Page 81 - TP_Play_V2.1_class5
P. 81

21 st
                                                                                                 Century   #Critical Thinking
                 D. Competency-based/Application-based questions.                                  Skills


                     1.   Ahsan like to keep his books in alphabetical order on the bookshelf. According to
                          you, what can be the reason for this?

                     2.   Poonam wrote a secret message in the form of symbols and numbers.
                          What is this type of data called?



                                                                                               21 st   #Critical Thinking
                                                                                             Century
                                                                                               Skills  #Technology Literacy
                                                        In the lab


                       Analyse the following data:

                       1.  Ravi got 67% marks.

                       2.  Kiran got 92% marks.
                       3.  Ahad got 89% marks.

                       4.  Jasmine got 72% marks.
                       Arrange this data in a tabular format in Excel.

                       Use the Internet to identify the following signs, then write the names of the signs.

                       1.                                2.                               3.





                        ...................................  ...................................  ...................................


                       4.                                5.                               6.





                       ...................................  ...................................  ...................................






                  Teacher's Corner

                 1.  Explain the concept of information processing to students.

                 2.   Demonstrate an example other than the one used in the book to explain the concept of secret
                    message to students.









                                                                                            Data Processing       79
   76   77   78   79   80   81   82   83   84   85   86