March 13, 2021

Information TechnologyUNIT 4 - Word Processing (Class-IX Notes)UNIT – 4WORD PROCESSING

Information Technology
UNIT 4 - Word Processing 
(Class-IX Notes)

UNIT – 4
WORD PROCESSING
Q1. What is Word Processing? Name some Word Processing softwares.
Ans. Word Processors are used to write documents such as articles, letter, resume, report, poem and also making posters. They can help to:-
Ø Correct any spelling mistakes
Ø Edit the document
Ø Print the document
Ø Change the appearance of different portions of the document
Ø Insert header & footer, page numbers, pictures or images in the document
Ø Present information in a tabular form and many more
Some of the most popular Word Processing software are:-
Ø Open Office Writer
Ø MS- Word
Ø Notepad
Ø Google documents

Q.2 Write the steps to Open MS Word ?
A. The Steps are as follows:
1. Click on Start.
2. Click on All Programs
3. Click on Microsoft Office
4. Click on Microsoft Word.

Q.3 Write the steps to Save a Document?
A. The Steps are as follows:
1. Click on Office Button / File Menu
2. Click on Save
3. A Dialog Box appears
4. Type the name of the file and set the location
5. Click on Save.

Q.4 Write the steps to Open a Document?
A. The Steps are as follows:
1. Click on Office Button / File Menu
2. Click on Open
3. A Dialog Box appears
4. Open the location and Click on the file name
5. Click on Open

Q.5 Write the steps to close a Document?
A. The Steps are as follows:
1. Click on Office Button / File Menu
2. Click on Close.

Q.6 Write the short cuts for the following:-
1. Create a New Document:- Ctrl +N
2. Save a Document:- Ctrl + S
3. Open a Document:- Ctrl + O
4. Close a Document:- Alt + F4

Q.7 What is the difference between Save and Save As Option available in MS Word ?
A. If we save a file using File Menu -> Save, the previous file is overwritten and new changes will reflect in the existing file only.
But if we save a file using File Menu -> Save As, the previous file will not be replaced and a new file will be created with a new name.

Q. 8 Write the steps to use the Save As option ?
A. The steps are as follows:-
1. Click on Office button / File Menu
2. Click on Save As Option
3. A Dialog Box Appears
4. Type the new name and select the new location.
5. Click on Save.

Q.9 What is GUI?
A. GUI is a type of user interface that allows users to interact with electronic devices using images rather than text commands. This type of interface have graphical symbols or icon in the Ribbon.

Q.10 Name the Eight tabs and their groups.
1. Home Tab:- Clipboard, Font, Paragraph, Styles, Editing
2. Insert:- Pages, Tables, Illustrations, Links, Header & Footer, Text
3. Page Layout:- Themes, Page Setup, Page Background, Paragraph, Arrange
4. References:- Table of Contents, Footnotes, Citations, & Bibilography, Captions, Index, Table of Authorities
5. Mailings:- Create, Start Mail Merge, Write & Insert Fields, Preview Results, Finish
6. Review:- Proofing, Comments, Tracking, Changes, Compare, Protect
7. View:- Document View, Show/Hide, Zoom, Window, Macros.

Q.11 Describe Home Tab in detail?
A. The Home Tab contains commands for formatting of text, drawing of objects, editing content of documents such as copy and paste. The features of Home Tab are as follows:-
1. The Clipboard group contains commands to cut, copy and paste text. The format painter is also available here.
2. Font group command allows change of the Font-font face, size, style etc.
3. Paragraph group is used to change settings of the paragraph such as alignments, indents, spacing etc.
4. The Styles group allows to choose a style and change the style.
5. Editing group contains command to select, find and replace text.

Q. 12 Write the steps to Bold, Italics and Underline the text ?
A. For using the features of Bold, Italics and Underline the text,
Click on B, I, U option available under Font group of Home Tab.
Short cuts
Bold:- Ctrl + B
Italics:- Ctrl + I
Underline:- Ctrl + U.

Q.13 Write the steps to use Check Spelling/Grammar Feature?
A. Check Spelling Feature is a feature in MS Word that automatically checks the spellings & grammar and helps the users to create flawless documents.
Steps to use Check Spelling/Grammar Feature
1. Click on the Review tab on the Ribbon.
2. Click on the option Spelling & Grammar in the Proofing group.
3. The Spelling & Grammar dialog box appears.
4. The suggestions of correct spellings are shown in the box.
OR
1. Position the cursor on the misspelt word.
2. Right-click the mouse.
3. A pop-up menu box appears.
4. The correct spelled word is shown on the top of the box and the spelling will be corrected automatically in the text.
OR
Short Cut :- Press F7 key

Q14. What is the use of Thesaurus option in word?
A. A word processor helps us to look up synonyms and antonyms in the thesaurus option.

Q15. Write the steps to use the Thesaurus option?
A. Steps to use Thesaurus Option are :-
1. Select the word
2. Click on the Review tab
3. Click on Thesaurus option in the proofing group
4. A box opens up on the right side of the screen. This is called Research task pane. It contains the synonyms and antonyms of the selected word.
5. Right click on the selected word and click in Insert. It will replace the original word.

Q16. What is the difference between Copy and Paste option and Cut and Paste Option ?
A. Copy and Paste:- The original set of text remains where it was and it is also pasted to another place in the document.
Cut and Paste:- The original set of texts gets deleted and it pasted to another place in the document.

Q17. What is clipboard?
A. The clipboard is a temporary short-term data storage area in your computer where the text is temporarily placed.

Q18. Write the steps to Cut-Paste and Copy-Paste?
A. Steps to Cut-Paste are as follows:-
1. Select the word that is to be copied.
2. Right click the mouse anywhere on the selected text. A pop-up menu appears. Click on Cut.
3. Click at the position where you want to paste the text.
4. Right-click, then click paste from the pop-up menu.
The selected text is copied to the new location.
Steps to Copy-Paste are as follows:-
1. Select the word that is to be copied.
2. Right click the mouse anywhere on the selected text. A pop-up menu appears. Click on Copy.
3. Click at the position where you want to paste the text.
4. Right-click, then click paste from the pop-up menu.
The selected text is copied to the new location.

Q19. What is the use of Find and Replace Feature of word processor.
A. Find and Replace feature helps us to find all the occurrences of a specific word or group of words in a document and also replace them with a new word or a group of words.

Q20. Write the steps to Find and Replace Feature?
A. Steps to use Find and Replace Feature are as follows:
1. Click Find in the Home tab, Editing group.
2. A Find and Replace dialog box appears.
3. To just find the word, click Find. Enter text you want to search in the Find what box, click Find Next. To find all the occurrences of the word, click Find in, then click Main document.
4. To find and replace, click Replace tab. Enter text to find in Find what. Enter text to replace in Replace with.
5. Choose the action to be taken by clicking on – Replace, Replace All.

Q21. Write the steps to create a list using numbers or bullets?
A. Steps to create list using numbers or bullets are as follows:
1. Select the text.
2. On the Home tab, in the Paragraph group, click the Bullets icon. The bullets will appear at the beginning of each sentence.

Q22. When it is better to use bullets than numbers ?
A. We Use numbered lists when we are working with instructions to be done in a sequence ie.,steps to be followed, and the numbers suggests a hierarchy. If numbers aren’t essential, use bullets.

Q23. When to capitalize the first letter in a bulleted item?
A. In most cases, it is recommended that you start each bulleted item with a capital letter for the sake of a good presentation.

Q24. What is Font ?
A. Font refers to the style of writing i.e., how the characters look in the document. The look of characters can be changed using the Font face(name), Font Size and Font Color.

Q25. What is Alignment?
A. Alignment determines the appearance and orientation of the edges of the paragraph. The different types of alignment are –
1. Left Alignment :- Aligned the text evenly along the left margins.
2. Right Alignment :- Aligned the text evenly along the right margins.
3. Centre Alignment :- Aligned the text evenly with the centre of the page.
4. Justified Alignment :- Aligned the text evenly with both left and right margins.

Q26. What are the different views of a document?
A. Word Processor provides options to work on a document in different formats / layouts which gives a different look to the document. The different layouts are:-
1. Print Layout
2. Full Screen Reading
3. Web Layout
4. Outline
5. Draft

Q27. Explain the different views of a Word document.
1. Print Layout: It is the default document view setting. User will able to see how the document will look when it gets printed.
2. Full Screen Reading: This view provides the maximum space available for reading the document. It hides the ribbon and view the document in two (side by side) frames similar to a book.
3. Web Layout: It shows how the document will appear in the web browser. In this view the document looks like a web page.
4. Outline: This view displays the document as an outline and shows only the headings present in the document like an index of the book. It is useful when the document has large number of pages and sections.
5. Draft: This view is used for quick editing of the document. It is useful for proof reading of the document.

Q28. What is a Hard Copy and Soft Copy ?
A. In IT, a document saved on the computer is called a Soft Copy and one that is printed is called Hard Copy.

Q29. Write the steps to Print a Document?
A. The steps to print a document are as follows:
1. Click File -> Print. A print dialog box appears with multiple settings. Make desired settings and print the page.

Q30. Explain the different settings available in the Print Dialog Box.
A. The different settings available in Print Dialog Box are as follows:-
1. Print Range:- It includes 4 options- All for printing whole document. Current Page for printing the page on which the cursor is currently placed. Selection for printing the selected text. Pages for printing the selected page numbers.
2. Copies:- for Selecting the number of copies of the document to be printed.
3. Properties:- for setting advanced properties.

Q31. What is a Table?
A. A table is an arrangement of rows and columns. It helps you to present information in an organized form.

Q32. Write steps to insert a table in a word document.
A.
1. Select the Insert tab. Select Table from the Tables group. An Insert Table drop down menu appears.
2. Drag your mouse to the desired number of rows and columns and click the left button of the mouse.
3. An empty table having the selected number of rows and columns is inserted in the document.

Q33. Write steps to format a table.
A.
1. Click anywhere on the table. A Design tab and Layout tab appear in the ribbon.
2. Click on the Design tab. Different styles and options for formatting will appear.
3. Using the options available in Design tab, you can format the table.

Q34. Write steps to change Layout of a table.
A.
1. Click anywhere on the table. A Design tab and Layout tab appear in the ribbon.
2. Click on the Layout tab. Different options will appear to change the Layout.
3. Using the options available in Layout tab, you can change the Layout of the table.

Q35. Write steps to convert text to table and table to text.
A. [While typing text, use comma between data to indicate where you want to divide text into columns and use paragraph marks(Press Enter Key) to indicate where you want to begin a new row]
Steps to convert text to table:-
1. Select the text that you want to convert from the document.
2. On the Insert tab, in the Tables group, click Table, and then click Convert Text to Table.
3. A convert text to table dialog box appears. In the dialog box, under Separate text at, click the options for separate character that is in your text (commas in this case)
4. In the Number of columns box, check the number of columns.
5. Select any other options that you want. Click on OK button.
Steps to convert table to text:-
1. Select the entire table.
2. Click on convert to text option in Data group under Layout tab of Table Tools.
3. A convert table to text dialog box opens. Choose any Separate text with option.
4. Click OK.

Q36. Write steps to add border to a page or a paragraph/text
A. Steps to add border to a page or paragraph/text are:-
1. Click on Page Borders option in the Page Background group on Page Layout tab. A Borders and Shading dialog box appears.
2. In the dialog box, do one of the following
Ø To add a paragraph or text border, click the Borders tab.
Ø To add a page border, click the Page Border tab. This tab has three sections.
o In the left most section, under setting, select the type of border you want.
o In the center section, you can modify the line style, border color and width. You can even click Art to add a design to a page border.
3. Check Preview to see how the border will look.
4. Click OK.

Q37. Write steps to add shading to pages, paragraphs and text.
A.
1. On the Page Layout tab in the Page Background group, click Page borders. A Borders and Shading dialog box appears.
2. Click on the tab Shading.
3. There are three options under Shading tab.
a. Fill: By clicking on the down arrow, a colour palette is displayed. Choose the desired colour shading.
b. Style: This option allows the changes in darkness of the shading and also different patterns of shading.
c. Apply to:By clicking on the down arrow, you can choose if you want to shade only the selected text or the entire paragraph.

Q38.What is Margin? How do we set the margin?
A. Page margins are the blank space around the edges of the page. You can position some items in the margins such as headers, footers, page numbers etc. A document has top, bottom, left and right margins.
Steps to adjust/change margin are:-
1. Select the Page Layout tab.
2. Click on Margins in the Page Setup group. A Margins drop down list appears.
3. Select any one of the options shown, Narrow, Moderate, Wide or Mirrored OR click on the Custom Margins... option to set the customise margin.

Q39. What are the two types of Page Orientation? How do we change the page orientation?
A. The Two types of Page orientation are:-
            1. Portrait:- means that the page is taller than it is wider.
            2. Landscape:- means that the page wider than it is taller.
Steps to change the page orientation:-
1. Click on Page Layout tab
2. Click on the Orientation button. This will give you two options: Portrait and Landscape.
3. To change the orientation, click on the desired orientation icon.

Q40. What is Print Preview? Write steps to check Print Preview.
A. Print Preview enables you to see what the document will look like when it is printed.
Steps to check Print Preview:-
1. Select File-> Print-> Print Preview option.
2. A Print Preview tab opens. A sample Print Preview of the page displays.

Q41. What are tabs? How do we set tabs?
A. Tabs are often used to format documents. Different types of tabs are:-
1. A Left Tab stop – sets the start position of text that will then run to the right as you type.
2. A Centre Tab stop – sets the position of the middle of the text. The text centers on this position as you type.
3. A Right Tab stop – sets the right end of the text. As you type the text moves left.
To set Tabs, do the following:-
1. Click the tab selector at the left end of the ruler until it displays the type of tab that you want.
2. Click the ruler at the location you want. 

FUNDAMENTALS OF COMPUTER IT-402 Class 9 UNIT – 2

Information Technology 
IT-402  Class 9  UNIT – 2
FUNDAMENTALS OF COMPUTER

Q. What are the application areas/uses of computer?
Ans. The application areas of computer are:-
1. Bank – Almost every bank uses computers to keep the records money transactions and financial documents.
2. Communication – Communication has become very easy and simple through internet and email. Through email we can send message in a split of seconds to anybody in any part of the world.
3. Business – Today, computers can be found in every store, supermarkets, offices etc. One can buy and sell things online and bills & taxes can be paid online. Business transaction takes place easily, accurately and records can be stored.
4. Medical Science and Health care- Diseases can be diagnosed and cured with the help of computers.
5. Education – Computers are used in classrooms by teachers to teach and maintain records. Online learning and assessments are increasing day by day.
6. Media – Almost every type of editing and audio-visual composition, special effects for action and science fiction movies are created on computers.
7. Travel and Ticketing - With the advent of computers, ticketing and reservation have become an easy task. We can check seat availability, PNR status and can also book hotels online.
8. Weather Predictions – Weather forecasting now relies on computers that take atmospheric factors into account.
9. Sports - In cricket, third umpire decision, in which computer recording is seen, is reached to accurate and fair decision with the help of computers. Computers also help sportsman to practice and improve his skills.
11. Social Media - The spreading of an idea or of news occurring somewhere in the world is now possible through social sites on the internet. Sites such as Facebook, Twitter, Youtube and LinkedIn allow people to share ideas on news, products and services.
12. Scientific Research- Scientist uses computers to view images from space and to publish information on their recent research.
13. Government- Computers are also used for providing services to citizens by the government.
14. Publishing- Computers are also used to design any type of publication such as magazines, books, newspapers, e-books etc.
15. Daily Life- We operate washing machines, microwave oven etc. using software. We can store our information, important work, contacts, appointments on the computer.
Q.4 Describe CPU?
A.CPU is Central Processing Unit. It is the most important processing device. It is the brain of the computer. It processes the input to perform calculations and produce output.
Q.5 Describe motherboard?
A. Motherboard is a large circuit board that connects input, output and processing devices. It provides pathways that allow data to pass through these various components. It also contains a chip that determine how, when and where data can flow through the computer. The devices like expansion cards, video cards, chip etc. are plugged into the motherboard.
Q.6 Describe Operating System ?
A. Operating System is a software that controls and manages all the parts of computer system that are connected to it. It acts as interface that helps you to interact with the computer. Examples Windows, Linux, Android.A etc.
Q. 7 Describe Programs and Data ?
A. Programs, also called applications, are used to perform various tasks such as writing letters, doing calculations or sending e-mail messages. Examples Microsoft Office Word, Presentation are programs.
          Data – Data is the text, graphics, audio or video that is provided as input to the computer.
Q. 8 Describe Network and its terminologies?
A. Interconnection of two or more computers is called a network. Network is used to share information or different resources like files, software, printer etc. A typical network has the following three components:-
          Workstation – A computer on the network that requests for information or resources is called a workstation or client.
          Server – A computer on the network that provides services to other computers is called a server.
          Communication Channel – Cables or wireless connections that are used to connect computers is called communication channel.
Q. 9 Describe Internet?
A. Internet is a collection of different networks that are linked to each other for information exchange. Internet is used to send information, files, search on any topic, buy and sell products, watch movies, send e-mail messages etc.
Q. 10. Decribe Intranet?
A. Intranet is a special type of network to communicate and share information within the organization. An intranet is similar to internet but is accessible only to authorized users of the organization.
Session 2: Parts of a Computer System
Q. 11 Explain Different Parts of Computer System?
A. The computer has various parts and each part performs a specific function. Following are the different parts of a computer system :-
1. Input Devices:- Input devices are used to provide information to a computer. Examples of input devices are- Mouse, Keyboard, Scanner, etc.
2. Output devices:- Output devices are used to get output or result from a computer after it performs a specific task. Examples of output devices are- Monitor, Printer, Speaker etc.
3. Central Processing Unit and Memory:- CPU is a device that interprets and runs the commands that we give to a computer. It is the control unit of a computer. It is also referred to as the processor. Memory is where information is stored and retrieved by the CPU.The three main types of memory are RAM, ROM and Flash Memory.
Q. Explain different Input devices?
Ans. Mouse – A standard mouse has left and right button. Left button is used to select items and right button is used to display commonly used menu items on the screen.
          Keyboard – A set of keys that resembles a keyboard on a typewriter. Keyboard is used to type text such as letters or numbers into the computer.
          Microphone – Microphone is used to record sound into a computer.
          Scanner – Scanner is used to transfer an exact copy of a photograph or document into a computer.
          Webcam - Webcam captures and send live pictures to other users.
          Stylus - Stylus is, similar to a pen, used to make selections and enter information by tapping on a touch sensitive surface. For example, stylus is used in PDA or tablet.
          Trackball - Trackball is a pointing device, like a mouse, consists of a ball that is rotated to move the pointer on a computer screen.
Q. Explain different Output devices ?
Ans. Monitor- It is used to display information in visual form, using text and graphics. It is like a Television.
          Printer- It is used to create a paper copy (hard copy) of whatever you see on your monitor.
          Speaker / Headphone – It is used to hear sounds. Speakers may either be external or built into the computer.
Q. Explain different types of memory ?
A. RAM – RAM is Random Access Memory. It is the main memory and allows you to temporarily store commands and data. The CPU reads the data and commands from RAM to perform tasks. It is volatile, which means it is available only while the computer is turned on.
    ROM – ROM is Read only Memory. It retains its contents even after the computer is turned off. It is non-volatile, or permanent memory that is commonly used to store commands, that checks whether everything is working properly or not.
    Flash Memory – It is a non-volatile memory that retains data even after a computer is turned off. Unlike in ROM, you can erase or modify stored information.
Q. What are expansion cards. Explain its types?
Ans. An expansion card is a circuit board that can be attached to the motherboard to add features such as video display and audio capability to the computer. It improves the performance of the computer and enhances its features. Types of Expansion Cards are:-
1. Video Card – It is connected to the computer monitor and is used to display information on the monitor.
2. Network Interface Card (NIC) – It allows a computer to be connected with other computers in order to exchange information.
3. Sound Card – It converts audio signals from a microphone to digital signals which can be stored as a computer’s audio file and vice-versa.
Q. What are Storage Devices? Explain some common storage devices?
Ans. Storage devices are used to store computer information. They can be divided into two types – internal storage devices and external storage devices.
Some common storage devices:-
1. Hard disk – It is a magnetic disk which is the main storage device in the computer. It can be external or an internal device.
2. Floppy Disk – A portable device that allows to store a small amount of data. A main disadvantage of using floppy disk is that it can be easily damaged by heat and dust.
3. CD-ROM – It is a portable storage medium that allows you to store 400 times more data than a floppy disk. It is less prone to damage. CD-ROM is Compact Disk – Read Only Memory.
4. DVD-ROM – It is also a portable storage device that can store huge amount of data. It is commonly used to store movies and videos.
Q. What are Ports. Explain its types?
Ans.A port is a channel through which data is transferred between input/output devices and processor.
Types of ports:-
1. USB port (Universal Serial Bus) – It is used to connect peripheral devices such as Mouse, Keyboard, Printer, Pendrive.
2FireWire port – It is used to connect devices such as Digital Camera. It is faster than USB.
3. Network Port – It is used to connect a computer to other computers to exchange information between the computers.
4. Parallel port and Serial Port - These ports are used to connect printers and other devices to a personal computer.
5. Display adapter – You connect a monitor to a display adapter on your computer. The display adapter generates the video signal received from a computer and sends it to a monitor through a cable.
6. Power – A motherboard and other components inside a computer use direct current (DC). A power supply takes alternating current (AC) from a wall outlet and converts into DC Power.
SESSION 3: COMPUTER FUNDAMENTALS
Q. What is a computer system?
A. A computer system is a programmable machine designed to perform arithmetic and logical operations to produce meaningful results in desired format.
Q. Explain three main units of computer system?
A. A computer system is broadly divided into three units:-
1. Input Unit:- Input unit helps the user to enter raw data and instructions into the computer system.
2. Central Processing Unit:- CPU performs the required operations as per given instructions.
3. Output Unit:- Output unit produces meaningful results in the desired format for the user.
Q. Explain three parts of CPU?
A. The CPU is divided into three parts:-
1. Control Unit (CU) :- It receives each and every instruction from user and coordinates between different parts to perform various operations.
2. Arithmetic and Logic Unit (ALU) :- It performs all the mathematical and logical calculations.
3. Memory Unit:- It is a temporary storage where small amount of data is stored while other operations are being performed.                                         
Q. Explain different parts of Memory Unit?
A. The memory unit is further divided into two main components:-
1. RAM
2. ROM
Q. What is BIOS?
A. The essential instructions written and stored by the manufacturer to load operating system and take care of basic input/output operations is referred as BIOS or Basic Input Output System.
Q. Explain data storage in computer system?
A. In computer system, the data is stored in the form of Bits and Bytes. Bit or Binary Digit represented by 0 or 1 is the smallest storage unit. 08 bits combined together to form a single byte, which represent a single character. For example, “KVDL” need 4 bytes in the computer memory.
Q. Represent units of computer memory in a table?
A.
Memory Unit
Relationship with Earlier Memory Unit
In Equivalent Bytes
Kilo Byte (KB)
1 KB = 1024 Bytes
1024
Mega Byte (MB)
1 MB = 1024 KB
1024 X 1024
Giga Byte (GB)
1 GB = 1024 MB
1024 X 1024 X 1024
Tera Byte (TB)
1 TB = 1024 GB
1024 X 1024 X 1024 X 1024
Q. Write the capacity of following storage devices:-
1. Compact Disk (CD) = 750 MB
2. Digital Versatile Disk (DVD) = around 4.5 GB
3. Blue-ray Disk = around 25 GB / 50 GB
4. Pen Drives = 512 MB to 32 GB
5. Memory Stick = 512 MB to 32 GB
6. Hard Disk = maximum 12 TB (developed till 2017)
Q. Name the ports or sockets and the devices which can be connected with these ports and sockets?
1. Power Socket: - for connecting power cable.
2. Personal System 2 (PS2) Ports: - for connecting Mouse and Keyboard.
3. Universal Serial Bus (USB) Ports: - for connecting USB devices like pen drives, mouse etc.
4. Video Graphic Adapter (VGA) Ports: - for connecting Monitor / Screen.
Q. How can you set-up and start-up a computer system?
A. Connect Monitor with VGA cable, mouse & keyboard with PS2 / USB cable and power on the CPU after connecting Power Cable.
The computer should display some messages from the manufacturer and then it should start the Operating System (OS) which is referred to as Booting Process. Once, the booting process is over, we can see the desktop- the first screen in the beginning, to allow us to choose and start the application of our choice.
SESSION 4: TYPES OF COMPUTERS
Q. Explain different types of Computer.
Ans. 1. Desktop Computer - Desktop Computers are made up of individual components such as a monitor, a keyboard, a system unit and a printer. They are not portable and are generally placed on the surface of a desk or a table.
2. Laptop Computers - Laptop Computers are lightweight personal computers. Laptop Computers are smaller in size as compared to a desktop computer and designed for travel. They are also called notebooks. They are small and portable. They run on electricity or on batteries that can be recharged. They consume more power than desktop computers with a similar hardware setup.
3. Handheld Computers – They are used for specific everyday tasks such as managing personal data. These are smaller than laptops and provide fewer features compared to desktop or laptop computers. Cellular phones or digital cameras are based on handheld computers model.
 4. Tablet Computers – Tablet computers are fully functional computers that allow you to write directly on the screen by using a tablet pen. Tablet pen can also be used to perform mouse functions. So, they do not need a keyboard and a mouse.
Q. Explain different factors that affect the overall performance of the computer.
Ans. The factors that affect the performance of the computer are:-
1) CPU speed – The CPU speed is the rate at which the CPU can perform a task, such as moving data to and from RAM, or performing a numerical calculation. A computer with the faster CPU completes a task more quickly.
2) Harddisk factors – Speed and size of the harddisk play an important role when a program needs to process large volumes of data. Harddisks differ in storage capacities, speed of data storage and retrieval. If the speed of data retrieval is fast, the computer takes less time to start and to load programs.
3) RAM - The computer uses RAM (Random Access Memory) to store the information that is currently in use. If the amount of RAM is large enough to hold all of the information in use, this can result in faster computer performance.
Q. Explain different types of Productivity Programs and their uses?
A. The different types of productivity programs and their uses are:-
1. Word-processing and publishing programs:- It is used to create and modify text-based documents. MS Word is a commonly used word-processing program. Publishing Programs are used to combine text and graphics to create documents such as brochures, greeting cards, books etc.
2. Presentation Programs:- It is used to present your information in the form of slides. We can add sound and pictures to these slides to make them more attractive and informative. MS Powerpoint is a commonly used presentation program.
3. Spreadsheet Programs:- It is used to create results, timetables, budgets, perform mathematical calculations, making charts and graphs etc. MS Excel is an example of spreadsheet program.
4. Database Programs:- It is used to store and manage data in an organized way. We can also create simple reports from the data we have stored. An example of Database program is MS Access.
5. Graphics Programs:- It is used to create and edit drawings. It is also used to enhance photographs. The Paint Program is an example of a graphics program.
Q. What are Communication Programs? Explain different communication programs.
Ans. Computers use special programs called communication programs that allow you to send and receive messages with other people in a digital format.
The different types of communication programs are:-
1. E-mail – E-mail is the exchange of messages from one computer user to another computer user. To send an e-mail message, you must have an Internet connection and an e-mail account. An e-mail account is similar to username@example.com where username is your name, @ is the at sign and example.com is the domain name. A domain name identifies the name and type of organization with whom you have an e-mail account. Sending and receiving e-mail messages is an instant way of communicating with anyone. It only takes a few seconds to send and receives an e-mail. Receiver of the e-mail may or may not be available at the time of receiving of the e-mail. E-mail is stored in his/her e-mail account inbox folder. He/She can read the e-mail at any time.
2. Chat – It allows you to send and receive messages immediately. Chat programs can be used to communicate with several people at the same time. When you are chatting with someone, the person on the other end receives the message and send the reply immediately. Unlike E-mail, in chatting receiver should be present at the time of chatting. Through chat, you can also talk to the person, this is called voice chat and another form of chatting allows you to see the person you are talking to, this is called video chat, a device called webcam is needed to do the video chat. A commonly used communication/chat program is Windows Live Messenger.
SESSION 5 : USING A COMPUTER
Q. Write about the different keys of the keyboard.
Ans. The keys of the keyboard is categorized into following:-
1) Function Keys – Keys labeled from F1 to F12 are function keys. We use them to perform specific functions.
2) Special Keys – Keys, such as Control (CTRL) , SHIFT , SPACEBAR, ALT , CAPS LOCK and TAB are special keys. The special keys perform special functions depending on when and where they are used. WINDOWS LOGO key is also a special key which is used to open Start Menu.
3) Punctuation Keys – It include keys for punctuation marks, such as colon (:), semicolon (;), question mark (?), single quotation marks (‘ ‘), double quotation marks (“ “ ).
4) ENTER or RETURN Key – This key is used to move the cursor to the beginning of a new line. It is also used to send commands and to confirm a task on a computer.
5) COMMAND Keys – Keys such as INSERT (INS), DELETE (DEL), and BACKSPACE are command keys. INSERT key is used to write letters to the right of the cursor and DELETE and BACKSPACE keys are used to remove typed text.
6) NAVIGATION Keys – Keys such as the arrow keys, HOME, END, PAGE UP and PAGE DOWN are navigation keys. The arrow keys are used to move the cursor up, down, right and left. The HOME key moves the cursor to the left end of a line of text. The END key moves the cursor to the end of a line. The PAGE UP key is used to move one page up and the PAGE DOWN key is used to move one page down while viewing a document.
7) ALPHABET keys – These keys are used for entering letters. (A to Z)
8) NUMERIC keys - These keys are used for entering numbers. (0 to 9)
Q. Write a short note on Mouse.
Ans. A mouse is a small device that you can use to move, select and open items on the computer screen. Most mouse devices have at least two buttons, left and right. Most of the actions are performed by clicking the left button. The right button is used for specific functions. Some advanced types of mouse devices provide additional buttons to speed up common tasks, such as scrolling text.
Session 6: COMPUTER OPERATING SYSTEM
Q. What is an Operating System?
Ans. An operating system performs four primary functions.
1) It manages and controls the hardware connected to a computer.
2) It helps other programs running on a computer to use the hardware.
3) It helps you organize and manage files and folder on the computer.
4) It provides a user interface that allows you to interact with the hardware, the operating system itself, and other programs.
An operating system controls how programs work with each other and how they interact with the computer hardware. It also creates the file system that determines how your data is stored within a storage device. For example, Windows Vista, Windows 2008, etc.
Q. What is a Desktop?
Ans. A desktop is a computer display area of windows that contains various objects. It is first screen which display after booting of the system.
On the desktop, we find:-
i) My Computer or Computer – it contains all the storage areas of the computer.
ii) Recycle Bin – it contains all the deleted content of the computer.
iii) My Network Places or Network – it contains the information of interconnected computers.
iv) My Documents or Documents – it contains a common area to store various types of files on the computer.
Q. Define:
a) Icons – The pictures that we see on the desktop screen are called icons.
b) Taskbar – At the bottom of the desktop, there is a bar which is known as taskbar, left side of which may contain a Start button, right side may contain date, time and active device information and the center of the taskbar may have some shortcuts and active applications.
c) Shortcuts – Shortcuts are the direct links to help the user to start the application, which may be stored anywhere on the computer.
d) Help and Support – It provides documented form of help information to work on the computer.
e) Search – It help to search for an applications or a file.
f) Settings – It helps to customize various settings (Display, Hardware, Software etc. ) of the computer.
g) Documents – It provides quick links to all recent documents, which were opened modified recently on the computer.
h) Programs – It displays a submenu with list of various applications available on the computer to work on.
 SESSION 7: PERFORMING BASIC FILE OPERATIONS
Q What is a file format? Name some file formats.
Ans. Every file has an associated format that defines the way data is stored in the file. The file format is identified by a period (also called a dot) appended to a file name, followed by three or four letters. Some of the file formats are as follows:-


Ø doc/.docx ( word documents)
Ø .gif/.jpg (image files)
Ø .exe (executable files)
Ø .wma and other (multimedia file)


Q. What is a file and folder?
Ans. File – File is a collection of related information.
          Folder – We can organize files using folder. Different files can be stored in a folder.
Q. Write steps to rename a file/folder?
Ans. 1. Select the file/folder.
2. Click the right button of the mouse. Select the option rename.
3. Type the new name and Press enter key.
Q. Write steps to delete a file/folder?
Ans. 1. Select the file/folder to be deleted.
          2. Click right button of the mouse. Select the option Delete.
          3. Pop up will ask you to confirm File delete. Click on Yes button.
Q. Write steps to copy-paste a file / folder?
Ans. 1. Select the file/folder. Click right button and select copy option
2. Go to the location where you want to paste the file/folder. Click right button and select paste option.
                                      OR
1. Select the file/folder. Press Ctrl & C keys together.
2. Go to the location where you want to paste the file/folder. Press Ctrl & V keys.

Q. Write steps to cut-paste a file / folder?
Ans. 1. Select the file/folder. Click right button and select cut option
2. Go to the location where you want to paste the file/folder. Click right button and select paste option.
                                      OR
1. Select the file/folder. Press Ctrl & X keys together.
2. Go to the location where you want to paste the file/folder. Press Ctrl & V keys.
SESSION 8:- THE INTERNET
Q What is Internet? What are the uses of the internet?
Ans. Internet is a interconnection of different networks. The uses of internet are as follows:
1. Internet is used to communicate with people all around the world instantaneously.
2. It helps us to get the latest information on the current events.
3. You can search information on any topic.
4. You can study online and get certification of courses you opt.
5. Internet is a great source of entertainment. We can listen to music, play games, watch movies or share pictures etc.
6. We can buy and sell products online.
7. We can perform banking transactions.
Q. What are the requirements of an Internet connection? Explain.
Ans. To connect to the Internet, we need :-
1. A Computing Device: It can be a personal computer, portable computer, or even a mobile device such as a cell phone etc.
2. A Connection Device: such as Modem. Modem is Modulator-Demodulator which converts digital information into analog information and transmits it over a phone line. It can either be built-in or externally attached to a computer.
3. An ISP: ISP is Internet Service Provider. It is a company that provides Internet connectivity to individuals, businesses and organizations.
Q. What are the different methods by which you can connect to the Internet?
A. The different methods are as follows:-
1. Physical Connection: When we connect to the Internet by using cables, the connection is called a physical connection.
2. Wireless Technology: A computing device that supports wireless technology has a Wireless Fidelity or the Wi-Fi card that provides wireless communication between the computing device and the network.
 Q. What is an Access Point (AP)?
A. As, a wi-fi card is not physically connected to an ISP, another device we need for wireless connectivity is an access point (AP). An AP is used to connect a wireless computing device to a wired network. This wired network may belong to an ISP. We can connect to the Internet through the ISP.
Q. What is a Bandwidth?
A. Bandwidth is the amount of data that can be transmitted over a network in a certain amount of time. The amount of data that any network can receive or send depends on its bandwidth. It is measured in Mbps or megabits per second, Kbps or Kilobits per second which means 1 KB of data can be transmitted over the network in 1 second.
Q. Explain different types of connection for using Internet?
A. The different types of Internet Connections are as follows:
1. Dial-up : We can access internet by dialing a particular number provide by the ISP. It offers the data transfer rate up to 56.6 Kbps.
2. DSL (Digital Subscriber Line) : While using DSL Connection, we are always connected to the Internet. A type of DSL connection is the asymmetric digital subscriber line (ASDL) connection. To use an ASDL connection, we must have a special ASDL modem. It offers the data transfer rate of 384 Kbps to 8 Mbps.
3. Cable Modem: We can get a high-speed Internet connection from the cable TV provider. Using this type of connection, we can be connected to the internet at all times. It supports data transfer rates of 4 Mbps.
4. T1 – T1 lines provide a dedicated phone line connection to connect to the internet. T1 are a popular option for business today. It supports data transfer rates of 1.544 Mbps.
5. Wireless - We can connect to the Internet by using wireless technology.Some wireless connections supports bandwidth of several gigabits per second (Gbps). It supports data transfer rate from 11 Mpbs to 45 Mbps.
Q. What type of Internet connection are used by home users and corporate users?
Ans. By home users – home users normally take internet connection from the telephone connection provider. They use broadband connection. Such connections are shared with many users at the same time and so its speed varies depending on various users’ internet activity at that point of time. The speed varies from 256 kbps to 2 mpbs.
By Corporate users – The corporate users prefer subscribing a leased line internet connection for faster, effective and reliable connectivity. The speed of such connections varies from 1 mpbs to 100 mpbs. These connections are provided with the help of dedicated connectivity with ISP’s internet server.
Q. What is Internet Browser? Name some.
Ans. Internet Browser – Internet Browser is the software, which helps us to access web pages from various websites. Examples – Google Chrome, Mozilla Firefox, Safari, Opera and Internet Explorer.
Q. What is Search Engine? Name some search engines.
Ans. A search engine is a program that is used to search information on the web. For example – Google.com, bing.com, yahoo.com, altavista.com, etc.
Q. What is an ISP? Name some ISP.
Ans. ISP stands for Internet Service Provider. ISPs are companies that provide internet services to the users. For example – MTNL, BSNL, Airtel, Idea, Reliance etc.
Q. Write some basic tips to search information using search engines.
Ans. Some basic tips are:-
1. Keep the searching text simple. For example- if you are searching for a particular product, place or concept- just type its name.
2. Use the words that are more likely to appear on a web page. For example, instead of typing ‘pain in head’ just type ‘headache’.
3. Punctuation symbols should be ignored such as “”,!,?, () etc
4. Search is always case insensitive like DELHI or delhi are same.
SESSION 9: THE WORLD WIDE WEB
Q. What is world wide web?
Ans. World Wide Web or WWW or Web is a way of accessing and sharing information over the internet by using web browsers. The information is in the form of text, pictures and sounds which are arranged logically and stored on computers known as web servers.
Q.Define Webpage and Website.
Ans. Webpage – A web page is a formatted document on the web that a web browser can display. It contains text, images, audio, video, hyperlinks, etc. Web pages are created using HyperText Markup Language (HTML).
Website – A website is a collection of web pages that reside on a web server. First page of the website is called Home page.
Q. Write a short note on Web Addresses.
Ans. To access a website, we need to access the computer on which the website is stored. Each computer on the web is identified by a unique address known as IP address (Internet Protocol address). The IP address is a numeric address that specifies the exact location of a computer on the web such as 192.168.0.1.As it is not easy to remember the numeric addresses, every IP address is linked to a corresponding domain name. Web browsers can use either the domain name or the IP address to locate and display a web page. A web site for a domain is accessed with the help of a unique alphanumeric address known as the web address. The web address is also known as the URL (Uniform Resource Locator). The URL / web address specifies the protocol to be used for transferring data between different computers and exact location of the website.Example:- http://www.ugc.ac.in, http://www.cbse.nic.in etc. Components of URL are:-
http:// - indicates the protocol to be used to access a file.
www - indicates that the website is on the web.
ugc/cbse - name of the website
ac.in/nic.in – indicates type of domain
Q. What is domain name suffix?
Ans. Domain Name suffix indicates the type of organization to which the website belongs. For example – Microsoft.com where .com is domain name suffix. Some of the domain name suffixes and their use are as follows:-
.com - indicates the website is for commercial organization.
.edu - indicates the website if for educational institutions.
.net - indicates the website is for network-oriented organization.
.org - indicates the website is for non-profit organization.
.info - indicates the website is informative in nature.
.museum - indicates the website is used for museum or for an individual of the museum profession.
There are country level domains that are specifically used by a country or independent territory. Some examples are - .ke for Kenya, .in for India, .jp for Japan etc.
Q. What is e-commerce?
Ans. E-commerce refers to the business transactions made over the internet such as buying and selling items online.
Session 10 : DIGITAL TECHNOLOGY AND MEDIA DEVICES
Q. Explain different digital and media devices.
Ans. Some of the digital devices are:-
1. Audio and Video Player – Examples – MP3 Player, CD players and DVD players. MP3 players are used to play audio whereas CD and DVD players are used to play audio or video.
2. Mobile Phones – It is wireless device that is used to make a call from any location. Web enabled phones can be used to connect to internet, check e-mail messages or download songs and games from the internet. If the phone has multimedia features and camera, you can click pictures, videos, record sound and play music.
3. Video Game systems – Example – Microsoft Xbox. An Xbox has a motherboard and a harddisk and supports online gaming. You can play games, transfer audio files and can also play movies.
4. Personal Digital Assistants (PDAs) – A PDA is handheld computer that is used as a personal organizer. A traditional PDA includes features, such as an address book, task list and a calculator.PDA can be connected to internet and can also contain camera.
5. Digital Camera - A digital camera stores images digitally on a memory device such as flash memory card or a mini hard disk.
6. Digital Video Cameras - It is used to record both audio & video and store it in a digital format. Digital camcorders and webcams are examples of digital video cameras.
Q. Write types of Audio.
Ans. Audio is of two types – analog and digital.
Analog - What you speak or hear is of analog form or wave format.
Digital - The audio stored in digital devices is of digital format.
Q. What is digital audio technology and what are its characteristics.
Ans. The audio stored in digital devices are called digital audio. Digital audio technology allows us to record, edit and play digital audio files on a computing device. This technology lets you communicate with the computer by just speaking.
Basic characteristics of digital audio technology are:-
1. Digital audio can be compressed. Compressed audio files save space, allow portability and are easier to transfer over the internet .
2. It can be edited on a computer by using audio editing software.
Q. Explain different audio file formats?
A. 1. Wave (.WAV): This is a universal sound file format which is used to store audio files in the wave audio format. Audio files stored in this format have good audio quality but this format is used sparingly these days as the audio files stored in this format are larger when compared with other formats. It was developed for Microsoft Windows 95.
2. MPEG Audio Layer 3 (.MP3): This format was developed by Motion Picture Expert Group to allow compression of audio and video for digital distribution. The MP3 format is a popular format that is used to store digital audio files as the files stored in this format are generally smaller than WAV files.
3. Windows Media Audio (.WMA): This format was developed by Microsoft. It is used to store digital audio files.
Q. What is audio streaming?
A. Audio streaming is the process of playing a large audio file from the Internet without downloading it. The audio file is sent to the computer in a continuous stream.
Q. Define Digital recording?
A. Digital recording is the technique of recording and storing audio files in a digital format. These audio files can also be stored in storage devices like CDs and DVDs , in various formats such as WAV and MP3.
Q. Explain the concept of burning?
A. The process of copying audio and storing it on a recordable CD or DVD is referred to as burning. For the burning,
1. We need a special hardware device, such as CD or a DVD writer. A CD writer can burn only recordable CDs whereas most DVD writers can burn recordable CDs and DVDs.
2. We also need software to copy audio to a recordable CD or DVD. Different types of CDs can be created from these software, such as Data CDs, Audio CDs and Mixed Mode CDs. Mixed Mode CDs contain audio, video and data files.
Q. Explain different speech technologies?
A. 1. Speech Synthesis: It is a technology that allows the computer to speak to you by converting text to digital audio. Windows Vista has a built-in screen reader called Narrator that supports speech synthesis. A screen reader is a program that reads the text on the computer screen aloud. To support speech synthesis, the computer must have a sound card and speakers.
 2. Speech Recognition: It is a technology that allows us to communicate with a computer by using only our voice to enter text and to issue commands. To support speech recognition, the computer must have an audio input device like microphone, a sound card and speech recognition software that converts human speech into text and commands for the computer.
Q. What is digital video technology?
A. Digital video technology allows us to record video in the digital format on a digital storage device, such as a CD, DVD or a flash memory card, and edit it on a computer by using digital video editing software.
Q. What are the characteristics of Digital Video?
A. The characteristics of Digital Video are:-
1. We can edit them easily using digital video editing software.
2. We can also upload the video to a web site and share it over the Internet.
3. We can copy the video from a computer to a recordable CD or DVD.
4. These files can be easily compressed. Compressed files save space and are easier to transfer over the Internet.
Q. What are Camcorders? Explain the types of Camcorder.
A. Camcorder captures and records video.
The 2 types of Camcorder are as follows:
1. Analog Camcorder: An analog camcorder records and stores video in an analog format on a tape. To edit the video on the computer, we have to convert it to digital format from analog format.
2. Digital Camcorder: A digital camcorder records and stores video in a digital format, which makes editing the recorded video easy.
Note: A Digital camcorder is lighter and smaller than an analog camcorder.
Q. Explain the purpose of using Digital Video Editing Software?
A. A digital video editing software can:
1. Add titles and background music to the video.
2. Cut or remove certain scenes from the video.
3. Add special effects, such as fade-in and fade-out to the video.
4. Enhance video quality by adjusting its brightness, contrast and color.
5. Record audio over the video to describe certain scenes.
Q. What are the different types of Digital Video Editing?
A. The digital video editing can be of two types:
1. Linear: In linear editing, we have to sequentially traverse a file to edit it. Tape is always in a linear format and has to be edited linearly.
2. Non-Linear: In non-linear editing, we can directly go the frame and remove it from the video. Random access devices such as, DVDs and CDs read and write data in a non-linear manner.
WARNING: Copying video directly from the web and storing it on CDs is illegal. Copying video directly from a video CD or DVD is also illegal. We should have permission to copy and video before copying and storing it.
Q. What is Web Video Technology?
A. Web Video Technology allow us to transfer digital video files over the Internet.
Some of Web Video Technology are:
1. Video Streaming
2. Downloading Video
3. Web Conferencing.
Q. What is Digital Photography?
A. Digital Photography allows us to transfer pictures to a computer where we can edit pictures to enhance their quality.
Q. Define Personal and Professional Photo Printers?
A. Personal Photo Printers: They can either be black and white or color printers. Color Inkjet printers are the most commonly used personal photo printers.
Professional Photo Printers: They are used in print labs, use special imaging devices to expose regular photo paper. These printers produce true-photographic quality prints on paper.
Q. What is computer security and privacy?
A. Computer Security: Computer security deals with the measures that we can take to avoid damage to the computer and its data.
Computer Privacy: Computer privacy means that our data is not accessible by anyone without our permission. It deals with the measures that we can take to restrict access to our data.
Q. What are Natural Threats? Explain various Natural Threats?
A. Natural calamities such as earthquakes, floods, etc can damage the computer any time. Natural Calamities such as, fires, extreme temperatures, and lightning strikes lead to major physical damage to the computers and loss of data.
Various Natural Threats are described as follows:
1. Excessive heat or cold, fluctuation in temperature can damage some parts of the computer system.
2. Fire can damage the system. Even if the computer does not directly catch fire, the excessive heat generated during fire is enough to melt the delicate components inside the computer. Smoke can damage the CPU fan.
3. Lightning that strikes with a huge amount of electrical charge can cause a surge. A surge or spike is a sudden increase in the supply of voltage, which can permanently damage the motherboard of the computer system.
Q. Explain the measures for Protection from Natural Threats?
A. Following are the measures that we can take to protect our data and computer from natural threats:
1. Back-up data: Backing up data involves creating multiple copies of our data. Making a backup helps us to recover the data in case of any data loss.
2. Install computers in secure location: Install the computers in a place where it is not likely to get damaged due to natural factors. Avoid installing computers in rooms that are exposed to excessive dust or moisture.
3. Install protective electrical devices: Install devices such as UPS that can provide battery backup in case of a power outage. In case of lightning it is better to turn off the computer and plug it from the power to avoid damage.
4. Insulate computers from fire: Insulate the computers from fire by housing them in fire retardant surroundings. Also install fire safety equipments.
5. Maintain appropriate temperature and humidity: Maintain an optimum temperature and humidity level to ensure the smooth functioning of the computer. Install devices like ACs and humidity controllers.
Q. Who is a hacker?
A. A hacker is a person who tries to illegally access the computer when the system is connected to the internet. After accessing your computer, a hacker can steal or damage the data stored on the computer.
Q. Describe various threats from malicious human sources and human errors to your computer.
Ans.
1. Theft – Anyone can steal your computer or its components, if they have access to it. With the use of laptops or portable computers, physical theft has become very common. There is also virtual theft i.e. identity theft (hacker can steal your personal information to assume your identity) and software piracy (theft of computer design or program)
2. Viruses, worms and Trojan horse – Viruses are programs that damage data or software. They spread, without your knowledge, through the internet, storage devices. Worms are viruses that replicate themselves once they attack a computer, making it difficult to remove them. Trojan horse is a kind of virus disguised as useful software. Once a Trojan horse reaches your computer, it starts acting like a virus causing damage to the computer’s data.
3. Spyware – Spyware are programs that get installed on your computer without your knowledge. They secretly send out information about your web browsing habits or other personal details to another computer through the network.
4. Internet Scams – While using internet, you might come across some attractive offers through e-mail messages or chat room communication. You should be careful before accepting such offers because they might be planned scams.
5. Online predator – Online predators are individuals who lure anybody online into appropriate and unethical relationships. Online predators develop contact with their targets by using e-mail or chat-room communication.
6. Accidental deletion of data – Accidental deletion of an important file can disrupt the integrity of data or prevent other files or programs from working.
7. Accidental damage to hardware – Computer components, being delicate, run the risk of getting damaged due to carelessness. As a result you lose the data stored on the computer.
Q. What are the measures for protection against threats from human actions?
Ans.
1. Store data Safely – Keep your data in safe and secure locations that have limited access to others. This minimizes the possibility of theft or tampering of the data.
2. Encrypt Data – When you encrypt data, unauthorized users cannot access the data by removing the hard-disk and attaching it to another computer.
3. Install antivirus and antispyware programs – Antivirus and antispyware programs have the ability to check for viruses and spyware present in the computer’s memory and also prevent new ones from entering. You must regularly update antivirus and antispyware to protect the system
4. Install Firewall – Firewall helps to ensure computer privacy by restricting external access to your computer by any unauthorized access.
5. Back up data – Creating multiple copies of data provides protection against loss of data due to accidental erasure or destruction of data.
6. Keep computer in safe environment – Keep the computer in an area that is dust – free, free from vibrations, water, any magnetic source etc. The table on which the computer is placed should be steady and stable.
Q. What are the guidelines for protecting your computer?
Ans.
1. Implement – It is an effective way to minimize the risk to your operating user environment and data is to keep unauthorized individuals identification from accessing your computer. To achieve this, set accounts for authorized users on the basis of which, each user gets an appropriate level of access.
2. Set Username and Password – You can also increase the security and limit unauthorized access to your computer by setting up a username and password.
3. Keep password secure – The password acts like a key to your computer. Anyone who knows your password can access your computer and tamper with data. You must keep your password secure. Never share your password with others.
4. Lock Computer – When you leave the computer on and unattended, someone can tamper with your computer software or data. You can prevent this by temporarily locking your computer while you are away. When a computer is locked, it hides the content of the screen. You can lock the computer by using a key combination of Ctrl + Alt + Del and then clicking the Lock computer button. The shortcut is Window key + L Key.
5. Install and update protective software – You need to continuously guard your computer against threats like viruses and spywares. You can protect your computer from these threats by installing antivirus and antispyware software. You need to update these software from time to time. It is also a good practice to install firewall, which filters out the content that reaches your computer. Windows Defender is a built-in antispyware program in windows that protects against pop-ups and other security threats.
6. Encrypt Data – Converting the data to an unreadable form to protect it from unauthorized access is called Encryption. An authorized user can reconvert the encrypted data into a readable and usable form. This is called Decryption. Various software products include a way to encrypt data.
7. Back up data – You can also protect your files from loss or damage by making copies of important files and storing them on a different storage media, such as CDs and DVDs. This process is known as Backing up data. You should keep the backups in secure locations, so that you can use them in case the original data is damages or deleted.
Q. Explain the best practices for Securing Online and Network Transactions?
Ans.1. Use Strong Password: A strong password is primary defence against security and privacy threats. The password should consists of a combination of uppercase and lowercase letters,numbers and special characters such as ampersand and number sign and should not contain complete words or names.
2. Protect against hacking and spyware – Spyware programs get installed on the computer with your knowledge and secretly transfers confidential data from your computer to the hackers. To Protect your computer from such programs, intall antispyware programs and make use of Internet Service Provider (ISP) support for online security. Windows also includes built-in antispyware programs called Windows defender.
3. Clear browsing – The websites and web pages you browse is stored in the browser’s history. However, some of the temporary Internet files may contain your personal information such as username and password. Cookies are small files that are created on the computer by previously visited websites to identify and track your preferences. However, cookies can also be threat to computer privacy. So, You should regularly delete the browser’s history, temporary files and cookies to protect your privacy.
4. Avoid Sharing - Hackers can access and misuse your personal information like name, e-mail, bank details etc which you fill in online forms. Some companies may also use this information to send unwanted mails. Therefore, before you share any of your personal details on a website ensure that it is a secured website.
5. Perform online transactions only on secure sites:- A website is secure it its name has the prefix https. This prefix indicates that the website implements Secure Socket Layer (SSL protocol). Always check whether the website is secure or not. The locked padlock icon that appears in the Address bar helps you identify a secure website. You can also check the security certificate of a website before performing any online transactions on that site.
6. Configure security components by using Windows Security Center - Windows Security Centre is a feature in Windows Vista, which provides a convenient utility to check the status of essential security setting and track the antivirus software installed on your computer. Following are the four components of Security Centre that you can set using Windows Security Centre -
1. Firewall 2. Automatic updating 3. Malware protection 4. Other Security settings
7. Disable active content - Active content refers to small programs that get installed on the computer while you are browsing the Internet. In some cases, these programs can be used to damage the data stored on the computer or install malicious software without your consent. By using your browser settings, you can disable active content to prevent the installation of such programs.
Q. What are the measures for Securing E-mail and Instant Messaging?
Ans. To ensure e-mail security and IM security:-
1. Avoid opening e-mail with attachments.
2. Do not respond to junk mail
3. Do not respond to unsolicited commercial mail
4. Protect yourself from phishing
5. Chat with known people only
6. Avoid opening instant messenger attachments.
Q. What are the measures to protect your privacy?
Ans. 1. Shield your Identity:- Avoid sharing your personal information with anyone. Use strong password for access to your computer and e-mail connections.
2. Make Regular Backups – It is good practice to back up all types of the important and sensitive data on your computer.If you regular back up the data, you can recover the data in case the original data is damaged or deleted. Also, it is advisable to store the backup data in a secure place and restrict access to it by using passwords and encryption.
3. Check the current security of your system regularly – Check the current security level of your computer regularly. Modern operating systems have built-in features that help you track the computer against various threats to security and privacy.
4 . Run Virus Scans Daily – Each day when you access the Internet, there is chance that your computer is infected by viruses. Therefore, it is important that you run a virus scan on your computer everyday. You also need to keep the antivirus software up-to-date to protect your computer from new viruses.
5.Use Antispyware – Spyware programs can secretly enter your computer and transmit personal information. Use antispyware software to keep a check upon these malicious programs and keep the software up-to-date.
6. Perform Online Transactions on Secure Websites – Always share your personal information, bank details and online transactions only on secure websites.
7. Report abuse to the ISP – You should report to ISP whenever someone attempts to invade your online privacy by sending you spam and attempts to hack your computer.
8. Filter E-mail Messages from Unknown / Anonymous Senders – You can create e-mail filters that help you block the junk or spam mails. Be careful while dealing with junk and spam mails.
9. Encrypt Sensitive E-mail Messages, If Possible – Encryption is the process of encoding the e-mail message in such a manner that it appears unreadable to everyone except the intended reader. Most e-mail software such as Windows Mail, provides this e-mail encryption feature.
Q. What are online predators?
Ans. The Internet communication can be misused by people to lure young individuals into appropriate or dangerous relationships. The people who engage in such activities are known as online predators. Online Predators trap their victims by developing contact through chat rooms, instant messaging, e-mail, or discussion boards. They generally target children, especially adolescents and can also target adults with the objective of financial exploitation.
Q. What are the guidelines for protection from online predators?
Ans. 1. Know the signs of predator behavior – Online predator tend to get intimate very quickly. They often express a great deal of interest and affection towards their targets. You detect such behavior to avoid contact with them.
2. Be cautious of offers from strangers online – Online predators lure their targets with gifts or other tempting offers. You should be cautious about such gifts or offers.
3. Educate your family on online safety measures – Educate your family members on appropriate chat room behavior to avoid being targeted by online predators. Tell them to use nonsuggestive and neutral screen names. The screen names must not give away their actual names, age, gender or contact information because this information can be misused. Your family members must not share their personal information, username and password with anyone including friends.
4. Guide children when they visit website – It is recommended that parents guide their young children when the children visit any websites. As a parent, instruct children to leave a website if the site contains unpleasant content or the site asks for excessive personal information.
5. Know the sites visited by children – It is important for parents to regularly check the type of web sites their children visit. Track the previously visited websites by viewing the browser history.
6. Block access to inappropriate web sites – You can block access to websites that contain adult content by enabling the browser’s Content Advisor feature or by installing certain software programs.
7. Monitor chat activities – You can install specialized software that can monitor chat activities and flag inappropriate information exchange on your computer.

The Earth in the Solar System

Class 6 
Social Science











The Earth in the Solar System.

The sun, nine planets, satellites, asteroids and meteoroids form the solar system.

The Sun

The sun is in the center of the solar system. It is made up of extremely hot gases. The sun is about 150 million km away from the earth.

Planets

There are nine planets in our solar system. The nine planets are Mercury, Venus, Earth, Mars, Jupiter, Uranus, Neptune and Pluto.

Planets move around the sun in a fixed orbit.

Mercury is the nearest planet.
Pluto is the farthest planet.
A new planet 2003 UB313 has been discovered. It is bigger than Pluto and is farthest from the sun.

Earth
It is the third nearest planet to the sun and fifth largest planet of our solar system.
The earth is a unique planet because it supports life.
It is also called the blue planet.
Its shape is Geoid.

The Moon

It is the only satellite of the earth.
Its diameter is one-quarter of the earth. ‘
It is about 3.84,400 km away from us.
It moves around the earth in about 27 days.
Only one side of the moon is visible to us on the earth.
No life exists on moon as it has neither water nor air.

Asteroids
They are numerous tiny bodies which move around the sun between the orbits of Mars and Jupiter.
The largest asteroid is the Ceres.

Meteoroids

The small pieces of rocks which move around the sun are called meteoroids.
Our solar system is a part of the Milky Way galaxy.
Milky Way galaxy was named Akash Ganga.
There are millions of galaxies that make the Universe.
The Stars and the MOON are celestial bodies which are visible only at night in the sky. During daytime, the power of the sun’s light renders them invisible.
The moon appears differently on different nights—like the Full Moon only once a month, on the poornima night whereas on the fifteenth night after that, there is no moon in the sky (amavasya).

Some celestial bodies are big and hot since they are made of gases. They are called Stars. The sun is also a star. We do not feel the heat and light of the stars other than the sun since they are very far away from us.

Groups of stars that are visible in definite patterns are called Constellations. Ursa Major (the Big Bear), The Small Bear (Saptarishi), etc are some well-known constellations.

The Pole Star is known to retain the same position every night in the sky. It is also called the North Star since it helps in knowing the North direction.

There are celestial bodies that do not have their own heat and light. They reflect the light they get from stars. Such bodies are the Planets. We live on the earth, a planet. Most planets have Satellites, which are celestial bodies that revolve around a particular planet. The moon is the only satellite of the earth.

The earth and moon are part of a bigger system (or family) of celestial-bodies, called the Solar System. The sun is the “head” of this system and is present at its centre. The planets revolve around the sun, while the satellite revolves around the placets. The planets, in addition to revolving around the sun, also rotate about their own axis.

The sun is made of extremely hot gases, and it provides heat and light to the rest of the solar system. It is about 150 million kilometres away from the earth.

All the planets of the solar system are listed below: (in the order of their distance from sun)

Mercury (planet nearest to the Sun)

Mnemonic:
to memorise the names of the eight planets in the order of their distance from the sun
My Very Efficient Mother Just Served Us Nuts
where the beginning of each word is the same as the first letter of the planet existing at that position in the order (check the list above)

Till August 2006, Pluto was also a planet. But it is now recognised as a “dwarf planet”.

The shape of the earth is called a Geoid. This means it is not perfectly spherical, since it is flattened at the poles. The earth is probably the only planet that can support life. This is because its temperature, resources like water and oxygen, etc are present in the proportions appropriate for life. The earth, with its 2/3 rd of surface covered with water, appears blue from space and is called Blue Planet.

The Moon’s diameter is 1/4 th of that of the earth. It is 3,84,400 km away from earth. It completes a revolution around the earth in about 27 days. Incidentally, it also takes around the same time for a rotation about its own axis. It does not support life.

There are several other tiny bodies in space (the Asteroids) that move around the sun. There is a “belt” of such objects, called the Asteroid Belt, between Mars and Jupiter.


There exist small pieces of rocks (Meteroids) which also move around the sun.
The Milky Way is the galaxy (a huge system of billions of stars) we live in. The Milky Way is further a part of a bigger collection of galaxies, called the Universe, (refer Flow¬Learning)

Celestial Body: An object in the universe (but not on the earth) is said to be a celestial body. Examples are sun, earth, moon, stars, etc.

Star: A celestial body that is characterized by being very hot and big, and made of gases is a star. A star typically has its own heat and light.

Full Moon Night: A night when the moon is visible from the earth as a full sphere is called the Full Moon night, and it occurs once a month.

New Moon Night: The fifteenth night after the Full Moon night, when the moon is not visible at all in the sky, is called the New Moon night.

Constellation: A group of several stars which can usually be recognized by a definite pattern is called a constellation. An example is Ursa Major.

Planets: A celestial body which revolves around a particular star in an orbit, and gets all its light from that star, is called a planet. Earth is a planet.

Satellites: A celestial body which revolves around a planet in a particular orbit is called a satellite. The moon is a satellite of the Earth.

Orbit: The particular and definite elliptical path in which a planet (or satellite) always remains, is called the orbit of that planet (or satellite).

Sun: The Sun is a star that acts as the “head” of the solar system and around which all planets revolve: Note that the sun is not at the center of the orbit, instead it is like in the figure above.

Inner Planets: The Inner Planets are the planets that orbit around the sun between the sun and the asteroid belt, that is, are close to the sun. These are: Mercury, Venus, Earth and Mars.

Outer Planets: The Outer Planets are the planets that orbit the sun beyond the asteroid belt, that is, are very far away from the sun. These are: Jupiter, Saturn, Uranus and Neptune.

Geoid: The shape of the earth is called a geoid. A geoid is spherical except for the flattening at two places diametrically opposite to each other.

Poles: The two places diametrically opposite to each other and which lie on the axis about which a spherical body rotates are called poles.

Asteroids: A large number of tiny celestial bodies which move around the sun, and are mainly present in a belt between the orbits of Mars and Jupiter, are called Asteroids.

Meteoroid: Small pieces of rocks which move around the sun are called meteoroids.

Galaxy: A galaxy is a collection of innumerable stars. Most stars have their own families like the solar system. The Milky Way is the galaxy in which we live.

Universe: The Universe is the largest unit in which we live. It is a collection of galaxies. There is only one Universe and everything that exists in this Universe itself. 

March 12, 2021

Fundamental Rights and Duties as given by the Constitution of India.

FUNDAMENTAL RIGHTS
As we have seen, rights are claims that are essential for the existence and development
of individuals. In that sense there will a long list of rights. Whereas all these are recognized by the society, some of the most important rights are recognized by the State and enshrined in the Constitution. Such rights are called fundamental rights.

These rights are fundamental because of two reasons. 

First, these are mentioned in
the Constitution which guarantees them and the 

Second, these are justiciable, i.e.
enforceable through courts.

Being justiciable means that in case of their violation, the
individual can approach courts for their protection. If a government enacts a law that
restricts any of these rights, it will be declared invalid by courts. Such rights are provided in Part III of the Indian Constitution. 

The Constitution guarantees six
fundamental rights to Indian citizens as follows: 

(i) right to equality, 
(ii) right to freedom, 
(iii) right against exploitation, 
(iv) right to freedom of religion, 
(v) cultural and educational rights, and 
(vi) right to constitutional remedies. 
While these fundamental rights are universal, the Constitution provides for some exceptions and
restrictions.

1. Right to Equality
Right to equality is very important in a society like ours. The purpose of this right
is to establish the rule of law where all the citizens should be treated equal before the law. It has five provisions (Articles 14-18) to provide for equality before law or for the protection of law to all the persons in India and also to prohibition, discrimination on the grounds of religion, race, caste, sex or place of birth.
(i) Equality before Law: The Constitution guarantees that all citizens will be equal
before law. It means that everyone will be equally protected by the laws of the
country. No person is above law. It means that if two persons commit the same
crime, both of them will get the same punishment without any discrimination.
(ii) No Discrimination on the basis of Religion, Race, Caste, Sex or Place of Birth: The State cannot discriminate against a citizen on the basis of religion,
race, caste, sex or place of birth. This is necessary to bring about social equality.
Every citizen of India has equal access to shops, restaurants, places of public entertainment or in the use of wells, tanks or roads without any discrimination.
However, the State can make special provisions or concessions for women and children.
(iii) Equality of Opportunity to all Citizens in matter of Public Employment:
The State cannot discriminate against anyone in the matter of public employment. All citizens can apply and become employees of the State. Merits and qualifications will be the basis of employment. However, there are some exceptions to this right. There is a special provision for the reservation of posts for citizens belonging to Scheduled Castes, Scheduled Tribes and Other Backward Classes (OBCs)
Figure 16.1 Working in Office Without Gender Based Discrimination. 
(iv) Abolition of Untouchability: Practising untouchability in any form has been made a punishable offence under the law. This provision is an effort to uplift
the social status of millions of Indians who had been looked down upon and kept at a distance because of either their caste or the nature of their profession.
But, it is really very unfortunate that despite constitutional provisions, this social evil continues even today. 
(v) Abolition of Titles: All the British titles like Sir (Knighthood) or Rai Bahadur which were given to the British loyalists during the British rule, have been abolished because they created distinctions of artificial nature. However, the
President of India can confer civil and military awards to those who have rendered meritorious service to the nation in different fields. The civil awards such as Bharat Ratna, Padma Vibhushan, Padam Bhushan and Padma Shri and
the military awards like Veer Chakra, Paramveer Chakra, Ashok Chakra are conferred. 
(v) Right against Exploitation
Traditionally, the Indian
society has been hierarchical that has encouraged exploitation in many forms. Which is why, the Constitution makes provisions against exploitation. 

The citizens have been  guaranteed the right against exploitation through Articles 23 and 24 of the Constitution. 
These two provisions are:
1. Prohibition of traffic in human beings and forced labour: Traffic in human beings and begar and other similar forms of forced labour are prohibited and any breach of this provision shall be an offence punishable in accordance with law.

2. Prohibition of employment of children in factories, etc.: As the Constitution provides, no child below the age of fourteen years shall be employed to work in any factory or mine or engaged in any other hazardous employment. This right aims at eliminating one of the most serious problems, child labour, that India has been facing since ages. Children are assets of the society. It is their basic right to enjoy a happy childhood and get education. But as shown in the illustration and as you also may have observed, in spite of this constitutional provision, the problem of child labour is still continuing at many places. This malice can be
eliminated by creating public opinion against it.

 Right to Freedom of Religion
As you know, one of the objectives declared in the Preamble is “to secure to all
its citizens liberty of belief, faith and worship”. Since India is a multi-religion country, where Hindus, Muslims, Sikhs, Christians and many other communities live together,
the Constitution declares India as a ‘secular state’. It means that Indian State has no religion of its own. But it allows full freedom to all the citizens to have faith in
any religion and to worship, the way they like. But this should not interfere with the religious beliefs and ways of worship of other fellow beings. This freedom is available to the foreigners as well. In respect of the Right to freedom the Constitution makes the following four provisions under Articles 25-28:

1. Freedom of conscience and free profession, practice and propagation of religion: All persons are equally entitled to freedom of conscience and the right to profess, practise and propagate religion freely.
 However, it does not mean
that one can force another person to convert his/her religion by force or allurement. Also, certain inhuman, illegal and superstitious practices have been banned. Religious practices like sacrificing animals or human beings, for offering to gods and goddesses or to some supernatural forces are not permissible.
Similarly, the law does not permit a widow to get cremated live with her dead husband (voluntarily or forcibly) in the name of Sati Pratha. Forcing the widowed woman not to marry for a second time or to shave her head or to make her wear white clothes are some other social evils being practised in the name of religion. Besides the above stated restrictions, the State also has the power to regulate any economic, financial, political or other secular activities related to
religion. The State can also impose restrictions on this right on the grounds of public order, morality and health.
2. Freedom to manage religious affairs: Subject to public order, morality and health, every religious group or any section thereof shall have the right 
(a) to establish and maintain institutions for religious and charitable purposes; 
(b) to manage its own affairs in matters of religion; 
(c) to own and acquire movable
and immovable property; and 
(d) to administer such property in accordance with law.
3. Freedom as to the payment of taxes for promotion of any particular religion: No person shall be compelled to pay any tax, the proceeds of which are specifically used in payment of expenses the incurred on the promotion or maintenance of any particular religion or religious sect.

4. Freedom as to attendance at religious instruction or religious worship in certain educational institutions
(1) No religious instruction shall be provided in any educational institution wholly maintained out of State funds. However, it will not apply to an educational institution which is administered by the State but has been established under any trust which requires that religious instruction shall be imparted in such an institution. But no person attending such an institution shall
be compelled to take part in any religious instruction that may be imparted there or attend any religious worship that may be conducted there. In case of a minor, the consent of his/her guardian is essential for attending such activities.

Cultural and Educational Rights
India is the largest democracy in the world having diversity of culture, scripts, languages and religions. As we know the democracy is a rule of the majority. But the minorities are also equally important for its successful working. Therefore,
protection of language, culture and religion of the minorities becomes essential so that the minorities may not feel neglected or undermined under the impact of the majority rule. 

 In Articles 29-30 two major provisions have been made:
1. Protection of interests of minorities: Any minority group having a distinct language, script or culture of its own shall have the right to conserve the same.
No citizen shall be denied admission into any educational institution maintained by the State or receiving aid out of State funds on grounds only of religion, race, caste, language or any of them.
2. Right of minorities to establish and administer educational institutions: All Minorities, whether based on religion or language, have the right to establish and administer educational institutions of their choice. In making any law providing for the compulsory acquisition of any property of an educational institution established and administered by a minority, the State shall ensure that the amoun fixed by or determined under such law for the acquisition of such property would not restrict or abrogate the right guaranteed under that clause. The State shall not, in granting aid to educational institutions, discriminate against any educational institution on the ground that it is under the management of a minority, whether based on religion or language.

Right to Constitutional Remedies
Since Fundamental Rights are justiciable, they are just like guarantees. They are enforceable, as every individual has the right to seek the help from courts, if they are violated. But in reality it is not so. Encroachment or violation of Fundamental
Right in our day to day life is a matter of great concern. Which is why, our Constitution does not permit the legislature and the executive to curb these rights. It provides legal remedies for the protection of our Fundamental Rights. This is called the Right to
Constitutional Remedies stipulated in Article 32. 

When any of our rights are violated, we can seek justice through courts. We can directly approach the Supreme Court that can issue directions, orders or writs for the enforcement of Fundamental Rights. Right to Education (RTE). The Right to Education is added by introducing a new Article 21A in the Chapter on Fundamental Rights in 2002 by the 86th Constitutional Amendment. It was a long standing demand so that all children in the age group of 6-14 years (and their parents)
can claim compulsory and free education as a Fundamental Right. It is a major step forward in making the country free of illiteracy. But this addition remained meaningless, as it could not be enforced until 2009 when the Parliament passed the
Right to Education Act, 2009. It is this Act which aims at ensuring that every child who is between 6-14 years of age and is out of the school in India, goes to school
and receives quality education, that is his/her right.

Fundamental Rights are indeed very essential for the well
being of every citizen. We also know that people have always struggled against injustice, exploitation and inequality for the creation of better surroundings, bette living conditions and preservation of the human dignity. Efforts to avail such rights to all human beings have been made at the international level also by recognising
various rights which are popularly known as Human Rights. The General Assembly of the United Nations adopted Human Rights in 1948 and enshrined them in 

Some of the Human Rights are: Equality before Law, Freedom from Discrimination, Right to Life, Liberty and Personal Security, Right to Free Movement, Right to Education, Right to Marriage and Family, Freedom of Thought, Conscience and Religion, Right to
Peaceful Assembly and Association and Right to Participate in the Cultural Life of
the Community. 
 
The Human Rights which could not find place under the Fundamental Rights have been included in the Chapter on
Directive Principles of State Policy. Moreover, keeping in view the importance of Human Rights, the National Human Rights Commission was founded in 1993 by the Government of India to guarantee that the Indian citizens also enjoy those rights.


Fundamental Duties
After going through the Fundamental Rights, you must have observed and realized that in return for every right, the society expects the citizens to do certain things which are collectively known as duties. Some such important duties have been incorporated in the Indian Constitution also. The original Constitution enforced on 26th January, 1950 did not mention anything about the duties of the citizen. It was expected that the citizens of free India would perform their duties willingly. But things did not go as expected. Therefore, ten Fundamental Duties were added in Part-IV of the Constitution under Article 51-A in the year 1976 through the 42nd Constitutional Amendment. 
 
Fundamental Rights are justiciable, the Fundamental Duties are non-justiciable. It means that the violation of fundamental duties, i.e. the non-performance of these duties by citizens is not punishable. 

The following ten duties have been listed in the Constitution of India:
1. to abide by the Constitution and respect its ideals and institutions, the National Flag, National Anthem;
2. to cherish and follow the noble ideals which inspired our national struggle for freedom;
3. to uphold and protect the sovereignty, unity and integrity of India;
4. to defend the country and render national service when called upon to do;
5. to promote harmony and the spirit of common brotherhood amongst all the people of India and to renounce practices derogatory to the dignity of women;
6. to value and preserve the rich heritage of our composite culture;
7. to protect and improve the natural environments including forests, lakes, rivers and wildlife;
8. to develop the scientific temper, humanism and the spirit of inquiry and reform;
9. to safeguard public property and not to use violence; and
10. to serve towards excellence in all spheres of individual and collective activity.

Featured Post

All the Prime Ministers of India with Information

All the Prime Ministers of India with  Information   The Prime Ministers of India with some basic information about them: 1.         Jawah...