Page 6 - TP_iPlus_V2.1_Class7
P. 6
Inside the Series
The key features of the series have been designed to ensure better learning and assessment.
Learning Resources QR Code is given for digital
interaction of chapter videos.
Contents Animation
Scan for
Computer—Hardware
Learning Outcomes
Components
1 1 Computer—Hardware Components 7
provide an overview Hardware New Trends in Hardware
Learning Outcomes 2 Number System 21
Number System Decimal to Binary Conversion Binary to Decimal Conversion
Hardware of the chapter Operations on Binary Numbers
3 Computer Virus 30
New Trends in Hardware
What is a Computer Virus?
contents. Think Tank Types of Computer Virus
How do You Know Your PC has a Virus?
How does a Computer get infected with a Virus?
How to Prevent Your PC from a Virus?
encourages students Antivirus Ransomware Malware 40
Firewall
The Most Dangerous Malwares Known
the hardware is useless and vice-versa.
A computer system is made up of two types of components: hardware and software. Both these
components are equally important for the functioning of a computer system. Without software
Ethics and Safety Measures in Computing
4
What Are Internet Ethics?
to explore innovative malicious software used to access the data of the host system illegally by encrypting it. The victim of
Software is a set of instructions that make the computer perform tasks. Software is another
term for a computer program. Software can be classified into two broad categories: system
What are Unethical Practices? Safety Measures While Using Computer/Internet
i + HARDWARE What is Internet? Computer Ethics Ransom is the money demanded for the release of a kidnapped hostage. Similarly, ransomware is
the previous classes. In this chapter, we will learn more about hardware.
software and application software. We have already learnt about different types of software in
Digital Footprints
Indian Laws and Government Initiatives
5 Click on Paste 5 Spreadsheets—An Introduction Rootkit 57
the attack has to pay a huge amount of money to the attacker to regain access to their data.
command. ideas and think Starting Excel 2016 Rootkit is a type of malware that gains administrator access to the host system. Once the attacker
Components of Excel 2016 Window
Let us learn about these in detail.
Features of Excel 2016
All the physical components of a computer system are called hardware. These are the parts that
Creating a New Workbook
Types of Data
Entering Data in the Worksheet
we can see or touch. Hardware components are classified into two types: internal and external.
Internal Hardware Components
Saving a Workbook
beyond conventional Backdoor
gains access to the system, the rootkit gets hidden but retains special access to the system. The
detection of rootkit is difficult as it has special access to the system, it bypasses the tracking software.
detail. 6 More on Spreadsheets 67
All the hardware components located inside the CPU box\Cabinet are known as internal hardware
Column Width and Row Height
topics. Merging Cells the system covertly. Formatting Spreadsheets
CPU A backdoor is a method or software used to bypass normal authentication or security measures
components. Examples of the internal hardware components are the CPU, Motherboard, Switched
Inserting Rows/Columns
Mode Power Supply (SMPS), Disk Drives, Modem, Ports, etc. Let us learn about some of them in
Autofill
Using Formulas to Perform Calculation Order of Operation
to gain unauthorized remote access to a computer or network. Backdoors can be installed
Selecting Cells in a Worksheet Copying/Moving Data through malicious software or vulnerabilities in legitimate software, allowing attackers to control
Worksheet 1 i + THE MOST DANGEROUS MALWARES KNOWN 82
The Central Processing Unit (CPU) is a processor and
sometimes called a microprocessor. It is the computer’s brain
the computer. What if Word had a special feature that could translate your words into
as it performs all the calculations and runs programs, managing
Test Sheet 1 • Wabbit Virus (1974) is a self-replicating virus that creates multiple copies of itself, causing
83
operations and executing the basic instructions that control
Quick Byte • ILOVEYOU Virus (2000) spread via email with a subject line of "I Love You," containing a
an alien language? Guess, what would you say to the aliens, and how
system slowdowns and crashes.
Concept of a Database
would they respond?
85
7
Database and DBMS—An Introduction
malicious attachment that appeared as a harmless text file.
i + UNDO/REDO Advantages of a Database System Types of Databases
Components of Access 2016
provides practical
Types of Views in Access
Creating a Database
7 Undo is used to cancel the last/previous command. Redo is used to reverse the action of Terms Related to a Database Access 2016 • Mydoom Worm (2004) scraped addresses from infected machines, then sent copies of itself
Data Types in Access 2016
to those addresses.
• Code Red Worm (2001) would spread itself with the message: “Hacked By Chinese!”
Computer—Hardware Components
Undo command. Conventions for Naming a Field weather. Creating a Table
information or tips 98
To undo, click on the Undo button • Storm Worm (2007) attacked millions of computers with an email about approaching bad
on the Quick Access Toolbar. •
8
More on Access
To redo, click on the Redo button information of United States Department of Transportation.
on the Quick Access Toolbar. Forms in Access Reports in Access
Opening An Existing Database Exiting Access 2016 Zeus, also known as Zbot Trojan horse (2007) was made with an intention to steal banking
9
Quick Byte Queries in Access through spam emails to steal banking information.
Lists and Tables in HTML
#Problem Solving & Logical Reasoning to the students. 109
• Emotet (2014) is considered one of the most destructive and dangerous Trojans. It spreads
Crack The Code #Digital Literacy Shortcut keys to Undo are Ctrl + Z. Creating Lists Creating Tables • Pegasus (2016) is commercial spyware. It secretly infects a smartphone (Android or iOS) and
tracks the device completely for every action.
Shortcut keys to Redo are Ctrl + Y. Info Byte
Identify five terms related to computer safety and viruses. 10 More on HTML 123
V Q A U Y S X H E S i + SPELL CHECK Inserting Images Linking Web Pages software. Adding Audio & Video
J U V F U W C G T P Frames Forms in HTML5
Most malware programs are distributed over the Internet, often bundled with other
Worksheet 2
P R G E K E B F R Y Have you observed that after typing text in Word 2016, some words have a red or blue Info Byte i + ANTIVIRUS 152
A E Z V I R U S O W wavy line under them? These lines indicate that you have made a spelling or grammar Test Sheet 2 153
mistake.
W S D S U S A G J A Antivirus software is a set of programs designed to identify, prevent, and remove malware from
O D E O F A M K A R wavy line show grammatical mistake. presents an your computer. It helps protect your system by detecting viruses and other malicious threats
Project
The red wavy line shows that a word has been spelled incorrectly, whereas the two blue
155
R F F X T I B B N E 34
M H N O R T O N S S In Word, you can easily correct these mistakes by using the Spelling & Grammar tool. You Explore More (Introduction to MySQL) iPlus (Ver. 2.1)-VII 158
can check spelling and grammar mistakes in a document or only in selected parts of the
Uncover Artificial Intelligence & Robotics
#Experiential Learning document. Commonly, it is called spell check. interesting fact 162
#Communication
Let’s Explore OGO Cyber Sample Questions 166
Browse the internet and make a list of ten popular antivirus programs. 31 about the topic. 168
IT Buzz Words
Editing in Word 2016 To Sum Up
#Ethical & Moral Reasoning
(vi)
Life Skills and Values All the physical components of a computer system are called hardware.
Computer system is made up of two types of components: hardware and software.
Never download files from unknown websites. A computer accepts data and instructions from you through input devices.
Life Skills and Values Output is the information obtained after processing of data which the user receives
#Digital Literacy The CPU is the brain of the computer.
through output devices.
Practical Time Storage devices are used to store data for future use.
Visit your computer lab and perform the following tasks: focus on ethical and The 3D camera is a real-sense device which is able to recognise faces and use that
• Open Microsoft PowerPoint.
• Create a presentation on "Computer Virus." The presentation should include the following topics, To Sum Up capability to log in to devices like smartphones or laptops.
with each topic covered on a separate slide:
o What is a Computer Virus?
o What Happens If a Virus Infects Your Computer? moral values.
o Common Types of Computer Viruses provides a Exercise
o What is Antivirus Software? Section A (Objective)
o How Does Antivirus Software Work? A. Tick (3) the correct option.
Teacher’s Corner summary of the 1. What is a set of instructions called that makes the computer perform a specific task.
a. Hardware
1. Discuss about the latest computer virus and malware threats. c. Memory b. Software
2. Demonstrate the installation of antivirus software. d. CPU
39 chapter for quick 2. Which output device helps in printing flex, graphs, tables, charts, etc.
Computer Virus a. Laser printer
b. Plotter
recapitulation. 3. Which of the following is not an internal hardware component?
c. Ink jet printer
d. Dot matrix printer
a. SMPS
b. Ports
c. Mother board
d. Printer
4. Which port is found in computer projectors?
a. Parallel
b. Serial
Special section on Artificial Intelligence (AI) & 5. Which keyboard is operated by typing on a touch-sensitive surface rather than pressing
c. USB
d. VGA
physical keys?
Robotics is given to enhance AI skills. c. Wired b. Wireless
a. Virtual
d. Real
18
iPlus (Ver. 2.1)-VII
Uncover Artificial
Intelligence & Robotics EXPLORE MORE
i + ARTIFICIAL INTELLIGENCE Introduction to MySQL
Computer is an electronic device that can store and process data according to the instructions operating systems, including Linux, Unix and Windows. It is popular for web-based applications
MySQL is an open-source RDBMS software which is available free of cost. It can run on all
given to it. It has become an essential part of our lives and its requirement is growing exponentially. and online publishing. It uses a query language called SQL (Structured Query Language). SQL
Since its invention, scientists and researchers are continuously working on improving its speed, is the standard language for managing relational databases and performing various operations
reducing its size and making it more powerful in terms of its capability to complete a task with of tables.
least human involvements.
on the data in the tables. It would enable us to store, retrieve, and manipulate data in the form
Scientists always stumbled upon the question, “Can a machine think and behave like humans?“. Explore More SQL is a high-level interactive language that allows users to specify what is required to be done
This question led to the invention of one of the most advanced technologies of all times, AI. operations are implemented.
Artificial Intelligence is a branch of computer science that pursues the creation of computers
in the form of queries. Unlike other high-level languages, we do not need to specify how the SQL
and machines which are as intelligent as human beings. contains supplement i + TYPES OF SQL COMMANDS
According to the father of Artificial Intelligence, John McCarthy, AI is “the science and engineering SQL uses various commands to perform different operations on a database.
of making intelligent machines, especially intelligent computer programs”. Data Definition Language (DDL)
AI-Terminologies topics for add-on A Data Definition Language or Data Description Language (DDL) is a standard for commands
There are some frequently used terms in the field of Artificial Intelligence. Let us understand that define the different structures in a database. DDL statements create, modify and remove
them. TRUNCATE, RENAME and DROP.
Machine Learning knowledge. Data Manipulation Language (DML)
database objects such as tables, indexes and users. Common DDL statements are CREATE, ALTER,
Machine learning allows a machine to predict
more accurate results without being explicitly A Data Manipulation language (DML) is a language that enables users to retrieve, update, insert
DELETE.
programmed to do so. It is a subset of artificial and delete data in a database. Common DML statements are SELECT, UPDATE, INSERT INTO and
intelligence. Data Control Language (DCL)
Algorithms A Data Control Language is a language that has various commands which are used to grant and
A set of rules or instructions given to an AI machine is Transaction Control Language (TCL)
take back authority from any database user. Some DCL statements are Grant and Revoke.
known as algorithm. It helps an AI machine to learn on
its own. A Transaction Control Language is a language that has various commands which are used to
manage transactions in the database. These are used to manage the changes made by DML-
statements. Some TCL statements are Commit, Savepoint and Rollback.
i + DATA TYPES IN SQL
162 must have a name and data type.
A data type defines a sort of value that a column will contain. In a database table, every column
iPlus (Ver. 2.1)-VII
158
iPlus (Ver. 2.1)-VII

