0% found this document useful (0 votes)
36 views4 pages

CLASS VIII Computer Notes

Uploaded by

zaynrehan34
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views4 pages

CLASS VIII Computer Notes

Uploaded by

zaynrehan34
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

CLASS: VIII

LESSON :1 COMPUTER NETWORKS


D. ANSWER THE FOLLOWING QUESTIONS:
T.B – PAGE NO = 19
1A) WAN: WIDE AREA NETWROK(WAN): WAN connects the computers from various countries and continents.
Wan connects different LANS and MANS from across the globe. The internet is an example of WAN.
2A) Advantages of computer network: Computer networks offer many advantages, including:
 Sharing: Users can share files, hardware, and software resources with other users.
 Communication: Users can communicate with each other via email, chat, or video.
 Accessibility: Users can access resources, information, and online services from
anywhere.
 Storage: Computer networks offer great storage capacity.
 Collaboration: Computer networks enhance collaboration among users and systems.
 Cost efficiency: Companies can outsource work to other firms, saving on the cost of
hiring employees.
 Security: Computer networks can perform secure transfers at rapid speeds.
 Roaming access: Users can sign in to any computer on the network and access their
files.

3A) hub and router: A hub is a network device that broadcasts data to all connected devices, while a
router is a network device that forwards data packets between networks.
4A) Star topology and one disadvantage: A star topology is a network topology where devices
send data to a central hub or switch, which then forwards the data to the intended recipient. A
disadvantage of star topology is that the entire network can fail if the central device fails. This
is because the central device, or hub or switch, is the most important node in the network and
controls the entire system.
5A) In a Ring topology, each device is connected to two other devices in a circular fashion. Bus
topology is a topology where each device is connected to a single cable which is known as the
backbone.

E)
1A) Ms Anju should use Wide Area Network to connect the computers of the two branches.
2A) RING TOPOLOGY, it is network configuration where device connections create a circular
data path. Each networked device is connected to two others, like points on a circle.

3A) Don’t have to string cables, so installation can be quick and cost effective.
Expandability: You can easily expand wireless networks with existing equipment, where as a
wired network might require additional wiring. Security: Advances in wireless network provide
robust security protections.

4A) Here are three potential challenges that a technology officer might face when
managing a computer network:
 Security
A network can be vulnerable to security threats like viruses, malware, and cyber-
attacks. These threats can compromise sensitive data and disrupt operations.
 Network downtime
A network can experience downtime, which can cause inconvenience and disrupt
productivity.
 Maintenance and updates
A network requires regular maintenance and updates to ensure optimal
performance and security. This can be time-consuming and costly.

5A) It can help improve communication, collaboration, and problem-solving.

Chapter – 2: CYBER ETHICS

E)
1A) Being emotionally upset during or after using the Internet or the phone.
being very secretive or protective of one's digital life.
spending more time than usual in their room. Don't respond to and don't forward cyberbullying
messages.
Keep evidence of cyberbullying. Record the dates, times, and descriptions of instances when
cyberbullying has occurred. Save and print screenshots, emails, and text messages. ...
Block the person who is cyberbullying.

2A) Digital citizenship teaches users to act appropriately online, per widely-accepted behaviour
norms, sometimes called digital etiquette. It also teaches empathy and kindness in online
spaces. Digital citizenship teaches users to manage their personal information and media
consumption responsibly

3A) Top tips for staying secure online


 Top tips for staying secure online.
 Use a strong and separate password for your email.
 Install the latest software and app updates.
 Turn on 2-step verification (2SV)

4A) "Phishing" emails appear to be from a legitimate source but trick you into providing
personal information or credentials. The Federal Trade Commission defines phishing as "when
a scammer uses fraudulent emails or texts, or copycat websites, to get you to share valuable
personal information."

5A) The advantages of cyber ethics

1) Protects system against viruses, worms, spyware and other unwanted programs. 2)
Protection against data from theft. 3) Protects the computer from being hacked. 4) Minimizes
computer freezing and crashes.

F)
1A) Sneha's classmates are exhibiting inappropriate behaviour by sending messages that are
not appropriate. These behaviours can be classified as cyberbullying or harassment, depending
on the content of the messages and the intention behind them
2A) Arvind's problem is called spam or unsolicited bulk email. This is an unethical practice as it
wastes time and resources and can sometimes be used for malicious purposes.

3A) No, Prabha should not respond to the email asking for her bank account details:
 Don't respond
Never respond to an unsolicited email that asks for your personal or banking information .

4A) Ravi should follow several ethical practices online: Respect copyright: He should not
download or share copyrighted material without permission. Cite sources: He should properly
cite any information he uses for his studies. Be mindful of privacy: He should not share
personal information unnecessarily

5A) No, you should not believe an email stating that you won an iPhone and you should not respond to it:

chapter: 3 computational and algorithmic Thinking


E)

1A) Typically, algorithms are executed by computers, but we also rely on algorithms in our daily
lives. Each time we follow a particular step-by-step process, like making coffee in the morning
or tying our shoelaces, we are in fact following an algorithm.

2A) step 1) pick up your bag

step 2) open your bag


step 3) write an algorithm to prepare your school bag according to the timetable
step 4) close your bag
step 5) stop

3A) Breaking down complex problems into smaller, manageable steps is crucial
because it allows for a clearer understanding of the issue, reduces overwhelm,
enables focused attention on specific parts, and ultimately makes it easier to
develop and implement effective solutions by tackling each component individually
rather than trying to solve everything at once; essentially, it simplifies the problem-
solving process and increases the likelihood of success

4A) Searching algorithms can help you locate data for retrieval, modification, or verification.
For example, you can use a searching algorithm to find a name in a phone book, a number in a
sorted array, a path in a maze, or a keyword in a document.

5A) Decomposition. involves breaking down a complex problem or system into smaller parts
that are more manageable and easier to understand. The smaller parts can then be examined
and solved, or designed, individually, as they are simpler to work with. If a problem is not
decomposed, it is much harder to solve.
Chapter 4: App Development

D)

1A) A banking app is a mobile application where users can access their bank account,
complete transactions right from their mobile devices, check balance, view payment history,
etc.

2A) Hybrid apps are mobile apps that combine elements of both native and web apps. They are
useful because they offer a number of benefits, Hybrid apps can be used on multiple
platforms, such as Android, iOS, and Windows, without the need to create separate code for
each platform.

3A) Web applications require an Internet connection and use a web browser as a runtime
environment. On the other hand, desktop applications are installed on a computer and run
locally.

4A) A native app is any app that can be downloaded and live on your device; it
functions as a stand-alone program and often accesses different features of
your device to work. Even if products or programs can be accessed online as
web apps (e.g. a social media platform), native apps aren’t just copies of the
website. They have to be independently developed.

5A) MIT App Inventor is a free, cloud-based tool that allows users to create apps for smartphones and
tablets using a visual programming language

You might also like