Posts

Showing posts from November, 2025

m s excel class ix practical

Image
 

HTML CODE PRACTICE AND PREPARATION FOR EXAMINATION-

  HTML CODE PRACTICE AND PREPARATION FOR EXAMINATION- 1.        AUDIO AND VIDEO 2.        ORDERED LIST AND UNORDERED LIST 3.        NESTED LIST 4.        TABLE 5.        SUBSCRIPT AND SUPERSCRIPT 6.        INTERNAL CSS 7.        INSERTING IMAGE 8.        COMMENT 9.        MCQ’S 10.    CASE STUDY BASED QUESTIONS

cyber bullying and cyber stalking

 Q1  What is cyber bullying and cyber stalking ?   Harassing, demeaning, embarrassing, defaming or intimidating someone using modern technologies like Internet, cell phones, instant messengers, social networks etc., is called Cyber Bullying. Cyber stalking refers to online stalking where someone uses Internet, chat rooms, social networking sites, emails etc. to stalk his/her victim. Cyber stalker follows the victim online everywhere and keeps posting/sending something which are unsolicited. Q2 What is cyber crime ? How can you report it ? Any criminal offence that is facilitated by, or involves the use of, electronic communications or information systems, including any electronic device, computer, or the Internet is referred to as Cyber crime. A cyber crime can be reported in the following ways: 1.    The local police stations can be approached for filing complaints with the cyber crime cells specially designated with the jurisdiction to register complaint. 2....

CLASS 8 CHAPTER 9 Website Designing: Tables

Image
            Website Designing: Tables A.                       Fill in the blanks with the help of the given words. 1.           The tag to start a table is <table> 2.           The caption tag is used to give the title to a table. 3.           Width attribute of <table> tag specifies the width of a table by using either a percentage value or a pixel. 4.           <th>….</th> tag gives a column heading in a table. 5.           Cellpadding is an attribute of the <table> tag to set the distance between the cell content and the boundary. B. Tick the correct answer. 1. ...

HTML PRACTICALS- TABLE 7 NOV 2025

Image
 PRACTICE THE FOLLOWING HTML CODE:-

CLASS IX M S WORD PRACTICAL & CYBER SAFETY MCQ PRACTICE

Image
  cyber safety quizzes https://edu.gcfglobal.org/en/internetsafety/internet-safety-quiz/1/ https://kidsnetguard.com/en/cyber-quiz/ https://test.sanfoundry.com/cyber-security-tests/ https://www.troupisd.org/apps/form/form.TROI.s2zF40E.2jb

CLASS VIII CHAPTER 8 COMPUTER MALWARE

Image
  CLASS VIII COMPUTER MALWARE A.     Fill in the blanks with the help of the given words. 1.      SPYWARE .. is a program that is put in someone’s computer, to secretly gather information about the user and spread it to those with harmful intentions. 2.      ……VIRUS…………. infects Microsoft Word or Microsoft applications that provide support for Macros (a sequence of steps). 3.      … WORMS………… infect and multiply without targeting and infecting specific files already present on the computer. 4.      …HACKER ….tries to break into your computer system to get information or destroy it. 5.      … ANTIVIRUS ………………software are used to detect, prevent and remove malware. B.      Tick ( √ ) the correct answer. 1.      The action which a virus performs on the computer is called… payload …… 2.      Da...