their skills to steal important data. Hacking is against the law and can harm people’s privacy and safety.

Hacking can be done for various reasons:

Black hat hackers want to steal information by spreading viruses or creating other problems.

Ethical hackers or White hat hackers work for companies, governments, or cybersecurity firms, engaging in cyber spying to identify vulnerabilities in computer systems, networks, or applications to prevent malicious hackers from stealing sensitive information from their countries or organisations. This is known as ethical hacking.

Malicious refers to actions done on purpose to cause harm or damage, often intending to create problems, distress, or negative outcomes for others.

When a hacker gets access to digital personal data without your permission, it is called a Cyber Attack.

Spamming

Spams are unsolicited and often repetitive messages sent to a large number of people over the internet. These messages can be in the form of emails, texts, or comments on websites. Spam messages can have harmful links or files that might put viruses on your device, leading to unauthorised collection of your personal information.

Spamming is getting a bunch of unwanted advertisements in your emails.

Here are some ways you can recognise spam using the following tips:

• Notice errors in grammar and spelling, as legitimate sources usually have proper writing.

• Messages that do not include your email address in the To: or Cc: fields are common forms of spam.

• Attachments or hyperlinks from unknown sources might contain harmful software or inappropriate content.

• Be cautious of messages with generic greetings like Dear Customer instead of your name.

Plagiarism

Did You Know?

The very first internet message in 1969 was simply “LO”. Although the intention was to type “LOGIN”, the system crashed after just two letters, which ultimately marked the beginning of the internet.

Plagiarism means taking words, ideas, or images from someone else and presenting them as one’s own work. It is considered an ethical violation and a form of academic or intellectual fraud.

If someone is caught committing plagiarism, there can be various consequences, depending on the situation and the context in which the plagiarism occurred. Some schools and universities use special software to detect plagiarism. This tool checks the work against online sources and databases to find any copied parts. If caught, one could fail the assignment, the course, or even be expelled.

If copyrighted material is used without permission, legal action could be taken by the original creators or copyright holders. This may result in fines or other legal consequences.

Copyright allows creators to own and control their creative stuff, like books, music, videos, or art. It means others can’t use, copy, or share the original work without the permission of the copyright holders. To avoid plagiarism:

• One can rephrase the material.

• Quote the words of another person by using quotation marks and giving credit to avoid plagiarism.

Cyberbullying

Cyberbullying is when someone uses the internet to hurt, target, threaten, or harass others. Cyberbullying can happen through various platforms, such as social media, text messages, emails, and online forums.

One must be vigilant while using the internet since cyberbullying exists in various forms. It could be in any of the following forms:

Harassment: Sending mean or hurtful messages, repeatedly posting offensive comments, or sharing embarrassing photos or secrets of someone publicly online.

Impersonation: Pretending to be someone else and sending harmful messages or spreading false information using their name.

Cyberstalking: Constantly tracking someone online or sending threatening or intimidating messages to someone, often causing fear and distress.

Think and Tell

Phishing

Phishing is an act in which someone tricks you into revealing personal information like passwords, credit card numbers, or other sensitive data by pretending to be a trustworthy person or organisation. This usually comes in the form of messages or emails that seem authentic or from reliable sources like banks or government organisations. Phishing messages often use attachments and urgent language, claiming your account is at risk or you’ll miss something important, pushing you to act quickly.

Phishing focuses on deceiving individuals into revealing sensitive information, often for malicious goals like identity theft or unauthorised access.

Online Scams

Online scams are dishonest schemes occurring on the internet where people try to trick others into giving away money, personal information, or valuable things. Online scams cover a wide range of misleading activities, like fake offers, lottery wins, and investment fraud, where victims are promised something valuable in return to manipulate them into sending money or valuable assets.

Piracy

Piracy involves the unauthorised copying, distributing, or using of copyrighted materials like software, music, movies, or media without permission from the copyright owners. This causes financial losses for creators. Legal consequences, such as fines or criminal charges, can occur based on copyright laws.

Additionally, pirated content lacks the quality, security, and support of legitimate copies. Pirated software can even carry malware, risking harm to devices and personal data.

Imagine you wrote a story for class and someone copied your story and said they wrote it. What kind of crime is that?

Softlifting means unauthorised installing, copying, or sharing software, especially among friends and family. Softlifting is considered to be the most common form of software piracy. This breaks copyright rules and software agreements.

Think and Tell

What crime is it if your friend is receiving hurtful messages on his social media that have caused emotional stress for him?

Identity Theft

Identity theft is a crime where someone steals personal information like names and credit card details to pretend to be another person. They do this for illegal purposes or to gain money. This stolen information is used to imitate the victim, enabling the thief to secure loans in the victim’s name or acquire prescription drugs, potentially affecting the victim’s medical history.

Identity theft can lead to financial troubles, damaged credit records, and emotional distress. It is a serious crime with significant consequences.

Identity theft can occur in any of the following ways:

Phishing: Sending misleading emails or messages that seem to be from legitimate sources, asking recipients to share sensitive information.

Data Breaches: Hacking into the databases of companies or organisations to steal large amounts of personal data.

Skimming: Illegally capturing credit card information by attaching devices to ATMs, petrol pumps, or other payment terminals.

a  The internet has had a bad impact on business growth or sales.

b It is hard to talk to a friend who is far away because of the internet.

c  Thanks to the internet, money transfer is possible.

State the name of the crime.

a  Breaking into computer systems to steal data without permission.

b  Using the internet to hurt, threaten, or harass others.

c  Copying and distributing software without owner's permission.

The cybercriminals on the FBI’s most-wanted list caused people to lose $100 million.

Safe Online Computing Practices

Safe computing practices are all about protecting ourselves and our devices while using the internet and technology.

Some online safety practices are:

1. Children should always use the internet under the supervision of their parents.

2. Use passwords that are hard to guess and different for each account.

3. Keep your passwords secret and change them periodically.

4. Do not share or disclose your identity with strangers online.

5. Restrict your online profile to being checked by some trusted people only.

6. Keep your computer and phone up-to-date. Updates often fix security holes.

7. Do not click on links in emails or attachments from unknown sources.

8. When shopping or working online, stick to well-known and secure websites.

9. Set a strong password for your home Wi-Fi network to keep outsiders from sneaking in and causing trouble.

10. Do not use public Wi-Fi for online transactions, as it can increase the risk of hacking.

11. Download files from trusted sources only. Unclear downloads can bring unwanted risks to your device.

12. Be cautious when sharing pictures or your location online.

Digital Footprints

When engaging in online shopping, you may notice that the system remembers information about your prior searches. On platforms like YouTube, Instagram, Facebook, etc., you get suggestions similar to the items you recently searched for or purchased. Your online actions create digital footprints, leaving traces of your online activities.

Digital footprint is the trail of information that you leave behind when you do something online. This data is being saved and can be used for different purposes.

Digital Footprint is created every time you:

• Search for something on the internet

• Shop online

• Post a message

• Click on a link

• Watch a video

There are two types of digital footprints:

1. Active digital footprints: Active digital footprints are the data that are left behind when you knowingly share information online. For example, if you knowingly choose to post something on Instagram, you are aware that other users of the internet can view that information.

2. Passive digital footprints: Passive digital footprints are used when information about a user is gathered from him or her without their knowledge. For instance, when you “like” or “dislike” anything online, your preferences are used to customise various advertisements for goods you might find appealing.

Discuss!

What type of digital footprint is created when you search for a recipe online and the website tracks your search history to suggest more recipes?

Causes of Digital Footprints

Let’s learn what creates the traces of our online activities.

1. Browsing history: Every website you visit is recorded in your browser’s history.

2. Social media posts: Anything you post on social media platforms becomes a part of your digital footprint.

3. Searches: Search engines remember your searches and use them to show relevant advertisements.

4. Online purchases: Your online shopping history is stored on e-commerce websites.

5. Emails: Email communication leaves behind a record of your interactions.

Preventing Unwanted Digital Footprints

It is important to prevent unwanted digital footprints to maintain our privacy online. Here’s how this can be achieved:

1. Privacy settings: Adjust privacy settings on social media platforms to control who can see your posts and personal information.

2. Private browsing: Use private or incognito mode in web browsers to prevent saving your browsing history.

Incognito mode, also known as private browsing or privacy mode, lets you browse the internet without leaving behind a trace of your activity.

3. Limited sharing: Be cautious about sharing personal details online. Think before you reveal too much.

4. Regular logout: Log out of your accounts after using them, especially on shared devices.

5. Clearing cache: Periodically clear your browser’s cache, cookies, and browsing history.

6. Avoid Over-sharing: Think twice before posting personal information, location, or sensitive data online.

Computing Ethics

Computing ethics should be followed to ensure that people use technology and computers in a responsible, respectful manner. Computing ethics keep us safe online, make sure we don’t harm others, and help us make good choices on the internet.

Computing ethics, also known as computer ethics, is a branch of ethics that deals with the moral principles and guidelines governing the responsible and fair use of technology, computers, and digital information.

Here are some computing ethics principles that one can follow:

1. Respect the privacy of others and your own by not sharing sensitive information.

2. Always share correct information and do not spread fake stories.

3. Use strong passwords, update your software, and do not do harmful things like hacking.

4. Show respect for copyright by not using or sharing digital content without permission.

5. Make sure that everyone, irrespective of their limited abilities, resources, or location, can use technology easily.

6. Be clear about what you do online, especially when dealing with important tasks or choices that impact on others.

7. Keep learning about the latest in computer ethics and cybersecurity to make smart and ethical choices online.

8. Update your operating systems and other software, like antivirus, frequently.

9. Backup your important data regularly.

10. Be careful while sharing your electronic devices.

11. Buy a licensed copy of the software.

12. Make use of firewalls.

A firewall is a digital security guard for your computer or network. It helps keep out unwanted and potentially harmful data while allowing safe information to pass through.

Do It Yourself 4B

Match the practice with its description. 1

Practice

Supervising children’s internet usage

Paying online using public Wi-Fi

Data breach consequences

Keeping antivirus updated

Description

The exposure of user data, such as emails and phone numbers

Computing ethics principles that one must follow

Ensuring that the use of the internet is under parental supervision

It can increase the risk of hacking, resulting in losing all the money in the account

a  What is the potential consequence of sharing personal information, location, or sensitive data online?

i  Your online presence will become more interesting

ii  It will lead to decreased digital footprints

iii Your online security will improve

iv It will threaten your privacy and security

b  Which type of digital footprint is created when information is gathered about you without your knowledge?

i Active digital footprint

iii Public digital footprint

c What is one of the goals of computing ethics?

i Spreading fake stories

iii Hacking

Points to Remember

ii Passive digital footprint

iv Private digital footprint

ii Preventing harm

iv Ignoring privacy

1 The internet lets us book tickets online, shop, talk to friends, and pay bills, no matter where we are.

2 The internet helps businesses grow by reaching more people, doing worldwide transactions, and communicating easily.

3 Hacking is the process of breaking into a computer system, a website, or an online account without permission.

4 Spams are unsolicited and often repetitive messages sent to a large number of people over the internet.

5 Plagiarism means taking words, ideas, or images from someone else and presenting them as one’s own work. It is considered a crime or an act of fraud.

6 Cyberbullying is when someone uses the internet to hurt, target, threaten, or harass others.

7 Phishing is when someone tricks you into sharing private information, like passwords or credit card numbers by pretending to be someone you trust.

8 Online scams are tricky schemes on the internet where people try to trick others into giving away money, personal information, or valuable items.

9 Piracy is when people copy or use copyrighted things, like software, music, or movies, without permission from the owners.

10 Identity theft is a crime where someone steals personal information, like names and credit card details, to pretend to be another person.

11 To be safe online, create strong passwords and update them regularly.

12 Avoid clicking on links from unknown sources to stay safe.

13 Digital footprint is the trail of information that you leave behind when you do something online.

14 Incognito mode lets you browse the internet without leaving behind a trace of your activity.

15 Computing ethics deals with the moral principles and guidelines governing the responsible and fair use of technology, computers, and digital information.

Chapter Checkup

A. Fill in the Blanks.

Hints cyberstalking   ethical   private browsing   firewall   spams

1 are unsolicited and often repetitive messages, sent to a large number of people over the internet.

2 An hacker works for governments or cybersecurity firms.

3 Constantly tracking someone online is called .

4 lets you browse the internet without leaving behind a trace of your activity.

5 A is a digital security guard for your computer or network.

B. Tick () the Correct Option.

1 What is the primary purpose of white hat hackers?

a To spread viruses and malware

c To explore computer systems for fun and learning

2 What is the purpose of online scams?

a To provide free services to users

c To enhance online security measures

b To steal sensitive information

d To keep organisations safe from security risks

b To trick individuals into sharing personal information or money

d To educate people about ethical hacking

3 Which of the following is a good practice to prevent unwanted digital footprints?

a Sharing personal details openly

c Clearing cache and cookies regularly

b Logging into accounts on public computers

d Using the same password for all accounts

4 Which of the following is an example of an ethical computing practice?

a Sharing someone else’s work without permission

c Spreading rumours online

b Creating strong and unique passwords

d Ignoring software updates for security reasons

5 Which of the following is NOT a recommended online safety practice?

a Using strong and unique passwords

c Keeping operating system and antivirus updated

b Sharing personal information with strangers

d Using private browsing mode

C. Who Am I?

1 I let you book tickets or pay electricity bills from the comfort of your home.

2 I am a bunch of unwanted and repetitive advertisements in the emails of the users.

3 I am the act of unauthorised installing, copying, or sharing software without permission, usually among friends and family.

4 I am a law that grants creators ownership and control over their creative works.

5 I am the type of digital footprint that remains when you knowingly share information online.

D. Write T for True and F for False.

1 The internet restricts us from booking tickets online.

2 The internet enables us to learn about different subjects and acquire new skills.

3 Piracy is the unauthorised copying or distributing of copyrighted materials.

4 Digital footprints do not leave any hints of we do online.

5 Keeping software updated is not necessary for cybersecurity.

E.

Answer the Following.

1 What is the internet?

2 What is softlifting?

3 What are some computing ethics principles?

4 What are digital footprints? Write their types.

5 What are some ways you can recognise spam?

F. Apply Your Learning.

1 Pranjal visits random and unsafe websites and enters his details on them, and as a consequence, he receives plenty of unwanted emails. What are these unwanted emails called?

2 Priya and Moni created an art project about “Save Wildlife” that won a competition. Unfortunately, someone stole their work and shared it online without permission. What crime did they become victims of?

3 During COVID-19, the avoidance of exchanging physical cash was supported by the internet. How did the internet help in this situation?

4 Ramya was searching for shoes. Later, she received suggestions from various shoe brands in the form of advertisements. Why did these advertisements appear?

5 Arnav sees a funny photo of one of his friends on social media, and he wants to share it on his own social media account. What do you think he should do to ensure he does not violate anyone’s rights and share the content properly?

Spreadsheets and Their Uses

Imagine that your mother plans to start giving you pocket money of ₹500 to help you learn the value of money. At the end of the month, your mother asks you how you spent the money and how much you have saved. You tell her roughly but do not have an exact record of your expenses and savings.

You can have an exact record of your expenses and savings using a tool called a spreadsheet.

A spreadsheet is a tool for storing data, performing computations, organising information, and analysing data in a tabular format.

There are various spreadsheet tools such as Microsoft Excel, Google Sheets, and LibreOffice Calc. Microsoft Excel requires a license to use, whereas Google Sheets and LibreOffice Calc are web-based applications that are free to use and allow multiple users to work on the same spreadsheet simultaneously.

We will be learning Google Sheets to prepare a spreadsheet for your expenses.

Uses of Spreadsheets

Before we start, let us learn about the uses of spreadsheets.

1. Tracking expense and savings: Spreadsheets can be used to track income and expenses, create budgets, and set financial goals.

The first spreadsheet program was VisiCalc, which was released in 1979. Did You Know?

2. Organising data: Spreadsheets can be used to organise data in many ways, such as creating lists, tables, and charts.

3. Performing calculations: Spreadsheets can be used to perform a variety of calculations, such as adding, subtracting, multiplying, and dividing numbers. We can even perform complex calculations such as those related to trigonometric functions and statistical analysis.

4. Creating charts and graphs: Spreadsheets can be used to create charts and graphs to visualise data.

Creating a Google Spreadsheet

Let us create a Google spreadsheet for tracking our monthly expenses.

Steps to create and name a spreadsheet:

1. Open the Chrome browser and then go to https://docs.google.com/spreadsheets/.

2. Click the plus sign to open a blank spreadsheet.

3. Rename the spreadsheet at the top-left corner by replacing ‘Untitled spreadsheet’ with your project name.

Discuss!

What are some other things we can do with spreadsheets?

Components of a Google Sheets Window

A spreadsheet is made up of rows and columns. These rows and columns form a grid or a table.

A Google Sheets window has the following components:

• Cells: Cells are the small boxes in a spreadsheet where you can enter data.

• Rows: Rows are the horizontal lines of cells in a spreadsheet. Rows are numbered 1, 2, 3, and so on.

• Columns: Columns are the vertical lines of cells in a spreadsheet. Columns are labelled with the letters A, B, C, and so on.

• Active cell: An active cell is the cell that is currently selected. During selection, it is highlighted with a blue border.

• Cell address: A cell address is the name of a cell in a spreadsheet. This address is made up of a column letter and a row number, such as A1 or B3.

• Formula bar: The formula bar is located above the spreadsheet. In this bar, you can enter and edit formulas, which are used to calculate values in cells.

• Sheet tab: A sheet tab is a labelled tab located at the bottom of the spreadsheet window. You can have multiple sheets in Google Sheets by adding more sheet tabs.

Think and Tell

Identify rows and columns for cell B26 and C71.

Moving Around a Spreadsheet

We can move around in a spreadsheet, using the arrow keys to change an active cell and look at different information. To move left, press the left arrow key. To move right, press the right arrow key. To move up, press the up arrow key; and to move down, press the down arrow key.

Do It Yourself 5A

Match the columns.

Column A

Active cell

Formula bar

Cell address

Spreadsheet The currently selected cell 1

2

Answer the following.

a What are cells?

Column B

Enter and edit formulas

Name of a cell in a spreadsheet that contains a column letter and a row number

A tool for storing data, performing computations, organising information, and analysing data

b What is the blue highlighted box known as?

c What is a cell address?

d With what component can we access multiple sheets within Google Sheets?

e How can we change an active cell?

Entering Data

To enter data in a cell, first click the cell to select where you want to type and then start typing.

Now, let us start our project to track our monthly expenses.

Type the given data in a spreadsheet:

We entered the names of the items we bought and their prices. As you can see, the values in a data cell can be of various types. Let us learn about the data types Google Sheets can have.

Data Type

There are two main data types a cell can have in Google Sheets:

1. Numbers: Numbers can be integers or decimals. They can also be positive or negative.

Numbers

2. Text: Text is a sequence of characters. These characters can be letters, numbers, or operators. Text can also include date and time.

Text Numbers

Think and Tell

Identify the type of data if the entered value in a cell is ‘Hello_@’.

Using Formulas and Functions

Now, we have a record of our monthly expenses on the spreadsheet. To find out how much money we spent in a month, we need to use a formula.

Adding Formulas

A formula is a logical expression of numeral values and operators (+, –, /, ×, %) to do the calculations.

For example, you can add a formula in a cell to add up the numbers in the entire column or to find the average of a group of numbers.

In a spreadsheet, formulas are made up of numbers, operators, and cell addresses.

Let us find out the total amount of money spent in a month by adding a formula in the prices column (B column).

To calculate the total monthly expense:

1. Select the cell where you want the total monthly expense to appear.

2. Type the ‘=’ sign, followed by the cell address you want to add, separated by the ‘+’ operator.

For example: =B2+B3+B4+B5+B6.

Now, let us find the average price of the items bought in the month. To do this, we will add up the prices of all the items and then divide the sum by the number of items.

To calculate the average price of the items:

1. Select the cell where you want the average price to appear.

2. Type the formula to find the average price.

For example: =(B2+B3+B4+B5+B6)/5.

We learnt how to add a formula in a cell to perform calculations in a spreadsheet. However, there is a quicker method for calculations, which is known as a function.

Using Functions

In Google Sheets, we have several built-in functions for various operations.

Functions in Google Sheets are the formulas that are already available. They can analyse data and perform calculations on it.

A function can be applied to a cell range, which is a group of adjacent cells (cells located next to each other).

A cell range is defined by specifying the starting cell and the ending cell. This range includes all the cells that fall between these two cells in a continuous sequence.

Cell ranges are represented using a colon (:) that separates the starting and ending cells.

Refer to the given table to learn about the built-in functions available in Google Sheets. Cell ranges and cell addresses given in the table can be referred to from the monthly expenses project that we have created in Google Sheets.

Function Name

SUM Calculates the sum of the values in a cell range.

AVERAGE Calculates the average of the values in a range of cells.

PRODUCT Multiplies the values in the specified range of cells.

MOD Returns the remainder of the division of a number by a divisor.

SQRT Returns the square root of a number.

INT Rounds the number to an integer value.

POWER Returns the result of raising a number to a specified power.

Input =SUM(B2:B6)

Output 420

Input =AVERAGE(B2:B6)

Output 84

Input =PRODUCT(B2:B6)

Output 750000000

Input =MOD(B3,7)

Output 1

Input =SQRT(36)

Output 6

Input =INT(–25.6)

Output –26

Input =POWER(B6,3)

Output 27000

ABS Returns the absolute value of a given number. Input =ABS(–23)

Output 23

COUNT Counts the number of cells in a range that contain numbers.

MIN Returns the lowest value in a range of cells.

Input =COUNT(B2:B6)

Output 5

Input =MIN(B2:B6)

Output 30

Function Name

Purpose

Example

MAX Returns the highest value in a range of cells. Input =MAX(B2:B6)

Output 250

IF Verifies if the provided condition is met. This function returns value1 when the condition is true and value2 when the condition is false.

CONCATENATE Combines multiple text strings into one.

LEN Returns the length of the text string.

UPPER Converts the text into capital letters.

LOWER Converts the text into small letters.

TODAY Returns the current date.

NOW Returns the current date and time.

=IF(condition, value_if_true, value_if_ false)

Input =IF(B2<50,’Affordable item’,’Costly item’)

Output Costly item

Input =CONCATENATE (A5,A3)

Output ColoursSnacks

Input =LEN(A1)

Output 5

Input =UPPER(A5)

Output COLOURS

Input =LOWER(A6)

Output canteen food

Input =TODAY ()

Output 10/26/2023

Input =NOW()

Output 10/26/2023 9:41:52

Let us try to calculate the total expenses and the average price using the built-in functions.

SUM() Function

The SUM() function is used to calculate the sum of the values in a cell range.

To calculate the total monthly expense using the SUM() function:

1. Click the cell where you want the sum to appear.

2. Type the ‘=’ sign, followed by the function name with round brackets = SUM()

3. Inside the round brackets, add the cell range you want to calculate, i.e., =SUM(B2:B6)

4. To get the total monthly expense, press Enter

AVERAGE() Function

420

The AVERAGE() function is used to calculate the average of the values in a range of cells.

To calculate the average price of the items using the AVERAGE() function:

1. Click the cell where you want the average to appear.

2. Type the ‘=’ sign, followed by the function name with round brackets =AVERAGE().

3. Inside the round brackets, add the cell range you want to calculate, i.e., =AVERAGE(B2:B6).

4. To get the average price, press Enter.

Explore More!

Discuss!

Saving and Closing a Sheet

Now, we have a complete and accurate record of what and how much we spent in a month. Whenever we create something on a computer, we need to save it so that we can come back to it later to check or update it, as needed.

However, Google Sheets makes this even easier with its autosave feature that automatically saves your data every time you make a change.

When done, you can close the spreadsheet by clicking Close

Observe the given table.

Identify and write down the values that the given functions will return.

a  =COUNT(B2:B7)

b  =AVERAGE(B5:B7)

c  =LEN(A6)

d  =UPPER(A5)

Which function returns the remainder of the division of a number by a divisor?

a  SUM()

c  PRODUCT()

Points to Remember

b  AVERAGE()

d  MOD()

1 A spreadsheet is a tool for storing data, performing computations, organising information, and analysing data in a tabular format.

2 An active cell is a cell that is currently selected. When selected, it is highlighted with a blue border.

3 A cell address is the name of a cell in a spreadsheet. It is made up of a column letter and a row number, such as A1 or B3.

4 A sheet tab is a labelled tab located at the bottom of the spreadsheet window. You can have multiple sheets in a Google Sheets by adding more sheet tabs.

5 You can move around in a spreadsheet using the arrow keys to change the active cell and look at various types of information.

6 A cell can have two main data types in a Google Sheets: numbers and text.

7 A formula is a logical expression of numeral values and operators (+, –, /, ×, %) to do the calculations.

8 Functions in Google Sheets are formulas that are already available. These functions can analyse data and perform calculations.

9 A cell range is defined by specifying the starting cell and the ending cell. This range includes all the cells that fall between these two cells in a continuous sequence.

Chapter Checkup

A. Fill in the Blanks.

Hints functions   spreadsheet   autosave   formula bar   cell range

1 A is a tool for storing data, performing computations, organising information, and analysing data in a tabular format.

2 The is located above the spreadsheet.

3 The SUM() function is used to calculate the sum of the values in a

4 are the built-in formulas that analyse data and perform calculations on it.

5 Google Sheets has feature that automatically saves data every time you make a change.

B. Tick () the Correct Option.

1 Which of the following is the correct way to write the SUM() function?

a =SUM(B2-B6)

c =SUM(B2:B6)

b =SUM(B2+B6)

d =SUM(B2 * B6)

2 What is the cell address for the cell in the fifth column and third row?

a C3

b C5

c E3 d F3

3 What is the output of the formula =SQRT(16) in Google Sheets? a 2 b 4

c 8 d 16

4 Which symbol is used to begin a formula in Google Sheets?

a = (equals sign)

c – (minus sign)

b + (plus sign)

d * (asterisk)

5 Which function is used to combine multiple text strings into one?

a CONCATENATE

b LEN

c UPPER d LOWER

C. Who Am I?

1 I am a function used to multiply the values in the specified range of cells.

2 I am a function used to return the absolute value of a given number.

3 I am a function used to verify whether a provided condition is met.

4 I am a function that converts text into lowercase.

5 I am a function that returns the length of a text string.

D. Write T for True and F for False.

1 An active cell is a cell that is currently selected.

2 Rows are the vertical lines of cells in a spreadsheet.

3 MAX returns the lowest value in a range of cells.

4 COUNT returns the number of cells in a range that contain numbers.

5 MOD returns the square root of a number.

E. Answer the Following.

1 List the common uses of spreadsheets.

2 Which function is used to find the minimum value in a range of cells? Give an example.

3 What are the basic components of the Google Sheets window? Name any three.

4 What is the output of the following formula?

=UPPER(‘hello’)

5 What is the output of the following formula? =CONCATENATE(‘Hello’, ‘world!’)

F. Apply Your Learning.

1 What is the output of the following formula, given that the value of the cell C1 is 50?

=IF(C1>10, ‘Greater than 10’, ‘Less than or equal to 10’)

2 Explain the purpose of the IF function in Google Sheets. Use this function to check if the value in cell H1 is greater than 50. If it is, display ‘Yes’; otherwise, display ‘No’. Provide the formula and the result.

3 Create a formula that multiplies the values in cells J1 and J2 and then adds the result to the value in cell J3. Display both the formula and the final result.

4 Observe the given table.

Now, write the formula and the result for the following questions.

a What is the total cost of all the stationery items in the table?

b Which stationery item is the most expensive?

c Which stationery item is the least expensive?

d What is the average price of a stationery item in the table?

Selecting Cells

In the previous chapter, you learnt how to enter data in a spreadsheet and how to use formulas and functions. Now, we will learn about some advanced features of spreadsheets, such as copying and moving data, inserting and deleting cells, undo, redo, and autofill.

Let us learn to select cells first. We often need to select a group of cells to perform various operations such as copying, moving, inserting, or deleting.

We can select cells in a Google Sheet in various ways:

1. Selecting a cell: Left-click on the cell you want to select.

3. Selecting a column: Left-click on the column letter to select all cells in a column.

5. Selecting all data cells: Select a cell holding some data and then press Ctrl + A shortcut key. All the cells containing data will be selected.

2. Selecting a row: Left-click on the row number to select all cells in a row.

4. Selecting multiple cells: Click on the required starting cell and then drag the mouse to the last cell you want to select.

6. Selecting all cells in a sheet: To select all the cells in a sheet, select a blank cell and press Ctrl + A

If you select a data cell, then press the Ctrl + A twice to select all the cells in a sheet.

Changing Cell Data

Changing cell data refers to modifying, replacing, or deleting the data in a cell.

You can follow these steps to change the cell data:

1. Click on the cell you want to edit. A blue border will appear to indicate that it is now the active cell.

2. Start typing to edit or replace the existing data. The new data will appear in the cell as you type.

Did You Know?

Spreadsheets support real-time collaboration, meaning multiple users can work on the same spreadsheet simultaneously.

3. Confirm the changes by changing the active cell using the arrow keys or pressing the Enter key.

Discuss!

Why is it important to know how to select, edit, and format cells in a spreadsheet?

Copying and Moving Cell Data

In Google Sheets, you can copy the data of a cell and paste it in the same sheet or in a different one. You can also move the data and keep it at some other place in the same sheet or a different one. Let us see how to copy and move data from one place to another.

Copying Cell Data

Copying cell data means copying the data from one or more cells and pasting it into another cell or cells in the same spreadsheet or another one. This will keep the data in both places.

You can follow these steps to copy cell data:

1. Select the cell or cells you want to copy.

2. Go to the Edit menu and choose the Copy option to copy the selected cell(s).

OR

Right-click and choose the Copy option from the pop-up menu to copy the selected cell(s).

OR Press the Ctrl + C shortcut key on the keyboard to copy the selected cell(s). The cell data will be copied.

Pasting Cell Data

You can follow these steps to paste the copied cell data:

1. Select the cell where you want to paste the copied cell data.

2. Go to the Edit menu and choose the Paste option to paste the copied cell data.

OR Right-click on the cell and choose the Paste option from the pop-up menu to paste the copied cell data.

OR Press the Ctrl + V shortcut key on the keyboard to paste the copied cell data. The cell data will be pasted.

Pasted data

Match the columns. 1

Column A Column B

Shortcut key to paste copied cell data

Copy option icon Ctrl + C

Paste option icon

Shortcut key to copy selected cell(s)

Answer the following.

a How can you change cell data in a Google Sheet?

Ctrl + V

b What are the ways to copy cell data in a Google Sheet?

Moving Cell Data

Moving cell data means cutting the data from one or more cells and pasting it into another cell or cells in the same spreadsheet or another one. The data will only be in one place after you move it.

You can follow these steps to move cell data:

1. Select the cell data to be moved.

2. Go to the Edit menu and choose the Cut option to cut the selected data.

OR Right-click and choose the Cut option from the pop-up menu to cut the selected data.

OR Press the Ctrl + X shortcut key on the keyboard to cut the selected data.

A dashed border around the cut data will appear.

3. Select the cell where you want to move the cut cell data.

4. Choose any of the three ways to paste the cell data. The data will be moved to the new cells.

Deleting Cell Data

Deleting cell data means removing the data from a cell and making it blank.

You can follow these steps to delete cell data:

1. Select the cell(s) from which you want to delete the data.

2. Press the delete key on the keyboard to delete data from the selected cells. The cells will be blank.

Undo and Redo

Undo and Redo are two useful features that save our time and help us avoid mistakes such as accidentally removing a row of data, entering the wrong data, or applying the wrong formula.

You can reverse or repeat recent changes made in a spreadsheet using the undo and redo commands.

Undo

The Undo feature allows you to undo or revert recent changes made in a spreadsheet.

You can follow these steps to undo changes:

1. Go to the Edit menu and choose the Undo option. Selecting a cell Selecting a group of cells

OR Click on the Undo option in the toolbar.

OR

Press the Ctrl + Z shortcut key on the keyboard. The last change made will be reverted.

Redo

Imagine that you undo some changes you made, but later you realise that you want those changes back. Instead of making the changes again, you can use the redo command.

The redo feature allows you to redo or repeat the recent changes. It will redo the last change that you have undone using the undo command.

You can follow these steps to redo changes:

1. Go to the Edit menu and choose the Redo option.

2

OR

Click on the Redo option in the toolbar.

OR

Press the Ctrl + Y shortcut key on the keyboard. The last change undone will be repeated.

Think and Tell

When do you think undo and redo can be helpful?

Do It Yourself 6B

Which keyboard shortcut is used to cut the cells in a spreadsheet? a Ctrl + C

Ctrl + X

Match the following with their meaning.

Column A

Moving cell data

Redo

Undo

It lets you do something again that you did before. 1

Deleting cell data

Column B

It reverses your last spreadsheet action.

This means removing the content from a cell.

The process of relocating information from one location to another within or between spreadsheets.

Inserting a Cell, Column, and Row

You can insert a cell, column, and row as you require. Let us see how you can do it.

Inserting a Cell

Inserting a cell means adding a cell within a row or column.

You can follow these steps to insert a cell:

1. Select the cell where you want to insert the new cell.

2. Right-click on the cell and choose Insert cells > Insert cells and shift right option from the shortcut menu.

The cell will be inserted, shifting the existing cells to the right.

OR Right-click on the cell and choose Insert cells > Insert cells and shift down.

The cell will be inserted, shifting the existing cells downwards.

Inserting a Column

Inserting a column means adding a new column to a spreadsheet. We can add a column to the left or right of an existing column.

You can follow these steps to insert a column:

1. Choose the column next to where you want to add a new column.

Left-click on the column letter to select the column.

2. Right-click and select the Insert 1 column left option from the pop-up menu.

A new column will appear on the left-hand side of the column.

OR

Right-click and select the Insert 1 column right option from the pop-up menu.

A new column will appear on the right-hand side of the selected column.

Inserting a Row

Inserting a row means adding a new row in a spreadsheet. We can add a row above or below an existing row. You can follow these steps to insert a row:

1. Choose the row next to where you want to add a new row.

Left-click on the row number to select the row.

2. Right-click and select the Insert 1 row above option from the pop-up menu.

A new row will appear above the row.

OR

Right-click and select the Insert 1 row below option from the pop-up menu.

A new row will appear below the row.

Deleting a Cell, Column, and Row

You can delete a cell, column, and row as you require. Let us see how you can do it.

Deleting Cells

Deleting a cell or cells means removing the selected cells. After deleting the cell(s), the surrounding cells will shift to fill the gap.

You can follow these steps to delete cells:

1. Select a cell or cells you want to delete.

2. Right-click and select the Delete cells > Delete cells and shift left option from the pop-up menu.

The cell will be deleted and cells next to it will be shifted to the left.

OR

1. Select a cell or cells that you want to delete.

2. Right-click and select the Delete cells > Delete cells and shift up option from the pop-up menu.

The cell will be deleted, and cells next to it will be shifted upward.

Deleting Columns

Deleting columns means removing one or more columns. You can follow these steps to delete a column:

1. Left-click on the column letter to select the column you want to delete.

2. Right-click and choose the Delete column option from the pop-up menu to delete the column.

The column will be deleted, and the column on the right will be shifted left.

Deleting Rows

Deleting rows means removing one or more rows. You can follow these steps to delete a row:

1. Left-click on the row number to select the row you want to delete.

2. Right-click and choose the Delete row option from the pop-up menu to delete the row.

The row will be deleted, and the row below will be shifted up.

Applying Autofill

Autofill is a feature that allows you to automatically fill in a series of cells with data based on the pattern of the first few cells.

You can follow these steps to autofill a series of cells:

1. Select the cells for the pattern to be followed to generate new data and fill the series of cells with it.

2. Hold the left mouse button and drag the Fill Handle (the small dot that appears at the bottom-right corner of the last cell of the selection) to autofill the cells with new data.

Autofill can be used to generate number series, date series, and text series.

Do It Yourself 6C

Which of the following is NOT a step to insert a cell in a spreadsheet?

a Select the cell where you want to insert the new cell.

b Left-click on the cell and choose Insert cells, then shift right.

c Right-click on the cell and choose Insert cells, then shift right.

d Right-click on the cell and choose Insert cells, then shift down.

How do you delete a column?

a Left-click the column letter to delete the column.

b Right-click the column letter and choose the Delete column option from the pop-up menu.

c Left-click the column letter and press the Delete key.

d Right-click the column letter and press Ctrl + X.

What is the purpose of the fill handle in Autofill?

a To change the font style of selected cells.

b To insert new rows or columns.

c To fill a series of cells based on a pattern of data.

d To perform calculations in the selected cells.

What kind of series can you create using Autofill if you enter "Monday" in one cell and "Tuesday" in the next cell?

a A series of numbers.

b A series of random texts.

c A series of days of the week.

d Autofill cannot be used with text.

Points to Remember

1 Cells can be selected in Google Sheets by:

a Clicking on a cell.

b Clicking on a row number to select all cells in a row.

c Clicking on a column letter to select all cells in a column.

d Holding left-click and dragging the mouse over multiple cells.

e Pressing the Ctrl + A shortcut key to select all the cells.

2 Changing cell data means modifying, replacing, or deleting the data in a cell.

3 To replace existing cell data, select the cell and type over it. Press the Enter key or click away from the cell to confirm the change.

4 Copying cell data means to copy the data from one or more cells and paste it into another cell or cells in the same spreadsheet or another one. This will keep the data in both places.

5 Moving cell data means to cut the data from one or more cells and paste it into another cell or cells in the same spreadsheet or another one. The data will only be in one place after you move it.

6 Deleting cell data means removing the data from a cell and making it blank.

7 The undo feature allows you to undo or revert recent changes made in a spreadsheet.

8 The redo feature allows you to redo or repeat the recent changes. It will redo the last change that you have undone.

9 Inserting a cell means adding a cell within a row or column.

10 Inserting a column means adding a new column to a spreadsheet. We can add a column to the left or right of an existing column.

11 Inserting a row means adding a new row in a spreadsheet. We can add a row above or below an existing row.

12 Deleting a cell or cells means removing the selected cells, and the surrounding cells will shift to fill the gap.

13 Deleting rows or columns means removing one or more rows or columns from a Google Sheet.

14 Autofill is a feature that allows you to automatically fill in a series of cells with data based on the pattern of the first few cells.

Chapter Checkup

A. Fill in the Blanks.

Hints

1 To copy cell data, you can use the shortcut key.

2 Undo allows you to the most recent change.

3 allows you to reapply actions you have previously undone.

4 To paste cell data, you can use the shortcut key.

5 To select multiple cells, hold the left mouse button and the mouse.

B. Tick () the Correct Option.

1 After selecting a cell, you can replace its data by .

a Clicking

c Typing

2 Which shortcut key combination can be used to paste cell data?

a Ctrl + C

c Ctrl + V

3 What does the undo feature do?

a Delete the selected cell

c Apply formatting

4 What is Autofill used for?

a To automatically fill in a series of cells with data based on the pattern of the first few cells

c To move data from one cell to another

5 How can you delete a cell in Google Sheets?

a Press the Delete key

c Right-click on the cell, select Delete cells and shift up

b Deleting

d Formatting

b Ctrl + Z

d Ctrl + Y

b Adds a new row or column

d Reverses the most recent change

b To copy and paste data from one cell to another

d To delete data from a cell

b Right-click on the cell, select Delete cells and shift left

d All of these

C. Who Am I?

1 I am the process of cutting and pasting cell data.

2 I am a way to select multiple cells with a mouse.

3 I am the small dot that appears at the bottom-right corner of a cell.

4 I am the shortcut key to select all cells in a Google Sheet.

5 I help you automatically fill in a series of cells with data based on a pattern.

D. Write T for True and F for False.

1 To select an entire row, you can left-click on the row number.

2 To insert a new row, you can left-click on the row number and select Insert 1 row above or below.

3 To select multiple cells, you can hold down the left mouse button on the first cell in the range and then drag the mouse to the last cell in the range.

4 Deleting a row in a spreadsheet will shift the remaining rows left to fill the gap.

5 You can use autofill to generate number series only.

E. Answer the Following.

1 What is the difference between copying and moving cell data?

2 How do the undo and redo features work?

3 Write the steps to insert a column.

4 How can you use Autofill in a Google Sheet?

5 What are the different types of series that Autofill can generate?

F. Apply Your Learning.

1 You are making a spreadsheet to keep track of how many books you read in a year. You want to choose the cells in the row for the month of January so that you can type the number of books you read that month. How can you choose the cells in the row for the month of January?

2 Rahul is making a budget table with different types of expenses and how much he spends on each one. He has missed an entry. How can he add a new row in between for the missed entry in his budget table?

3 You want to create a schedule for your next school project. You create a column with the header "Day" and then fill in Monday and Tuesday in the two cells below. How can you autofill the remaining days?

4 Ananya has a spreadsheet with some information. She needs to delete a group of cells that have wrong information. How can she delete a range of cells from a spreadsheet?

5 Shreya keeps track of the items that she sells in her store. She needs to add a new column to track how many of each item are left. How can she add a new column to track the availability of the items?

Introduction to Database

We are surrounded by data all the time. It is basically the information that we can use to learn about things and make decisions.

Take the example of your school. It keeps data about all the students, like their names, ages, grades, and library card numbers, to maintain records and track their progress.

Databases are a way to organise and store data so that it is easy to find and use. Databases are used by a wide range of users, including schools, businesses, and scientists.

Imagine your school library without a database. In that case, your school will not know what books are there, which books are issued to whom, and which books are needed.

A database is an organised collection of data that is stored electronically on a computer system.

Databases are made up of tables. Each table contains information about a specific topic.

Importance of Database

Databases help us store information in a way that is organised, easy to find, and secure.

Here are some of the reasons why databases are important:

 Handle a huge amount of data: Databases can store a huge amount of data, which is helpful for keeping track of customers, products, or inventories.

 Organisation: Databases help to keep data organised and easy-to-find. They store data in tables made of rows and columns, making it simple to search, sort, and create reports.

 Efficiency: Databases can help improve efficiency by reducing the amount of time and effort required to find and manage data.

 Accuracy: Databases can help improve the accuracy of data by eliminating the need for manual data entry. This can help reduce errors and improve the overall quality of the data.

 Centralisation: Keeping all the information in one place helps structure data, prevents duplication, saves space, and makes you work better and faster, boosting productivity.

 Data integrity: Data integrity means making sure data is accurate, complete, and consistent from start to finish. It is important because it affects the quality of decisions based on the data.

 Security: Databases can be protected with passwords and other security measures to keep our information safe from unauthorised access.

 Scalability: Databases can grow to hold a lot of data and handle many users. That is why they are ideal for all kinds of organisations, big and small.

 Avoid data redundancy: Data redundancy means when the same data is stored in multiple places within a database. To make data management more efficient and secure, we can reduce redundancy by organising data using specific rules or using special software to keep one trustworthy source of data.

 Collaboration: Collaboration in a database means that lots of people can work on it together without causing problems. Also, it is very easy in a database to check what changes each person has made because their name and ID are recorded for each change they make.

Explore More!

Objects of a Database

The objects of a database are the building blocks that make up a database. They are used to store and organise data in a way that is efficient and easy to access.

The main objects of a database are:

 Tables: Tables are the basic building blocks of a database. A table is a collection of rows and columns, where each row represents a single record and each column represents a single piece of data about the record.

 Queries: A query is a request for data from a database. Queries can be used to retrieve, store, update, or delete data in a database. They also help to generate reports, perform data analysis, find and fix data errors, and more.

 Reports: Reports are used to display data from a database in a formatted and organised way. They can be used to generate invoices, statements, mailing lists, and other types of documents.

 Forms: Forms are user-friendly interfaces used to enter, edit, or get data from a database. They can be used to create new records, update existing records, and delete records.

Database

Management System (DBMS)

A DBMS (Database Management System) is a software that helps us store, retrieve, and manipulate data in a database.

The first DBMS was developed in the early 1960s by Charles Bachman. Did You Know?

Big Data is a huge collection of information. Companies use it to recommend movies, and songs, you might enjoy. Know more about Big data by scanning this QR code.

It acts as an interface between the database and user applications. It protects and keeps the database safe by restricting access for multiple users.

Components of DBMS

Database Management System consists of six main components. These are:

 Hardware

 Software

 People

 Procedures

 Data

 Database Access Language

1. Hardware: The hardware of computers consists of physical components such as a keyboard, mouse, monitor, and processor.

Hardware captures the data and presents the output to the user. For example, input devices like a keyboard and mouse help us take input from the user, and storage devices such as a hard disk store that data. The CPU then processes the data and provides the output through output devices like a monitor or printer.

2. Software: Software is a set of programs that help hardware perform its job. It is made up of procedures and programs that can understand the language used for databases.

Some examples of DBMS software are MySQL, Oracle, SQL Server, dBase, FileMaker, Clipper, and Microsoft Access. FoxPro is a discontinued DBMS developed by Microsoft.

Did You Know?

Smart home gadgets, such as those that control lights and music, use databases to work.

People: People interacting with computers are also referred to as the “live-ware” of the computer system.

They form the most crucial part of the DBMS.

These individuals control and manage databases, performing various operations within the DBMS. This group comprises the database administrators, software developers, and end-users.

4. Procedures: A procedure is a form of general instructions or guidelines for using a DBMS. These instructions include how to set up the database, install it, log in and out, manage it, create a backup, and generate reports from the database.

5. Data: These are the actual pieces of information, like numbers or text, that are input into a computer system.

Data refers to the collection of raw facts stored in a database.

The database contains both the actual data and metadata. Metadata can be defined as data about the data.

For example, when you want to store data in a database, you need to identify the attributes needed to organise that data, such as the size of the data, name, and other related details. These specific pieces of information about the data to be stored are known as metadata

Discuss!

Share any creative tips or tools you use to manage your digital belongings.

6. Database Access Language: Database Access Language is a language that allows users to give commands to a database to operate the stored data. You can use this language to ask the database to do many things, such as getting data, modifying it, or removing it.

The most widely used Database Access Language is SQL. SQL stands for Structured Query Language.

Types of DBMS

There are four main types of DBMS:

Hierarchical DBMS

Hierarchical databases are like trees, where each piece of data has one parent and zero or more children. This makes it easier to add and remove data, but it can be difficult to find specific pieces of data.

Hierarchical databases were invented in the 1960s and were used to store data on big computers. Today, they are still used in some applications, such as the Microsoft Windows Registry and XML.

In a hierarchical database, the top-level data element is called the root node. It is like the trunk of the tree, and all of the other data elements are like the branches and leaves.

The endpoints of the branches are called leaves. Leaves contain the actual data, while the branches just show how the data is related to each other.

Consider the example of a hierarchical database.

In this example, the root node is the parent of child nodes 1, 2, and 3. Child node 1 is the parent of Grandchild node 1.

Relational DBMS

A relational database management system (RDBMS) is a software program that helps us to store and manage data in a relational database. A relational database is a type of database that stores data in tables, often called relations, and links them together based on defined relationships.

RDBMSs are the most common type of database, and they are used by all sorts of businesses and organisations. Some common examples of RDBMS are MySQL, Microsoft SQL Server, and Oracle.

RDBMSs use a language called SQL to access and manage data. SQL is a relatively easy language to learn, which is why RDBMSs are so popular.

In the example, there are three columns (student_id, student_name, and grade_level) and 5 rows.

NoSQL DBMS

NoSQL DBMS stands for not only SQL database management system. NoSQL databases are different from relational databases. Relational databases store data in tables with rows and columns.

NoSQL databases use flexible data storage methods, including key-value pairs, document-oriented collections, column-family stores, and graph databases. Some examples of NoSQL databases are MongoDB, Cassandra, DynamoDB, and Redis.

NoSQL databases are often used for big data applications. This is because they can scale easily to handle large amounts of data.

Here is an example of a NoSQL database:

In this example, there are 3 rows or records with a key and columns or attributes as values for the key. The columns can be the same or different across the keys. This is how NoSQL supports flexible data to store for each key.

Object-oriented DBMS

Object-oriented database management systems (OODBMSs) are different from relational database management systems (RDBMSs). RDBMSs store data in tables, while OODBMSs store data in objects.

Objects are like boxes that can store all sorts of data, such as a person’s name, address, and phone number. Objects can also store relationships between each other. Many objects of the same type form a class.

OODBMSs are often used for complex applications, such as engineering and telecommunications applications. They are also used for applications that need to store a lot of data, such as social media applications.

Here is an example of OODBMS:

In this example, Sahil is an object of the Employee class. He has different relationships with other objects, such as:

1. He works in the Technical department.

2. He lives in Delhi.

3. He has the phone number 9967188451.

The words “works”, “lives”, and “has” represent the relationships.

Write T for true and F for false.

a A table stores data in rows and columns.

b Databases cannot reduce data redundancy.

c A query is used to generate reports, perform data analysis, and find data errors.

d Hierarchical databases are ideal for finding specific pieces of data easily.

e People who control and manage databases are referred to as “live-ware”.

Column A

Column B

Database Occurrence of duplicate copies of similar data

Data integrity

Database management system

Data redundancy

A special computer program for managing databases

An organised collection of data

A process that makes sure data is accurate, complete, and consistent throughout the database

MySQL

MySQL is a database management system that allows you to create your own databases. It allows you to create, update, and retrieve data using SQL. It is open-source, which means it is free to use. It is popular for its speed, reliability, and scalability.

SQL (Structured Query Language)

SQL (Structured Query Language) is a language that can help ask questions only from structured data and give useful information. It allows you to perform various operations on the data stored in the database, such as updating, inserting, deleting, and modifying data, etc.

Did You Know?

SQL is not a database management system, but a query language.

In SQL, we can frame queries (the questions to ask) using commands to get the information we want. For example, we can use SQL to ask the database for a list of all the people who live in a certain city or the names of all the books that have been written by a certain author.

The SQL commands can be divided into two categories: DDL and DML.

01011100010010

???

Stands for Data Definition Language

Purpose Defines the structure of a database by creating database and tables

Commands

CREATE TABLE, ALTER TABLE, DROP TABLE, CREATE INDEX, CREATE VIEW, etc.

Effect on data Does not affect the data in database tables but rather affects the structure of databases and tables

Used by

Filtering Data

Typically used by database administrators to create and maintain the database schema

Not used to filter data, so we do not have a WHERE clause for the DDL commands

Examples CREATE TABLE customers ( id INT NOT NULL AUTO_INCREMENT,

name VARCHAR(255) NOT NULL, email VARCHAR(255) NOT NULL, PRIMARY KEY (id) );

ALTER TABLE customers ADD COLUMN phone VARCHAR(255);

DROP TABLE customers;

Data Manipulation Language

Populates and Manipulates data in tables within databases

INSERT, UPDATE, DELETE, SELECT, etc.

Can affect the data in database tables but not the structure.

Typically used by application developers and end-users to interact with the database

WHERE clause is used with commands to filter the data

INSERT INTO customers (name, email) VALUES (‘John Doe’, ‘john.doe@example. com’);

UPDATE customers SET phone = ‘123-456-7890’ WHERE id = 1;

DELETE FROM customers WHERE id = 2;

SELECT * FROM customers;

SQL commands are not case-sensitive, but in some DBMS, the table name and field names are casesensitive. This means you can write the SQL commands like SELECT, FROM, and WHERE in uppercase or lowercase letters.

Think and Tell

To enter a record into a table, which command can be used?

Database Concepts

The following are the main database concepts:

Tables

A table is made up of rows and columns. The rows are called Records and the columns are called Fields. The column headers are called Attributes.

A record consists of related details about an entity.

An entity is the object about which you want to store data in a table. For example, Student, Employee, Library, Hospital, etc.

Consider the following Student table:

In the Students table, the fields or attributes are Student_ID, Student_Name, Grade, Section, Roll_Number, Library_ID, and House_ID. The values related to one student comprises a record.

Data Types

If you look at the data within the columns or fields of the Students table, you will notice that they contain similar types of information. For example, Student_Name and Section contain characters representing names, Grade and Roll_Number consist of numbers, and Student_ID, Library_ID, and House_ID include a combination of letters and numbers. These characteristics are known as data types.

A data type defines what kind of data an attribute can hold.

Let us learn about the various data types we can have for fields in a table in MySQL.

The commonly used SQL data types are:

Data type Description

Number Used to store numeric values, such as integers, decimals, and floats.

String Used to store text data, such as names, addresses, and descriptions.

Date and timeUsed to store date and time values, such as birthdays, appointment times, and product expiration dates.

INT, DECIMAL, FLOAT

VARCHAR, CHAR, TEXT

DATE, TIME, DATETIME

Boolean Used to store true or false values. BOOL

Keys

In the Students table, there are two columns that can only have unique values: Student_ID and Library_ID. However, other columns can have repeated values. For example, two students can have the same name, be in the same grade or section, or live in the same house. Also, a roll number can repeat if students are from different grades.

We can use the unique columns in a table as keys.

Keys are used to uniquely identify records in a table and establish relationships between tables. There are four main types of keys:

1. Primary key: A primary key is a unique identifier for each record in a table. It can be a single column or a combination of multiple columns. For example, in the Students table, we can make Student_ID the Primary Key as it uniquely identifies each row in the table.

2. Candidate key: A candidate key is a column or combination of columns that can uniquely identify each record in a table. A table can have multiple candidate keys, but only one can be the primary key. For example, in the Students table, Student_ID, and Library_ID are the candidate keys, as they both uniquely identify each record in a table.

3. Composite key: A primary key can consist of more than one attribute. For example, in the Students table, Grade, Section, and Roll_Number when combined together, can identify a row uniquely. Hence, it can be a primary key.

When a primary key consists of more than one attribute, it is called a composite key.

4. Foreign key: A foreign key is a column in one table that references the primary key of another table. This creates a relationship between the two tables.

Consider the following tables:

Students table:

House Table:

House_ID House_name

H001 Red house

H002 Yellow house

H003 Green house

Both tables have an attribute named House_ID. The field House_ID is the primary key in House_table, but it is not a primary key in students_table. That is why House_ID is considered a foreign key in the students_table.

Creating a Table

The CREATE table command is used to create a table. The syntax is as follows:

Syntax:

CREATE table <table_name> (Field1 datatype, Field2 datatype, … );

The command to create the Students table is as follows:

It has seven columns: Student_ID, Student_Name, Grade, Section, Roll_Number, Library_ID, House_ID. Each column has a specific data type, such as varchar for Student_ID, Student_Name, Section, Library_ID, and House_ID, INT for Grade, and Roll_Number.

Inserting Records in a Table

Now, let us add records of the students to the table we have created.

Syntax:

INSERT into <table_name> (value1, value2, …);

To insert a record in the Students table, use the command:

This command will add a record to the table. You can repeat this command to add multiple records to your table.

Queries and Data Retrieval in MySQL

Queries allow us to retrieve, manipulate, and analyse data as we need. We use DML commands to make queries to retrieve data in MySQL. DML commands apply filtering and sorting techniques to extract relevant information from the database.

Let us learn about some DML commands to make queries and retrieve data.

SELECT Statement

We have already seen how the SELECT command is used to display records from a table.

The SELECT command can be used in multiple ways to display data.

1. To display all the records from the table with all the columns. SELECT * FROM table_name;

This will display all the records from the table.

2. To display all the data of a specified column(s).

Filtering Data

You can filter data using the WHERE clause with the SELECT command to display records based on a condition.

Syntax: SELECT column1, column2, ... FROM table_name WHERE condition;

Using Relational Operators

You can build conditions using relational operators, such as =, >, <, >= or <=.

Using Logical Operators

The logical operators are used to create more complex conditions in SQL queries. The most commonly used logical operators are AND and OR

The AND logical operator is used when you want to have more than one condition, and all the conditions must be true.

For example, to retrieve the records of the students who are in Grade 7 and are in Section A:

The OR logical operator is used when you want to have more than one condition, and either of the conditions can be true.

For example, to retrieve the records of the students who are either in Grade 7 or in Section A (or both). You can use the OR operator like this:

Sorting Data

The ORDER BY clause allows you to sort the retrieved data in ascending (ASC) or descending (DESC) order based on one or more columns.

Creating a View

A view is a virtual table that is based on one or more tables. It does not store any data but instead displays the data from the underlying tables in a specific way. Views are used to simplify complex queries, restrict access to data, and create custom reports.

To create a view in MySQL, use the given command:

Syntax:

CREATE VIEW view_name AS SELECT column1, column2, ... FROM table_name WHERE condition;

Example:

To see the records of a view in MySQL, you can simply query the view using a SELECT statement.

Views and tables in MySQL serve different purposes and have distinct characteristics.

Feature View Table

DefinitionA virtual table is based on one or more tables.

Storage Does not store any data.

PerformanceCan be slower than tables, as the view needs to be evaluated each time it is queried.

Security Can be used to restrict access to data by only showing certain columns or rows of data to certain users.

ComplexityCan simplify complex queries.

Use casesUsed to simplify complex queries, restrict access to data, and create custom reports.

Do It Yourself 7B

1 Fill in the blanks.

A physical table that stores data.

Stores data on disk.

Can be faster than views, as the data is already stored in memory.

Does not have built-in security features.

Can make complex queries more difficult to write and understand.

Used to store and organise data.

a SQL commands can be categorised into and

b DDL commands are used to define the of a database.

c DML commands are used to manipulate and data.

d The WHERE clause is used with the command to filter data.

e To enter a record into a table, you can use the command.

2 Answer the following questions.

a Identify and write down the field names if you had to create a table named Library in the School database.

b Write SQL commands to create the table for your idea and to add records.

Points to Remember

1 A database is an organised collection of data that is stored electronically on a computer system.

2 A database management system (DBMS) is a software system that helps users create, manage, and access databases. It acts as an interface between the database and user applications.

3 The objects of a database are the building blocks that make up a database. They are used to store and organise data in a way that is efficient and easy to access.

4 The main objects of a database are tables, queries, reports, and forms.

5 Database management system consists of six main components: Hardware, Software, Data, Procedures, Database Access Language, and People.

6 There are four main types of DBMS: Hierarchical, Relational, NoSQL, Object-Oriented.

7 MySQL is a database management system that allows us to create our own database.

8 SQL (Structured Query Language) is a language that can help us ask questions only from structured data and gives useful information. The SQL commands can be grouped into two: DDL and DML.

9 A table is made up of rows and columns. The rows are called Records and the columns are called Fields. The column headers are called Attributes.

10 A data type defines what kind of data an attribute can hold.

11 The common data types that are used to define the type of data used in the table are: INT, FLOAT, CHAR, VARCHAR, DATE, and DATETIME.

12 Keys are used to uniquely identify records in a table and establish relationships between tables.

13 You can filter data using the WHERE clause with the SELECT command to display records based on a condition.

14 The AND logical operator is used when you want to have more than one condition, and all the conditions joined should be true.

15 The OR logical operator is used when you want to have more than one condition, and either of the conditions can be true.

16 The ORDER BY clause allows you to sort the retrieved data in ascending (ASC) or descending (DESC) order based on one or more columns.

17 A view is a virtual table that is based on one or more tables.

Chapter Checkup

A. Fill in the Blanks.

Hints foreign     view    INT     record     ASC/DESC

1 The primary key in a table is used to uniquely identify in that table.

2 The ORDER BY clause allows you to sort the retrieved data in order.

3 A key is a column in one table that references the primary key of another table.

4 would be the appropriate data type for the roll_number field in a table which stores student data.

5 A is a virtual table that is based on one or more tables.

B. Tick () the Correct Option.

1 Which SQL command is used to retrieve all records and columns from a table?

a SELECT b SELECT FROM

c SELECT ALL d SELECT TABLE

2 In SQL, what does the WHERE clause do?

a Orders the result b Filters the result

c Groups the result d Joins multiple tables

3 Which SQL operator is used to filter data based on multiple conditions where all conditions must be true?

a OR b =

c AND d NOT

4 Which SQL operator is used to sort the result set in descending order?

a SORT BY b ASC

c DESC d ORDER BY

5 What is a primary key in SQL?

a A key used for foreign table references

c A key used for sorting records

b A key that uniquely identifies a record in a table

d A key used for ordering records

C. Who Am I?

1 I am a collection of data which is stored electronically on the computer system in the form of tables.

2 I am a language used to create new databases, insert data, delete data, and more.

3 I am a software that helps us store, retrieve, and manipulate data in a database.

4 I am the collection of data, organised in terms of rows and columns.

5 I am a type of key that uniquely identifies each record in a table and is used to establish relationships between tables.

D. Write T for True and F for False.

1 Databases are like digital filing systems that help organise and store information.

2 The CREATE TABLE command is a DDL command.

3 The ALTER TABLE command is used to create a new table.

4 Data types define what kind of data a field can have, such as numbers, text, or dates.

5 Views are used to restrict access to data.

E. Answer the Following.

1 What are the main components of a database management system (DBMS), and what do they do?

2 Explain the significance of DDL (Data Definition Language) and DML (Data Manipulation Language) commands in managing a database.

3 Describe the purpose of the WHERE clause in SQL queries and provide an example of its usage.

4 Discuss the differences between a primary key and a composite key in the context of a database.

5 Explain the function of the ORDER BY clause in SQL and how it can be used to sort retrieved data.

F. Apply Your Learning.

1 Your school’s database contains a table Student_Record with the attributes Student_Name, Grade, and Section. A new student, Sarah, has joined Grade 6, Section B. Write the command to insert her record in the table.

2 You want to see the list of students who are in Grade 5, Section A at your school in the table named Student_ Record.

What SQL query would you use to get this information?

3 Your school has many students with the same name, such as “Raj”. The database has a table of students with their names. What can help you uniquely identify each student in the database?

4 Riya wants to retrieve a list of books by a specific author from the library’s database. What SQL command can she use to obtain this information?

5 Shreya needs to generate a list of all the students in Grade 7 who are in the school’s basketball team. What SQL command can she use to obtain the list?

Designing with Canva

Canva is a free graphic design platform used to create graphics and presentations. The word ‘graphics’ refers to visual art or images. Using graphics and text, we can easily convey ideas and information to a reader.

Canva is used for making various types of visuals that can be used in posters, on social media, presentations, flyers, infographics, and many more.

Let us learn how to create projects with graphics using Canva!

Getting Started with Canva

To get started with Canva, follow the steps:

1. Open a web browser.

2. Type www.canva.com in the address bar. The home page of the website opens.

3. Create a new account by clicking on the Sign up button. Or, log in to Canva by using your existing mail address by clicking on the Log in button.

To log in to an existing account To create a new account

After you log in, the first screen will look like the image given here. You can see a variety of design templates and tools that you can choose from.

Let us create a card using Canva. The card will be on the culture of Kerala. Once you learn how to make a card, you can make another one on any other state of your choice.

Creating a Card

To create a card:

1. Click the Create a design button in the top right-hand corner of the screen. A drop-down menu will appear.

2. Choose Card as the design type from the menu.

3. A new window opens where you can design the card.

Setting a Background

To set the background image for your card, follow the steps:

1. Scroll down the left-hand sidebar and then select the Background option.

2. Choose a suitable background from the list.

Now, you can add various elements to your design.

Adding Elements

Elements in Canva are colourful images, stickers, icons, and shapes that you can easily add to your designs to make them interesting.

Let us follow these steps to add some elements on the card:

1. Click the Elements option on the sidebar. A drawer menu appears.

2. Browse the various elements displayed in the menu.

3. You can also type a keyword in the Search elements box and press Enter.

4. The elements related to the keyword will appear.

5. Select an element to add. The selected element appears in the design area.

Adding Text

Other than elements, you can also add text to your design. Follow the steps to add text to your project:

1. Click the Text option on the sidebar. A drawer menu appears.

2. Select the Add a text box button.

3. A text box with default settings appears in the design area.

4. You can select the font style and font size from the text options displayed in the options bar above the design area. Now, type the desired text in the text box.

In a similar manner, add more elements and text to your design.

Concept of Layers

When you add new elements to Canva, they get placed on top of each other, creating layers of elements.

A layer can be considered as a transparent sheet. Suppose you need to create a drawing with various elements. There are multiple transparent sheets with one element drawn on each sheet. Now, put these sheets on top of each other. You can observe a complete drawing with multiple elements.

Positioning Elements

After all the elements are placed in the design area, you can position them as required. Let us explore the various ways to position an element or a layer.

1. Click on an element.

2. Click on Position in the Options bar.

3. A sidebar opens on the left-hand side, consisting of two tabs, Arrange and Layers.

Let us learn about the various options in the Arrange and Layers tabs.

Arrange Tab

In the Arrange tab, the general settings for arranging various elements appear. This panel is further divided into various sections.

Layers Arrangement Section

The first section helps us with the arrangement of layers.

Forward—moves the selected layer a layer above.

To front—moves the selected layer to the top of the stack.

Backward—moves the selected layer a layer below.

To back—moves the selected layer to the bottom of the stack.

Align to Page Section

This section helps you to align the elements on your page.

For vertical alignment, use the options Top, Middle, and Bottom.

For horizontal alignment, use the options Left, Center, and Right.

Let us align the text “KERALA” in the middle of our design:

1. Select the text to be aligned.

2. Then, select the Middle option, to position the element vertically in the middle of the design page.

Advanced Section

The Advanced section lets you move, turn, or resize elements in your design, using exact values. It is like using a ruler to place any element exactly where you want it.

Width and Height

Width refers to how wide an object is, and height refers to how tall an object is.

In Canva, you can type the values to specify the exact object size.

You can change the values of width and height by typing the required values in the Width and Height fields. Here, px stands for pixels

Rotate

The Rotate option in Canva allows you to turn the element around at the required angle. You can use this feature to show elements from various angles.

To rotate an element:

1. Select the element to be rotated.

2. Change the value of the Rotate field to the required angle. Alternatively, you can also rotate elements with the help of the Rotate icon.

Layers Tab

Hold the Rotate icon and move it to change the angle of the element.

You can use the Layers tab to view the list of the layers in your project. By dragging the layers using a mouse, you can arrange the layers from this tab as well.

Using the All Tab

Go to the Layers tab and select the All tab under it.

Using the Overlapping Tab

Different layers in the design

Bottom Layer

If there are multiple layers in a project, it becomes difficult to select the exact layer on which you want to work. In such a case, the Overlapping tab is helpful.

1. Go to the Layers tab and select the Overlapping tab under it.

Top Layer

2. This tab shows only the layers that overlap with a selected layer. Select the layer you are looking for and make the required changes.

Think and Tell

Imagine you are creating graphics in Microsoft Paint. You have added a few shapes and text overlapping each other. Later, you realise that the text is hiding behind the shapes. Is it possible to correct it without re-creating it in Paint? If you create the same project in Canva, how would it be helpful?

Duplicating a Layer

Duplicating a layer means creating a copy of it. This can save a lot of time when you want to use the same element multiple times in a project. What if you want to add two trees? You will simply duplicate the layers.

To duplicate a layer:

1. In the Layers tab, right-click the layer that you want to duplicate. A drop-down menu appears.

2. Select the Duplicate option.

3. The selected layer is duplicated.

Deleting a Layer

Deleting layers that are not needed helps maintain an organised design. To delete an element from your design, delete its corresponding layer.

To delete a layer:

1. In the Layers tab, right-click the layer you want to delete.

2. Select the Delete option.

3. The selected layer is deleted.

Did You Know?

As of 2023, 80 crore designs have been created using Canva since its launch.

alignment of the text “Happy Birthday” in the given designs.

Write T for True and F for False.

a The Middle and Center alignment options serve the same purpose.

b The To Front option is different from the Forward option.

c The To Back option places an element immediately behind the other element.

d You can change the order in which the elements are layered.

Tick () the correct option.

a The Align to Page feature helps you to:

i Make elements invisible.

iii Align the elements on page.

Animations

Have you ever seen a flipbook?

ii Create complex designs.

iv Change the colour of the element.

It is a small book with a series of images at various positions on separate pages. When you quickly flip through such a book, it creates the illusion of movement of the objects drawn on the pages.

The cartoon movies that you watch are created in a similar fashion. Many images are drawn and flipped through at a fast pace so that the characters seem to be moving. This is what we call animation.

Did You Know?

Creating Animations

After creating a design in Canva, you can make it look interactive by adding animations. Canva has many useful tools using which you can create interesting animations. Let us learn how to use them.

Adding Page Animation

Page animations decide how your page will enter the screen.

To add page animation:

1. Select the page. (Make sure you select only the background, not the other elements.)

“Snow White and the Seven Dwarfs”, released in 1937, is Disney’s first full-length animated movie!

2. Click the Animate option on the top bar. A sidebar with the tab Page Animations opens showing a list of animations.

3. Place the mouse cursor over the effects to see what they look like on your page.

4. Click the Play button, at the top right-hand side of your screen.

Adding Element Animation

You can animate specific texts and elements present on a page in the same way as you can animate the entire page.

To add element animation:

1. Click the text/element you want to animate.

2. Select the Element Animation tab from the sidebar and apply the desired animation effect to your element.

Now, let us learn about some more features Canva has to offer.

Applying Transparency

Applying transparency means making the elements look see-through. In Canva, all elements are fully visible by default. This means that Transparency is set to 100.

To apply transparency:

1. Select an element from your design, for example, the boat.

2. Click the Transparency icon from the options bar above the design area. The Transparency slider appears.

3. Move the slider to the left to decrease the transparency of the boat and to the right to increase the transparency.

4. Observe the effect on the element’s transparency.

Using the Copy Style Option

Suppose you like the style of an element or a page, such as font, colour, effects, or transparency. You can apply the same styles to other elements or pages as well.

To copy and apply a style, follow the given steps:

1. Let’s say, you like the boat for its transparency and want to copy the same to another element.

2. Right-click the boat. A context menu appears.

3. Click the Copy style option. The style is copied.

4. Click the element where you want to apply the copied style. For example, click the mask placed below the word “KERALA”.

The mask becomes transparent with the same transparency value, just like the boat.

Locking Objects

Locking an object makes sure that the object remains in its place while you work on the other parts of the design. You can either lock an individual element or the entire page.

To lock the entire page, select the page and click the Lock page option, as shown in the given image.

To lock the specific elements, right-click the element and select the Lock option from the context menu. You can also click the Lock symbol present on the top bar. The element is locked. Note that another Lock symbol appears near the locked element.

To unlock the element, click the Lock symbol again.

How can the Lock feature be helpful when you are creating a project?

Do It Yourself 8C

Fill in the blanks.

Explore More!

Wonder how animation works practically?

a  Page Animation decides how the will enter the screen.

b  To see how your animation looks on an element, you use the button.

c  The feature is used to copy the style of an element to another.

Match the following:

When you have completed a design and want no change in it

When you want to make the elements look see-through

When you want to have the same style as the current element

Points to Remember

Canva is a free graphic design platform that is used to create various visual contents, such as graphics, presentations, posters, social media graphics, flyers, and more.

Canva has a wide variety of design templates and tools to choose from for your projects.

Canva offers colourful images, stickers, icons, and shapes as elements that you can easily add to the designs to make them more engaging.

You can also add text to your design using the Text option from the sidebar. You can choose various options for fonts, sizes, and types.

When you add new elements in Canva, they are placed on top of the ones you have already added, creating layers of elements.

You can use the Position option to adjust the layering, alignment, and size of elements.

You can make your designs look interactive by adding animations.

You can use the Copy Style option to copy the style of one element and apply it to other elements.

You can use the Lock option to lock specific elements or the entire page to prevent accidental changes while working on other parts of your design.

Chapter Checkup

A. Fill in the Blanks.

Canva is a popular online tool used for creating various types of .

To create a design in Canva, you need to click the button.

Elements in Canva include graphics, stickers, icons, and

The option in Canva allows you to control the arrangement of various elements in your design.

B. Tick () the Correct Option.

What can layers in Canva NOT be compared to?

a Transparent sheets placed on top of each other

c Layers of paint

In Canva, what can you add animation effects to?

a Only the text elements

c The entire design

What can you do with text animation in Canva?

a Change the font of the text

c Make the letters move, slide, bounce, or fade

What does adjusting transparency in Canva do?

a Changes the font size of the element

c Makes a layer see-through

How does the Copy Style feature in Canva help your design?

a It changes the animation effects.

c It duplicates the entire design.

b Jigsaw puzzle

d Images put on top of each other

b Only the images

d Only the background colour

b Adjust the transparency of the text

d Convert text into images

b Rotates the element

d Duplicates the element

b It applies the same style from one element to another.

d It adds comments to the design.

I make layers see-through, creating visual effects and overlays.

I can animate elements to slide, bounce, or fade in and out.

I prevent unwanted changes in the project.

I help you position the element at the top, in the middle, or centre of the design area.

I am used to turn elements around to a desired angle.

D. Write T for True and F for False.

Canva is difficult to use and requires professional design skills.

The Layers tab in Canva helps order the elements like a stack.

Locking objects in Canva prevents any changes to that element.

The element will not be visible if the transparency value is 100.

The Forward option brings the layer to the top of the stack.

E. Answer the Following.

What is the purpose of the Position option in Canva?

Explain the difference between the Forward/Backward and To Front/To Back arrangement options.

F. Apply Your Learning.

Aleena is making a poster for Diwali. She places various elements in her design. Which Canva feature can she use to put the elements exactly in the centre?

Archita made a crossword puzzle for her classmates, using Canva. However, she made some adjustments to the project, causing the crossword to become nearly invisible. What do you think she must have done?

Maya is creating a design with lots of elements. She wants some objects to be in front while others hide behind them. Which Canva feature can she use to control the layers and make her design look like a playful scene?

Imagine you are a young chef who wants to share your favourite recipes. You have designed a digital recipe card using Canva. You have created multiple layers of elements in the recipe card. The text of the recipe card is hidden behind the images. What might be the problem?

Rani created a card for her friend’s birthday. She was showing it to her younger brother Anuj. Anuj was very curious and deleted the text in the card by mistake. How could Rani have prevented this mistake?

Introduction to AI

Can you imagine a world where:

 your smartphone understands your commands;

 your email accurately filters out spam; and

 your car automatically navigates through traffic and parks at the right spot?

All of this is actually possible with the help of Artificial Intelligence or AI. Artificial Intelligence is the ability of machines to think and act like humans.

Therefore, Artificial Intelligence is a branch of computer science that helps to create intelligent machines capable of simulating human-like reasoning, problem-solving, and decision-making.

Applications of AI

Explore More!

Want to know more about artificial intelligence? Scan here!

Be it in your classroom or in the marketplace, or at your home, you can find applications of AI everywhere. Some prominent fields where AI has made a significant impact are given as follows:

Field Application

Healthcare

Business

Education

Banking

Transport

Social Media

Security

Robotics

Smart homes

Detecting diseases, discovering new drugs, doing remote surgery

Preventing fraud, helping us shop by giving recommendations

Smart content that helps us learn

Managing money and bank accounts, preventing fraud

Autonomous vehicles, ride-hailing apps, navigation system

Face recognition, content filtration

Data security, identification of fraud, threats, etc.

Heavy industry, robotic surgeries, home assistants

Smart devices and connectivity to mobile applications

Did You Know?

In 1997, a computer named “Deep Blue” made by IBM beat the world chess champion, Garry Kasparov. It was the first time a computer won against a champion in chess.

Domains of AI

There are three main domains of AI:

Machine Learning: Machine learning is like teaching a computer to learn from experiences. It is used to help computers do smart things on their own.

Let us understand this concept with the help of an example:

When you teach your pet to recognise your friends, you may reward it every time when it correctly recognises them. Over time, your pet is able to recognise your friends and family more quickly than earlier. Similarly, AI machines also learn from vast datasets, becoming increasingly intelligent over time.

Computer Vision: This domain of AI makes the computers ‘see’ and ‘recognise’ objects.

For example, just as we see an object and immediately recognise it, similarly the AI machine looks at an object using cameras, and matches it with the thousands and thousands of images in its dataset. If the object matches the description of the given object, then the machine recognises it.

Natural Language Processing: Natural Language Processing or NLP makes the computers understand the human language in text and spoken form.

Digital assistants and chatbots use the concept of NLP to interact with humans.

In this chapter, you will learn more about NLP. Let’s get started.

Natural Language Processing

Have you ever wondered how AI assistants like Alexa or Siri listen to your commands and respond? It is possible with the help of a domain of AI, that is called Natural Language Processing.

Imagine a situation where you are talking to a computer or a robot. As it is a machine, it will not be able to understand your language. Here, NLP plays its role. NLP makes the machine understand your language and respond to you in a way that makes sense.

NLP helps computers understand us and talk to us like people.

To understand the concept of NLP practically, let us create an app which will convert the input text to speech. For this, we will use the MIT App Inventor.

This app will process the input text and convert it to speech.

So, let’s get started.

Think and Tell

The MIT App Inventor

The MIT App Inventor is an online platform for creating apps for mobile phones and tablets. It is a very easy and simple platform to learn app creation and coding. This platform focuses on teaching everyone, especially young children, to create their own apps.

Creating an App

The Tekie platform allows you to access MIT App Inventor directly.

If you are accessing MIT App Inventor directly, follow the steps given. Otherwise jump straight to starting a new project.

1. Visit the following link to open MIT App Inventor: https://appinventor.mit.edu/

2. The following screen appears:

3. Click on the Create Apps! Button.

4. A sign in screen appears. You can use your Gmail id to login or you can create a new one.

5. After signing in, the Welcome to App Inventor pop-up box appears. Click on the Continue button at the bottom of the screen.

6. Another screen appears, from where you can choose to view the tutorials or you can start a new blank project.

Continue Button

Starting a New Project

1. Click on START A BLANK PROJECT.

2. The Project View window appears.

3. A dialog box appears asking to give a project name to your project.

4. Give an appropriate name to your project, for example, text_to_speech and click on OK.

5. A new project with the same name will be created.

Click here to start a blank project

6. Click on it. The Project View window will open.

Sections of the Project View Window

The Project View window is divided into four sections:

Palette: Various components are present under different categories in the palette.

Viewer: You can select any component from the palette and drag and drop it on the screen in the Viewer section.

Components: The components section shows the various components that are placed in the Viewer. Properties: The Properties section shows the properties of the selected component.

Components

Properties

Working With Palette Section

Let us now create the interface of the app.

1. From the Palette section, drag the Button component and place it in the Viewer section on Screen1

Button 1 added in Components section

Palette
Viewer

2. You can observe the Button1 component is also added under the Components section.

3. Now in the Properties section, scroll down to the Text property of the button. Replace the text “Text for Button1” with “Text to Speech”.

4. Now, in the Palette section, click on the Media drawer.

5. Select the Text to Speech component and drop it on Screen1.

6. It will not be visible on the screen. However, you can see it below Screen1 as a Non-visible component.

The interface of the app is created. Now, let’s create a code for it.

Coding the App

The next step is to create a code for the app. To code in MIT App Inventor is very easy and userfriendly. You can create code for your app by using various blocks present in the Blocks Editor.

To create code for your app, follow the given steps:

1. Click on the Blocks Editor button in the right-hand upper corner of the Project View window.

2. The Blocks Editor will open with the Blocks section on the left and the Viewer section on the right.

3. Click on Screen1 > Button1 from the Blocks pane.

4. The blocks related to Button1 will appear.

5. Drag when Button1.Click block from the Blocks drawer and drop it in the Viewer pane.

6. Similarly, click on Screen1 > TextToSpeech1

7. The blocks related to Text to Speech component will appear.

8. From the Blocks drawer, drag the call Text to Speech1.Speak block and drop it inside the when Button1.Click block.

9. Now, from Built-in > Text drawer, drag the “A text string” block and plug it into the socket labelled message.

10. Click inside the text string block and type your desired message. For example, “Welcome to the world of coding!”

11. Your app and its code are ready to use.

Testing the App

1. To test your app, you will need a mobile phone.

2. Go to the Google Play Store of your android phone and download MIT AI2 Companion App.

3. Install the app by clicking on “Install”.

4. After installation, open the app. You have to provide a six-character code to connect.

5. Now, to get the code, go to your computer where you have created your app.

6. Go to the Connect menu and select the AI Companion option.

Explore More!

You can scan this QR Code to get the MIT AI2 Companion App on your mobile phone.

7. A Connect to Companion window will open with a six-character code.

You can now fill in this six-character code on the mobile phone app.

1. The app will now open on your mobile.

2. Click on the button that you have created.

3. You will be able to hear the message that you have provided in the app code, that is “Welcome to the world of coding!”

4. Keep exploring!

Welcome to the world of coding!

Points to Remember

Artificial Intelligence is the ability of machines to think and act like humans.

Some of the applications of AI are in the fields of healthcare, business, education, banking, transport, social media, security, robotics, and smart homes.

There are three main domains of AI: Machine Learning, Computer Vision, and Natural Language Processing.

Machine learning is like teaching a computer to learn from experiences.

Computer vision makes the computers see and recognise objects.

Natural Language Processing or NLP makes the computers understand the human language in text and spoken form.

MIT App Inventor is an online platform for creating apps for mobile phones and tablets.

The Project View window of MIT App Inventor is divided into four sections, Palette, Viewer, Components, and Properties.

Chapter Checkup

A. Fill in the Blanks.

Artificial Intelligence is the ability of machines to think and act like .

B. Tick () the Correct Option.

What does AI stand for?

a  Advanced intelligence b  Artificial information

c  Artificial intelligence

d  Automated invention

Which domain of AI focuses on teaching computers through experience?

a  Computer vision b  Natural language processing

c  Machine learning d  Deep learning

What is the main purpose of Natural Language Processing?

a

c

make

create virtual reality games

a

c

C. Who Am I?

I am a branch of computer science that enables machines to simulate human-like reasoning, problem-solving, and decision-making.

I am a domain of AI that help computers do smart things on their own.

I am often used by digital assistants and chatbots.

I am an online platform that makes it easy for people, especially young children, to create their own mobile apps.

D. Write T for True and F for False.

Artificial Intelligence refers to the artificial intelligence of humans.

Natural language processing makes computers understand human language only in written form.

Machine learning involves teaching computers using experiences.

Computer vision allows computers to recognise objects through touch.

E. Answer the Following.

What are the three main domains of AI mentioned in the chapter?

How does Machine Learning work? Give an example.

Describe the concept of Computer Vision and provide an example.

Explain how Natural Language Processing (NLP) makes computers understand human language. What is the

F. Apply Your Learning.

Amitesh is a healthcare professional. Explain to him how he can make use of AI in the healthcare field.

Sharvi is creating a project in which she wants to create a code for the computer to recognise things. Which domain of AI will she be using to create this project?

Nimisha owns a pet cat. She is training her to recognise various objects in her room. Which domain of AI learns in a similar manner?

Rudra wants to create a personalised app for his business. Which application would you suggest

Test Paper 1 (Based on Chapters 1 to 4)

A. Fill in the blanks.

1 devices are used to give instructions to the computer.

2 A is a way of representing and expressing numbers using a set of symbols or digits.

3 software is designed to detect, prevent, and remove various forms of malware from a computer system.

4 hackers want to steal information by spreading viruses or creating other problems.

B. Tick () the correct option.

1 scanners use flat glass surfaces to scan objects, such as documents, photographs, and artwork.

a  Flatbed

c  Sheetfed scanners

b  Handheld

d  Drum scanners

2 The number system has a base of 16, and has digits from 0 to 9 and letters of the alphabet A to F.

a  Octal

b  Decimal

c  Binary d  Hexadecimal

3 A is a type of computer virus that infects executable program files.

a  Boot sector virus

c  Macro virus

b  Program file virus

d  Network virus

4 means taking words, ideas, or images from someone else and presenting them as one’s own work.

a  Spamming b  Cyberbullying

c  Plagiarism d  Phising

C. Write T for True and F for False.

1 A projector is an output device that projects images on a small screen.

2 The Octal Number System is a base-8 number system that uses digits from 1 to 8.

3 Malware can run in the background without your knowledge.

4 Incognito mode lets you browse the internet without leaving behind a trace of your activity.

D. Answer the following questions.

1 What is a light pen?

2 What is the binary number system?

3 What do you mean by Trojan horse?

4 Define the term digital footprints.

E. Apply your learning.

1 Ravi wants to watch high-definition movies and store large video files on a durable, portable, and high-capacity disc. Name the type of disc he should use.

2 Convert (B28)16 into decimal and binary forms.

A. Fill in the blanks.

1 A is the name of a cell in a spreadsheet.

2 data refers to modifying, replacing, or deleting the data in a cell.

3 A is an organised collection of data that is stored electronically on a computer system.

4 Duplicating a layer means creating a of it.

B. Tick () the correct option.

1 function rounds the number to an integer value.

a  Sum

c  Int

b  Power

d  Abs

2 Which keyboard shortcut is used to copy the cells in a spreadsheet?

a  Ctrl + C

c  Ctrl + X

b  Ctrl + V

d  Ctrl + Z

3 are used to display data from a database in a formatted and organised way.

a  Tables

c  Reports

b  Queries

d  Forms

4 makes the computers understand the human language in text and spoken form.

a  Machine Learning

c  NLP

C. Write T for True and F for False.

b  Computer Vision

d  Big data

1 The AVERAGE() function is used to calculate the average of the values in a range of cells.

2 Inserting a row means adding a new column to a spreadsheet.

3 Data refers to the collection of raw facts stored in a database.

4 A layer can be considered as a transparent sheet.

D. Answer the following questions.

1 What are functions?

2 Write the difference between Undo and Redo.

3 Mention the names of the main types of DBMS.

4 What is AI?

E. Apply your learning.

1 What is the output of the following formula?

a   =SQRT(36)

b   =TODAY ()

2 You have to create a spreadsheet for your school project. You create a column with the header “Serial number” and then fill in 1 and 2 in the two cells below. How can you autofill the remaining numbers?

About the Book

This book embodies the principles outlined in the National Curriculum Framework (NCF) and the National Education Policy (NEP) 2020. It unveils the world of computer science through a unique and captivating pedagogical approach— seamlessly integrating curriculum content into the mesmerising adventures of Mel and Conji, fictional figures hailing from the enchanting world of Avora. Our aim is to prepare learners for the dynamic and technology-driven landscape of the 21st century, equipping them with the essential skills they need to thrive in an ever-evolving world.

Special Features

• Explore More: QR codes to explore an exciting application of the concept.

• Discuss: Questions to trigger engaging group discussions in the classroom.

• Think and Tell: Probing questions to stimulate thinking at an individual level.

• Did You Know? Interesting facts related to the application of a concept.

• Do It Yourself: Milestone exercises to practice specific concepts.

• Chapter Checkup: A pool of questions catering to all topics and skills covered in the chapter.

• Test Papers: Designed to evaluate understanding of core concepts and application of skills.

About Uolo

Uolo partners with K-12 schools to provide technology-enabled learning programs. We believe that pedagogy and technology must come together to deliver scalable learning experiences that generate measurable outcomes. Uolo is trusted by over 15,000+ schools across India, Southeast Asia, and the Middle East.

ISBN 978-81-981442-0-1

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.