Forms and Reports Class 8 Chapter 5
Internet Safety Quiz - answers, talking points & resources 1. C — don’t write your passwords down or use the same for each account, as this increases the chance of being hacked. Instead, choose a unique memorable phrase, and if possible add a special character or number and mixture of cases - for example ‘Reddocmartens100”. 2. B and D — talk to a parent/carer before uploading videos of you or your friends to check the content won’t put you at risk. Check with the people in the video as well - as you would like to be asked if someone was uploading a video of you. 3. C — downloading videos illegally can often put malware on your computer. You’re also breaking the law, and your IP address can be tracked even if you are in ‘Incognito’ mode, meaning your location, operating system and browser are still visible! 4. B — even if you know what someone looks like, they may not be who they say they are, which could put you at risk. A trusted adult will be able to give you advice to help you stay safe. 5. D — stay as anonymous as possible online, particularly when using public-facing accounts. You should always set your profile to ‘private’ if possible so only your friends can see your posts. 6. D — if a revealing photo of you is shared online, it can be almost impossible to delete, and could lead to you being blackmailed or bullied. 7. B, D and E — if something like this happens to you or a friend, don’t panic — you’re not alone and there are steps that can be taken to minimise the effects. Tell a trusted adult or parent/carer — it might be a difficult conversation but their main concern will be keeping you safe. You should also report the photo to any social network it is posted. Although sending an explicit picture of someone under 16 is illegal, the law is meant to protect people who are victims of having their photo shared online, not get them in trouble.
8. B, D and E — speak to a trusted adult, who will be able to support you in taking steps such as speaking with your school or reporting the abuse to the social media site. You will most likely feel better if you walk away from the situation rather than retaliate. Remember it’s not your fault and anyone can be a victim of cyberbullying. 9. C — if you’re ever unsure about whether your phone is sharing your location, ask a trusted adult for help.
Forms and Reports Class 8 Chapter 5
Q1. What is a form? List its uses.
Ans1. A form is a database object that provides a user friendly interface for interacting with data allowing users to enter, change and view the data in a database.
Uses of forms-
1. Data input and editing
2. Data viewing
3. Data validation
4. User interface
Q2. How can you create a customized form?
ANS- We can create a customized form in the following ways-
1. Using form wizard
2. Using the design view
This view provides more advanced customization options including adding new controls and setting the properties.
Q3.What are reports? What are they used for?
Ans- Report is a database object. It is used to view and summerize the data in a printable format.
Q4. What is the purpose of the record navigation bar?
ANS- The record navigation bar shows the number of records in a table. It provides numeraous navigation buttons to view the records. This record navigation bar is used to open a new blank record button.
Q5. Describe how M S Access is useful in filling and analysing the data.
Ans- M S Acess has many features for data management including data entry, querying and reporting. It is useful for both filling and analyzing. It allows users to structure data effectively, retrieve specific information through queries and generate reports for analysis.
A. Fill in the blanks
1. Form
2. Record navigation bar
3. Double click
4. Create
5. Report wizard
B. Stat True or False
1. False
2 True
3. False
4. False
5. True
Comments
Post a Comment