TECH WIZARD Class 8 SYLLABUS Term - I 1. Cyber Crime and Cyber Security 2. Animation Basics 3. DBMS Concepts 4. RDBMS: MS Access 5. HTML Tables, Hyperlink and Forms Term - II 6. JavaScript Web Programming 7. Programming Logic 8. Python Basics 9. Understanding Data Science 10. Introduction to Artificial Intelligence Exercises Chapter 1 – Cyber Crime and Cyber Security A. Choose the correct answer. 1. a 2. b 3. d 4. c B. Fill in the blanks. 1. Trojan 2. Network Access Control 3. Worm 4. SSL C. Answer the following questions. 1. i. Cybercrime: Unauthorised access with the intention of misuse of someone’s personal data. ii. Cybersecurity: Measures to prevent cybercrime and fight cyberthreats. Trojan is a program promoted as useful program but once installed it harms the computer. A Worm slows down the computer and replicates itself from one computer to other over a network. 2. The 4 cyber frauds are credit card fraud, ATM fraud, Email fraud, and Phishing. Credit card information such as passwords and PIN are stolen by the hackers. These details are used to make unauthorised purchases. In Email fraud, the user is sent a message informing about some lottery or some very attractive offer to lure the user into making heavy payments. 3. Common security measures we must follow to be safe from cyber threats are: i. When we use emails or log in to a bank’s website to make a transaction, we should use a strong password. That is, there should not be a password that is easily guessed. Page | 43
TECH WIZARD ii. Open the email attachment carefully, and do not open any email attachments from an unknown sender. After downloading them, make sure to scan with antimalware software. iii. It is illegal to download pirated items for free, such as movies or commercial software, and it can also put our sensitive data at risk. Chapter 2 – Animation Basics A. Choose the correct answer. 4. a 5. a 1. b 2. a 3. a 4. Ink bottle 5. Panels B. Fill in the blanks. 1. Keyframes 2. Layers 3. 12 C. Answer the following questions. 1. Flash, is a multimedia graphic software that is used to create interactive animated vector graphics for the web as well as for desktop presentations, movies, games, etc. It is used to create interactive and animated vector graphics for the web as well as for desktop presentations, movies, games, etc. 2. The Selection tool is used most commonly to select and move an item or multiple items on the Stage. It is also used to edit lines and shapes, in a way that is familiar to users who have worked in other vector graphic applications. 3. The Timeline is the area where we organize and control time-based animation in Flash. Flash documents divide lengths of time into frames. On the timeline we can also add layers. In each layer a separate object can be kept for easier management 4. Keyframes are the drawings which define a movement. In the workflow of traditional hand-drawn animation, the senior or key artist would draw the keyframes. After testing and approval of the rough animation, the scene would be handed over to their assistant. In Flash, the keyframes represent the starting and ending points for tweens. 5. Layers help in stacking the objects above or below the other. For example, a car can be kept in a layer and tree can be kept in another layer just below it so that it seems that tree is behind the car. Using layers, we can easily manage various objects easily that make our whole animation. Each layer can be given a unique, relevant name 6. On the Timeline, left-click and drag 'Polygon' Layer below the 'Rectangle' Layer. The 'Rectangle' Layer will now be on top of the 'Polygon' Layer. 7. Lasso: It is a selection tool to select irregular shapes by sensing colour intensity. Sub-selection: It is used to drag lines and outlines of shapes into a curvy structure. Ink bottle: It applies outline or stroke colour of a drawing object. Chapter 3 – DBMS Concepts A. Choose the correct answer. 1. a 2. c 3. c 4. d 5. c B. Fill in the blanks. 1. Parent 2. Table 3. Data 4. OLE object 5. Foreign C. Tick (√) the correct statement and cross (×) out the wrong one. 1. False (×) 2. False (×) 3. True (√) 4. True (√) 5. True (√) Page | 44
TECH WIZARD D.Answer the following questions. 1. A Relational database is a collection of related tables, also known as relations. Relational databases store the data in one or more tables called relations. 2. Query can be broadly categorised as - • Selection query- Used for extracting information from one or more tables. This is called selection. Such queries never change the content already stored in a table. • Action Query- Creating a new table or making changes in the content of the table. It may be for adding a new record, deleting the existing records or modifying the existing records. 3. Below are the data types in MS-Access: 4. The 4 characteristics of any DBMS are controlled data redundancy, data sharing, data integrity and data security. 5. Primary key uniquely identifies each record in the table. A foreign key is a referential constraint between two tables. The foreign key refers to a matching value in another table (parent). For example- Table: STUDENT Table: PERFORMANCE ADMISSION_NUMBER STUDENT NAME ADMISSION_NUMBER EXAM MARKS 76 ADM000000001 Ravi Kumar ADM000000003 Term 1 84 ADM000000002 Anu Sharma ADM000000001 Term 2 ADM000000003 Rehman ADM000000002 Term 1 83 Siddiqui ADM000000002 Term 2 89 ADM000000003 Term 2 78 ADM000000001 Term 1 93 Here, in table STUDENT, ADMISSION_NUMBER is Primary key while in table PERFORMANCE, it is foreign key. (Every value has a matching value in the parent table). 6. Foreign Key is a column that refers to the primary key/unique key of the other table. So, it demonstrates relationship between tables and act as cross reference among them. Foreign key can store duplicate values. Table having a foreign key is called child table or dependent table. 7. A primary key is usually based on a single column or attribute. In some cases, combination of two or more fields is used as primary key. Properties of Primary Key • It should always store some value. No null values are allowed in primary key field. Page | 45
TECH WIZARD • It should store unique value. • Once decided, the value must not change as long A003 Tom Clancy as that record remains in the database. • There can be only one primary key defined in a table or a relation. Chapter 4 – RDBMS: MS Access A. Choose the correct answer. 1. c 2. d 3. c 4. a 5. b B. Fill in the blanks. 1. Query 2. Advance 3. Alphabetically, Numerically 4. Rows 5. Fields C. Tick (√) the correct statement and cross (×) out the wrong one. 1. False (×) 2. False (×) 3. False (×) 4. True (√) 5. True (√) D. Answer the following questions. 1. Referential integrity means to ensure that correct data is stored in the tables. This is done by applying referential integrity rules to check if matching values are present or not. 2. The 3 types of relationship in a database are one-to-one, many-to-many and one-to-many. 3. Filtering means displaying data on the basis of some filter criteria. Filtering helps us display only those records which we need according to our requirement. This helps in analysing the data easily 4. One-to-many relationship means one record of a table matches with multiple records in a table. For example, an item is sold to many customers or a teacher teaching many classes. 5. To create a simple query in Query Design View. i. Under Create tab, in Queries group, click on Query Design. ii. In Show Table pop-up, select the table Student and click on Add button. Then click on Close button. The table Student will be added to the Query Design. 6. One to Many Relationship: This means one record in one table has many matching records in the other related table. One is denoted by number 1 and Many is denoted by infinite (∞) sign. One-to-one relationship means that one record of a table matches with exactly one record in other table. For example, a passenger can have one seat in flight. One-to-many relationship means one record of a table matches with multiple records in a table. For example, an item is sold to many customers or a teacher teaching many classes. 7. Refer Q no. 6 Chapter 5 – HTML Tables, Hyperlink and Forms A. Choose the correct answer. 4. d 5. d 6. Caption 1. d 2. a 3. c 4. Form 5. Checked B. Fill in the blanks. 1. Internal 2. Name 3. Button Page | 46
TECH WIZARD C.Answer the following questions. 1. Rowspan attribute is used to merge the cells across two or more adjacent rows while colspan attribute merges cells across two or more adjacent columns 2. Border : This attribute places a border around the table and each cell. It takes a number for border width as value. Syntax: <table border=3 > ... </table> Bgcolor: This attribute is used to change the background color of a table. Syntax: <table bgcolor = \"lime\"> ... </table> Background: This attribute will set a picture as the background of a table. Syntax: <table background= \"compumatrix.jpg\" > ... </table>Parts of a Table 3. Row: 'Row' stands for a horizontal line that represents a record in a table. Table rows may be grouped into a head, foot and body sections. Column: 'Column' stands for a vertical line that contains a particular type of value. Cell: 'Cell' is a rectangular box that contains the data or value in a table. Cells may span multiple rows and columns. 4. Radio button is used to accept one of multiple choices from user in a form. It is created by setting type property of input tag to radio. They are grouped together by giving same value to their NAME attribute Chapter 6 – JavaScript Web Programming A. Choose the correct answer. 1. d 2. a 3. a 4. c 5. c B. Fill in the blanks. 1. Conversion 2. .(dot) 3. Concatenation 4. Onchange 5. Function C. Answer the following questions. 1. A variable identifies data in our program. A variable is identified by a unique name and its value may change as program executes. To create a value in JavaScript, var keyword is used and values are assigned to it using assignment operator =. E.g., var x = 1000 2. / is division operator, % is modulo operator and ++ is increment operator. E.g. var x = 10 / 3 will return 3 in variable x. var x = 10 % 3 will return 1 in variable x. var x = 10 x++ will make the value of variable x 11. 3. InnerHTML property refers to the area between the start and end tag of any container element. E.g. mytext.innerHTML=“Here comes the text.” mytext is the ID of any HTML container element such as FONT or P or H1 etc. 4. Parselnt() converts strings to integer and toString() converts integer to strings. 5. Event is any interrupt that occurs due to user action or application like, mouse click. Event handler is the function that executes in response to an event. E.g. <script language=“javascript”> function greet() { alert(“Greetings”) Page | 47
TECH WIZARD } </script> <font onclick=“greet()”>Click me to welcome you.</font> 6. JavaScript mouse events are listed as follows: i. onMouseEnter: When mouse pointer comes over an object like button, text, web page etc. ii. onMouseOut: Reverse of onMouseEnter i.e. when mouse goes away from an object. 7. onMouseEnter: When mouse pointer comes over an object like button, text etc. onMouseOut: Reverse of onMouseEnter i.e. when mouse goes away from an object. <H1 ID=para1 onmouseenter=\"f1()\" onmouseout=\"f2()\">Click me for magic.</H1> <script language=“javascript”> function f1() { para1.color=\"red\" } function f2() { mytext.color=\"#000000” } </script> Chapter 7 – Programming Logic A. Choose the correct answer. 1. b 2. b 3. a 4. b 5. a B. Tick (√) the correct statement and cross (×) out the wrong one. 1. True (√) 2. True (√) 3. False (×) 4. True (√) 5. True (√) C. Answer the following 1. Logic is something that makes sense. It helps to define the detailed steps and their sequence in a computer program. For example- Going out with an umbrella on a dry, clear night seems illogical while the same umbrella looks right in place on a rainy day or in a bright hot afternoon. 2. Data validation is an important aspect of programming. If data is incorrect then the output shall also be erroneous. Data validation is the technique to ensure that valid and relevant data is input to the program. Validation of data is planned according to the information available while analysing the program. 3. The approach that is followed to Understand the prime requirement (prerequisite) and develop the logic of a program is a step-wise process to design the solution. Chapter 8 – Python Basics A. Choose the correct answer. 1. d 2. d 3. a 4. a 5. a B. Fill in the blanks. 1. Interactive 2. Indentation 3. Input() 4. len() 5. interpreter C. Tick (√) the correct statement and cross (×) out the wrong one. 1. False (×) 2. False (×) 3. False (×) 4. True (√) 5. True (√) Page | 48
TECH WIZARD D. Answer the following questions. 1. # This is a single line comment. ‘’’This is a multi Line comment’’’ 2. Interactive mode is useful to run or test individual statements quickly if you do not need to save them while script mode allows to save the script and then execute it anytime later 3. / operator returns the returns value with decimal place (float). E.g., 3/2 = 1.5 // operator returns integer value after division. E.g., 3/2 = 1 % modulus operator returns the remainder of the division. E.g., 5%3 = 2 4. i. Python is an interpreter-based programming language. ii. Programs written in python are easy to understandand relatively simple. iii. Python is a case-sensitive programming language. 5. Smallest unit in a command is known as a token. Identifiers (rules) : variables or label to the memory location holding some value. Operators: symbols which define some action to be done on some operands. 6. Indexing in Strings: Each character in a string is having its position value in the form of an integer which is called as index. Beginning index value is zero and increases while moving from left to right in a string. Strings have negative indexes also which start from -1 and starts from the last character of the string and thus reduces negatively while moving right to left character by character in a string. Chapter 9 – Understanding Data Science A. Choose the correct answer. 1. d 2. a 3. a 4. d 5. a 6. b B. Fill in the blanks. 1. Datification 2. Historical 3. Anomaly 4. Relevant 5. Big Data C. Match the scenario of column A with the conclusion in column B. 1. d 2. e 3. b 4. c 5. a D. Answer the following questions. 1. Data is an individual piece of value which alone does not make any sense. Practice of drawing out useful conclusion from the data is called data science. 2. Data science tries to answer questions such as Yes/No type predictions, anomaly detection, forecasts, grouping values on the basis of differences or similarity. 3. Classification is the process of grouping the observations on the basis of some criteria such as grouping students in to slabs of marks obtained. Clustering means grouping on the basis of some similarity among the observations such as grouping subscribers who watch horror movies. 4. Big data is a large and complex set of data that cannot be easily managed, processed, or analyzed using traditional data processing tools and methods. It can come from a variety of sources, including social media, IoT devices, business transactions, machine-generated data, healthcare data, government data, and scientific data. 5. Search Engine Optimisation is the process to increase the visibility of a website by making it appear in the top search results returned by search engines. It helps in search optimisation by the content of the website with social media data and mapping it with the search keywords and phrases typed by the users in the search engines. Page | 49
TECH WIZARD Chapter 10 – Introduction to Artificial Intelligence A. Choose the correct answer. 1. d 2. c 3. c 4. a 5. c 6. a B. Fill in the blanks. 1. Analytics 2. Inductive 3. Unsupervised ML 4. Neurons 5. Habits C. Tick (√) the correct statement and cross (×) out the wrong one. 1. True (√) 2. False (×) 3. False (×) 4. NA D. Answer the following questions. 1. Artificial Intelligence in the AI field refers to the study of the principles, concepts and technology for building such machines and systems that should think, act and learn like humans. 2. Artificial Neural Networks is neuron like computing in which each neuron in the brain is a tiny processor and brain is the big machine composed of millions of these processors. It is able to hold the information taught (fed repeatedly) to it by a computer program. Two types of neuron network are: i. Machine Learning (ML) ii. Supervised ML 3. Human brain first senses the incoming stimulus. For example, feeling hot. Reasoning means analysis the stimulus and reach a suitable conclusion. For example, feeling hot is sensing and deciding not to go closer to the fire is reasoning. 4. Machine Learning is the application of AI. It enables a computer system to learn from experience without programming it further. This technique is used to make computer do accurate predictions after analyzing the input given to them. Unsupervised ML is equipped with neural network capability is fed only with input data but not the desired output details. It uses input data to analyse enormous amount of data in its knowledge base to generate any output it can. Page | 50
Search
Read the Text Version
- 1 - 8
Pages: