0% found this document useful (0 votes)
674 views2 pages

Class 5 Notes

Uploaded by

anika
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
674 views2 pages

Class 5 Notes

Uploaded by

anika
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Chapter 1-More on excel

Q.1 What is cell reference ?


A.1 The cell address is also known as cell reference . With the help of cell reference , we can
find values and data that we want .
Q.2 What are the types of cell references ?
A.2 There are three types- Absolute, relative and mixed.
Q.3 What is relative reference?
A.3 When we create a formula , references to a cell or ranges are usually based on the
position relative to the cell . When we copy the formula to other cells , the cell reference
automatically gets changed . This is called relative reference.
Q.4 What is absolute reference ?
A.4 Absolute reference is used when we don’t want to change the address of the cell while
copying the formula to the other cell.
Q.5 What is mixed reference ?
A.5 It is a combination of relative and absolute reference .
Cyber ethics and security
Chapter 2- Cyber ethics and security

Q.1 What is cyber-crime?


Ans- A cyber-crime is a crime which involves computers and networks. Cyber-crime poses
threats integrity, safety and survival of most business system.
Cyber-crime> piracy, viruses, phishing, hacking, integrity threats, pharming and
miss leading online financial transactions.
Q.2 Define
(1) Phishing- In this attacker tries to find sensitive information of users by the means of
electronic communication illegally.
(2) Pharming- It is more advanced technique to get user’s credentials by making efforts to
enter user’s information into the website.
(3) Hacking- Act of compromising digital devices and networks through unauthorized access
to an account or computer system.
(4) Piracy- It is the unauthorized duplication of copyrighted content that is then sold at
substantially lower rate.
(5) Viruses- These are the instructions that are put in computer program in order to stop it
from working properly or destroy information.

(6) Identity thefts- It is the crime of obtaining personal or financial information of another
person to use their identity to commit fraud.
Q.3 What do you mean by cyber ethics?
Ans- Ethics means “What is right and what is wrong.” In cyber world there are certain
standards such as-
 Do not use pirated software.
 Don’t use unauthorized accounts
 Don’t steal other’s password
 Don’t hack
Q.4 What are some guidelines of ethics?
Ans- Here are some guidelines of ethics-
 Honesty
 Confidentially
 Responsibility
 Respect
 Professionalism
 Obey the law
Q.5 What is encryption and decryption?
Ans- Encryption is the process of translating plain text into cipher text.
Decryption is the reverse process of changing cipher text into plain text.

Chapter 3-Scratch
Q.1 What is scratch ?
Scratch is a simple programming language which is used to create games and animated stories.
Q.2 Who developed scratch ?
A.2 Mitchel Resnick
Q.3 How to save a scratch project ?
A.3 Click on file menu>save > give a name to your project >click on save.
Q.4 What are the main components of scratch ?
A.4 Sprite-It is a small graphic character that performs actions in scratch project.
Stage- It is the main working area where the sprite moves and performs the actions.
Blocks palette-It contains the set of blocks that are used to program the sprite and give instructions to
it.
Script- It is a stepwise collection of instructions which are given to sprite to do a specific task . Script is
also called a program.
Script area- It is a place where we can create a script for a sprite to do a particular task.
Q.5 Label the part of Scratch window .

You might also like