/ / / Chapter-8 INTRODUCTION TO HTML Difference between. 1. WYSIWYG editor & Text Editor.

Similar documents
STD 7 th Paper 1 FA 4

Frequently Asked Questions and other helpful information

Reference Services Division Presents. Excel Introductory Course

Click OK in the confirmation window. The selected workstations restart in the Thawed state.

E4-E5 (CFA) For internal circulation of BSNLonly

Bridge Program Computer Skills Self-Inventory

EXCEL BASICS: MICROSOFT OFFICE 2007

Copyright 2018 Lepide Software Private Limited. All rights reserved.

File Maintenance Windows 7 Word What is File Maintenance?

USER GUIDE KASPERSKY MOBILE SECURITY 8.0

2018 By: RemoveVirus.net. Remove A Virus From Your PC In 5 Simple Steps

Introduction. A cell can contain any of the following:

Protegent Total Security Solution USER GUIDE Unistal Systems Pvt. Ltd. All rights Reserved Page 1

Plasmon Diamond Library Manager

Contents. Session 2. COMPUTER APPLICATIONS Excel Spreadsheets

CompTIA A+ Certification ( ) Study Guide Table of Contents

Getting Started With Outlook Express For Windows 2000/XP Author Marcie Matsuo Revised by Darren Kato

4. A mail box 9) What is an embedded system? 1. A program that comes wrapped in a box 2. A program that is permanent part of a computer 3.

Very Basics of HTML. G day mates during this tutorial I will teach you the basics of HTML.

Keeping Your PC Safe. Tips on Safe Computing from Doug Copley

The following documents are included with your Sony VAIO computer.

Chapter 8 Operating Systems and Utility Programs أ.أمل زهران

Cyber Security Practice Questions. Varying Difficulty

Windows 7. More Skills 11 Manage Fonts. To complete this project, you will need the following file: You will save your file as: CHAPTER 7

Lesson-1 Computer Security

Computer Applications I Vocabulary (Frameworks)

Vocabulary Platform Computing\ First grade Theoretical number of hours=30 Practical number of hours =60

EXCEL BASICS: MICROSOFT OFFICE 2010

Manual Removal Norton Internet Security Won't Open Or

Module 15. Troubleshooting Software

IT Essentials v6.0 Windows 10 Software Labs

SafeGuard Easy Demo guide. Product version: 6 Document date: February 2012

Secure Recipient Guide

Notebook Configuration & Software Installation From Home (For Windows OS Only)

How To Remove Virus From Computer Without Using Antivirus In Windows Xp

BCS IT User Syllabus ECDL Unit 2 Using the Computer and Managing Files/IT User Fundamentals Level 1. Version 5.0

Installing McAfee VirusScan For Windows 95/98 Kyler Kwock, Wilbur Wong Revised by Therese Nakadomari

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

The Operating System

Symantec 9.0, Symantec 10.0 Norton 2005, Norton 2006 and McAfee 8.0i anti-virus installation

Windows 2000 Professional

A Tutorial for Excel 2002 for Windows

F-Secure Mobile Security

Table of Contents. Preface... iii COMPUTER BASICS WINDOWS XP

RPS Technology Standards Grades 9 through 12 Technology Standards and Expectations

Introduction to Microsoft Windows

Dreamweaver is a full-featured Web application

Introduction to the SAM Student Guide 4. How to Use SAM 5. Logging in the First Time as a Pre-registered Student 5 Profile Information 7

NUIT Tech Talk: Spring Cleaning Remembering the Technology?

Excel Level 1

CONTENTS. SysReturn_Manaual Updata 06/4/24. Chapter1 Introducing SysReturn Introduction to SysReturn Features and Functions...

Section A. 1. is the alignment where the text is aligned from the left edge and ragged from the right edge.

Unit III: Working with Windows and Applications. Chapters 5, 7, & 8

Best Practices for Using the Rich Text Editor

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

KENDRIYA VIDYALAYA CHENANI (J & K)

Airtel PC Secure Trouble Shooting Guide

SEVENTH-DAY ADVENTIST HIGHER SECONDARY SCHOOL 132FT. RING ROAD, HARIPURA, MANINAGAR 08

Glossary. advance: to move forward

Lasso CDP. Lasso. Administration Tool Guide. August 2005, Version Lasso CDP Administration Tool Guide Page 1 of All Rights Reserved.

Intro to ICDL Base Syllabus Version 1.1

9936A LogWare III. User s Guide. Revision

Best Practices for Using the Rich Text Editor

Remove Manually Norton Internet Security 2012 Will Not Start

Using the Computer & Managing Files Part 2

Install and Configure ICT Equipment and Operating Systems Unit 229 Utility Programs

INTERNET SAFETY IS IMPORTANT

Cheat Sheet to Speed-Up a Slow PC

Discovering Computers Living in a Digital World

Computer Application Practical

WINDOWS XP. iii. Contents

[Troubleshooting] High usage (100%) of CPU and HDD in Windows 10

Microsoft Excel 2010 Handout

Top Producer 7i Remote

[Troubleshooting] Task Manager shows High CPU, Memory and Disk Usage

Libraries. Multi-Touch. Aero Peek. Sema Foundation 10 Classes 2 nd Exam Review ICT Department 5/22/ Lesson - 15

Perform Manual System Restore Xp Safe Mode Command Prompt

Finding information on your computer

B1.1-R3: IT TOOLS AND APPLICATIONS

FAQ. Safe Anywhere PC 12. Disclaimer:

Microsoft Word 2003.

College of Pharmacy Windows 10

NET 311 D INFORMATION SECURITY

Lasso Continuous Data Protection Lasso CDP Client Guide August 2005, Version Lasso CDP Client Guide Page 1 of All Rights Reserved.

Zillya Internet Security User Guide

Excel Lesson 3 USING FORMULAS & FUNCTIONS

Contents Microsoft Excel Lesson 1: Entering Text and Numbers...4 The Microsoft Excel Window...4 The Microsoft Office Button...

Reinstalling Windows 95/98/ME/2000 Professional

F-Secure Mobile Security

Types Of Computer Virus Sources Of Virus Virus Warning Signs Virus Detection(Anti-Virus) Virus Prevention and Removal

STONELOCK NETWORK USER MANUAL Version

Excel Basics Tips & Techniques

IBM Spectrum Protect HSM for Windows Version Administration Guide IBM

THE HP Storageworks X510 Data Vault

Introduction to Excel 2007

Collector and Dealer Software - CAD 3.1

Grey High School. June COMPUTER APPLICATIONS TECHNOLOGY Grade 10 Paper 2 Written MEMORANDUM

Website Development Komodo Editor and HTML Intro

AppleWorks 5 Installation Manual. Includes information about new features FOR MAC OS

ViconNet Version 6 XX Installation and Upgrade Guide.

Transcription:

Grade- 7 Computer Chapter-2 MS EXCEL Chapter-8 INTRODUCTION TO HTML Chapter-9 COMPUTER VIRUSES Chapter-10 COMPUTER SECURITY Chapter-2 MS EXCEL 1. What is a formula? A formula in MS Excel Starts with an equal (=) sign. It is a sequence of values, cell reference,functions and operators. It produces new if values from the exiting values. 2. Name all the errors displayed in MS Excel and state their possible reasons. a) Errors are: #####: Column is not wide enough to display numbers. #DIV/o! Formula contains an invalid operation division by O. #N/A Data are not available. 3. Define functions: A function is a built in formula in MS Excel that is used to carry out common mathematical calculation. It saves us from writing lengthy formulae. E.g. Sum, Avg, Min, Max, etc. 4. What is the use of auto sum facilities in MS Excel? It is a shortcut of sum function. It provides a quick way of adding up columns or rows of numbers in a spreadsheet. 5. Write the formula to calculate the average of three numbers in cells A1, A2 and A3. = Average (A1, A2, A3) 6. Describe functions present in the function library on the formula tab the ribbon. Functions are: Autosum : Calculate the sum of a range of numbers. Recently used : Recently used functions are included. Financial : Cash flow return, financial function etc it shows. Logical : List of logical function. Text : Includes text based function. Date & Time : Includes function to calculate date & time. Lookup & Reference : Includes function for searching and reference purposes. Math & Trig : List of mathematical & trigonometric functions. Solve the equations using BODMAS rule. 1. 25/5 + 2 3 5 = 5 + 2 3 5 = 5 + 3 15 = 7 15 = -8 2. 35 2 10/2 5 3. 40/5 10 2 + 10 4. 20 20/5 20 + 20 Chapter-8 INTRODUCTION TO HTML Difference between. 1. WYSIWYG editor & Text Editor. WYSIWYG User can use this without having knowledge of HTML. Adobe dream viewer & Microsoft Front page are e.g. Text User should have knowledge Of HTML. WordPad & notepad are eg of it. 2. Start tag & End tag

Start tag First tag in a pairs in Start tag. In <H1>.<IHI> <HI> is start tag. Here no slash are Inserted. End tag Second tag in a Pair is end tag. In <HI>.<IHI> <IHI> is end tag. Here slash is Inserted. 3. HTML & Head elements HTML elements <HTML> identifies the document as HTML document. In <HTML> many tags are used. E.g. <Head>,<body>, <forms>, etc. 4. Title element & body element. Title element <title> element contains the document little. This element used in <Head> tag. Head elements <Head> contains information about the documents. In <Head> tags can Be <base>, <link>, <meta>, <style>etc. Body element <body> tag encloses all tags attributes & information. This element is used in <HTML> tag. Question & answer. 1. Define: A) HTML: Stands for hyper text markup language. It is a set of instruction given to a web browser to describe the structure of a web page. B) Tags: The instructions given in HTML in the form of text characters. 2. What are container & empty element in HTML? Explain with examples. The element that has both the tags ir the starting tag as well as the ending tag is container element. The elements that have the starting tag only and have no end tag are called empty elements. E.g.: <HTML> <body> <HI> hello <IHI>(container), <br> (empty) Hi <IHTML> 3. Write the steps to do the following tasks. A. Create web page in HTML a) Click start button. b) Choose accessories from all programs. c) Click on notepad. d) Type: <HTML> <head> <titles> try</tittle> </heads> <Body> I am learning </Body> </HTML> B. Save a web page in notepad. a) Click file save b) Select all files. c) Type name of file.html d) Click on save button. C. View a web page in Microsoft internet explorer. a) Click on Microsoft internet explorer. b) Click on file ->open c) Click on browser and locate the saved HTML file. d) Select the file & click open. e) Click ok. 4. Name the essential document structure elements of HTML. A) HTML element HEAD element TITLE element BODY element

5. Explain the use of font element in designing a web page in HTML. A) Use of font element are : i. Size: used to represents <font size = value> valid range 1 7 default the size is 3.e.g.: <font size = b> Hello </font> ii. Color: used to change the colors of the text. E.g.: <font color = red > hello </font> iii. Face: sets the typeface that will be used to display the text on server. E.g.: <font face = Times new roman > 6. Short note. A) Heading element. There are six levels of heading. <HI> is higher level. <H6> is the lowest level. Used to announce topics to follow and information of all ranges according to a logical hierarchy. e.g.: <HTML> <Head> <title> heading <title> </Head> <body> <HI> </HI> <H2> </H2> <H3> </H3> <H4> </H4> <H5> </H5> <H6> </H6> </Body> </HTML> Output:- a) B, I and U elements B element is used to display the enclosed text in bold. E.g.: <B> Hello </B> Output: Hello I Element: used to display enclosed text in italics. E.g. <I> Hello </I> output hello U element used to display the enclosed text with underline E.g.: <U> Hello</U> Output Hello Chapter-9 COMPUTER VIRUSES 1. What is a computer virus? A computer virus is a program or a set of program designed specially to affect the normal functioning of a computer. Programmer create it s to harm memory, data, CPU speed & program. 2. What does a computer virus do? Computer virus can infect the executable program files like Microsoft word and operating system programs. It can infect the attachment of e-mail, so virus spreads from one pc to another. 3. How do computer viruses spread? Virus spread from the following ways. From removable media like pen drive, CD, floppy etc. From files downloaded from the internet. From e-mail attachment. 4. What is an antivirus software? Antivirus software is application software designed to detect and remove the virus from the computer system. Its starts automatically when the computer system is started.

It checks for virus in all the directories and files of computer system. Some antivirus are: 1) Norton 2) AVG 3) McAfee 4) Symantec 5) Quick Heal. 5. List the various signs that indicate the presence of a virus in our computer. Signs are:- Computer begins to operate slower than normal. Computer shut down frequently. Restarts PC again & again. Applications we store in the computer do not work as usual. Some or whole disk drives becomes difficult to access. Error message pop up on the screen. A virus infected file will have double extensions such as image.jpg.vbs. Strange icons appear on our desktop. 6. How can we present viruses from entering into our computer system? Prevention measures: Restrict access of viruses to your system both offline & online. Allow only authorized uses to use your system. Keep programs and data on separate disks, if possible. Scan all removable devices. Updates the antivirus. Difference between. 1. Resident viruses and direct action viruses. Resident viruses are permanent. It damaged RAM and all files and programs. Direct action virus: Are not permanent. They affect the documents in the folder or directory. 2. Overwrite viruses & boot viruses. Overwrite viruses These viruses damage or remove the data present in those documents that they infect, thus, marking them useless at last. 3. Computer virus and antivirus Virus It is a program designed Specially to affect the normal Functioning of a computer. E.g. Polyboot.B, anti EXE. Boot viruses The virus that infects a part of hard disk floppy drive is referred to as boot sector Virus. Antivirus The tool that is used to Remove viruses a Computer is called an anti virus. E.g. Norton, AVG, Avast, Quick heal. Chapter-10 COMPUTER SECURITY 1. Why there is a need to secure our computer? We secure our computer to prevent:- Theft of hardware. Interruption of services. Piracy of information Damage to hardware or information. Unauthorized modification of information. Illegal confining of information or resources. 2. What is authentication? Explain any one biometric authentication techniques. A) Process of verifying a user s identify and his right to access a system is known as authentication. Biometric techniques: Face recognition: The analysis of facial feature is done by scanning a person s face. It helps it authenticate and individual identity.

3. What points should be kept in mind while creating a password? A) Don t use personal info like Surname DOB. B) Create a password by mixing different characters types it make it difficult to guess. C) Avoid using a password with repetitive letters or numbers. D) Try using a unique phrase as your password. E) Set password recovery options. 4. Explain the terms encryption and decryption. Encryption: The process of converting data and information into a form that is not readable by anyone. Decryption: The process of converting encrypted data back into a readable form. 5. What does an antivirus program do? Mention some popular antivirus software. An antivirus is also a software program that detects the virus and removes it immediately. Antivirus scan: a) Remove the detected malware from the computer. b) Separate all affected files and application so that the infection can t spread further. c) Attempt to repair infected files. d) Inform the uses of the presence of the malware. Some antivirus software is Norton, AVG, MacAfee, Symantec, etc. 6. Explain data backup. What is the advantage of taking backup? Taking a backup refers to the process of making one or more copies of important data to fall back on in the event of the loss of the original data. Advantages: At the time of system crash, we can do restore of data. At the time of data lost, restore can be done. 7. List some ways in which we can take a backup of the data. Backup can be taken in pen drive CD, floppy disk by copying a data. Backup strategies can be used in bigger systems. 8. What is firewall? Why do we use it for our computer? A firewall is a special security program that prevents unauthorized access to a computer network system. A firewall inspects every data packet that arrives at a network and decides on the basis of a set of predefined rules, whether to let it can or not. 9. Fingerprint recognition means. A fingerprint sensor is used to create a digital image of the fingerprint. Then this image is compared to the stored image of a verified fingerprint and if it matches with it access is granted. 10. Name some biometric authentication. 1. Fingerprint recognition. 2. Voice recognition. 3. Face recognition. 4. Iris recognition.