0% found this document useful (0 votes)
28 views

Class Vii (Comp) Study Material

1. The document provides notes for the second term of Class 7 for the subject of Computer. It defines various computer terms like Krita, layers, definition list, nested list, etc. 2. It discusses the difference between concepts like frame and keyframe, ordered and unordered lists, desktop and mobile apps, cyberstalking and cyberbullying. 3. It includes questions and answers on topics covered in the notes like switching to animation workspace in Krita, using timeline in Krita, renaming layers, creating tables using HTML tags, and more.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views

Class Vii (Comp) Study Material

1. The document provides notes for the second term of Class 7 for the subject of Computer. It defines various computer terms like Krita, layers, definition list, nested list, etc. 2. It discusses the difference between concepts like frame and keyframe, ordered and unordered lists, desktop and mobile apps, cyberstalking and cyberbullying. 3. It includes questions and answers on topics covered in the notes like switching to animation workspace in Krita, using timeline in Krita, renaming layers, creating tables using HTML tags, and more.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

CLASS 7

SUBJECT: COMPUTER

NOTES FOR 2ND TERM


1. Define
i. Krita: Krita is a free and open source painting and animation program. It provides a
versatile and easy way to create an animation.
ii. Layers: Layers are like transparent sheets stacked on top of one another each
containing a different image that appears on the stage.
iii. Definition List: A Definition list, also called a description list consists of a term
followed by its definition. It is used to present a glossary, list of terms etc .
iv. Nested List: A list within another list is known as nested list.
v. DigiLocker: It is a mobile app, which is supported by the Ministry of Electronics and
IT, under its digital India initiative. DigiLocker offers a cloud account for each Aadhar
holder to access his/her authentic documents or certificates.
vi. BHIM: It stands for Bharat Interface for Money is an Android application that enables
fast, secure and reliable cashless payments through our mobile phone.
vii. Virus: A virus is a program or set of programs that disrupts the normal functioning of
a computer.
viii. Forgery: It is an act of imitating or making a false copy of a document like Birth
certificate, Driving licence, Currency notes, etc, with an intent to check an individual
or organisation.
ix. Machine Learning: Machine learning is a field which deals with building technology
that can be used to program machines in the manner that the machines can learn
independently.
x. Computer vision: computer vision is a field that deals with the idea of computer
replicating human vision. This technology is used to extract visual information from
images and videos.
2. Difference between
i. Frame and Keyframe

Frame Keyframe

I) Frame is defined as the little rectangular cell I) Keyframes are the special kind of frames.
that appears on the timeline.
II) Animation in Krita is created by frames. II) keyframe define some changes to an object
properties for an animation like position,
colour, shapes, etc.

ii. <UL> tag and <OL> tag

<UL> TAG <OL> Tag

I) it is used to create an unordered list. I) it is used to create ordered list.


II) It Indents each item in the list and adds II) It Indents each item in the list and adds
bullet against each of them. It is also known as number against each of them. It is also known
Bulleted list. as Numberd list.

iii. Desktop apps and Mobile apps

Desktop apps Mobile apps

I) Desktop app can be used on a desktop or a I) Mobile apps run on a smartphone or tablet.
laptop II) These apps are usually small in size.
II) These apps are usually big in size. III) Adobe Photoshop express, Microsoft office
III) Eg.- Adobe Photoshop, MS office, etc mobile, etc

iv. Write the difference between cyberstalking and cyberbullying .

Cyberstalking Cyberbullying

I) when an attacker harasses a victim through I) It is an act of harming or harassing through


emails, social media, chat rooms, blogs, instant information technology in a deliberate
messaging, etc., it is called cyber stocking. manner. This includes insulting remarks and
threatening messages sent by email,spreading
rumours about the person etc.

v.
3. Q/ANS
i. How do you switch to the animation workspace in Krita?
Ans: The steps to switch to the animation workspace are:
a) Click on window menu
b) Click on work space option and select the animation option from the sub menu.
ii. What is the significance of timeline in Krita.
Ans: The timeline is a rectangular window which is present at the bottom of the
stage. It is the area where one controls the sequencing and timing of the graphics.
The major component of the timeline are Layers, Frames and Playhead.
iii. Write down the steps to rename a layer.
Ans: Steps to rename a layer are:
a) Double click on the layer we want to rename.
b) Type the new name and press the Enter key.
iv. Describe the tags that are used to create a table.
Ans: The tags that are used to create table are:
a) <TABLE> tag: It is used to create table.
b) <TR> tag: It is used to create table row.
c) <TH> tag: It is used to insert column heading.
d) <TD> tag: It is used to insert table data.
e) <CAPTION> tag: It is used to give table caption.
v. How are image added in HTML document?
Ans: The <IMG> tag with the 'SRC' attribute is used to insert image in a web page.
Syntax: <IMG SRC= "Name or Path of the image file">
vi. Write the use of type attribute with an ordered list.
Ans: TYPE attribute specifies the type of numbering or bullet used to Mark items in
the lists. By default its value is 1 for an ordered list and disc for an unordered list.
vii. How can you broadly categorise the apps? Explain any one category of the apps.
Ans: We can categories apps in three categories:
a) Desktop apps
b) Web apps
c) Mobile apps
Desktop apps: These apps can be used on a desktop or laptop, they do not need
web access and run independently on a computer.
viii. State the use of web apps.
Ans: Web apps browser based apps which is stored on a remote servers, which can
be utilised from any device through the internet. They require minimum device
memory.
ix. What is the difference between Hybrid app and Native app?
Hybrid apps have the features of both web apps and native apps where as, Apps that
are developed keeping the device specification in mind are known as native apps.
x. What is cyber crime? Give an example.
Ans: Cyber crime is any illegal activity done through the internet. For example-
Identity theft; where somebody steals your email id or password and uses it to send
fake emails to people containing false information about the product or winning a
lottery etc.
xi. What is cyberextrortion.
Ans: Cyber extortion is a crime in which the victim is attacked first and then force to
pay money to store further attacks. Cyberextortion may be done by blocking the
system resources of the victim by some Ransomware or Denial of service attack.
xii. Mention any three ways in which you can protect your system.
Ans: Three ways to protect our system can be:
a) Anti-virus should be used to protect system from viruses
b) Firewall should be used to protect the system.
c) To protect data in any system, strong password should be used.
xiii. Write any two applications of AI in everyday life.
Ans: any two applications of AI everyday life are:
a) Virtual assistants like Siri and Alexa
b) Personalised content recommendations on streaming platforms.
xiv. What is NLP? Name a few popular apps that make use of NLP.
Ans: NLP stands for natural language processing. It is a voice based communication
system where a user can give voice commands to a machine. The machine can easily
interpret these commands with the help of NLP. Alexa, Google assistant, Apple Siri
are some AI based applications that use NLP for communication.
xv. Explain the use of AI in Google search.
Ans: Google is a popular search engine which is widely used for searching
information on the Internet. When any user searches for anything, Google search
engine makes use of AI for suggesting relevant search topics for the user.

You might also like