You are on page 1of 2

CLASS 6TH (NEWTON + EINSTEIN)

1. Write the Shortcut key for the followings: (1) Select next Cell, (2) Jump to the first Cell in a
Row, (3) Create a new Paragraph within a Cell, (4) Insert a tab within a Cell
2. Drag the words into the correct boxes
Insert Left
Layout
Rows & Columns
cell
Insert Right
1. Select the ____________ of the row above and below which we need to insert a new row or to the left or
right we need to insert a column

2a. ____________ tab > ______________ group > Insert Above or Insert Below option.

2b. Layout tab > Rows & Columns group > ________________ or ____________ option.

3. Make yourself a word document on ‘how many gadgets and IT related things’ you used in
this summer vacations.
4. Write down the word file’s tools.
(All the answer should be submitted in word file, bring the printout of it )

CLASS 7TH (NEWTON + EINSTEIN)


1. Convert the Numbers- 59, 100, 62 from Decimal Number to Binary Number.
2. Convert the Numbers- 10011, 1110, 1111 from Binary Number to Decimal Number.
3. Convert the Numbers- 87 & 66 from Decimal Number to Octal Number.
4. Learn and write (2 times) the coding systems in Computer from (page no. 6)
(All the answer should be submitted in word file, bring the printout of it )

CLASS 8TH (NEWTON + EINSTEIN)


5. Drag the words into the correct boxes
trojan
virus
white hat
cyber detective
cybercrime
Hacking
black hat
Spyware
Unauthorised access with the intention of misuse of someone’s personal data is called ______________.
____________ is the process of identifying flaws in a computer system or network to exploit its
weaknesses, if it done with a malicious purpose is called ______________ hacking and, if the hacking is
done to assess the security of a system and inform the authorities to improve upon it, then it is
called ____________ hacking whereas a ____________ is a kind of hacker who uses modern computer
technology to secure different types of information without the consent of the owner of that information. The
____________ is destructive computer program that attaches itself with the computer files by replicating
itself. A _____________ appears to be a useful program but in fact it causes harm _____________
monitors all your activities on the computer as well as your data and transfer it to the external party.

6. Search the Types or names and interesting history of cyber crime and security with the
help of your parents.
7. Learn about various types of cyber frauds here-
https://cybercrime.gov.in/Webform/CyberAware.aspx and write any 3 extraordinary
types with the help of above link.
8. Make yourself a word document on ‘how many gadgets and IT related things’ you used in
this summer vacations.
(All the answer should be submitted in word file, bring the printout of it )
CLASS- 9TH
1. List the main component of Effective Communication.
2. Write the types of communication with an example?
3. List the main components of communication process.
4. Write any four advantages and disadvantages of Written Communication?
(All the answer should be submitted in word file and send it on mail id.
nhlvrm@gmail.com )
CLASS- 10TH
1. Write down the four examples of oral and written communication.
2. Draw a flow chart of the types of communication.
3. Write the different types of non-verbal communication.
4. Draw any five examples of visual communication.
5. Draw a picture based on the complete cycle of communication.
(All the answer should be submitted in word file and send it on mail id.
nhlvrm@gmail.com )

You might also like