Thursday, March 19, 2026

8.1 Network and Digital Citizenship

 ๐Ÿ“˜  Notes



Communication & Computer Network

  • Communication – Process of sharing ideas, information, feelings between sender and receiver.
  • Computer Network – Collection of computers/devices connected to share data, hardware, software, and information.
  • Need for Network – Resource sharing saves time and money.
  • Data Sharing – Authorized users can access shared databases/files.
  • Hardware Sharing – Devices like printers can be shared across network.
  • Software Sharing – Programs stored centrally can be accessed by multiple users.
  • Electronic Funds Transfer (EFT) – Transfer of money via credit/debit cards, online banking.

Network Components

  • Sender – Device that initiates data transfer.
  • Receiver – Device that receives data.
  • Communication Channel – Medium (cables, microwave, satellites).
  • Protocol – Rules for communication between devices.
  • Server – Powerful computer managing files/resources.
  • Workstation/Peer – Less powerful computers connected to server.

Types of Networks

  • LAN (Local Area Network) – Small area (home, school, office).
  • MAN (Metropolitan Area Network) – Connects LANs across a city/town.
  • WAN (Wide Area Network) – Large area, country/world; Internet is the largest WAN.
  • PAN (Personal Area Network) – Connects personal devices (phones, laptops) via Bluetooth/Wi-Fi.

Network Hardware

  • Computer – Core device in a network.
  • NIC (Network Interface Card) – Provides network access to devices.
  • Hub – Central connection point for cables; broadcasts data to all.
  • Switch – Forwards data to specific destination; more efficient than hub.
  • Router – Connects multiple networks (e.g., LAN to Internet).
  • Cables – Twisted pair, coaxial, fiber-optic.
  • Resource – Any part of system (disk, printer, memory) usable by programs.

Communication Channels

  • Physical Media – Twisted pair, coaxial, fiber-optic cables.
  • Wireless Media – Infrared, broadcast radio, Wi-Fi, cellular radio, microwave, satellites.

Network Architecture

  • Peer-to-Peer Network – All computers equal; best for small networks.
  • Client/Server Network – Server provides resources; clients request services.
    • File Server – Stores files.
    • Print Server – Manages printers.
    • Database Server – Stores databases.
    • Network Server – Manages traffic.
    • Web Server – Delivers web pages.

Network Topology

  • Bus Topology – All devices connected to single cable; linear.
  • Star Topology – Hub at center; easy to add/remove nodes.
  • Ring Topology – Devices connected in circular chain; failure of one affects all.

Protocols

  • HTTP – Transfers web pages.
  • FTP – Upload/download files.
  • TCP/IP – Standard for Internet communication.
  • POP3 – Downloads emails from server (removed after download).
  • IMAP – Access emails directly on server (available across devices).
  • SMTP – Sends emails across Internet.

Digital Citizenship

  • Definition – Responsible and ethical use of technology.
  • Guidelines:
    • Treat others with respect online.
    • Avoid cyberbullying, hate speech, harassment.
    • Protect personal information and privacy.
    • Use strong passwords/security.
    • Respect copyright and intellectual property.


7.1 Number System (Decimal Binary Octal Hexadecimal)

๐Ÿ“– Notes



1. Number System

  • A way to represent numbers in computers.
  • Two types:
    • Non‑positional: Symbols have fixed values regardless of position (e.g., tally marks, Roman numerals).
    • Positional: Value depends on position (decimal, binary, octal, hexadecimal).

2. Decimal Number System (Base 10)

  • Uses digits 0–9.
  • Place values: powers of 10 (units, tens, hundreds…).
  • Example: (123 = 1 x 100 + 2 x 10 + 3 x 1).

3. Binary Number System (Base 2)

  • Uses digits 0 and 1.
  • Place values: powers of 2 (1, 2, 4, 8…).
  • Example: (1001_2 = 8 + 1 = 9_{10}).
  • Bit: Smallest unit (0 or 1).
  • Byte: 8 bits grouped together.
  • Nibble: 4 bits (half a byte).

4. Octal Number System (Base 8)

  • Digits: 0–7.
  • Place values: powers of 8.
  • Each octal digit = 3 binary digits.
  • Example: (112_8 = 74_{10}).

5. Hexadecimal Number System (Base 16)

  • Digits: 0–9 and A–F (A=10, B=11, C=12, D=13, E=14, F=15).
  • Each hex digit = 4 binary digits.
  • Compact way to represent binary.
  • Example: (4F_{16} = 79_{10}).

6. Conversions

  • Decimal → Binary: Divide by 2, record remainders.
  • Binary → Decimal: Multiply digits by powers of 2, add results.
  • Decimal → Octal: Divide by 8, record remainders.
  • Decimal → Hexadecimal: Divide by 16, record remainders.
  • Binary ↔ Octal/Hex: Group bits (3 for octal, 4 for hex).

7. Important Rules

  • Binary numbers: only 0 or 1.
  • Octal numbers: digits 0–7.
  • Hexadecimal numbers: digits 0–9, A–F.
  • Last binary digit = parity check (0 = even, 1 = odd).
  • Zero power rule: any number raised to power 0 = 1.


6.1 Malware - Threat to computers

 

Notes



๐Ÿฆ  Malware

  • Definition: Malicious software that acts without user’s knowledge and alters computer operations.
  • Payload: The destructive event malware is designed to deliver.
  • Symptoms: Slow performance, full storage, unusual messages, system property changes, unexpected shutdowns.

๐Ÿงฉ Types of Malware

  • Virus: Program written to damage data; attaches to files and activates on certain events.
  • Worm: Self-replicating malware that consumes system resources.
  • Trojan Horse: Disguised as a friendly program but destroys data.
  • Rootkit: Hides in a computer, allows remote control.
  • Logic Bomb: Dormant until triggered by a specific date/event.
  • Adware: Displays unwanted ads, may lead to infected sites.
  • Spyware: Secretly collects user information.
  • Keyloggers: Record keystrokes to steal sensitive data.
  • Ransomware: Locks system and demands payment to restore access.

๐Ÿงฌ Types of Viruses

  • File Infector: Infects program files, spreads when executed.
  • Boot Sector Virus: Attaches to boot sector, very dangerous.
  • Macro Virus: Infects files with macros (automated tasks).
  • E-mail Virus: Spreads via infected email attachments.
  • Executable File Virus: Infects executable (.exe) files.

Examples:

  • Sweeper: Fake antivirus that changes system files.
  • Sleeper: Steals personal/financial info, targets large networks.
  • Alabama: Infects executable files, manipulates file names.

๐Ÿ“ฅ Sources of Viruses

  • E-mail attachments
  • Internet downloads
  • Software distribution via infected media

๐Ÿ›ก️ Antivirus Programs

  • Definition: Detect and remove viruses; use virus signatures (patterns of virus code).
  • Working: Infected files are removed or quarantined (isolated).
  • Virus Hoax: Fake warnings about non-existent viruses.

Popular Antivirus Software: Norton, McAfee, Kaspersky, AVG, TotalAV, Quick Heal.


⚠️ Precautions Against Malware

  • Do not boot with removable media inserted.
  • Avoid opening unexpected email attachments.
  • Verify attachments even from known contacts.
  • Delete suspicious messages.
  • Never share sensitive data via email.
  • Download only from trusted websites.
  • Install and update antivirus regularly.
  • Scan all downloads before use.



Monday, February 16, 2026

Class 6 - Cloud Computing (Notes and Exercise work)


Class Notes: Cloud Computing

1. What is Cloud Computing?

Imagine you want to play a video game, but you don't have a console at home. Instead, you go to a gaming zone and pay to play for one hour. You use their console, their electricity, and their TV.

Cloud Computing is similar.

  • It means using computer services over the Internet.

  • Instead of storing files or running programs on your own computer's hard drive, you access them online.

  • The "Cloud" is just a name for huge servers (powerful computers) connected to the Internet.

2. Key Features of Cloud Computing

Here are the main characteristics that make the Cloud special:

  • On-Demand: You can get service whenever you need it. It is like turning on a light switch.

  • Access Anywhere: You can open your files from a phone, a tablet, or a laptop. You just need the Internet.

  • Pay-as-you-go: You only pay for what you use. If you use less, you pay less.

  • Easy Scaling: If you need more space to save photos, you can get it instantly. You don't need to buy a new computer.

3. Types of Cloud Computing

There are three main ways to use the cloud. Think of it like transportation:

  • Public Cloud (Like a Bus):

    • Many people use it at the same time.

    • It is cheaper and owned by a service provider (like Google or Microsoft).

    • Example: Gmail or Google Drive.

  • Private Cloud (Like a Personal Car):

    • This cloud is used by only one person or one company.

    • It is very secure but can be expensive.

    • Example: A bank storing secret financial data.

  • Hybrid Cloud (Like a Taxi):

    • This is a mix of both Public and Private clouds.

    • You use the public cloud for simple things and the private cloud for secret things.

4. Advantages of Cloud Computing

Why is everyone using the Cloud?

  • Saves Money: You do not need to buy expensive computers or software.

  • Data Backup: If you lose your laptop, your data is still safe in the cloud.

  • Collaboration: Multiple students can work on the same project at the same time (like on Google Docs).

  • Unlimited Storage: You can store huge amounts of data without worrying about your hard drive getting full.


Exercise work 
A. Tick the correct (M.C.Qs)
1. a) Cloud Computing
2. b) Services 
3. c) Resource Pooling
4. a)Google Drive 

B. Fill in the blanks - 
1. Hybrid
2. Pay-per-use
3. cloud storage
4. trash
5. sign out / log out

C. True /False
1. True
2. True
3. True
4. False
5. False

D. Define the following -

1. IaaS (Infrastructure as a Service)

  • Full Form: Infrastructure as a Service.

  • Definition: This is like renting the "raw materials" of a computer. You rent the servers and storage space over the Internet, but you have to manage the software yourself.

  • Who uses it? Mostly IT experts and network administrators.

  • Simple Example: Microsoft Azure or Amazon Web Services (AWS).

2. PaaS (Platform as a Service)

  • Full Form: Platform as a Service.

  • Definition: This provides a platform (a playground) for creators. It gives you the tools and space you need to build and test your own software or apps without worrying about the hardware.

  • Who uses it? Software developers and coders.

  • Simple Example: Google App Engine (used to build apps).

3. SaaS (Software as a Service)

  • Full Form: Software as a Service.

  • Definition: This is ready-to-use software. You just open your web browser and use the app. You do not need to install anything on your computer.

  • Who uses it? Everyone (End Users like you and me).

  • Simple Example: Gmail, Google Drive, or Zoom.


E. Differentiate between the following - 

Public CloudPrivate Cloud

It is owned by a service provider (like Google or Microsoft).It is owned by a single company or organization.

It is shared by many different people and companies.It is used only by one specific organization.

Cheaper. You do not need to buy servers. You just pay a monthly fee.Expensive. You have to buy and maintain your own hardware.

It is secure, but your data is on a shared server.It is very secure because no one else has access to it.

Eg. YouTube or Gmail. Anyone can sign up and use it.Eg. A Bank's Database. Only bank employees can access the customer details.

F. Answer the following in 1-2 sentences: -

1. What do you mean by cloud computing?
Ans - Cloud computing means using the Internet to store and access your data and programs instead of keeping them on your computer's hard drive. It allows you to use computing services like storage and software online, accessing them from anywhere in the world.
2. What are Service Providers?

Ans - Service providers are the companies, like Google or Microsoft, that own and manage the huge cloud servers. They offer services like storage and software to us over the Internet so we do not have to buy expensive equipment.

3. What is Google Drive?

Ans - Google Drive is a cloud storage service that allows you to save your documents, photos, and videos online. It lets you open and edit your files from any computer or phone that is connected to the Internet.


G. Answer briefly - 

1. Write any three advantages of cloud computing?

  1. Cost Saving: You save money because you do not need to buy expensive computers or hard drives.

  2. Access Anywhere: You can open your work from any place and any device (like a phone or tablet) using the Internet.

  3. Data Backup: Your files are safe in the cloud, so you won’t lose them even if your computer breaks or gets lost.

    2. What are the characteristics of cloud computing? 

    three main characteristics of cloud computing are:

    1. On-Demand Service: You can use cloud services whenever you want, just like turning on a light switch, without waiting for human help.1

    2. Resource Pooling: The service provider shares the same huge computing resources (like storage and processing power) among many different people at the same time.2

    3. Easy Scalability: You can easily increase or decrease your storage space or computing power instantly depending on your needs.3



    H. Application based question -
    Ans - Riya can use cloud storage service such Google Drive to upload her project on 'States of India' and share a link with her teacher online.



 

#1 What is CLP?

What is Computer Literacy Program?

In today’s digital era, being able to use a computer is no longer a luxury—it’s a necessity. Whether it’s sending an email, preparing a report, analysing data, or connecting with people across the world, computers are at the heart of almost everything we do. This is where Computer Literacy Programs (CLPs) come into play. They are designed to empower individuals with the knowledge and skills needed to confidently use computers and digital technologies in daily life.

Understanding Computer Literacy

Computer literacy means having the essential skills to use computer systems and applications efficiently. It’s not just about switching on a device or typing a document—it involves understanding how computers work, navigating software, managing files, using the internet responsibly, and applying technology for learning and productivity.

In simpler terms, computer literacy is to the 21st century what reading and writing were to the past centuries—a fundamental skill for participation in society.

Purpose of a Computer Literacy Program

A Computer Literacy Program (CLP) aims to bridge the gap between technology and people. It ensures that individuals, regardless of their background, gain practical knowledge of computers. The primary objectives include:

Basic Understanding: Familiarising learners with computer components, operating systems, and basic functions.

Application Skills: Teaching essential tools like word processing, spreadsheets, and presentations.

Internet Awareness: Understanding safe browsing, online communication, and digital ethics.

Empowerment: Enabling students, teachers, and professionals to use technology for education, employment, and innovation.


Key Components of a Computer Literacy Program

A well-designed CLP covers:

1. Introduction to Computers: Basic parts, hardware, software, and storage devices.


2. Operating Systems: Learning to use Windows or Linux environments.


3. Office Applications: Word, Excel, PowerPoint, and similar tools.


4. Internet and Email: Browsing, searching, and communicating online effectively.


5. Cyber Safety and Ethics: Awareness about privacy, data protection, and responsible use.


6. Practical Projects: Hands-on exercises that apply learning to real-life scenarios.



Importance in Modern Education

In schools, computer literacy programs prepare students for the digital future. They nurture logical thinking, creativity, and problem-solving abilities. For teachers, CLPs enhance teaching efficiency through smart classrooms, digital tools, and online resources. Beyond education, such programs play a crucial role in national development—helping citizens access e-governance, online banking, and digital marketplaces.

The Indian Context

India’s initiatives like Digital India and PMGDISHA (Pradhan Mantri Gramin Digital Saksharta Abhiyan) have made computer literacy a national priority. These programs aim to make at least one person in every household digitally literate, ensuring inclusive growth in rural and urban areas alike.

Conclusion

A Computer Literacy Program is more than just a course—it’s a gateway to opportunity. It empowers individuals to participate effectively in the digital world, enhances employability, and promotes lifelong learning. In essence, it transforms users from being mere consumers of technology into confident and capable digital citizens.

Written by:
ฯ€n2

Sunday, February 8, 2026

Class 6 - Introduction to Python



Class Notes: Introduction to Python

1. Basic Computer Terms

Before we learn Python, we must understand a few computer words:

  • Instruction: An instruction is a single command given to a computer to do a specific task.

  • Program: A program is a set of instructions given to a computer to solve a problem. It is like a recipe for the computer to follow.

  • Programming Language: Just like we use English or Hindi to talk to each other, we use a "Programming Language" to talk to a computer.

2. What is Python?

  • Definition: Python is a popular, high-level programming language. It is very easy to read and write.

  • Developer: It was developed by Guido van Rossum.

  • Year: It was released in the year 1991.

  • Why the name "Python"? It is not named after the snake. Guido van Rossum named it after a famous British comedy show called "Monty Python’s Flying Circus" because he wanted a name that was unique and mysterious.

3. Features of Python

Why do students and experts love Python?

  • Easy to Learn: It uses simple English words.

  • Free: It is free to download and use.

  • Case Sensitive: Python treats uppercase (A) and lowercase (a) letters as different.

  • Interpreted Language: It runs the code line-by-line.

4. Python IDLE

  • IDLE stands for Integrated Development and Learning Environment.

  • It is the standard software that comes with Python where we write and run our programs.

Working Modes in Python

There are two ways to work in IDLE:

  1. Interactive Mode:

    • You type a command and press Enter.

    • Python gives the result immediately.

    • It is good for testing small lines of code.

    • The prompt looks like this: >>>

  2. Script Mode:

    • You write the whole program in a file and save it.

    • Then you run the file to see the result.

    • It is used for writing long programs.

5. Compiler vs. Interpreter

Computers only understand machine language (0s and 1s). We need a translator to convert our Python code into machine language.

  • Compiler: It translates the whole program at once into machine language. If there are errors, it shows them all at the end.

  • Interpreter: It translates the program line-by-line. If there is an error in one line, it stops immediately. Python uses an Interpreter.

6. Tokens

A Token is the smallest unit in a program. It is like a "word" or "punctuation mark" in a sentence.

Types of Tokens:

  1. Identifiers:

    • These are names given to parts of the program, like variables or functions.

    • Example: my_name, age, total.

  2. Literals:

    • These are fixed values or data.

    • Example: 10 (Number literal), "Hello" (String literal).

  3. Delimiters:

    • These are special symbols used to separate or organize code.

    • Example: ( ), [ ], { }, , (comma), : (colon).

7. Data Types

A data type tells Python what kind of value we are using.

  • int (Integer): Used for whole numbers. Example: 5, 100, -20.

  • float: Used for numbers with decimal points. Example: 5.5, 3.14.

  • str (String): Used for text. It must be inside quotes. Example: "Hello", 'Apple'.

8. Comments

  • Comments are notes for the programmer.

  • The computer ignores them; it does not run them.

  • In Python, a comment starts with the hash symbol #.

    • Example: # This is a comment

9. Variables

  • A variable is like a container or a box used to store data.

  • Initializing a Variable: This means creating a variable and putting a value in it.

    • Syntax: Variable_Name = Value

    • Example: age = 12 (Here, age is the variable and 12 is the value).

10. Important Functions

  1. print(): It displays the output on the screen.

    • Example: print("Hello World")

  2. input(): It takes information from the user (keyboard).

    • Example: name = input("Enter your name: ")

  3. int(): It converts a string (text) or number into an integer. It is often used with input to take numbers.

    • Example: age = int(input("Enter your age: "))


Exercise Work

In Python, understanding these three components is like learning the grammar and punctuation of a new language. Here is a breakdown of what they are and how they function.


D. Define the following - 

1. Token

A token is the smallest individual unit in a Python program. When you run your code, the Python interpreter breaks the lines of text into these basic logical components to understand what you want it to do.

2. Operator

An operator is a special symbol or keyword used to perform computations or logical operations on data (called operands).

3. Comments

Comments are notes written by the programmer to explain what the code is doing. Most importantly, Python completely ignores them during execution. They are strictly for humans.

E. Differentiate between the following - 


KeywordsLiterals

Reserved words that have a special, predefined meaning to the Python interpreter.Notations for representing fixed, constant values in source code.

Used to define the structure, flow, and logic of the code (commands).Used to provide specific data values to the program.

Immutable. You cannot change their meaning or use them as variable names.Constant. The value 5 always means the number 5, but you can assign it to different variables.

F. Answer in 1-2 sentences.

Here are the answers:

1. Who developed Python and when?

Python was developed by Guido van Rossum and was first released in 1991.

2. What do you mean by identifier?

An identifier is a user-defined name given to entities like variables, functions, classes, or modules to distinguish them from one another in the code.

Here are the answers:

3. What are variables?

A variable is a named location in a computer's memory used to store data that can be changed during the program's execution. Think of it as a labeled container for values (e.g., in score = 10, score is the variable).

4. What do you understand by indentation?

Indentation refers to the leading whitespace (spaces or tabs) at the start of a line of code. Python uses indentation to define the structure and nesting of code blocks.

G. Answer briefly -

Ans 1. Python Data Types

  • Integer (int): Represents whole numbers (positive, negative, or zero) without any decimal points.

    • Example: 10, -5, 0

  • Float (float): Represents real numbers that contain a decimal point.

    • Example: 3.14, -0.01, 2.0

  • String (str): Represents a sequence of characters (text) enclosed in single (') or double (") quotes.

    • Example: "Hello", 'Python', "123" (Note: "123" is text, not a number)

  • Boolean (bool): Represents one of two logical values: True or False. It is often used in conditional testing.

    • Example: True, False (Note: Capital 'T' and 'F' are required)

2. input() and print() Functions

  • input(): This function allows the program to accept data from the user through the keyboard. It pauses program execution until the user types something and hits Enter.

    •  It always reads the data as a String, even if the user types a number.

    • Syntax: variable = input("Prompt text")

  • print(): This function displays data (variables, strings, numbers) to the screen (standard output). It is used to show the result of a program to the user.

    • Syntax: print("Result:", variable)


Saturday, November 8, 2025

Class 6- Internet Services - Introduction, Notes and Exercise Work

Internet services are the backbone of our digital life, transforming the Internet from a vast network of computers into a vibrant space where information, communication, and everyday activities flow seamlessly. These services allow people to exchange messages instantly through email and chat, hold real-time face-to-face conversations using video conferencing, and explore information through powerful search engines. They make tasks easier by enabling online shopping, digital banking, and cloud storage, which let users access files from anywhere. Even entertainment has expanded through online gaming and streaming platforms. Each service plays a specific role, but together they create a connected world where learning, communication, and daily work happen smoothly and efficiently across distances.


Notes -
Wi-fi - Wireless Fidelity
Modem - Modulator and Demodulator
E-mail- Electronic Mail
COD- Cash on delivery
 
Hotspot - A location providing Internet access. 
Tethering - Sharing mobile data with other devices.
Microblog - A Short post based blogging platform (e.g. Twitter Now Called X) 
 
HTTP: Hypertext Transfer Protocol (NO Encryption) not safe.
HTTPS: Hypertext Transfer Protocol Secure (With Encryption) safe to use.
 
Credit Card:  Borrowed Money from bank.
Debit Card:  Direct deduction from bank account.
Cash on Delivery: Pay after product delivery. 
 
Exercise Work
A. Multiple Choice Ques.
1. C2C
2. Online Catalog
3. Secure Web
4. Flipkart
5. Website 
 
B. True/False
1. True
2. False
3. True
4. False
5. True 
 
C. Fill in the blanks -
1. m-commerce
2. Wi-fi
3. e-commerce
4. lock icon
5. blogosphere
 
D. Define the following -
1. E-wallet : An e-wallet (electronic wallet) is a digital payment system that store user's money and payment information for making online transaction easily. 
Example - Paytm, Phone Pe
 
2. Net-Banking: Net banking (online banking) is a service provided by banks that allows customers to perform financial transactions through the internet such as money transfer, balance enquiry and bill payment.  

E. Differentiate between the following - 
B2B (Business to Business) : Involves online transactions between two businesses. Usually deals in bulk quantities. Example - A manufacture selling parts to a retailer.

B2C(Business to Consumer): Involves online transactions between businesses and consumers.Usually deals in smaller retail quantities.
Example - Flipkart or Amazon selling goods to customers.  

F. Answer in 1-2 sentences - 
1. What do you mean by e-commerce?
E-commerce refers to buying and selling of goods and services over the internet using electronic devices.

2. What do you mean by blogging?
Blogging is the process of writing and maintaining online journal or website that shares information ideas or experiences regularly. 
 
G. Answer briefly -
1. What are the advantages of e-commerce?
  • It allows customers to shop 24 x 7 from anywhere.
  • Save time and travel cost.
  • Provides a wider range of products to choose from
  • Enable easy price comparison and online payment.
2. What is the use of video conferencing?
Video conferencing allows people in different locations to commerce face-to-face through the internet using video and audio. It is widely used for online meeting, virtual classes and interviews.  
 
3. What is a blog? Write down any one use of it.
A blog is a regularly updated website that contains articles , post or opinions written by individual or group.
USE: Blogs can be used to share knowledge, news or promote business.
 
H. Application-Based Question -
Riya can use to 'Cash on Delivery' (COD) mode for payment. 

8.1 Network and Digital Citizenship

 ๐Ÿ“˜  Notes Communication & Computer Network Communication – Process of sharing ideas, information, feelings between sender and recei...