Page 6 - TP_iPlus_V2.1_Class7
P. 6

Inside the Series




                  The key features of the series have been designed to ensure better learning and assessment.



                    Learning Resources                                        QR Code is given for digital
                                                                             interaction of chapter videos.


                                                                                  Contents                 Animation
                                                                                                           Scan for
                        Computer—Hardware
                                                   Learning Outcomes
                        Components
                                      1                                         1  Computer—Hardware Components   7
                                                    provide an overview           Hardware    New Trends in Hardware
                        Learning Outcomes                                       2  Number System                  21
                                                                                  Number System    Decimal to Binary Conversion    Binary to Decimal Conversion
                          Hardware                     of the chapter             Operations on Binary Numbers

                                                                                3  Computer Virus                 30

                                   New Trends in Hardware
                                                                                  What is a Computer Virus?
                                                         contents.            Think Tank               Types of Computer Virus
                                                                                                       How do You Know Your PC has a Virus?
                                                                                  How does a Computer get infected with a Virus?
                                                                                  How to Prevent Your PC from a Virus?
                                                                         encourages students     Antivirus  Ransomware  Malware  40
                                                                                                       Firewall
                                                                                   The Most Dangerous Malwares Known
                      the hardware is useless and vice-versa.
                      A computer system is made up of two types of components: hardware and software. Both these
                      components are equally important for the functioning of a computer system. Without software
                                                                                 Ethics and Safety Measures in Computing
                                                                                4
                                                                                                       What Are Internet Ethics?
                                                                         to explore innovative    malicious software used to access the data of the host system illegally by encrypting it. The victim of
                      Software is a set of instructions that make the computer perform tasks. Software is another
                      term for a computer program. Software can be classified into two broad categories: system
                                                                                  What are Unethical Practices?   Safety Measures While Using Computer/Internet
                     i +  HARDWARE                                                What is Internet?    Computer Ethics   Ransom is the money demanded for the release of a kidnapped hostage. Similarly, ransomware is
                     the previous classes. In this chapter, we will learn more about hardware.
                     software and application software. We have already learnt about different types of software in
                                                                                  Digital Footprints
                                                                                            Indian Laws and Government Initiatives
                                                   5  Click on Paste            5  Spreadsheets—An Introduction   Rootkit  57
                                                                                                  the attack has to pay a huge amount of money to the attacker to regain access to their data.
                                                   command.                 ideas and think   Starting Excel 2016   Rootkit is a type of malware that gains administrator access to the host system. Once the attacker
                                                                                                       Components of Excel 2016 Window
                     Let us learn about these in detail.
                                                                                  Features of Excel 2016
                     All the physical components of a computer system are called hardware. These are the parts that
                                                                                            Creating a New Workbook
                                                                                  Types of Data
                                                                                                       Entering Data in the Worksheet
                     we can see or touch. Hardware components are classified into two types: internal and external.
                     Internal Hardware Components
                                                                                  Saving a Workbook
                                                                         beyond conventional      Backdoor
                                                                                                  gains access to the system, the rootkit gets hidden but retains special access to the system. The
                                                                                                  detection of rootkit is difficult as it has special access to the system, it bypasses the tracking software.
                    detail.                                                     6  More on Spreadsheets           67
                     All the hardware components located inside the CPU box\Cabinet are known as internal hardware
                                                                                                        Column Width and Row Height

                                                                                topics.     Merging Cells   the system covertly.     Formatting Spreadsheets
                    CPU                                                                           A backdoor is a method or software used to bypass normal authentication or security measures
                     components. Examples of the internal hardware components are the CPU, Motherboard, Switched
                                                                                  Inserting Rows/Columns
                     Mode Power Supply (SMPS), Disk Drives, Modem, Ports, etc. Let us learn about some of them in
                                                                                  Autofill
                                                                                            Using Formulas to Perform Calculation   Order of Operation
                                                                                                  to  gain  unauthorized  remote access to  a  computer  or  network.  Backdoors  can  be  installed
                                                                                  Selecting Cells in a Worksheet   Copying/Moving Data  through malicious software or vulnerabilities in legitimate software, allowing attackers to control
                                                                                 Worksheet 1      i +  THE MOST DANGEROUS MALWARES KNOWN   82
                    The Central Processing Unit (CPU) is a processor  and
                    sometimes called a microprocessor. It is the computer’s brain
                    the computer.                   What if Word had a special feature that could translate your words into
                    as it performs all the calculations and runs programs, managing
                                                                                 Test Sheet 1    •  Wabbit Virus (1974) is a self-replicating virus that creates multiple copies of itself, causing
                                                                                                                  83
                    operations  and  executing  the basic instructions that  control
                                                                             Quick Byte          •  ILOVEYOU Virus (2000) spread via email with a subject line of "I Love You," containing a
                                                    an alien language? Guess, what would you say to the aliens, and how
                                                                                                  system slowdowns and crashes.
                                                                                  Concept of a Database
                                                    would they respond?
                                                                                                                  85
                                                                                7
                                                                                 Database and DBMS—An Introduction
                                                                                                  malicious attachment that appeared as a harmless text file.
                                                i +  UNDO/REDO                              Advantages of a Database System    Types of Databases
                                                                                                       Components of Access 2016
                                                                          provides practical
                                                                                                       Types of Views in Access
                                                                                  Creating a Database
                                       7        Undo is used to cancel the last/previous command. Redo is used to reverse the action of    Terms Related to a Database    Access 2016   •  Mydoom Worm (2004) scraped addresses from infected machines, then sent copies of itself
                                                                                            Data Types in Access 2016
                                                                                                 to those addresses.
                                                                                                 •  Code Red Worm (2001) would spread itself with the message: “Hacked By Chinese!”
                                Computer—Hardware Components
                                                Undo command.                     Conventions for Naming a Field      weather.    Creating a Table
                                                                          information or tips                     98
                                                To undo, click on the Undo button                •  Storm Worm (2007) attacked millions of computers with an email about approaching bad
                                                          on the Quick Access Toolbar.          •
                                                                                8
                                                                                 More on Access
                                                To redo, click on the Redo button                information of United States Department of Transportation.
                                                          on the Quick Access Toolbar.   Forms in Access    Reports in Access
                                                                                  Opening An Existing Database   Exiting Access 2016 Zeus, also known as Zbot Trojan horse (2007) was made with an intention to steal banking
                                                                                9
                                                Quick Byte                                  Queries in Access  through spam emails to steal banking information.
                                                                                 Lists and Tables in HTML
                                #Problem Solving & Logical Reasoning       to the students.                      109
                                                                                                •  Emotet (2014) is considered one of the most destructive and dangerous Trojans. It spreads
                    Crack The Code  #Digital Literacy    Shortcut keys to Undo are Ctrl + Z.   Creating Lists    Creating Tables  •  Pegasus (2016) is commercial spyware. It secretly infects a smartphone (Android or iOS) and
                                                                                                 tracks the device completely for every action.
                                                   Shortcut keys to Redo are Ctrl + Y.           Info Byte
                  Identify five terms related to computer safety and viruses.   10 More on HTML                  123
                        V  Q  A  U  Y  S   X  H  E   S  i +  SPELL CHECK          Inserting Images    Linking Web Pages  software.   Adding Audio & Video
                         J  U  V  F   U  W  C  G  T   P                           Frames    Forms in HTML5
                                                                                                   Most malware programs  are distributed over the Internet,  often bundled with other
                                                                                 Worksheet 2
                        P  R   G  E   K  E   B  F   R   Y  Have you observed that after typing text in Word 2016, some words have a red or blue   Info Byte    i +  ANTIVIRUS   152
                        A  E   Z  V  I   R   U  S   O  W  wavy line under them? These lines indicate that you have made a spelling or grammar   Test Sheet 2   153
                                                mistake.
                        W  S   D  S   U  S   A  G   J   A                                      Antivirus software is a set of programs designed to identify, prevent, and remove malware from
                        O  D  E   O  F  A  M  K  A   R  wavy line show grammatical mistake.  presents an   your computer. It helps protect your system by detecting viruses and other malicious threats
                                                                                 Project
                                                The red wavy line shows that a word has been spelled incorrectly, whereas the two blue
                                                                                                                 155
                        R  F   F   X  T  I   B  B  N   E                                        34
                        M  H  N  O  R  T   O  N   S   S  In Word, you can easily correct these mistakes by using the Spelling & Grammar tool. You   Explore More (Introduction to MySQL)   iPlus (Ver. 2.1)-VII  158
                                               can check spelling and grammar mistakes in a document or only in selected parts of the
                                                                                 Uncover Artificial Intelligence & Robotics
                                  #Experiential Learning  document. Commonly, it is called spell check.  interesting fact   162
                                  #Communication
                   Let’s Explore                                                 OGO Cyber Sample Questions      166
                    Browse the internet and make a list of ten popular antivirus programs.  31  about the topic.  168
                                                                                 IT Buzz Words
                                                              Editing in Word 2016           To Sum Up
                                   #Ethical & Moral Reasoning
                                                                                                 (vi)
                    Life Skills and Values                                                      All the physical components of a computer system are called hardware.
                                                                                                Computer system is made up of two types of components: hardware and software.
                   Never download files from unknown websites.                                  A computer accepts data and instructions from you through input devices.
                                           Life Skills and Values                               Output is the information obtained after processing of data which the user receives
                                  #Digital Literacy                                             The CPU is the brain of the computer.
                                                                                              through output devices.
                    Practical Time                                                              Storage devices are used to store data for future use.
                   Visit your computer lab and perform the following tasks:  focus on ethical and     The 3D camera is a real-sense device which is able to recognise faces and use that
                   •  Open Microsoft PowerPoint.
                   •   Create a presentation on "Computer Virus." The presentation should include the following topics,   To Sum Up   capability to log in to devices like smartphones or laptops.
                    with each topic covered on a separate slide:
                     o  What is a Computer Virus?
                     o  What Happens If a Virus Infects Your Computer?  moral values.
                     o  Common Types of Computer Viruses                   provides a                Exercise
                     o  What is Antivirus Software?                                                 Section A (Objective)
                     o  How Does Antivirus Software Work?                                   A.  Tick (3) the correct option.

                    Teacher’s Corner                                    summary of the         1.  What is a set of instructions called that makes the computer perform a specific task.
                                                                                              a. Hardware
                   1.  Discuss about the latest computer virus and malware threats.            c. Memory      b. Software
                   2.  Demonstrate the installation of antivirus software.                              d. CPU
                                       39                              chapter for quick     2.  Which output device helps in printing flex, graphs, tables, charts, etc.
                                   Computer Virus                                              a. Laser printer
                                                                                                        b. Plotter

                                                                         recapitulation.       3.  Which of the following is not an internal hardware component?
                                                                                             c. Ink jet printer

                                                                                                        d. Dot matrix printer

                                                                                             a. SMPS

                                                                                                       b. Ports

                                                                                             c. Mother board
                                                                                                        d. Printer
                                                                                               4.  Which port is found in computer projectors?
                                                                                               a. Parallel
                                                                                                        b. Serial
                      Special section on Artificial Intelligence (AI) &                        5.  Which keyboard  is  operated  by typing on a touch-sensitive surface rather  than pressing

                                                                                             c. USB

                                                                                                       d. VGA
                                                                                             physical keys?
                           Robotics is given to enhance AI skills.                              c. Wired        b. Wireless
                                                                                             a. Virtual
                                                                                                       d. Real
                                                                                            18
                                                                                             iPlus (Ver. 2.1)-VII
                                      Uncover Artificial
                                     Intelligence & Robotics                                            EXPLORE MORE
                               i +  ARTIFICIAL INTELLIGENCE                                            Introduction to MySQL
                               Computer is an electronic device that can store and process data according to the instructions   operating systems, including Linux, Unix and Windows. It is popular for web-based applications
                                                                                                  MySQL is an open-source RDBMS software which is available free of cost.  It can run on all
                               given to it. It has become an essential part of our lives and its requirement is growing exponentially.   and online publishing. It uses a query language called SQL (Structured Query Language). SQL
                               Since its invention, scientists and researchers are continuously working on improving its speed,   is the standard language for managing relational databases and performing various operations
                               reducing its size and making it more powerful in terms of its capability to complete a task with   of tables.
                               least human involvements.
                                                                                                 on the data in the tables. It would enable us to store, retrieve, and manipulate data in the form
                               Scientists always stumbled upon the question, “Can a machine think and behave like humans?“.   Explore More   SQL is a high-level interactive language that allows users to specify what is required to be done
                               This question led to the invention of one of the most advanced technologies of all times, AI.   operations are implemented.
                               Artificial Intelligence is a branch of computer science that pursues the creation of  computers
                                                                                                 in the form of queries. Unlike other high-level languages, we do not need to specify how the SQL
                               and machines which are as intelligent as human beings.   contains supplement   i +  TYPES OF SQL COMMANDS
                               According to the father of Artificial Intelligence, John McCarthy, AI is “the science and engineering   SQL uses various commands to perform different operations on a database.
                               of making intelligent machines, especially intelligent computer programs”.  Data Definition Language (DDL)
                               AI-Terminologies                             topics for add-on    A Data Definition Language or Data Description Language  (DDL) is a standard for commands
                               There are some frequently used terms in the field of Artificial Intelligence. Let us understand   that define the different structures in a database. DDL statements create, modify and remove
                               them.                                                             TRUNCATE, RENAME and DROP.
                               Machine Learning                                knowledge.       Data Manipulation Language (DML)
                                                                                                 database objects such as tables, indexes and users. Common DDL statements are CREATE, ALTER,
                               Machine  learning  allows  a  machine  to  predict
                               more accurate results without  being explicitly                  A Data Manipulation language (DML) is a language that enables users to retrieve, update, insert
                                                                                                DELETE.
                               programmed to do so. It is a subset of artificial                and delete data in a database. Common DML statements are SELECT, UPDATE, INSERT INTO and
                               intelligence.                                                    Data Control Language (DCL)
                                        Algorithms                                              A Data Control Language is a language that has various commands which are used to grant and
                                        A set of rules or instructions given to an AI machine is   Transaction Control Language (TCL)
                                                                                                take back authority from any database user. Some DCL statements are Grant and Revoke.
                                        known as algorithm. It helps an AI machine to learn on
                                        its own.                                                A Transaction Control Language is a language that has various commands which are used to
                                                                                                manage transactions in the database. These are used to manage the changes made by DML-
                                                                                                statements. Some TCL statements are Commit, Savepoint and Rollback.
                                                                                                i +  DATA TYPES IN SQL
                               162                                                             must have a name and data type.
                                                                                                A data type defines a sort of value that a column will contain. In a database table, every column
                                 iPlus (Ver. 2.1)-VII
                                                                                                158
                                                                                                 iPlus (Ver. 2.1)-VII
   1   2   3   4   5   6   7   8   9   10   11