Unit 3 Ict Skills (Imp QNS)

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 25

Class-10

Basic ICT Skills


Q1. ICT stands for _______________
a. Information and Communication Technology
b. Information and Communication Terminology
c. Information and Common Technology
d. Information to Communication Technology
Ans. a. Information and Communication Technology

Q2. A computer is an _____________ machine


a. mechanical
b. electrical
c. electronic
d. None of the above
Ans. c. electronic

Q3. ICT refers to all the methods, tools, concepts related to


a. storing digital information.
b. recording digital information.
c. sending digital information.
d. All of the above
Ans. d. All of the above

Q4. Which of the following ways are used to record or store information?
a. handwritten on paper
b. written using a typewriter
c. typed in computer
d. All of the above
Ans. d. All of the above

Q5. Physical part of computer is called ___________


a. Hardware
b. Software
c. Shareware
d. None of the above
Ans. a. Hardware

Q6. Which of the following is not computer hardware?


a. RAM
b. Keyboard
c. MS Paint
d. Monitor
Ans. c. MS Paint
Q7. Which of the following is/are examples of software?
a. MS Word
b. MS Excel
c. OpenOffice Calc
d. All of the above
Ans. d. All of the above

Q8. ______ act as an interface between the user and the computer.
a. Operating System
b. Ms Excel
c. Impress
d. Digital Documentation
Ans. a. Operating System

Q9. Software that starts working as soon as we switch on a computer is


a. RAM
b. ROM
c. Operating System
d. None of the above
Ans. c. Operating System

Q10. Hardware would not be able to function without ___________


a. Shareware
b. Freeware
c. Software
d. None of the above
Ans. c. Software

Q11. Which of the following is an output device?


a. Monitor
b. Speaker
c. Printer
d. All of the above
Ans. d. All of the above

Q12. Which of the following are mobile operating system?


a. Apple iOS
b. Android
c. Both of the above
d. None of the above
Ans. c. Both of the above

Q13. BIOS stands for


a. Basic Input/Output System
b. Base Input/Output System
c. Basic Input and Output Systematic
d. None of the above
Ans. a. Basic Input/Output System

Q14. Identify the input device


a. Printer
b. Speaker
c. Mouse
d. Monitor
Ans. c. Mouse

Q15. A __________ is a device used to type text, numbers and commands into the
computer.
a. Mouse
b. Keyboard
c. Joystick
d. None of the above
Ans. b. Keyboard

Q16. Keys labeled from F1 to F12 are __________ keys


a. Input
b. System
c. Function
d. Help
Ans. c. Function

Q17. The function of the F1 key in most programs is to ___________


a. open save as dialog box
b. open help
c. delete a file
d. None of the above
Ans. b. open help

Q18. You use the _______________ key to move the cursor to the beginning of a new
line.
a. Enter
b. Return
c. Both of the above
d. None of the above
Ans. c. Both of the above

Q19. Navigation keys are


a. Arrow Keys
b. Page Up
c. Page down
d. All of the above
Ans. d. All of the above

Q20. When the INSERT key is turned ON, it helps you overwrite characters to
the ______ of the cursor
a. left
b. right
c. both of the above
d. None of the above
Ans. b. right

Q21. DELETE key is used to remove typed text on the _______ side of the cursor.
a. left
b. right
c. both of the above
d. None of the above
Ans. b. right

Q22. Backspace key is used to remove typed text on the _____ side of the cursor.
a. left
b. right
c. Both of the above
d. None of the above
Ans. a. left

Q23. _____________ key opens the start menu.


a. Arrow
b. Ctrl
c. Windows
d. None of the above
Ans. c. Windows

Q24. A _____________ is a device that you can use to move, select and open items on
your computer screen.
a. Mouse
b. Joystick
c. Scanner
d. None of the above
Ans. a. Mouse

Q25. When you click a particular file by mouse, it may gets _______
a. Selected
b. Deselected
c. Both of the above
d. None of the above
Ans. a. Selected

Q26. When you move the item to the new location with the help of mouse. This is
called ________________
a. Move and drop
b. Move and leave
c. Drag and drop
d. None of the above
Ans. c. Drag and drop

Q27.Double-clicking means to quickly click the ______ mouse button twice


a. right
b. left
c. both of the above
d. None of the above
Ans. b. left

Q28. We can ___ a file by mouse by double click on file.


a. Close
b. Save
c. Open
d. Delete
Ans. c. Open

Q29. ______functions is performed by mouse?


a. Click
b. Double Click
c. Drag and Drop
d. All of the above
Ans. d. All of the above

Q30. Prevent others from using your computer by __________


a. using username and password
b. using antivirus
c. using UPS
d. using internet
Ans. a. using username and password

Q31. Electronic files in computer can be ____________


a. Copied
b. Moved
c. Rename
d. All of the above
Ans. d. All of the above

Q32. Each file in computer has _______________


a. Name
b. Extension
c. Both of the above
d. None of the above
Ans. c. Both of the above

Q33. The file name and file name extension are separated by a _______
a. period
b. comma
c. semi colon
d. None of the above
Ans. a. period

Q34. Sneha created a file in Notepad and saved the file by name “hello” so the complete
name of file will be _____________
a. hello.doc
b. hello.docx
c. hello.txt
d. hello.jpg
Ans. c. hello.txt

Q35. The extension of image file is _____________


a. .xls
b. .jpg
c. .doc
d. .docx
Ans. b. .jpg

Q36. A __________ is a location where a group of files can be stored.


a. folder
b. main file
c. super file
d. none of the above
Ans. a. folder

Q37. When a student, Neha, joins a class, the teacher creates a file on the computer to
store Neha’s information, such as name, address, phone number. In which of the
following application, we can store such information?
a. Notepad
b. Wordpad
c. MS Word
d. All of the above
Ans. d. All of the above

Q38. Which of the following is a text editor?


a. MS Excel
b. MS Paint
c. Notepad
d. All of the above
Ans. c. Notepad

Q39. Shortcut to save file is ________________


a. Ctrl + S
b. Ctrl + F1
c. Alt + S
d. None of the above
Ans. a. Ctrl + S

Q40. We need to protect our computer from ____________


a. Air
b. Dust
c. Both of the above
d. None of the above
Ans. b. Dust

Q41. We should avoid _______ to protect our computer/laptop.


a. Eating near computer
b. Keeping a glass of water near computer
c. Dropping laptop
d. All of the above
Ans. d. All of the above

Q42. The CPU has an ______________ to keep it cool.


a. internal fan
b. external fan
c. cooling pipe
d. None of the above
Ans. a. internal fan

Q43. Overcharge your mobile/laptop battery will _______ the battery life.
a. increase
b. decrease
c. no change
d. None of the above
Ans. b. decrease

Q44. Backing up data means to save the information present on your computer on
another device.(T/F)
a. True
b. False
Ans. a. True

Q45. ___________ is used to protect our computer from virus.


a. Worm
b. Anti Spyware
c. Anti virus
d. None of the above
Ans. c. Anti virus

Q46. __________ software, help us to clean up the unnecessary files.


a. Data Cleaner
b. Disk Cleaner
c. Cleaner
d. None of the above
Ans. b. Disk Cleaner

Q47. Unwanted mails are called ______________


a. A-SPAM
b. SPM
c. SPAM
d. N-SPAM
Ans. c. SPAM

Q48. What happens if you plugged in mobile/laptop even after 100% charge?
a. Device will break
b. Device will stop working
c. Device will over heat
d. None of the above
Ans. c. Device will over heat

Q49. Pressing ____________ key opens the Start menu.


a. Windows
b. Alt + Windows
c. Ctrl + Windows
d. None of the above
Ans. a. Windows
Q50. ________ key helps to move the cursor to the beginning of a new line.
a. Ctrl + Home
b. Ctrl + End
c. Enter
d. None of the above
Ans. c. Enter

Q51. Extension of temporary file is ____


a) .tmp
b) .exe
c) .bmp
d) .xls
Ans. a) .tmp

Q52. Press _____ on the keyboard to open Run dialog box.


a. Ctrl + R
b. Alt + R
c. Windows button + R
d. None of the above
Ans. c. Windows button + R

Q53. To open Temp folder type ____________ in Run dialog box.


a. temp%
b. %temp%
c. #temp#
d. Any of the above
Ans. b. %temp%

Q54. A device that monitors and controls incoming and outgoing network traffic based
on user-defined security rules is ________
a. Antivirus
b. Malware
c. Firewall
d. None of the above
Ans. c. Firewall

Q55. Firewall is a _____________________


a. Software
b. Hardware
c. Hardware or Software
d. None of the above
Ans. c. Hardware or Software
Q56. ___________ are small files which are stored on a user’s computer when a user
visit a website on the internet.
a. Image
b. Cookies
c. Firewall
d. None of the above
Ans. b. Cookies

Q57. Identify which of the following is a temporary file?


a. flower.jpg
b. temporary.doc
c. temporary.docx
d. web.tmp
Ans. d. web.tmp

Q58. Cookies are always harmful.(T/F)


a. True
b. False
Ans. b. False

Q59. _______ typically contain information about your visit to the webpage or record
your login information.
a. Cookies
b. Image
c. Firewall
d. None of the above
Ans. a. Cookies

Q60. Press ______ to select all files.


a. Ctrl + S
b. Ctrl + A
c. Ctrl + D
d. Ctrl + P
Ans. b. Ctrl + A

Q61. VIRUS is an acronym for


a. Vital Information Resource Under Seize
b. Vital Information Resource Under Size
c. Vital Information Remark Under Seize
d. Vital Informative Resource Under Seize
Ans. a. Vital Information Resource Under Seize

Q62. A _________ is a software program that attaches itself to other programs and alters
their behavior.
a. Cookie
b. Computer virus
c. Firewall
d. None of the above
Ans. b. Computer virus

Q63. A computer virus can infect only ________


a. Hardware
b. Software
c. Both of the above
d. None of the above
Ans. b. Software

Q64. A computer can get infected with virus by


a. Infected files
b. Infected pen drives
c. Infected file attachment of e-mails
d. All of the above
Ans. d. All of the above

Q65. A computer virus cannot ____


a. infect files on CD or DVD, if they are closed for writing.
b. infect computer hardware like, keyboard, mouse, etc.
c. Both of the above
d. None of the above
Ans. c. Both of the above

Q66. Common signs of a virus attack is/are :


a. Computer runs very slow
b. There is change in the file size
c. Computer restarts on its own
d. All of the above
Ans. d. All of the above

Q67. To prevent virus infection we should


a. Install and use anti-virus software.
b. not open e-mails of an unknown person/sender
c. not allow any untrustworthy person to use your system.
d. All of the above
Ans. d. All of the above

Q68. Which of the following is an Antivirus?


a. Norton AntiVirus
b. Quick Heal
c. McAfee VirusScan
d. All of the above
Ans. d. All of the above

Q69. An anti-virus program can be effective when


a. it run in the background at all times.
b. it is regularly updated
c. it scan full disk periodically
d. All of the above
Ans. d. All of the above

Q70. Characteristics of computer virus is :


a. it makes copies of itself.
b. it makes the system slow.
c. it may get activated at a certain date and time.
d. All of the above
Ans. d. All of the above

Q71. Regular care and maintenance of computer is required


a. to detect any issues at an early stage
b. so that system works efficiently
c. to avoid a condition of System Failure
d. All of the above
Ans. d. All of the above

Q72. Regular maintenance of the system includes


a. installing updates of the software
b. check the security of the system
c. taking backups of important files and documents
d. All of the above
Ans. d. All of the above

Q73. Precaution to be taken while cleaning the computer components are :


a. Power Off the computer before cleaning
b. Never spray cleaning fluid directly on the component of the computer.
c. Both of the above
d. None of the above
Ans. c. Both of the above

Q74. We should never spray any liquid cleaner directly on


a. Keyboard
b. Monitor
c. Mouse
d. All of the above
Ans. d. All of the above

Q75. Disk defragmentation help to


a. remove the virus from the system
b. use the disc space at an optimal level.
c. Both of the above
d. None of the above
Ans. b. use the disc space at an optimal level.

Q76. System Performance can be increased by


a. increasing RAM
b. disk defragmentation
c. Both of the above
d. None of the above
Ans. c. Both of the above

Q77. __________parts of the computer system should be cleaned so that it can work
properly.
a. Internal
b. External
c. Both internal and external
d. None of the above
Ans. c. Both internal and external

Q78. DOS stands for ______________


a. Disk Operating System
b. Dot Operating System
c. Disk Open System
d. Disk Operating Secure
Ans. a. Disk Operating System

Q79. Which of the following is Microsoft Product?


a. DOS
b. Windows
c. Android
d. Linux
Ans. b. Windows

Q80. ________________ operating system is an example of an interactive operating


system.
a. Windows
b. DOS
c. Linux
d. None of the above
Ans. a. Windows

Q81. GUI stands for _______________________


a. Graphical User Interface
b. Graphical User Interaction
c. Graphical User Interactive
d. None of the above
Ans. a. Graphical User Interface

Q82. Which operating system allows only one user to do a task on the computer and one
thing at a time?
a. Single-user, multi-task operating system
b. Single-user , single-task operating system
c. Multi-user
d. None of the above
Ans. b. Single-user , single-task operating system

Q83. Which Operating System is used to control machinery like robots in complex
animations and computer controlled automated machines
a. Real Time
b. Multi-user
c. Single-user, multi-task operating system
d. Distributed
Ans. a. Real Time

Q84. Examples of real-time operating systems is :


a. Windows CE
b. Lynx OS
c. Both of the above
d. None of the above
Ans. c. Both of the above

Q85. Examples of distributed operating systems is


a. Windows
b. Unix
c. Linux
d. All of the above
Ans. d. All of the above

Q86. ___________ operating system enables multiple users to work on the same
computer simultaneously.
a. Single-user , single-task operating system
b. Single-user, multi-task operating system
c. Multi-user
d. None of the above
Ans. c. Multi-user

Q87. Which Operating System enables single user to operate on several programs at the
same time.
a. Single-user, multi-task operating system
b. Multi-user
c. Single-user , single-task operating system
d. Real Time
Ans. a. Single-user, multi-task operating system

Q88. Example of Multi Tasking Operating System is


a. Windows
b. Apple MacOS
c. Both of the above
d. None of the above
Ans. c. Both of the above

Q89. An operating system in which commands can be entered by clicking/double-


clicking/right-clicking a mouse is :
a. GUI-based
b. CUI-based
c. TUI-based
d. None of the above
Ans. a. GUI-based

Q90. Examples of Mobile operating Systems is :


a. Android
b. Symbian
c. iOS
d. All of the above
Ans. d. All of the above

Q91. The first screen that appears on monitor after loading OS is


called ________________
a. Icons
b. Desktop
c. Wall paper
d. None of the above
Ans. b. Desktop

Q92. Small pictures on the desktop are called _______


a. Desktop
b. Symbols
c. Icons
d. Pictures
Ans. c. Icons

Q93. Picture used for the desktop background is called __________


a. Wallpaper
b. Background image
c. Wall image
d. Desktop image
Ans. a. Wallpaper

Q94. Start button is present on _________ side of the Taskbar.


a. right
b. left
c. top
d. bottom
Ans. b. left

Q95. Bar present at the bottom of the desktop is called ____________


a. Status bar
b. Scroll bar
c. Taskbar
d. None of the above
Ans. c. Taskbar

Q96. Components of Windows 7 Desktop is/are :


a. Desktop
b. Wallpaper
c. Taskbar
d. All of the above
Ans. d. All of the above

Q97. Which icon allows user to access all drives, files, and folders on the computer.
a. Recycle Bin
b. Computer
c. Application
d. Start button
Ans. b. Computer

Q98. The main components of Taskbar is/are


a. Start button
b. Active Applications
c. Date/Time icon
d. All of the above
Ans. d. All of the above

Q99. Deleted files and folders are stored in _______________


a. Recycle bin
b. My Computer
c. Control Panel
d. None of the above
Ans. a. Recycle bin

Q100. Everything we store in computer is stored in the form of a __________


a. Folder
b. Sub folder
c. File
d. None of the above
Ans. c. File

Questions ans Answers:


Q1. Mention any three functions of operating system.
Ans. Three functions of operating system are : (Write any three)
1 It checks whether the device is functioning properly or not.
2. It controls software resources of the computer.
3. It manages the computer memory
4. It manages the structure of the files and directories on a computer system.
5. It keeps track of the amount of disk space used by a specific file.
6. It allows you to create, copy, move and delete files

Q2. What is the name given to the screen that appears after Windows operating system is
loaded?
Ans. Desktop

Q3. Small images on the desktop are called _________.Ans. Icons

Q4. Name two common icons on the Desktop .


Ans. Two common icons on the Desktop are
a. Computer Icon
b. Recycle bin

Q5. Name the icon that provides access to all the drives, files and folders on a computer.
Ans. Computer icon provides access to all the drives, files and folders.

Q6. Name the button to the left of the taskbar.


Ans. Start Button
Q7. Picture for the desktop background is called ____________.
Ans. Wallpaper

Q8. Write any four components of Windows 7 Desktop.


Ans. Four components of Windows 7 Desktop are :
a. Taskbar
b. Wallpaper
c. Icons
d. Start Button

Q9. Taskbar is the long horizontal bar present at the ________________ of the screen.
Ans. Bottom

Q10. To left of the Taskbar is the ___________(Start button, Date/Time) and to the right
appears ________________ (Start button, Date/Time)
Ans. Start button, Date/Time

Q11. Files and folders deleted by the user are stored in the _________
Ans. Recycle Bin

Q12. To change the name of the folder, right-click and select _______________option
from the Shortcut menu.
Ans. Rename

Q13. Expand GUI and CUI.


Ans. GUI : Graphical User Interface
CUI : Character User Interface

Q14. Windows Operating System is an example of ______ (GUI / CUI)


Ans. GUI

Q15. Disk Operating System is an example of ___________ (GUI / CUI)


Ans. CUI

Q16. How can you delete a folder?


Ans. To delete a file or a folder:
1. Click the file or the folder.
2. Press the Delete key.
Or
Right-click and select Delete option from the Shortcut menu.

Q17. Name the place where deleted files are placed.


Ans. Recycle Bin
Q18. How can you empty the recycle Bin?
Ans. We can empty the recycle Bin
Right-click the Recycle Bin icon and then
click Empty Recycle Bin.
(OR)
1. Double-click the Recycle Bin icon.
2. The Recycle Bin window appears.
3. Click Empty the Recycle Bin.

Q19. What is the possible cause of slowing down of computer?


Ans. A large number of files are stored on the computer. These files can be
disorganized and fragmented
and may result in slowing down of the computer.

Q20. Why keyboard should be covered if not in use?


Ans. Dirt and dust can cause damage to the keyboard. Keys of the keyboard may not
function properly if dirt enters the keys.

Q21. What general precautions should you take while cleaning the
computer/components?
Ans. General precautions to be taken while cleaning the computer components are:
a. Always Power Off the computer system before cleaning.
b. Do not allow the cleaning liquid to drip near the circuit board.
c. Never spray cleaning fluid directly on the component of the computer. First
spray the liquid on the cloth and then wipe the component.

Q22. List some of the maintenance activities for the computer system.
Ans. Some of the maintenance activities are:
1 Keep the components of the computer, like keyboard, mouse, monitor, etc. clean.
2. Replace hardware that is not functioning properly
3. Keep food items away from the computer.
4. Cables and chords should not be messed up

Q23. Why regular disk defragmentation should be done?


Ans. A regular disk defragmentation should be done to remove all unnecessary
information that slows
down the computer. Disk defragmentation done at regular intervals helps the disc
space to be used
at an optimal level.

Q24. Mention few ways in which a computer gets infected with virus.
Ans. A computer can get infected with virus in any of the following ways:
a. Infected files
b. Infected pen drives
c. Infected CD-ROMs/DVD-ROMs
d. Through infected file attachment of e-mails

Q25. Can computer virus infect hardware?


Ans. No

Q26. What are the common signs of a virus attack?


Ans. Some of the common signs of a virus attack are:
a. Computer runs very slow
b. There is change in the file size.
c. Computer often stops responding.
d. There is an increase in number of files (unusual)
e. Unusual error message appears on the screen.
f. Computer restarts on its own.

Q27. How can you prevent your computer from virus infection?
Ans. To prevent our computer from being infected with virus, we should install
anti-virus software, run it
periodically and keep it updated

Q28. What is the use of antivirus software? Name any two commonly used anti-virus
software.
Ans. Antivirus software is used to detect and remove malicious programs from the
computer.
Some examples of antivirus software are McAfee Virus Scan, Norton AntiVirus,
Microsoft Security essentials, and Quick Heal.

Q29. How are temporary files created in computer?


Ans. Temporary files are created when you are running computer programs.
Microsoft Windows and Windows programs often create a .TMP file as a
temporary file. Temporary files are also created by web browsers to store your web
browser history.

Q30. Why we should remove temporary files from the computer?


Ans. Temporary files take up a large amount of disk space and makes the computer
slow so should be removed to clear space.

Q31. Identify which of the following is a temporary file.


a. Project.docx
b. Mathsite.tmp
Ans. Mathsite.tmp

Q32. How can you select all the files in a folder using the keyboard?
Ans. Press Ctrl + A, to select all the files in the folder.

Q33. Which key combination will you press to get the Run dialog box?
Ans. Press Windows button + R on the keyboard to get the Run dialog box

Q34. What command will you write in the Run dialog box to open the Temp folder?
Ans. %temp%

Q35. What are cookies?


Ans. Cookies are small files which are stored on a user’s computer when you visit a
website on the internet.

Q36. What is a firewall in computing?


Ans. A computer firewall is a network security system that monitors and controls
incoming and outgoing network traffic based on user-defined security rules.
Q1. What do you mean by ICT?
Ans. ICT stands for Information and Communication Technology. ICT refers to all
the tools
related to storing, recording and sending digital information.

Q2. Differentiate between Hardware and Software ?


Ans.
Hardware Software

The physical components that we can It is a set of programs/instructions that


see and touch. perform a specific task

Monitor, Keyboard are examples of MS Paint, MS Word are examples of


Hardware Software.

Q3. What do you mean by Operating System?


Ans. Operating System : It is a software that act as an interface between the user
and the computer.

Q4. Give two examples of mobile operating system.


Ans. Two examples of mobile operating system :
a. Apple iOS
b. Google Android

Q5. Name two operating systems for laptops or desktop.


Ans. Two operating systems for laptops or desktop are:
a. Ubuntu
b. Microsoft Windows
Q6. Identify me
a. I am a physical part of computer.
b. I am a collection of instruction doing specific task.
c. I am the software that starts working as soon as we switch on a computer.
d. I am an input device used to type text, numbers etc
e. I am a small device that you can use to move, select and open items on your
computer screen.

Ans.
a. Hardware
b. Software
c. Operating System
d. Keyboard
e. Mouse

Q7. Expand BIOS?


Ans. BIOS stands for Basic Input/Output System

Q8. What do you mean by Input device? Give two examples.


Ans. Those devices which are used to feed data/command into the computer are
called Input device. for example Keyboard and Mouse.

Q9. What do you mean by drag and drop?


Ans. Moving an item from one location to another with the help of mouse button.
This is called drag and drop.

Q10. Differentiate between files and folder.


Ans.
File Folder

A location where a group of files


A place where information is stored
can
in computer.
be stored.

It has a name and extension both It has only name.

Q11. Write the extension for the following.


a. A Notepad file
b. A Sound File
c. An image file
Ans. Extensions are
a. .txt
b. .mp3
c. .jpg
Q12. The file name and file name extension are separated by a ________________
Ans. dot ( . )
Ans. The steps to create folder on desktop are:
1. Right-click on desktop and then choose the ‘New Folder’.
2. Type the name of the folder.

Q14. Write the shortcut command for the following.


a. Cut
b. Copy
c. Paste
d. Undo
e. Redo
f. Select all
Ans. Shortcut commands are:
a. Cut ———– Ctrl + X
b. Copy ———– Ctrl + C
c. Paste ———– Ctrl + V
d. Undo ———– Ctrl + Z
e. Redo ———– Ctrl + Y
f. Select all ———– Ctrl + A

Q15. Write the basic tips for taking care of Laptop/Desktop.


Ans. Basic tips for taking care of Computer are :
1. Avoid eating anything over a keyboard.
2. Wipe the screen with a soft cloth.
3. Avoid eating or drinking near computer.
4. Handle and move your laptop carefully.

Q16. What do you mean by Data Backup?


Ans. Backing up data means to save the information present on your computer on
another device, such as CD/DVD drives or hard disk.

Q17. What do you mean by Spam?


Ans. We get mails from companies who are advertising a product or trying to
attract you to their website. Such mails are called Spam.

Q18. How can you increase the performance of a computer?


Ans. We can increase the performance of a computer by
a. Using an updated Antivirus Software
b. Removing unnecessary files and data, such as temporary files and images.

Q19. ________________ is leakage of information stored in a computer.


Ans. Security break
Q20. What do you mean by Virus?
Ans. Viruses are computer programs that can damage the data and software
programs or steal the information stored on a computer.

Q21. Name two types of Virus.


Ans. Worms and Trojan Horse

Q22. Differentiate between Worms and Trojan Horse.


Ans.
Worms Trojan

A Trojan Horse seems to be a useful


These are viruses that replicate and
program
spread to all files once they attack a
but once it reaches a computer it starts
computer.
destroying data.

Q23. What do you mean by Online predators?


Ans. Online Predator: Online predators are people who trap you into
inappropriate relationships.

Q24. Write few tips to protect your data from online theft and viruses.
Ans. Few tips to protect our data from online theft and viruses are:
a. Use passwords to login to your computer:
b. Install Anti-virus and Firewall:
c. Use Data Encryption
d. Give details of your credit card or bank account only on secure sites

Q25. What do you mean by threats to Computer?


Ans. Threats are the ways in which personal information can be leaked from a
computer without our knowing.

Q26. List the various threats to a computer and its data.


Ans. The various threats to a computer and its data are:
1 Virus
2. Phishing
3. Online theft
4. Cyber crime
5. Hacking

Q27. __________________ is stealing of software and using of unlicensed and


unauthorized copies of a computer software.
Ans. Software Piracy
Q28. What is ‘s’ in “https”?
Ans. ‘s’ stands for secure.

Q29. Name the encrypting feature of Windows.


Ans. BitLocker

Q30. List the various types of keys available on Keyboard.


Ans. The various types of keys available on Keyboard are :
a. Control keys
b. Function Keys
c. Alphabet Keys
d. Numeric Keys
e. Navigation Keys
Q31. When the ____________ key is turned ON, it helps to overwrite characters to the
right of the cursor.
Ans. INSERT

Q32. Name two keys available on keyboard which are used to remove typed text or
characters.
Ans. Delete and Backspace

Q33. _________ key helps to move the cursor to the beginning of a new line.
Ans. RETURN or ENTER

Q34. Pressing ______________ key opens the Start menu.


Ans. Windows

Q35. Name any two file extensions.


Ans. Two file extensions are :
a) .txt
b) .doc
c) .jpg
d) .xls

You might also like