SBS Notes Class P8 Unit 1-12
SBS Notes Class P8 Unit 1-12
COMPUTER SCIENCE
Class Pre-8th
(According to the syllabus of Punjab Curriculum Textbook Board, Lahore
and OXFORD)
Session 2023-24
Prepared by:
TEAM SBS
SB School, Head Office, Astana Aalia Sultan Abdul Aziz, Darbar
Hadrat Sultan Bahoo (RA) Dist. Jhang
SBS Notes Series Class Pre-8th, Unit-1: The Data Processing Cycle
Page 1 of 107
2. The processing stage is where raw data is transformed into
to be understood by users.
Q.3: State weather the following statements are true or false. Rewrite the false
statements to make them true.
1. The central processing unit (CPU) converts data into information.
Page 2 of 107
4. Encoding helps us to find information easy.
A B
Answer Key:
Page 3 of 107
Q.1: 1. a 2. c 3. c 4.b 5. b 6.b 7.a 8. d 9. b 10. c 11.c 12. C
Q.3: 1.T 2. F The information can be stored on primary and secondary storage
devices. 3.T 4. F Sorting helps us to find information easy. 5. True. 6. True. 7.
False. Sorted data is processed data.
9. True.
Q.4: CPU , convert data into information RAM , primary storage device
1. Describe the data-processing cycle with the help of a diagram. The data-
processing cycle describes how data is processed into information by the computer.
The input stage is the first stage of the data-processing cycle. Data is collected and
entered into the computer. In the processing stage, the computer converts data into
information according to given instructions. After processing, the information is
presented to users in the output stage. Information is stored on different types of
media in the storage stage. The stored information can be used later for a different
data processing cycle. In this way, the data-processing cycle continues.
Page 4 of 107
2. What is the difference between encoding and decoding?
Encoding is the conversion of data into a form that makes it easier for users to enter
it into the computer. It takes place at the input stage. For example, the name of a
person can be encoded as HB instead of Hammad Bahoo. Decoding is the
conversion of information into a form that makes it easier for users to read and
understand. It occurs at the output stage. The initials HB can be decoded as
Hammad Bahoo and displayed on the screen.
Data can be processed in different ways. Three ways of processing data are sorting,
grouping, and calculating. In sorting, data is arranged in a specified order. Data can
be arranged in alphabetical, ascending, or descending order. In grouping, similar
data items are arranged in groups. This makes it easy to locate data. In calculations,
we can add, subtract, multiply, and divide data. We can use it to create graphs and
charts.
A computerized system uses computers to perform a set of tasks. There is little need
for human involvement. This results in greater speed and accuracy. A computerized
attendance system in an office consists of a fingerprint reader and a computer.
Employees place their fingers on the reader and their attendance is marked
automatically on the computer. They do not need to sign on a register.
Page 5 of 107
6. Describe three advantages of a computerized system over a manual system.
Ans: Linear sequence. It begins with the input stage and ends at the output
stage.
Cycle means that the end point of one sequence of activities becomes the
starting point for another sequence of activities.
Ans: Data capture is the stage of entering the collected data into a data-
processing system such as a computer. This is also called the encoding stage.
10. What do you know about data communication?
Ans: Data communications is the set of activities that allow data to be sent from
one data- processing system to another.
11. What is input stage?
Ans: The input stage is the stage when data is fed into a data-processing system
to be converted into information.
Page 6 of 107
14. What do you know about manual system?
Ans: A shopkeeper may record sales using a pen and a register. This is a
manual system.
15. Which system send automatically email message to the supplier to send
more stock.
Ans: Computerized system send automatically email message to the supplier to
send more stock.
16. What do you know about information technology?
Ans: The use of different manual and computerized devices and methods for
processing data is called information technology
Modern banks operate through computerized systems. Below are the steps
commonly used to process data at a bank: Data about cheques, payments, utility
bills, etc. is input through manual systems. Data about credit card payments is input
through automated methods. At the processing stage, data is processed into
different reports. These reports are prepared in the form of weekly, monthly, and
annual reports. At the output stage, the bank produces statements and notifications
that are sent to customers of the bank. These statements are used as receipts of the
transactions. All data is stored on servers and hard disks.
2. In how many ways can a list of students’ names from your class be
organized?
There are several ways to organize a list of students‟ names. The list can be
prepared in alphabetical order so that the names of students are listed according to
the first letter of their name. This list can be used when preparing an attendance
register. The list can be prepared in ascending order of roll numbers. This list is used
to find out who has paid the school fees. The names can be organized according to
descending order of percentage marks. This list can be used to find how well
students have performed on an exam.
Page 7 of 107
3. What reasons would you give to convince a supermarket owner to install a
computerized system?
The following reasons can be suggested: The owner will be able to process data
relating to sales of thousands of products faster. All calculations of total price,
change paid, etc. can be made accurately and without any error. With a
computerized system, the owner can keep track of all items in the store for accurate
counting of stock. A computerized system can prepare a variety of reports to
compare the profits and expenses of the business.
Page 8 of 107
SBS Notes Series Class Pre-8th, Unit-2: Binary Computing
1. In binary addition, 1 + 0 =
A 0 b 1 c 10 d 11
2. One byte is a combination of bits.
A 10 b 7 b 8 d 16
3. Which type of data includes special characters?
A numeric b alphabetic c alphanumeric d special data
data data data
3. Which number system consists of both digits and letters?
A Binary b Decimal c Octal d Hexadecimal
4. Which coding scheme is used for Chinese and Japanese characters?
a ASCII b EBCDIC c Unicode d Binary
5. Data processing cycle consists of ________ stages.
a 4 b 6 c 8 d 10
6. The speed of electric current is almost
a 30,000 km/s b 3,000 km/s c 300,000 km/s d 300,km/s
7. We can observe the memory unit of a processor under a.
a Naked Eye b By Zooming c Shadow d Powerful
microscope
8. There are ___________ letters in the Urdu alphabet.
a thirty-eight b thirty-nine c Twenty-eight d Eighteen
9. The base of binary number system is
a 2 b 8 c 10 d 16
10. The base of binary number system is
a 2 b 8 c 10 d 16
11. The octal number system has digits
a (0, 1, 2, 3, b (0,4 , 3, 4,, 6,) c (0,1,2,3,4) d (0,2 , 3, 4,7, 6,)
4, 5, 6, 7).
12. There are binary coding schemes?
a 5 b 4 c 3 d 2
Page 9 of 107
Q.2: Fill in the blanks.
10. The letter 'A' and „a‟ are represented as _______ and _____ under
the decimal system.
11. The EBCDIC code is used in __________ computers.
Page 10 of 107
4. The hexadecimal system is based on sixteen values.
Page 11 of 107
Q.4: Match the Column A with Column B
A B
Binary 2 nibbles
Answer Key:
Q.3: 1. True. 2. False. Alphanumeric data consists of letters, numbers, and other
special characters. 3. True. 4. True. 5. True. 6. False. A binary number can be
converted into a decimal number by the expansion method. 7. False. One memory
location can store one bit. 8. False. We now live in a digital world. 9.T 10. T . 11.
False. When a computer is built, it is provided with a small number of
Q.4: Column A 1. in digital form 2.on electricity. 3. Has Base 16 4. Has Base 8 5.
Page 12 of 107
Has Base 10 6. Has Base 2 7.2 nibbles
4. What is a bit?
Page 13 of 107
5. Convert the following decimal numbers into binary
equivalents.
Ans:
a. 110+111 b. 1011-0101
2. Define Data?
Page 14 of 107
Q.11: How we make words?
Ans: We know that the English alphabet has twenty-six letters. We use
the twenty-six letters in different combinations to make different words.
Characters are the alphabet keys, number keys, and special keys on the
keyboard.
Ans: Binary coding schemes are used to convert characters into binary
form and vice versa.
Unit Size
Bit Smallest unit of data, can hold only one value:
0 or 1
Nibble 4bits is called Nibble
Byte Group of eight bits,/ 2 Nibbles
Kilobyte 1KB = 1,024 bytes
Megabyte lMB = (1,024) KB
Gigabyte lGB= 1,024 MB
Terabyte 1TB= 1,024 GB
Page 15 of 107
1. What are the differences between binary and decimal number
systems?
Ans: The binary number system is based on two digits, i.e. 0 and 1
while the decimal number system consists of ten digits, i.e. 0-9. The
base for binary numbers is 2 while the base for decimal numbers is 10.
The binary number system is used in computer data processing while
the decimal number system is used in everyday life.
Page 16 of 107
SBS Notes Series Class Pre-8th, Unit-3: Computer Hardware
SUMMARY
QUESTION
Page 17 of 107
B. State whether the following statements are true or false. Rewrite
the false statements to make them true.
True
True
Page 18 of 107
D. Answer the following questions.
1. Write down the functions of USB Port
Type-C ports are primarily used for data transfer, charging, and
connectivity with various peripherals. While HDMI stands for “High
Definition Media Interface” is digital interface developed to connect
high definition devices such as digital cameras, LED‟s and gaming
console etc., to computers with HDMI ports.
Page 19 of 107
7. Discuss printers and their types.
Computer Port :
A port is a physical point or a jack provided on a computer using
which an external device can be connected to the computer. It acts as
an interface or a point of attachment between computer and external
devices .
Types of Ports:
USB Port :
Page 20 of 107
USB is a plug and play interface that allows a computer to
communicate with peripheral and other devices. Today , it has
replaced ps/2 connecters , game ports , serials and parallel ports.
Type-C Port :
It is the latest design of the USB port that comes with 24 pins. It
can handle a current of 3A. It is also used in devices for fast
charging. One of the distinguishing features of this port is that it
has no up or down orientation.
HDMI Port :
HDMI Stands for” High Definition Media Interface” is a digital
interface developed to connect high definition devices such as
digital camera, LED‟s and gaming consoles, etc, to computer with
HDMI ports.
SATA Port :
SATA stand for SERIAL ADVANCED TECHONOLOGY
ATTACHMENT. It is also known as serial ATA or SATA . It
enables storage devices, such as hard drives and optical devices,
to communicate with motherboard using a high – speed serial
cable over two pairs of conductors.
Express Port :
PCI stands for Peripherals Component Interconnect. It is also
known as PCIe. It is an interface standard for connecting high
speed components with your computer system. Every desktop PC
has a number of PCIe slots. You can use PCIe to add GPUs
(video cards, graphic cards) WI-FI cards.
Page 21 of 107
The main function of a mouse is to move the mouse cursor on the
screen in the desired direction.
Select
A mouse provides the option to select the text, file, or folder and
many files at once.
Open a Program
You can open a folder, icon, or other objects using mouse just by
double click.
Drag-and-drop
When you select something, it can also be moved from one place
to another.
Hovering
When you move the mouse pointer on any object, hover changes
the color of links, and by clicking on that link, you can go on the
destination page.
Scroll up and Down
If you are working on a large document, you need to scroll up or
down a page. Scroll button of the mouse helps to up and down
your document page.
Page 22 of 107
These keys are used for moving around in documents or
webpages and editing text. They include the arrow keys, Home,
End, Page Up, Page Down, Delete, and Insert.
Numeric keypad
The numeric keypad is handy for entering numbers i.e 0-9 quickly.
The keys are grouped together in a block like a conventional
calculator or adding machine.
4. What are the use of function keys in Keyboard?
The function keys are used to perform specific tasks. They are
labelled as F1, F2, F3, and so on, up to F12. The functionality of
these keys varies from program to program. Here are some
common uses of function keys:
F1: The F1 key is commonly used as a help key.
F2: In many applications, pressing F2 allows you to rename
selected files or objects.
F3: F3 is commonly used to activate a search function within an
application or operating system.
F4: The functionality of the F4 key varies depending on the
context.
F5: F5 is often associated with refreshing or reloading content
F6: F6 is used to move the cursor or input focus to different areas
within a program or application.
F7: F7 is primarily used in word processing software as a shortcut
to initiate spelling and grammar checks.
F8: The function of F8 varies depending on the context.
F9: F9 typically doesn‟t have a standard function in most
applications, but it may be assigned custom functions by specific
software.
F10: F10 is often used to activate menus or access application
commands.
F11: In web browsers, pressing F11 toggles full-screen mode,
maximizing the browser window to fill the entire screen.
F12: F12 is commonly associated with opening the developer tools
or console in web browsers.
Page 23 of 107
HDMI stands for “High Definition Media Interface” is digital interface
developed to connect high definition devices such as digital cameras,
LED‟s and gaming console etc., to computers with HDMI ports.
2. Type-C
Type-C ports are primarily used for data transfer, charging, and
connectivity with various peripherals.
3. SATA Port
SATA port enables storage devices, such as hard drives and optical
devices, to communicate with motherboard using a high – speed serial
cable over two pairs of conductors.
4. Graphic Card
A graphics card is an expansion card which generates output images to
a display device, such as a computer monitor. A graphics card provides
high-quality visual display by processing and executing graphical data
using advanced graphical techniques, features and functions.
5. Webcam
A webcam is a video camera attached to a computer to record or stream
to the computer or computer network. Webcam can be used for following
purposes:
Still Images
Video Recording
Video Conferencing
Page 24 of 107
SBS Notes Series Class Pre-8th, Unit-4: Computer Software
Page 25 of 107
10 What type of application software is Microsoft Access?
Page 26 of 107
9. CAD and CAM are types of software.
10. DTP software is used to create text and
based documents.
11. __________ is used to solve user problems and to control different
operations of the computer.
12. ___________ starts up the peripheral devices and disk drives.
13. The BIOS is stored on the __________ chip.
14. __________________is the most popular operating system.
15. During ____________, the operating system divides processing time
and memory among the devices and programs.
16. _________is an open-source operating system.
Page 27 of 107
7. Design software helps people to design buildings and cars.
Page 28 of 107
5. (Microsoft Access / Microsoft Excess) is a popular database
management software.
10. A (file manager / virus scanner) enables us to use the files stored on
the computer.
12. A compiler converts a (document file / source file) into an object file.
A B
Page 29 of 107
Q.6: Tick five boxes to show which five of these statements are
most likely to be true. (5 marks)
12. Multitasking means doing two or more things at the same time.
14. A disk finder searches the hard disk for damaged files.
Page 30 of 107
Q.7:. Complete the following statements by filling in the blanks with
the correct terms. Each word or phrase can be used only once.
Answer Key:
Page 31 of 107
9.design 10. Graphics 11. Software 12.BIOS 13.ROM 14. Window
15.Multitasking 16.Linux
14. Q.3: 1. F Utility programs are used to perform specific tasks on the
computer. 2.T 3.T 4.F DOS is an example of command line user
interface. 5.T 6.T 7.T 8.T 9.F Presentation software helps us to
prepare presentations for meetings and educations. 10.F A video
player is entertainment software. 11.T 12.T 13.F Spreadsheet
software is used to display information visually.
Page 32 of 107
fragments of a single file. 19. We can rotate a picture using an image
viewer.
Ans: A device driver runs the system devices attached to the computer.
It first checks whether all the drivers are installed. It then checks whether
Page 33 of 107
all devices are connected to their drivers. It then displays a list of
devices and tells the user whether any drivers need to be installed.
Ans: Loss of data from the hard disk is called disk failure. We can avoid
data loss as a result of disk failure by regularly making back-up copies of
our data. We can use back-up software to prepare back-up copies.
Page 34 of 107
Manufacturing (CAM) uses computers to control robots and machines
that can perform dangerous tasks such as welding and lifting heavy
objects. This helps to avoid injuries to factory workers.
Page 35 of 107
14. What is the difference between graphics software and DTP
software?
Page 36 of 107
22. What is a virus?
(Possible answers)
Ans: Computer software (or software, shortly) is divided mainly into the
following two categories:
1. System software
2. Application software
Ans: A boot sequence includes the first few operations needed to boot
the computer.
Page 37 of 107
28. Define boot loader?
Ans: The bootloader loads the operating system from the memory.
Ans: A file explorer is a utility program that allows users to interact with
the files stored on the computer. Users can use the file manager to
create, edit, access, move, delete, or replace files.
Ans: A photo viewer is a utility program that can store images. It also
has features such as zooming, rotation, previews, slide show, thumbnail
display, full screen display, and so on.
Ans: A disk scanner is a utility program that searches the hard disk for
unnecessary or damaged files and suggests what to do about them. It
also manages folders like Temporary internet Files to release space for
essential data.
Page 38 of 107
35. What is use of Robots in manufacturing?
Ans: They can be controlled by a computer to lift and move heavy and
dangerous objects.
2. A computer has both CLI and GUI interfaces. Why do people still
prefer GUI interfaces?
Ans: CLI (command line interface), e.g. MS DOS and GUI (graphical
user interface), e.g. Microsoft Windows have different strengths and
weaknesses when compared to each other. GUI is more popular
because everything is visible on the desktop and multiple programs can
be executed at the same time by using the mouse, keyboard, and other
input devices. CLI involves memorization of commands and a plain
background which is not attractive. Only the keyboard is used for input.
Ans: Give reasons. The student should use Microsoft Word to prepare
her report. The reasons are given below. Microsoft Word includes
several options for preparing reports such as formatting options and font
Page 39 of 107
styles. The user can write the report and edit it before making a printout.
Features such as spell-check and grammar check can be used to
remove common mistakes from the report. Information can be organized
in the form of headings, bullets, and numbering to improve the
appearance of the report.
Ans: Graphics software has several uses for photographers. The main
uses are explained below. The photographer can scan and edit
photographs for different documents such as brochures, flyers, or
postcards. In addition, the photographer can edit the pictures to remove
unwanted spots and objects from the image. He can also add design
elements such as borders and frames to photographs using graphics
software.
Page 40 of 107
SBS Notes Series Class Pre-8th, Unit-5: MORE ON MICROSOFT
WORD
a) A4 b Letter c Legal D A5
Page 41 of 107
11 The _________ feature enables us to zoom in and out of a document.
14 The Split feature can be accessed by selecting Split from the Window
group on the __________ tab.
15 The _________ feature enables us to tell the computer where the next
page should start
Page 42 of 107
8. Alignment is the manner in which text is placed between the
of a page.
12. We can view the list by clicking on the Clipboard Dialog Box Launcher
on the_____________.
14. _____________ feature can be accessed from the Text group on the
Insert tab.
3. The Insert key enables us to replace existing text with new text.
5. The Word Count feature can be accessed from the View tab.
Page 43 of 107
6. The Page break feature is used to tell the computer where the next
page should begin.
10. In the Landscape orientation, text is printed along the width of the
page.
12. The viewing styles can be accessed from the insert tab.
Page 44 of 107
Q.4: Match the Column A with Column B
A B
Undo Shift+9
Redo Ctrl+Z
Print Ctrl+Y
Find Ctrl+P
Replace Ctrl+F
$ Ctrl+H
( Shift+3
3. To reunite windows that have been split, we use the (Remove Split /
Undo Split) feature.
4. The Insert key allows us to replace text to the (left/right) of the cursor.
5. The Word Count feature can be accessed from the (Insert / Review) tab.
Page 45 of 107
Q.6: Tick five boxes to show which five of these statements are
most likely to be true.
Page 46 of 107
2. The Undo command enables us to ______________ the last action
performed.
3. The Word Count feature enables us to find out the number of words,
lines, and ______________ in a document.
4. ______________ enables us to replace one word or phrase with
another throughout a document.
5. The Symbol feature allows us to insert ______________ symbols.
6. Column break is a ______________ break option.
7. Each footnote and endnote is given a reference ______________.
8. We can ______________ a document before printing it.
Page 47 of 107
3. Describe the steps involved in replacing a word in a document.
To replace a word in a document, we can follow these steps:
The options available for inserting section breaks are listed below:
Ans: The two windows can be reunited by selecting Remove Split from
the Window group.
Ans: To replace one word with another, perform the following steps.
Page 48 of 107
8. Why is the date and time important to insert in a document?
Ans: We can insert page numbers by selecting Page Numbers from the
Header & Footer group on the Insert tab. We can then select the position
of the page number on the page.
11. Under separate headings, list the commands and features that
can be accessed from the View tab and the Home tab.
Full Screen Reading Layout Print Font size Paste Cut Copy
Layout Web Layout Outline Draft
13. What are the shortcut keys for the Undo and Redo commands?
Page 49 of 107
15. What is a section break?
Ans: Draft layout displays the document as a draft so that the text can be
edited quickly.
Ans: The Split feature enables us to break up a window into two. In this
way we can view different parts of a document at the same time.
Page 50 of 107
Ans: Print Preview can be helpful in detecting many types of errors
before a document is printed. It can help to detect excessive empty
space on some pages of the document. It can also help us correct the
size of text that is too small or too large for comfortable reading.
Accurate and consistent line and paragraph spacing, document
formatting, borders, etc. can be checked to ensure the final document
matches our requirements.
Ans: I would prefer the report containing footnotes and endnotes. The
reason is that this document is more authentic than the other one. I can
cross-check the information from the source quoted and use it to do my
own research. I can also verify if the report is based on correct
information.
Page 51 of 107
Select the Find command from the Editing group on the Home tab.
You can also press the Ctrl+F keys instead.
Type the word or phrase in the window opposite Find what.
Click on Find Next. The word or phrase becomes selected on the
document. Keep clicking on Find Next until you reach the desired
place on the document.
Click on Cancel to return to the document.
We can also replace a word or phrase at several places in the
document by using the Replace command.
Select the Replace command from the Editing group. You can also
press the Ctrl+H keys instead.
Type the word or phrase to be replaced in the window opposite
Find what.
Type the new word or phrase in the window opposite Replace with.
Click on Find Next. The word or phrase is selected on the
document.
Click on Replace if you want to replace the selected word with the
new word. Otherwise, click on Find Next to move to the next part
of the document.
You can also click on Replace All to make the replacement
throughout the document.
Ans: We can insert them by selecting Symbol from the Symbol group on
the Insert tab.
Page 52 of 107
Select the symbol that you need by clicking on it.
3. In the Page Setup group, click Columns and specify the number
of columns by clicking the desired option, select two, in the
Columns drop-down menu.
4. You can also click more Columns to get the Columns dialog
box.
Enter the amount of space you want between the columns in the
Spacing spin box. The Width and spacing boxes will be activated only if
you clear the Equal column width check box.
7. Click the Line between check box for inserting a line between
the columns.
8. Click OK. Word will create columns with the chosen settings.
Page 53 of 107
Answer Key:
Q.1: 1. b 2. b 3. a 4. a 5. B 6.a 7.c 8.a 9.b 10.a 11.a 12.c 13.c 14.c
15.a
Q.2: 1. Status 2. Split 3. Ctrl + Z 4. Insert 5. Zoom 6.Symbol 7. Top
,bottom 8. Margins 9.page layout 10.default 11.Formatting 12. Home
tab 13.Zoom 14.Date and Time 15.organize
Q.3: 1. F. Print Layout displays a document as it would appear on a
printout. 2.T 3.T 4.F. The Symbol feature should be used to insert
symbols that are not found on a keyboard. 5.F. The Word Count feature
can be accessed from the Review tab. 6.T 7.T 8.F We can change the
vertical alignment of text only. 9.T 10.T 11. T 12. F The viewing styles
can be accessed from the view tab. 13.T
Q.6: 2. Zooming in makes the text appear larger. 3. The Split feature is
accessed from the View tab. 6. The Page break feature enables us to
tell the computer where to start the next page. 9. It is possible to view
two or more pages at the same time while previewing a document. 10.
The default setting for paper size is A4.
Page 54 of 107
SBS Notes Series Class Pre-8th, Unit-6: Microsoft Excel
SUMMARY
A spreadsheet contains information arranged in rows and columns.
A spreadsheet made on a computer is an electronic spreadsheet.
Spreadsheet software is a program for entering, calculating, analyzing, and
manipulating sets of numbers.
Microsoft Excel is a popular and widely used electronic spreadsheet software.
A worksheet is a rectangular grid of columns and rows.
The intersection of each row and column is a cell.
A cell is referred to by its cell reference.
The active cell is the one into which data can be entered.
The horizontal and vertical gridlines on the worksheet make it easier to see
and identify cells in the worksheet.
The Formula Bar displays the active cell address on its left and the cell
contents on its right. Data entered in a cell is displayed in the Formula Bar.
Data can be moved from one cell to another by using the Cut/Paste
command.
Data can be deleted by selecting a cell and using the Clear options from the
Edit Menu.
The Autofill feature enters a predefined series of text or numbers.
Data can be formatted by changing the font style, size, and alignment.
Sheet tabs at the bottom of worksheets make it possible to move quickly to
another worksheet by clicking on the corresponding sheet tab.
A cell can contain data consisting of 225 characters of text, numbers, dates,
logical values, or formulas.
Labels, or text, contain any combination of letters, numbers, spaces, and non-
numeric characters.
Values or numbers include numbers from 0 to 9, symbols like +, -, *, /, %, and
the decimal point.
A cell can be selected by clicking on it.
Data can be edited by selecting the cell and making changes in the Formula
Bar.
Data can be copied from one cell to another using the Copy/Paste command.
Page 55 of 107
A range of cells is a block of cells that touch each other. A range can be
selected by placing the mouse pointer on the first cell and dragging the mouse
to the last cell while pressing the left button.
Formatting enables us to improve the appearance of a spreadsheet.
We can increase or decrease the height of a row to suit our needs.
Row height is measured in points. The row height can range between 0 to 409
points.
We can increase or decrease the width of a column to suit our needs.
The number of characters that can be contained in a cell depends on the
width of the column. A cell can contain 0-255 characters.
Rows and columns can also be inserted on a worksheet.
Additional rows are inserted above the rows selected.
Additional columns are inserted to the left of the columns selected.
Formulas are used to perform calculations on a worksheet.
A formula always starts with an equals sign (=).
A formula may consist of brackets, operators, cell references, functions,
values, and text.
A cell reference represents the value entered in a cell.
Formulas can be copied to other cells. The cell references are adjusted
automatically.
There are three types of cell referencing – relative, absolute and mixed.
The default cell referencing is relative.
The $ sign is used for absolute referencing.
The type of cell reference is important only if you copy the formula to other
cells.
A function is a pre-written formula that performs specific calculations.
The SUM function is used to find the total of a given set of values. It is written
as =SUM(A2:E2).
The AVERAGE function is used to find the average of a given set of values. It
is written as =AVERAGE(A2:E2).
The MIN function is used to find the minimum value in a given set of values. It
is written as =MIN(A2:E2).
The MAX function is used to find the maximum value in a given set of values.
It is written as =MAX(A2.E2).
Page 56 of 107
The COUNT function is used to count the entries in a given set of values. It is
written as =COUNT(A2.E2).
Graphs, bar charts, and pie charts are different types of charts used in a
worksheet.
The legend is a key that explains what the lines or bars on the chart mean.
QUESTIONS
A1. Fill in the blanks.
1. The cell contents are edited in the Formula Bar .
2. Text data are also called labels .
3. An Excel workbook has three worksheets by default.
4. The Paste command is found in the Clipboard group.
5. We go to the Cells group to delete cell contents.
6. The default row height is 15 points.
7. New rows can be inserted from the Home tab.
8. A formula always begins with an equals sign.
9. We use the SUM function to find the total of a range of values.
10. The Charts group is found on the Insert tab.
11. A worksheet is a rectangular grid of columns and rows .
12. Each cell on a worksheet is known by its cell reference
13. The address of the active cell is given by the row number and column letter.
14. The vertical bar of the frame displays row numbers .
15. Sheet tabs are present at the bottom of worksheets.
16. Data can exist as labels or values .
17. The Autofill feature is used to enter a pre-defined series of data.
18. Merge and Center is used to display cell contents across several columns.
II. Finding the average of values in cells C8, C9, C10, C11, and C12
III. Finding the largest of the values in cells E21, E22, E23, E24, & E25
Page 57 of 107
IV. Finding the smallest of the values in cells B1, B2, B3, B4, and B5
V. Finding the total of values in cells G1, G5, G6, H9, and K3
B. State whether the following statements are true or false. Rewrite the false
statements to make them true.
Page 58 of 107
2. What type of data are symbols such as +, -, and * called in Microsoft Excel?
a). Text b). Values c). Signs d). labels
3. In which alignment is each line of text the same length?
a). left-aligned b). right-aligned c). Justified d). Centered
4. Where does data being typed in the active cell appear?
a). Editing group b). Status Bar c). Name Box d). Formula Bar
5. Which feature helps to create a data series automatically?
a). Autofill b). Indent c). Merge & Center d). Wrap Text
6. The sum of values divided by the number of values is called the.
a). Average b). Percentage c). maximum value d). Function
7. Which of these is another name for a pre-written formula?
a). Reference b). Function c). Value d). Selection
8. Which of these is used to find the total of a cell range?
a). MIN b). MAX c). SUM d). COUNT
9. Which of these is a value?
a). () b). + c). Word d). 100
10. Which of these is not an operator?
a). + b). c). () d). /
Page 59 of 107
5. Name three types of documents for which you would use a spreadsheet
instead of a Word document.
1. Marks sheets 2. Monthly bills 3. Price lists
6. Describe the steps involved in changing row height.
To change row height, we can follow these steps:
Click on the row number/s in the frame to select the row or rows.
Select Row Height from the Format button on the Cells group on the
Home tab.
Enter the new height in the box opposite Row height.
Click on OK.
7. What is the function of the AutoFit Selection feature?
The AutoFit Selection feature enables us to increase or decrease the column
width according to the amount of data in the column. In this way, the data
completely fills the column and there is no waste of space.
8. What is a formula? Describe the elements of a formula.
Page 60 of 107
11. What is absolute cell referencing?
This allows the user to fix a row or column reference; so if in a formula one
number is used over and over again, it can be defined as an absolute reference;
the advantage being that the same one number does not need typing repeatedly.
12. What is the advantage of using functions? Answer with the help of an
example.
The advantage of using functions is that they help us to avoid entering lengthy
formulas. They enable us to perform a specific operation on a large range of cells.
We do not need to enter an operator repeatedly. This helps us to save time and
avoid making mistakes.
To find the total of values in the cells B4, C4, D4, E4, F4, we might use the formula
=B4+C4+D4+E4+F4
We could also use the SUM function by typing:
=SUM(B4:F4)
In this way we do not have to enter each cell reference separately.
13. Why do we use charts on a worksheet?
We use charts on a worksheet because they present data in an interesting and
attractive way. Charts use visual forms such as lines, bars, and diagrams to help
us read and analyse data. Charts also allow people to form a general idea about
the data without having to read a lot of data. They help us to know whether data is
increasing or decreasing with time.
14. What is a spreadsheet?
A spreadsheet is a rectangular grid of cells that is used to organize, analyse, and
manipulate data.
15. What is an active cell?
An active cell is the cell that has been selected.
16. What is a sheet tab?
A sheet tab is a tab that allows us to move from one worksheet to another by
clicking on it.
17. What is a range?
A range is a block of cells that lie adjacent to each other.
18. What is the Formula Bar?
The Formula Bar is an area used to enter a formula in a cell. It is also used as an
area where changes can be made to data in a cell.
19. What is a frame?
A frame consists of a horizontal bar and a vertical bar that contain column and row
references.
20. What is the function of the Hide feature?
The Hide feature is used to prevent a row or a column from being visible on the
worksheet.
Page 61 of 107
21. What is the default column width?
The default column width is 8.43 characters.
22. What is a function?
A function is a pre-written formula for a specific operation.
23. What is the purpose of the SUM function?
The SUM function is used to calculate the total of a set of values.
24. What is the purpose of the AVERAGE function?
The AVERAGE function is used to find the average value of a set of data.
25. What is a legend?
A legend is a key that explains what the different bars, lines, and colours on a
chart represent.
Page 62 of 107
Additional information for the teacher
Page 63 of 107
entered on a worksheet, Excel can sort the data, search for specific data
required by the user, and select data that meets given criteria.
Microsoft Excel also offers Web support. This feature enables Excel to save
a workbook or part of a workbook in HTML format so that it can be viewed
and manipulated using a web browser.
Page 64 of 107
SBS Notes Series Class Pre-8th, Unit-7: Emerging Technologies
SUMMARY
QUESTIONS
A. Fill in the blanks with appropriate words.
1. Emerging Technology may refer to the advancement in existing technology.
2. Robotics is an Interdisciplinary branch of Computer Science and Mechanical
Engineering.
3. Artificial intelligence refers to technologies that make device act and think like
a human.
Page 65 of 107
4. A self-driving car is capable of sensing its environment and moving safely with
little or no human input.
B. State whether the following statements are true or false. Rewrite the false
statements to make them true.
1. Absolute technology is generally referred to as 'Emerging Technology.
False: New technology is generally referred to as 'Emerging Technology.
2. A self-driving car, also known as a manual vehicle.
False: A self-driving car, also known as a robotic vehicle.
3. Blockchain is a method that makes it easy to change the data or hack it.
False: Blockchain is a method that makes it difficult to change the data or hack it.
4. Robotics is replacing human efforts.
True
5. Virtual Reality is a 2D image.
False: Virtual Reality is a 3D visual or other sensory environment.
6. Virtual Reality is the same as Augmented Reality
False: Virtual Reality is different from Augmented Reality
7. Machine Learning is a system that improves itself with experience.
True
8. Google Translator is an example of CAT.
True
Page 66 of 107
C. Circle the correct option for each question:
1. is generally referred to as 'Emerging Technology‟
a). Discontinued b). New c). Best technology d). None of
development technology these
2. The goal of is to make device act and think like human.
a). Artificial b). Virtual Reality c). 3D printing d). Augmented
Intelligence Reality
3. A self-driving is car, also known as:
a). Robotic car b). Beautiful Car c). Automatic car d). Manual car
4. technology is a computer-generated imitation of the real-world
where people can interact in an apparently real or physical way.
a). VR b). AR c). CR d). All of these
5. is the integration of real-world environment and computer-
generated content.
a). VR b). AR c). Holographic d). All
6. A three-dimensional image created with projection Is called
a). Telegrams b). Histogram c). Hologram d). Photogram
7. Which of the following is not an example of an emerging technology?
a). Virtual Reality b). Blockchain c). Robotics d). 3G
8. applications are those which operate simultaneously on several
different computers.
a). Embedded b). Virtual c). Distributed d). None of these
9. In a blockchain system, the transaction or file recorded cannot be
a). Opened b). Read c). Saved d). modified
10. The estimated data rate of 5G technology is
a). 10Gbps b). 15Gbps c). 20Gbps d). 25Gbps
11. Chatbot is an example of:
a). Virtual Reality b). Augmented c). Robotics d). Artificial
Reality Intelligence
12. CAT is also known as:
a). Computer b). Computer c). Computer d). Computer
Assisted Authorized Assisted Application
Transaction Translation Translation Translation
Page 67 of 107
Robots are independent machines that can work without an external trigger or
operator while machine is dependent and cannot work on its own. Robots have a
wide range of uses in almost all areas of life. They are mostly used in
manufacturing industries, medical field, agriculture, military and entertainment
etc.
Page 68 of 107
10. What is holographic imaging?
A hologram is a three-dimensional image, created with photographic projection of
a 3D recorded image. Unlike 3D or virtual reality on a two-dimensional computer
display, a 3D hologram matches almost exactly with the original object.
11. How can you create a hologram at home?
You can create hologram at home by using simple mobile and a piece of glass or
plastic cut and joined at the angle of 45 degree.
12. Which device is used to experience virtual reality?
VR headset is used to experience virtual reality or VR.
13. What is the main purpose of using Computer Assisted translation?
The main purpose of using Computer Assisted Translation to enables a human
translator to work more quickly and precisely while translation. CAT speeds up
lengthy translations, reduces errors, is affordable, and is widely used.
14. What makes 5G better than previous ones?
5G is better than previous ones because it is much faster, more flexible, and has
less data transfer delays.
15. What are Holographic imaging? Discuss its applications.
A hologram is a three-dimensional image, created with photographic projection.
Unlike 3D or virtual reality on a two-dimensional computer display, a hologram is
a truly three-dimensional and free-standing image.
Applications:
Holographic imaging can be used imaging for more accurate result.
It can be used for security purpose.
It can be used in advertising and marketing.
It can be used to inspect quality of products in the manufacturing industry.
16. Write a note on blockchain.
Page 69 of 107
E. Write paragraphs to answer the following questions.
What you think of emerging technology? Explain your answer with three real
world examples.
The term emerging technology is generally used to describe a new technology, it
may also refer to the advancement in existing technology. Artificial Intelligence
(AI): Artificial intelligence refers to technologies that make device act and think like
human. Voice recognition and decision-making are features of human intelligence
that artificial intelligence may process. Self-driving Cars: A self-driving car, also
known as robotic car that is capable of sensing its environment and moving safely
with little or no human input. Many companies such as Google, and Tesla have been
developing and using self-driven cars for several years. 3D Printing: Three-
dimension (3D) printing is a process that creates a three-dimension physical objects
from a digital design. 3D printers may also be called additive manufacturing printers
or fabrication printers.
F. Lab exercise
Use a search engine to find an online map of your city. This map was made with the
help of a satellite. Can you locate your home and your school on the map? Also get
directions from your home to your school and find a best suitable route for you.
Page 70 of 107
SBS Notes Series Class Pre-8th, Unit-8: Computational Thinking
SUMMARY
Computational Thinking (CT) involves a set of problem-solving skills and
techniques we use to solve a problem.
A program is a set of instructions that tells a computer how to perform a task.
People who write programs are called programmers.
Programmers write programs in languages that ordinary people can also
understand. These languages are called user-friendly languages.
User-friendly languages use words from common English.
Breaking a task or problem into steps or parts is known as Decomposition.
Discover the principles that cause the patterns in a problem is called
Generalization.
An algorithm is a sequence of instructions that can be followed to get desired
results.
An algorithm is written by breaking down each activity into simple steps, and
writing a clear instruction for each step
After a programmer has written an algorithm, he prepares a diagram based on
the algorithm.
Brute Force Algorithm goes through all possible solutions until required
solution is found.
In Recursive Algorithm, a problem is broken into several sub-parts and called
the same procedure again and again.
Searching algorithms are used for searching elements or groups of elements
from a particular data.
Divide and Conquer Algorithm breaks a problem into sub-problems, solves a
single sub problem and merges the solutions together to get the final solution.
In problem solving, a loop is a sequence of instructions that is executed again
and again until a certain condition is true.
An infinite loop, have not an explicit end. It runs on an infinite time because its
condition is not false in any iteration.
A flow chart is a pictorial representation of an algorithm.
Flow charts help programmers plan and write programs.
A flow chart uses different symbols to denote different types of instructions.
Page 71 of 107
The Start / End symbol represents the starting point and end point of a flow
chart.
The Input / Output symbol represents the stage where data and processing
instructions are fed into the computer. It also represents the stage where the
computer provides the results of processing the data.
The Process symbol represents the processing taking place inside the
computer.
The Decision symbol represents the stage where a computer has to make a
decision. It contains a question with a yes or no answer.
Each symbol in the flow chart is connected with arrows. Arrows help the
programmer move from one instruction to the next in the correct sequence.
Efficiency of a solution is measured by following parameters:
o No of steps executed by the solution to solve the problem.
o Memory consumed by the solution
We need to make a selection when we have to choose between two possible
actions.
The choice of an action depends on whether a condition is true or not true.
A condition is true when the answer to the question is yes: Otherwise, it is not
true.
We can write a condition and the possible actions in the form of an IF...THEN
statement.
An IF...THEN statement tells us what the condition is. It also tells us what to
do if the condition is true.
IF...THEN...ELSE statement tells us what the condition is. It tells us what to
do if the condition is true. It also tells us what to do if the condition is not true.
Programmers use IF...THEN and IF... THEN...ELSE statements to write
computer programs. These statements help the computer to make decisions.
QUESTIONS
A. Fill in the blanks.
1. Breaking a task or problem into steps or parts is known as Decomposition.
2. Brute Force Algorithm goes through all possible solutions until required
solution is found.
Page 72 of 107
3. Searching algorithms are used for searching elements or groups of elements
from a particular data.
4. A loop is a sequence of instructions that is executed again and again until a
certain condition is true.
5. A flow chart is a pictorial representation of an algorithm.
6. An activity can be broken down into steps
7. Selection involves making a choice from several options.
8. A condition is true when its requirements are met.
9. Checking whether a condition is true or not true is called testing the condition.
10. The IF…THEN statement gives us a condition and tells us what to do if
the condition is true.
B. State whether the following statements are true or false. Rewrite the false
statements to make them true.
1. An infinite loop, have not an explicit end.
True
2. Divide and Conquer Algorithm breaks a problem into sub-problems.
True
3. Each step in the flowchart is represented by a step.
False. Each step in the flowchart is represented by a symbol.
4. Efficiency of a solution is measured by memory consumed by the solution.
False. Efficiency of a solution is measured by no of steps and memory
consumed by the solution.
5. Generalization is discovers the principles that cause the patterns in a problem.
True
6. A program is a set of instructions that tells a computer what to do.
True
7. An algorithm is a pictorial representation of a flow chart.
Page 73 of 107
C. Select the correct option for each question.
1. Breaking down a problem into sub problems is called
pattern
a). Generalization b). c). deconstruction d). Design
Recognition
2. Discover the principles that cause the patterns of a problem is called
pattern
a). Generalization b). c). deconstruction d). Design
Recognition
3. Set of instructions to solve a problem is called
a). Directions b). Instructions c). Algorithm d). Design
4. The algorithm which goes through all possible solutions until required solution is
found is called:
Recursive Searching Brute force sorting
a). b). c). d).
Algorithm algorithm algorithm algorithm
5. The algorithms which help in arranging a group of data in a particular manner are
called:
Recursive Searching Brute force sorting
a). b). c). d).
Algorithm algorithm algorithm algorithm
6. The algorithm which breaks a problem into sub-problems, solves a single sub-
problem and merges the solutions is called
Divide and
Recursive Brute force sorting
a). b). c). Conquer d).
Algorithm algorithm algorithm
Algorithm
7. The algorithm which uses a random number so that it gives immediate benefit is
called:
Divide and
Recursive Brute force Random
a). b). Conquer c). d).
Algorithm algorithm algorithm
Algorithm
8. The sequence where we repeat specific set of instruction again and again is
called:
a). Loop b). Sequence c). Condition d). all
9 The loops which have to be terminated are called
intermediate
a). Infinite loops b). Finite loops c). d). Simple loops
loops
10. The loops which are never going to end are called:
intermediate
a). Infinite loops b). Finite loops c). d). Simple loops
loops
11. Which flow chart symbol is shaped like a diamond?
a). Input b). Process c). Decision d). Start
12. A set of instructions in plain language is called a/an
a). Algorithm b). flow chart c). Program d). process
13. Which statement is used to test a condition?
a). PRINT b). IF c). TEST d). IF...THEN
14. Which symbol in a flow chart represents the flow of the steps?
a). Output b). Process c). Decision d). Arrows
Page 74 of 107
15. A condition is if it is satisfied.
a). True b). not true c). False d). Valid
Page 75 of 107
Feasible:
7. What are loops? Discuss its types
In problem solving, a loop is a sequence of instructions that is executed again
and again until a certain condition is true. If the condition becomes false, the
statements outside the branches the loop are executed.
There are two most common types of loops:
Finite Loops
The most common type of loop is finite loop. There type of loops have explicit
end and these loops execute their bodies for a fixed number of times. A finite
loop stops when the condition is false
Infinite Loops
An infinite loop, have doe not an explicit end it runs for an infinite time because its
condition remains true for iterations.
8. Enlist advantages and disadvantages of flowcharts
Advantages:
Easy to draw
Easy to understand
Mistakes can be easily identified
Debugging becomes possible
Logics can be easily understood.
Disadvantages of Flowchart
Difficult to present complex programs.
Modification is difficult
Time consuming
Difficult to understand for people who don‟t know flowchart symbols.
9. Why do we have to make selections? Explain with examples.
We have to make selections because there are many occasions where we have
to choose from two or more actions. For example, when we want to buy clothes,
we have to select from several styles and designs. Similarly, when we compose a
document on a word processor, we have to select which font colour or font size
to use.
10. What is a condition?
A condition is a state that must be achieved for a certain event to take place. It is
a necessary requirement for an action. A condition describes the things that must
happen before we can take an action. A condition should be worded in the form
of a question that has a Yes or No answer. If the condition is not satisfied, we
cannot perform the specific action.
Page 76 of 107
A condition should be worded in the form of a question that has a Yes or No
answer. A condition is true when we can answer Yes to the question. A
condition is not true when the answer to the question is No.
12. How does the IF...THEN statement help us in making a selection?
The IF…THEN statement helps us in making a decision by specifying a
condition and telling us what to do if the condition is true. If the condition is not
true, we continue with the previous action.
13. What is the difference between the IF…THEN statement and the IF...THEN
ELSE statement?
The difference between the IF…THEN statement and the IF…THEN…ELSE
statement is that the IF…THEN statement only tells us what to do if a condition is
true. It does not tell us what to do if the condition is not true. However, the
IF…THEN…ELSE statement tells us both what to do if a condition is true and
what to do if the condition is not true.
14. Write an algorithm using an IF...THEN statement for deciding whether to
refuel a car while driving along the motorway.
1. Check fuel level.
2. IF fuel level is close to EMPTY, THEN refuel car.
3. Drive on.
15. Create an algorithm for deciding whether to buy a new television or a
second-hand one.
1. Find out cost of new television.
2. Find out cost of second-hand television.
3. Check family savings.
4. IF family savings > cost of new television, THEN buy new television, ELSE
buy second-hand television.
5. Watch favourite programmes.
Page 77 of 107
Step 2: Declare 3 integer variables N1, N2 and N3
Step 3: Take the three numbers, to be added, as inputs in variables N1, N2,
and N3 respectively
Step 4: Declare an integer variable sum to store the resultant sum of the 3
numbers.
Step 5: Add the 3 numbers and store the result in the variable sum.
Step 6: Print the value of the variable sum
Step 7: END
3. Write the algorithm to find whether given number is even or odd
Algorithm to Find whether given number is Even or Odd:
Step 1: START
Step 2: Declare an integer variable N1.
Step 3: Take the number, to be checked, as inputs in variables N1.
Step 4: Declare an integer variable remainder to store the resultant remainder
by 2 of the number.
Step 5: Remainder = N1 %2.
Step 6: Check IF remainder = 0, then print “Number is Even”, Otherwise print
“Number is Odd”
Step 7: END
4. Write down rules of writing a flowchart.
We should follow the following rules while drawing a flowchart:
1. Use conventional flowchart symbols.
2. Every flow chart must have the start and End points
3. Each symbol should have one exit point except the decision Symbol.
4. Flow lines should not cross each other.
5. The flow lines coming out of the decision symbol should be labelled properly.
5. Why don’t we consider memory in measuring
efficiency of an algorithms. START
The solution which solves a problem in less
no. of steps is considered more efficient
than that which takes more steps for Input Three Numbers: A, B, C
solution because memory is not an issue
for computer systems now.
Sum = A+B+C
6. Draw a flowchart to find sum of three
numbers
Print Sum
END
Page 78 of 107
7. Draw a flowchart to find whether given number is even or odd.
START
INPUT Number A
Rem = A % 2
END
OUTPUT 37+64
END
Page 79 of 107
9. How can we measure the efficiency of a solution?
The efficiency of a solution is always measured in terms of number of steps taken
by the solution. The solution which solves a problem in less number of steps is
considered more efficient than that which takes more steps for solution.
Page 80 of 107
which option to select.
After evaluating all the options, we might then select the one that best
matches our standards. This option is called the solution. We have now
made a sound decision.
After selecting the best option, we have to use our resources to apply it.
This is called implementing the solution. Unless we implement the solution,
the problem will not be solved.
After implementing the solution, it is important that we see whether it is
producing the expected results. This is called monitoring the system. It helps
us verify whether we made a sound decision or not.
Page 81 of 107
SBS NOTES SERIES CLASS PRE-8TH, UNIT-9: COMPUTER
PROGRAMMING
SUMMARY
Programmers provide step-by-step instructions to computers.
Computers understand a limited set of Instructions. If they misunderstand an
instruction, they do not work properly and make errors,
When a program is run or followed by a computer, it is said to be executed.
Programs enable us to control how machines work.
A computer understands instructions in machine code. Machine code consists
of instructions written using only two digits: 0 and 1.
Low-level languages are used to write instructions in machine code. Low-level
languages can be divided into two groups.
First-generation languages are used to write programs in machine code.
Second-generation languages are used to write programs in assembly
language. Assembly language is easier than machine code.
High-level languages are user-friendly as well as programmer-friendly.
Third-generation languages are user- friendly languages created during the
1950s.
Fortran stands for FORmula TRANslation. It is used by engineers, weather
forecasters, and scientists.
COBOL stands for Common Business Oriented Language. It is used by
businesses.
Fourth-generation languages were developed from the 1960s to the 1990s.
These languages were mostly used to create programs for businesses.
Fifth-generation languages are used to create programs based on artificial
intelligence.
An assembler converts programs written in assembly language into machine
code.
A compiler converts programs written in high-level languages into machine
code.
An interpreter is used by a programmer to test an incomplete program as he
is writing it. Unlike the compiler which converts a completed high-level
language program into machine code, the interpreter only translates
instructions that the programmer needs to test run on the computer.
BASIC stands for Beginners' All-purpose Symbolic Instruction Code. It is a
very simple and easy-to-learn programming language.
Python is a high-level scripting language which can be used for a wide variety
of text processing, system administration and internet-related tasks.
Python is one of the easiest languages to learn and use, while at the same
time being very powerful.
Python statements do not need to end with a special character.
Python relies on modules, that is, self-contained programs which define a
variety of functions and data types.
QUESTIONS
A. Fill in the blanks.
Page 82 of 107
1. A computer understands instructions in machine code.
2. Second-generation languages are programmer -friendly languages.
3. FoxPro is a Fourth -generation language.
4. A program translated into machine code is executed by an interpreter.
5. High-level languages are user -friendly.
6. Python statements do not need to end with a special character.
7. Listing tasks in steps makes it easier to follow them completely and accurately.
8. The earliest programming instructions were in the form of a series of punched
holes.
9. High-level languages are both user-friendly and programmer-friendly.
10. COBOL is used in business organizations.
B. State whether the following statements are true or false. Rewrite the false
statements to make them true.
1. Fortran and COBOL are high-level languages.
True
2. Basic stands for Beginners' All-purpose Symbolic Instruction Computation.
False. Basic stands for Beginners' All-purpose Symbolic Instruction Code.
Page 83 of 107
C. Select the correct option for each question.
1. Which digits make up binary language?
a). 1 and 2 b). 1 and 0 c). 1 and 9 d). 2 and 3
2. Which of these is an early form of a computer program?
a). punched cards b). abacus c). Napier's bones d). Pascaline
3. Which of these is not a high-level language?
machine
a). b). Fortran c). C d). Java
language
4. What does Fortran stand for?
Formula Formula Formula Formula
a). b). c). d).
Transfer Transformation Translation Transport
5. Which group of languages is based on artificial intelligence?
second- fifth- fourth- first-
a). b). c). d).
generation generation generation generation
Page 84 of 107
5. Why do we need assemblers and compilers?
We need assemblers and compilers because they convert programs into machine
language so that they can be processed by a computer. Assemblers convert
instructions written in assembly language into machine code. Similarly, compilers
convert instructions written in high-level languages into machine code.
6. What does BASIC stand for? Why is it widely used in education?
BASIC stands for Beginners‟ All-purpose Symbolic Instruction Code. It is widely
used in education because it uses words from common English and has a simple
syntax. This makes it a user-friendly language that young students can easily learn.
7. What is python?
Python is a high-level scripting language which can be used for a wide variety of text
processing, system administration and internet-related tasks. Unlike many similar
languages, its core language is very small and easy to master, while allowing the
addition of modules to perform a virtually limitless variety of tasks.
8. What is meant by execution?
Execution is the stage where a computer carries out instructions.
9. What is a user-friendly language?
A user-friendly language is one that can be easily understood by ordinary
computer users.
10. What is a programmer-friendly language?
A programmer-friendly language is a programming language in which computer
programmers can easily write programs.
11. What is Fortran?
Fortran stands for formula translation. It is a high-level language that is used to write
programs for organizations that do scientific work.
12. What is an assembler?
An assembler is a program that converts instructions written in assembly language
into machine language.
E. Write paragraphs to answer the following questions.
1. Explain the benefits of high-level languages over low-level languages.
High-level languages have a number of benefits over low-level languages. High-
level languages are closer to natural languages like English, which makes
programming in high-level languages easier. Low-level languages are based on
binary digits 0s and 1s and are more difficult to learn. Programmers can detect
errors more easily in programs written using high-level languages.
2. Find out about a programming language that is not used nowadays. What
was it used for and which language has replaced it? What are the improved
features of the new language?
B language was a programming language used for designing applications and
language software. It was used to write code quickly and was better than
assembly languages. B language was superseded by C language. C language
Page 85 of 107
was created in 1970s. It had an improved syntax and was used with the ASCII
code.
3. Write about two possible applications of programs based on artificial
intelligence.
Programs based on artificial intelligence can be used to develop computer games
such as a chess game which contains knowledge of thousands of possible
moves, e.g. Deep Blue. These programs can also be used by scientists to study
how the brain thinks and makes decisions.
Page 86 of 107
SBS Notes Series Class Pre-8th, Unit-10: THE INTERNET AND EMAIL
SUMMARY
The Internet is a network that can connect all the computers in the world. It
consists of clients, servers, cables, and satellites.
The World Wide Web (WWW) is a specific part of the Internet. It consists of
files that can be accessed on the Internet.
Information on the Web is organized in the form of web pages.
A website is a collection of web pages about a common subject.
When sending data from a computer, a modem converts digital data into
analog signals. This is called modulation.
On receiving analog signals, the modem converts them into digital data. This
is called demodulation.
A telephone dial-up modem interconverts digital data and analog signals so
that they can be transmitted along telephone lines.
Digital Subscriber Lines allow digital data and voice signals to be carried
along telephone lines.
Television cable wires can also be used to transmit data.
An Internet browser is an application software that helps us connect to the
Internet and view information from the World Wide Web.
All computers that are part of the Internet are connected to a server called a
web server.
An Internet Service Provider (ISP) is a company that maintains a web server.
Every website has an address called a uniform resource locator (URL).
A Navigation Bar is a toolbar on an Internet browser. It contains buttons that
we can use to move around different sites and perform certain actions.
Hyperlinks on websites enable us to jump to another page on the website
without going through every web page in sequence.
When we bookmark a web page, the browser saves the URL of the page in a
separate folder called Favorites.
The History folder stores the URLS of all the websites that have been visited.
A search engine is a program that searches websites using keywords.
Downloading is the process of transferring data from a central system to a
smaller system.
Uploading is the process of transferring data from a smaller system to a
central system.
People use the Internet to stay informed use online databases, communicate,
and for entertainment.
We can communicate with others over a network through email.
A message that is sent over a network is called an email message.
Email stands for electronic mail. It is a system of sending digital messages
over a network such as the Internet.
There are some special websites that we can use to open an email account.
An email account is storage space on a web server where we can keep our
email messages.
An email account maintains a record of all the email messages that we have
sent and received.
. An email address identifies the sender and receiver of email.
To access our email account we need a user id and a password.
Page 87 of 107
Entering the subject helps the recipient know what the email is about, even
before reading it.
Cc and Bcc allow us to send the same message to more than one person at
the same time.
We can also upload and send electronic files such as documents,
spreadsheets, and images through email.
We can reply to an email message by clicking on Reply.
The Inbox folder contains all incoming email.
.The Junk folder stores junk mail i.e. advertisements, jokes and harmful messages.
The Drafts folder stores messages to be sent at a later date.
The Sent folder stores all the emails that we have sent to others.
The Deleted folder stores messages that have been deleted.
We can sign out of our email account by clicking on sign out.
QUESTIONS
A. Fill in the blanks.
1. The part of the Internet consisting of files that can be shared is called the
World Wide Web
2. The Internet browser is a program that we can use to view information
on the Web.
3. A website contains web pages on a related topic.
4. We can jump from one web page on a website to another by clicking on a
tab.
5. The address of a website is called a uniform resource locator (URL)
6. We can click on hyperlinks to jump to another page on the website without
going through every web page in sequence.
7. Converting digital data into analog signals is called modulation .
8. In computer terms, Cc stands for courtesy copy.
9. Junk mail is also called spam
10. We need a username and password to create an email account.
11. The Subject line tells the recipient what the email is about.
12. Unfinished messages can be stored in the Drafts folder.
B. State whether the following statements are true or false. Rewrite the false
statements to make them true.
1. The Internet and the Web are two terms for the same thing.
False. The term Internet is used to refer to the network of computers while
Web refers to the content available on the Internet.
2. Converting digital data into analog data is called modulation.
True
Page 88 of 107
3. The address of a website is called a uniform resource locator.
True
4. We can bookmark a page to view it at a later time.
True
5. We can view web pages visited earlier from the Tools menu.
False. We can view web pages visited earlier from the History folder.
6. Passwords are useful for preventing others misusing our email accounts.
True
7. To reply to a message we click on Send.
False. To reply to a message we click on Reply.
8. We can check our email by going to our Inbox.
True
9. Email can only be sent over the Internet.
False. Email can be sent over several computer networks like intranets,
extranets, and the Internet.
10. Junk mail is also known as spam.
True
C. Circle the correct option for each question.
1 Which of these is used to go directly to a web page without going through every
page?
2. What is the term used for saving data from the Internet on a computer?
a). History b). ISP c). Navigation Bar d). search engine
Page 89 of 107
a). # b). @ c). & d). %
bank
a). b). advertisements c). jokes d). scam mails
statements
D. Answer the following questions:
1. What is the difference between the Internet and the Web?
The Internet is a network that can link all the computers in the world into a
single network. It enables the computers on these smaller networks to share
data and resources with one another. The Web consists of the files that can
be shared over the Internet.
2. Explain the following terms:
a. Internet Service Provider
An Internet Service Provider is a company that maintains expensive web
servers. These web servers store large amounts of data. Internet Service
Providers enable computer users to be connected to their web servers.
b. gateway
A gateway enables a computer connected to a smaller network to be
connected to the Internet.
c. Bandwidth
Bandwidth is a measure of the amount of data that can be carried by a
transmission medium. Fibre- optic cables have the greatest bandwidth.
3. What is a modem? Describe the different types of modems.
A modem is a device that modulates and demodulates data so that it can
travel along a transmission medium. It converts digital signals into analog
signals to send them over a transmission medium. It converts analog
signals into digital signals to receive data being sent over a transmission
medium. There are three types of modems.
A telephone dial-up modem converts digital data into analog data and
vice versa. Data transmission is slow.
Digital Subscriber Lines transmit data at a greater speed. They enable
the telephone and the Internet to be used at the same time.
A cable modem uses coaxial cables to transmit data. Cable modems are
faster than telephone dial-up modems and DSL.
Page 90 of 107
4. Describe the function of the Favorites folder. How is it different from the
History folder?
The Favorites folder enables us to bookmark a web page to view it at a
later time. We can save our preferred websites in the Favorites folder. It is
different from the History folder because the URLs of the all the websites
we visit are stored automatically in the History folder.
5. How can we find information on the Web with the help of a search
engine?
We can find information on the Web by entering keywords in a search
engine. The search engine uses the keywords to search websites that
contain those keywords. It then displays a list of those websites. We can
then visit a relevant website by clicking on its URL.
6. How can we download information from the Web?
We can download information from the Web by clicking on the Tools button on
the Internet browser. We can then click on Save As in the File menu. Finally,
we can select a name and location for saving the file.
7. What is meant by email? What are the advantages of email?
Email stands for electronic mail. It is a means of sending messages from
one computer to another over the Internet and other networks. Email has
several advantages. It is faster and cheaper than other modes of
communication.
8. What is the function of an email address?
An email address identifies the sender and the receiver of an email message.
Entering the receiver‟s email address enables the message to be sent to the
right person. The sender‟s email address lets the receiver know who the
message is from.
9. Describe the procedure for attaching a file to an email message
A file can be attached to an email message by following the steps given below:
Click on Attachments.
Select the drive or folder where the file is located by using the Look in
menu.
Select the file by clicking on it.
Click on Open.
10. Why should we mention the subject of an email message?
We should mention the subject of an email message because it tells the
receiver what the message is about. The reader does not have to open every
message to see what it contains.
11. What does the Deleted folder contain? Can we recover a message that
we have deleted?
The Deleted folder contains email messages that have been deleted or removed
from the Inbox. We can recover a message that we have deleted because
deleted messages remain in the Deleted folder for a few days.
Page 91 of 107
12. What is the difference between Co and Bcc?
When we send an email message as Cc, all the recipients know that a copy has
been sent to other people. However, when we send an email message as Bcc,
the recipients do not know that copies have been sent to other people.
13. What is a web page?
A web page is a part of the World Wide Web that contains information on a
particular topic or subject.
14. What is meant by modulation?
The conversion of digital data into analog signals is called modulation.
15. What is an Internet browser?
An Internet browser is an application software that allows us to connect to
the Internet and view information from the World Wide Web.
16. What is meant by the term online?
Online is a term used to describe the state of being connected to the
Internet.
17. What is the function of the Navigation Bar?
The Navigation Bar enables us to move around the Web and visit different
web pages.
18. What is uploading?
The process of transferring or copying information to the Web is called
uploading.
19. What is an email account?
An email account is storage space offered by a website. An email account is
used to send and receive email messages.
20. What is a password?
A password is a code that we enter to access our email account. A
password prevents other people from accessing our account without our
permission.
21. What is an Inbox?
An Inbox is an email folder that contains email messages that others have
sent us.
22. What is an attachment?
An attachment is a file that can be sent together with an email message.
23. What is spam?
Spam is email that is not meant for us. It includes advertisements, jokes,
and harmful messages.
Page 92 of 107
E. Write detailed answer of the following questions.
1. You have found some informative web pages that you would like to view
later. Which feature of the web browser would you use?
I would bookmark the webpages (Ctrl+Shift+B) to view them later. If I have
not bookmarked the pages, I will search for them in the History folder. I would
also try to type part of the URL of the web page. This would display the URL
of the web page that matches the words I had typed.
2. Which keywords would you enter in a search engine to find information
about cities in China?
There are multiple keywords that I could use to find information about cities in
China. I could enter „Information about Chinese cities‟ or „China-information of
cities‟ in the search box. I could also type the names of some famous Chinese
cities such as Beijing, Shanghai, and Tianjin.
3. Describe how the Internet may be useful to your school librarian.
The school librarian can use Internet to search for new books published in other
countries that would interest students. The librarian could also order the books
online from the publisher‟s website or from online sellers. The librarian can also
read reviews of books online. He or she can communicate with other librarians
and share books.
4. What are the dangers of someone else finding out your email password?
A person who finds out my email password can access and steal sensitive
information like my account number details and other information sent by
email. He or she can send viruses or malware to my email contacts. My
account could be altered or even deleted, resulting in loss of important
information.
5. What are the safety measures taken by an email service provider?
Email service providers guide users about password protection. When setting
passwords, the email service provider indicates the strength of the password
and how to improve it. Alphanumeric passwords with 8 or more characters
including upper and lowercase letters are recommended. Email service
providers use encryption techniques to protect email messages. They use
spam filters to automatically send spam email to the Junk folder.
6. List some precautions to be taken when using email.
Some important precautions are:
i) Keep your password secret and hard to guess.
ii) Do not add people you do not know as your email contacts.
iii) Do not share your email ID with suspicious websites because they
could send continuous spam to your Inbox.
Page 93 of 107
that servers and clients should follow for sharing these files. Each network has
different rules for sharing files. These rules are called File Transfer Protocols
or FTPs. The most commonly used protocol is called TCP/IP.
Each URL begins with http://. HTTP stands for HyperText Transfer Protocol.
HTTP is a larger set of rules that can be used to share files across different
smaller networks that use different rules like TCP/IP. HTTP creates uniformity
in sharing files. With HTTP, a client on one of the smaller networks can access
data stored on a different network. The http:// in a URL tells us that the
browser will use these rules to access the information on the server.
The server is a powerful computer that houses the web page we need. Such a
server is called a host. The browser carries information from the host and
displays it on the browsing window. The first page of a website is called its
home page.
The www in a URL tells us that the information we need is stored on the
World Wide Web. Hotmail is the name of the organization that we need
information about. The final part of a URL is called a web extension. There are
several web extensions like .com, .edu, .gov, etc. Below is a table that
identifies different extensions and explains what they mean.
Once we type the URL in the Address Box, the Internet browser sends a
request to the host for the web page. The host accepts the request and sends
instructions to the browser. These instructions are in a language called
HyperText Mark-up Language (HTML). The browser follows these
instructions to display the web page in the browser window.
Email technology predates the introduction of the Internet. It was first used in
around 1965 to enable users to log on to a mainframe computer and store
files. It was further developed during the 1970s. Initially email communication
was restricted to the users logged on to the same mainframe computer, i.e.
employees belonging to the same organization.
Other versions enabled users to share email across different organizations.
These systems were called host-based systems and were the predecessor
systems of LAN-based systems which dominated the 1980s. The idea was to
use servers to enable a larger number of users to connect and share
information within a networked environment. These systems were also
Page 94 of 107
applicable to different organizations as long as they shared the same protocols.
The current email infrastructure allows substantial memory and advanced
options for the user. An email account is like a personal letter box which can
store thousands of messages. The latest search options enable users to
recover messages which date back several years. Users can categorize email
according to priority and senders.
A complete list of email companions can be maintained. Entering their names
in the Search option displays all the communication that has been conducted
with them.
Email accounts contain personalization options which enable users to specify
rules for incoming and outgoing messages. Users can also create their own
folders and sort email accordingly. They can change the theme of email folders
and match options according to their requirement.
Email messages can be written in plain text or in HTML format. Users can also
include signatures in their messages.
Page 95 of 107
SBS Notes Series Class Pre-8th, Unit-11: Ethics of Digital World
SUMMARY
Ethics is the discipline concerned with what is morally good and bad or
morally right and wrong.
An ethical issue is a circumstance in which a moral conflict arises in a society
or workplace.
Identifying and obeying the principles of being online is called digital ethics.
Leaving your devices unprotected can result in anything as small as a slower
computer, right through to losing all the money in your bank account, to
identity theft.
Being a responsible digital citizen means having the online social skills to take
part in online community life in an ethical and respectful way.
In phishing a scammer sends you a malicious link, designed to trick a person
into revealing sensitive information to the attacker.
Positive use of the Internet makes our lives easy and simple. The Internet
provides us with useful data, information, and knowledge for personal, social,
and economic development.
According to the US Census Bureau, E-commerce accounted for 14 percent
of all retail sales in 2020.
Client Relationship Management (CRM) is a software that encompasses a
wide range of data to help businesses to better serve their customers,
increase purchases and to find new customers.
The term social networking refers to the use of internet-based social media
sites to stay connected with friends, family, colleagues, or customers.
Copyright is a type of intellectual property rights that protect original works of
an owner.
Presenting other‟s work or ideas as your own, with or without consent is called
plagiarism.
The act of illegally reproducing copyrighted material, such as books, computer
programs, and films is called piracy.
Media bias occurs when a news outlet allows opinions to affect the news they
report.
Spending too long on social networking sites could adversely affect your
mood.
Fear of Missing Out (FOMO) is a phenomenon that became prominent around
the same time as the rise of social media.
As most people are probably aware, social media forms unrealistic
expectations of life and friendships in our minds.
QUESTIONS
A. Fill in the blanks.
1. Identifying and obeying the principles of being online is called digital ethics.
2. Spending too long on social networking sites could adversely affect your mood.
3. An ethical issue is a circumstance in which a moral conflict arises in a society or
workplace.
Page 96 of 107
4. Presenting other‟s work or ideas as your own, with or without consent is called
plagiarism
5. In phishing a scammer sends you a malicious link, designed to trick a
person into revealing sensitive information to the attacker.
B. State whether the following statements are true or false. Rewrite the false
statements to make them true.
1. Spending too long on social networking sites not affected on your mood.
False. Spending too long on social networking sites not affected on your mood.
2. The act of illegally reproducing copyrighted material is called privacy.
True
3. Media bias occurs when a news outlet allows affecting the news they report.
True
4. The term social networking refers to the use of internet-based media.
False. The term social networking refers to the use of internet-based social media
sites.
5. Positive use of the Internet makes our lives easy and simple.
True
Page 97 of 107
Social media
a). b). c). social websiting d). websiting
networking networking
8. is a type of intellectual property rights that protect original works of an
owner.
a). cyberbulling b). plagiarism c). Piracy d). copyright
9. Illegally reproducing copyrighted material, such as books, computer programs and
films is called
a). cyberbulling b). plagiarism c). piracy d). copyright
10. Accessing computers, computer software, computer data, or networks without
authorization is called:
unauthorized authorized improper
a). b). illegal use c). d).
access access experiments
Page 98 of 107
businesses such as Amazon and Shopify stores, always operate on the
Internet for all sales and customer interactions.
Marketing and CRM: CRM stands for Client Relationship Management
(CRM), is software that encompasses a wide range of data to help businesses
to better serve their customers, increase purchases and to find new
customers. CRM analytics allows businesses to customize interactions to fit
individuals, rather than offering the same generic interaction with everyone.
Furthermore tools like Facebook Pixel, can target new customers based on
websites they visit, posts they like and even the videos they watch on
YouTube.
Collaboration and Document Storage : Tools like Google Drive and
Microsoft OneDrive and Dropbox allow you to collaborate on projects in real
time, regardless of where they are located you can update, edit and comment
on documents as they are being drafted, while permission to access and edit
the documents can be controlled by the creator of the file.
Videoconferencing, Chat and Remote Employees: Many businesses are
integrating some remote work into their normal operations for the foreseeable
future, reducing costs associated with housing employees while using video
conferencing, in-house chat applications and social media to keep their teams
together even when they‟re physically distant.
Businesses are also embracing video conferencing and online chat for
customer interactions Automated chatbots integrated into a company‟s
website can answer client questions quickly, without having to wait for an
online representative to answer common questions (Like using internet in
Business).
6. Define CRM.
CRM stands for Client Relationship Management (CRM), is software that
encompasses a wide range of data to help businesses to better serve their
customers, increase purchases and to find new customers. CRM analytics allows
businesses to customize interactions to fit individuals, rather than offering the
same generic interaction with everyone.
7. Discuss use of internet in Entertainment.
You are probably already paying for an internet connection at home to make sure
you have email and social media access. From there, you can locate and enjoy
plenty of content on the internet from your phone, TV or computer. Popular, free
online entertainment resources include:
YouTube videos
Podcasts
Linked foursquare
Music streaming such as Pandora or Spotify
News sites such as ARY, Geo, Bol News, Dunya News and National Public
Radio etc.
Game sites, including King.com and Miniclip.
8. Define copyright in your words.
Copyright is a type of intellectual property rights that protect original works of an
owner. In copyright law, there are different types of works, including paintings,
photographs, illustrations, musical compositions, sound recordings, computer
Page 99 of 107
programs, books, poems, blog posts, movies. Architectural works, plays, and so
much more.
9. Differentiate between piracy and plagiarism.
The act of illegally reproducing copyrighted material, such as books, computer
programs, and films is called piracy. It is an act of criminal violence with the goal
of stealing others ideas and innovations.
Presenting other‟s work or ideas as your own, with or without consent is called
plagiarism. This covers all published and unpublished material whether in
electronic or in printed form Plagiarism is academic dishonesty and a disciplinary
offence.
10. What is the importance of picking strong and unique passwords?
Too many people pick passwords that are easy to remember and are obviously
linked to their personal lives, instead of words which are difficult to guess or
break.
You should pick strong passwords mixing capitalized letters, numbers and
symbols, and vary your passwords as much as possible.
SUMMARY
A presentation is an activity in which information is given to an audience to
help them understand a topic.
A presentation that uses written data, pictures, and sounds to explain an idea
is a multimedia presentation.
A slide is a rectangular area on which information can be displayed.
A slide show is a presentation in which slides are displayed in a sequence.
Multimedia programs are used for a variety of interactive purposes, such as
education, professional training, and so on.
Microsoft PowerPoint is an application software that enables the user to
create presentations using a computer.
A PowerPoint slide appears in the centre of the window.
Data can be inserted at different locations on the slide. These locations are
called placeholders.
A template is a model slide on which text and background are formatted in a
specific way.
The arrangement of placeholders on a slide is called slide layout. There are
several layouts available to choose from.
The Title Slide contains the title of the presentation.
Text can be entered by clicking in the Click to add text area on the slide.
Shapes, Clip Art, diagrams, video clips, and audio clips can be inserted in a
presentation.
The background of a slide can be changed by using shading, texture,
patterns, and background pictures.
A presentation can be viewed in different ways.
Transitions enables the user you to decide how slides follow each other
during the presentation.
A slide show can be conducted manually using the keyboard, or automatically
by setting the time for slide transitions
QUESTIONS
A. Fill in the blanks.
1. Multimedia means using multiple ways of communication.
2. In a multimedia system, a microphone and speakers are used for producing
sound
3. Data is inserted in different locations on a PowerPoint slide called placeholders.
4. A model slide on which text and background are formatted in a specific way is
called a template
5. Slide Sorter View displays thumbnails of the slides.
B. State whether the following statements are true or false. Rewrite the false
statements to make them true.
1. A placeholder is a model slide.
False. A template is a model slide.
2. The first slide of a presentation is called the Title Slide.
True
3. The Shapes feature is used to insert shapes such as rectangles and arrows on
the slide.
True
4. Normal View is used to display a list of all the slides.
False. Normal View is used to view a single slide and the Notes area.
5. Additional notes can be inserted on the Preview box.
False. Additional notes can be inserted in the Notes area.
6. PowerPoint has ability to convert the presentation into Video or audio.
True
7. Slide Transition can be adjusted from the animation group.
False. Slide Transition can be adjusted from the Transitions group.
8. Multimedia is used to train people for dangerous jobs.
True
C. Select the correct option for each question.
1. Multimedia is used in
a). playing games b). playing music c). watching films d). all of these
2. Which of these is the keyboard shortcut to add a new slide?
a). Ctrl+M b). Ctrl+N c). Ctrl+P d). Ctrl+S
3. On which tab are background styles present?
a). Home b). Animations c). Design d). Insert
4. Which of these is not an animation style?
a). Entrance b). Exit c). Emphasis d). Edit
5. Transition speeds and sounds can be selected form the group.
a). Preview b). Timing c). Background d). View
6. The easiest way to create a multimedia presentation to create it on:
F. Lab exercise
For the teacher: The two activities may be assigned to separate groups in the lab.
Make sure that some images are present on the computers so that students can
access them easily. Encourage them to use the Internet to search for additional
images. For the second activity, you can experiment with peer learning by having the
students use the presentation to explain their ideas to students from a different
class who may not have learnt to use Microsoft PowerPoint yet.