cbse class x Class-10 Basic ICT Skills study material notes
Class-10
Basic ICT Skills
Q1. ICT stands for _______________
a. Information and Communication Technology
b. Information and Communication Terminology
c. Information and Common Technology
d. Information to Communication Technology
Ans. a. Information and Communication Technology
Q2. A computer is an _____________ machine
a. mechanical
b. electrical
c. electronic
d. None of the above
Ans. c. electronic
Q3. ICT refers to all the methods, tools, concepts related to
a. storing digital information.
b. recording digital information.
c. sending digital information.
d. All of the above
Ans. d. All of the above
Q4. Which of the following ways are used to record or store information?
a. handwritten on paper
b. written using a typewriter
c. typed in computer
d. All of the above
Ans. d. All of the above
Q5. Physical part of computer is called ___________
a. Hardware
b. Software
c. Shareware
d. None of the above
Ans. a. Hardware
Q6. Which of the following is not computer hardware?
a. RAM
b. Keyboard
c. MS Paint
d. Monitor
Ans. c. MS Paint
Q7. Which of the following is/are examples of software?
a. MS Word
b. MS Excel
c. OpenOffice Calc
d. All of the above
Ans. d. All of the above
Q8. ______ act as an interface between the user and the computer.
a. Operating System
b. Ms Excel
c. Impress
d. Digital Documentation
Ans. a. Operating System
Q9. Software that starts working as soon as we switch on a computer is
a. RAM
b. ROM
c. Operating System
d. None of the above
Ans. c. Operating System
Q10. Hardware would not be able to function without ___________
a. Shareware
b. Freeware
c. Software
d. None of the above
Ans. c. Software
Q11. Which of the following is an output device?
a. Monitor
b. Speaker
c. Printer
d. All of the above
Ans. d. All of the above
Q12. Which of the following are mobile operating system?
a. Apple iOS
b. Android
c. Both of the above
d. None of the above
Ans. c. Both of the above
Q13. BIOS stands for
a. Basic Input/Output System
b. Base Input/Output System
c. Basic Input and Output Systematic
d. None of the above
Ans. a. Basic Input/Output System
Q14. Identify the input device
a. Printer
b. Speaker
c. Mouse
d. Monitor
Ans. c. Mouse
Q15. A __________ is a device used to type text, numbers and commands into the computer.
a. Mouse
b. Keyboard
c. Joystick
d. None of the above
Ans. b. Keyboard
Q16. Keys labeled from F1 to F12 are __________ keys
a. Input
b. System
c. Function
d. Help
Ans. c. Function
Q17. The function of the F1 key in most programs is to ___________
a. open save as dialog box
b. open help
c. delete a file
d. None of the above
Ans. b. open help
Q18. You use the _______________ key to move the cursor to the beginning of a new line.
a. Enter
b. Return
c. Both of the above
d. None of the above
Ans. c. Both of the above
Q19. Navigation keys are
a. Arrow Keys
b. Page Up
c. Page down
d. All of the above
Ans. d. All of the above
Q20. When the INSERT key is turned ON, it helps you overwrite characters to the ______ of the cursor
a. left
b. right
c. both of the above
d. None of the above
Ans. b. right
Q21. DELETE key is used to remove typed text on the _______ side of the cursor.
a. left
b. right
c. both of the above
d. None of the above
Ans. b. right
Q22. Backspace key is used to remove typed text on the _____ side of the cursor.
a. left
b. right
c. Both of the above
d. None of the above
Ans. a. left
Q23. _____________ key opens the start menu.
a. Arrow
b. Ctrl
c. Windows
d. None of the above
Ans. c. Windows
Q24. A _____________ is a device that you can use to move, select and open items on your computer screen.
a. Mouse
b. Joystick
c. Scanner
d. None of the above
Ans. a. Mouse
Q25. When you click a particular file by mouse, it may gets _______
a. Selected
b. Deselected
c. Both of the above
d. None of the above
Ans. a. Selected
Q26. When you move the item to the new location with the help of mouse. This is called ________________
a. Move and drop
b. Move and leave
c. Drag and drop
d. None of the above
Ans. c. Drag and drop
Q27.Double-clicking means to quickly click the ______ mouse button twice
a. right
b. left
c. both of the above
d. None of the above
Ans. b. left
Q28. We can ___ a file by mouse by double click on file.
a. Close
b. Save
c. Open
d. Delete
Ans. c. Open
Q29. ______functions is performed by mouse?
a. Click
b. Double Click
c. Drag and Drop
d. All of the above
Ans. d. All of the above
Q30. Prevent others from using your computer by __________
a. using username and password
b. using antivirus
c. using UPS
d. using internet
Ans. a. using username and password
Q31. Electronic files in computer can be ____________
a. Copied
b. Moved
c. Rename
d. All of the above
Ans. d. All of the above
Q32. Each file in computer has _______________
a. Name
b. Extension
c. Both of the above
d. None of the above
Ans. c. Both of the above
Q33. The file name and file name extension are separated by a _______
a. period
b. comma
c. semi colon
d. None of the above
Ans. a. period
Q34. Sneha created a file in Notepad and saved the file by name “hello” so the complete name of file will be _____________
a. hello.doc
b. hello.docx
c. hello.txt
d. hello.jpg
Ans. c. hello.txt
Q35. The extension of image file is _____________
a. .xls
b. .jpg
c. .doc
d. .docx
Ans. b. .jpg
Q36. A __________ is a location where a group of files can be stored.
a. folder
b. main file
c. super file
d. none of the above
Ans. a. folder
Q37. When a student, Neha, joins a class, the teacher creates a file on the computer to store Neha’s information, such as name, address, phone number. In which of the following application, we can store such information?
a. Notepad
b. Wordpad
c. MS Word
d. All of the above
Ans. d. All of the above
Q38. Which of the following is a text editor?
a. MS Excel
b. MS Paint
c. Notepad
d. All of the above
Ans. c. Notepad
Q39. Shortcut to save file is ________________
a. Ctrl + S
b. Ctrl + F1
c. Alt + S
d. None of the above
Ans. a. Ctrl + S
Q40. We need to protect our computer from ____________
a. Air
b. Dust
c. Both of the above
d. None of the above
Ans. b. Dust
Q41. We should avoid _______ to protect our computer/laptop.
a. Eating near computer
b. Keeping a glass of water near computer
c. Dropping laptop
d. All of the above
Ans. d. All of the above
Q42. The CPU has an ______________ to keep it cool.
a. internal fan
b. external fan
c. cooling pipe
d. None of the above
Ans. a. internal fan
Q43. Overcharge your mobile/laptop battery will _______ the battery life.
a. increase
b. decrease
c. no change
d. None of the above
Ans. b. decrease
Q44. Backing up data means to save the information present on your computer on another device.(T/F)
a. True
b. False
Ans. a. True
Q45. ___________ is used to protect our computer from virus.
a. Worm
b. Anti Spyware
c. Anti virus
d. None of the above
Ans. c. Anti virus
Q46. __________ software, help us to clean up the unnecessary files.
a. Data Cleaner
b. Disk Cleaner
c. Cleaner
d. None of the above
Ans. b. Disk Cleaner
Q47. Unwanted mails are called ______________
a. A-SPAM
b. SPM
c. SPAM
d. N-SPAM
Ans. c. SPAM
Q48. What happens if you plugged in mobile/laptop even after 100% charge?
a. Device will break
b. Device will stop working
c. Device will over heat
d. None of the above
Ans. c. Device will over heat
Q49. Pressing ____________ key opens the Start menu.
a. Windows
b. Alt + Windows
c. Ctrl + Windows
d. None of the above
Ans. a. Windows
Q50. ________ key helps to move the cursor to the beginning of a new line.
a. Ctrl + Home
b. Ctrl + End
c. Enter
d. None of the above
Ans. c. Enter
Q51. Extension of temporary file is ____
a) .tmp
b) .exe
c) .bmp
d) .xls
Ans. a) .tmp
Q52. Press _____ on the keyboard to open Run dialog box.
a. Ctrl + R
b. Alt + R
c. Windows button + R
d. None of the above
Ans. c. Windows button + R
Q53. To open Temp folder type ____________ in Run dialog box.
a. temp%
b. %temp%
c. #temp#
d. Any of the above
Ans. b. %temp%
Q54. A device that monitors and controls incoming and outgoing network traffic based on user-defined security rules is ________
a. Antivirus
b. Malware
c. Firewall
d. None of the above
Ans. c. Firewall
Q55. Firewall is a _____________________
a. Software
b. Hardware
c. Hardware or Software
d. None of the above
Ans. c. Hardware or Software
Q56. ___________ are small files which are stored on a user’s computer when a user visit a website on the internet.
a. Image
b. Cookies
c. Firewall
d. None of the above
Ans. b. Cookies
Q57. Identify which of the following is a temporary file?
a. flower.jpg
b. temporary.doc
c. temporary.docx
d. web.tmp
Ans. d. web.tmp
Q58. Cookies are always harmful.(T/F)
a. True
b. False
Ans. b. False
Q59. _______ typically contain information about your visit to the webpage or record your login information.
a. Cookies
b. Image
c. Firewall
d. None of the above
Ans. a. Cookies
Q60. Press ______ to select all files.
a. Ctrl + S
b. Ctrl + A
c. Ctrl + D
d. Ctrl + P
Ans. b. Ctrl + A
Q61. VIRUS is an acronym for
a. Vital Information Resource Under Seize
b. Vital Information Resource Under Size
c. Vital Information Remark Under Seize
d. Vital Informative Resource Under Seize
Ans. a. Vital Information Resource Under Seize
Q62. A _________ is a software program that attaches itself to other programs and alters their behavior.
a. Cookie
b. Computer virus
c. Firewall
d. None of the above
Ans. b. Computer virus
Q63. A computer virus can infect only ________
a. Hardware
b. Software
c. Both of the above
d. None of the above
Ans. b. Software
Q64. A computer can get infected with virus by
a. Infected files
b. Infected pen drives
c. Infected file attachment of e-mails
d. All of the above
Ans. d. All of the above
Q65. A computer virus cannot ____
a. infect files on CD or DVD, if they are closed for writing.
b. infect computer hardware like, keyboard, mouse, etc.
c. Both of the above
d. None of the above
Ans. c. Both of the above
Q66. Common signs of a virus attack is/are :
a. Computer runs very slow
b. There is change in the file size
c. Computer restarts on its own
d. All of the above
Ans. d. All of the above
Q67. To prevent virus infection we should
a. Install and use anti-virus software.
b. not open e-mails of an unknown person/sender
c. not allow any untrustworthy person to use your system.
d. All of the above
Ans. d. All of the above
Q68. Which of the following is an Antivirus?
a. Norton AntiVirus
b. Quick Heal
c. McAfee VirusScan
d. All of the above
Ans. d. All of the above
Q69. An anti-virus program can be effective when
a. it run in the background at all times.
b. it is regularly updated
c. it scan full disk periodically
d. All of the above
Ans. d. All of the above
Q70. Characteristics of computer virus is :
a. it makes copies of itself.
b. it makes the system slow.
c. it may get activated at a certain date and time.
d. All of the above
Ans. d. All of the above
Q71. Regular care and maintenance of computer is required
a. to detect any issues at an early stage
b. so that system works efficiently
c. to avoid a condition of System Failure
d. All of the above
Ans. d. All of the above
Q72. Regular maintenance of the system includes
a. installing updates of the software
b. check the security of the system
c. taking backups of important files and documents
d. All of the above
Ans. d. All of the above
Q73. Precaution to be taken while cleaning the computer components are :
a. Power Off the computer before cleaning
b. Never spray cleaning fluid directly on the component of the computer.
c. Both of the above
d. None of the above
Ans. c. Both of the above
Q74. We should never spray any liquid cleaner directly on
a. Keyboard
b. Monitor
c. Mouse
d. All of the above
Ans. d. All of the above
Q75. Disk defragmentation help to
a. remove the virus from the system
b. use the disc space at an optimal level.
c. Both of the above
d. None of the above
Ans. b. use the disc space at an optimal level.
Q76. System Performance can be increased by
a. increasing RAM
b. disk defragmentation
c. Both of the above
d. None of the above
Ans. c. Both of the above
Q77. __________parts of the computer system should be cleaned so that it can work properly.
a. Internal
b. External
c. Both internal and external
d. None of the above
Ans. c. Both internal and external
Q78. DOS stands for ______________
a. Disk Operating System
b. Dot Operating System
c. Disk Open System
d. Disk Operating Secure
Ans. a. Disk Operating System
Q79. Which of the following is Microsoft Product?
a. DOS
b. Windows
c. Android
d. Linux
Ans. b. Windows
Q80. ________________ operating system is an example of an interactive operating system.
a. Windows
b. DOS
c. Linux
d. None of the above
Ans. a. Windows
Q81. GUI stands for _______________________
a. Graphical User Interface
b. Graphical User Interaction
c. Graphical User Interactive
d. None of the above
Ans. a. Graphical User Interface
Q82. Which operating system allows only one user to do a task on the computer and one thing at a time?
a. Single-user, multi-task operating system
b. Single-user , single-task operating system
c. Multi-user
d. None of the above
Ans. b. Single-user , single-task operating system
Q83. Which Operating System is used to control machinery like robots in complex animations and computer controlled automated machines
a. Real Time
b. Multi-user
c. Single-user, multi-task operating system
d. Distributed
Ans. a. Real Time
Q84. Examples of real-time operating systems is :
a. Windows CE
b. Lynx OS
c. Both of the above
d. None of the above
Ans. c. Both of the above
Q85. Examples of distributed operating systems is
a. Windows
b. Unix
c. Linux
d. All of the above
Ans. d. All of the above
Q86. ___________ operating system enables multiple users to work on the same computer simultaneously.
a. Single-user , single-task operating system
b. Single-user, multi-task operating system
c. Multi-user
d. None of the above
Ans. c. Multi-user
Q87. Which Operating System enables single user to operate on several programs at the same time.
a. Single-user, multi-task operating system
b. Multi-user
c. Single-user , single-task operating system
d. Real Time
Ans. a. Single-user, multi-task operating system
Q88. Example of Multi Tasking Operating System is
a. Windows
b. Apple MacOS
c. Both of the above
d. None of the above
Ans. c. Both of the above
Q89. An operating system in which commands can be entered by clicking/double-clicking/right-clicking a mouse is :
a. GUI-based
b. CUI-based
c. TUI-based
d. None of the above
Ans. a. GUI-based
Q90. Examples of Mobile operating Systems is :
a. Android
b. Symbian
c. iOS
d. All of the above
Ans. d. All of the above
Q91. The first screen that appears on monitor after loading OS is called ________________
a. Icons
b. Desktop
c. Wall paper
d. None of the above
Ans. b. Desktop
Q92. Small pictures on the desktop are called _______
a. Desktop
b. Symbols
c. Icons
d. Pictures
Ans. c. Icons
Q93. Picture used for the desktop background is called __________
a. Wallpaper
b. Background image
c. Wall image
d. Desktop image
Ans. a. Wallpaper
Q94. Start button is present on _________ side of the Taskbar.
a. right
b. left
c. top
d. bottom
Ans. b. left
Q95. Bar present at the bottom of the desktop is called ____________
a. Status bar
b. Scroll bar
c. Taskbar
d. None of the above
Ans. c. Taskbar
Q96. Components of Windows 7 Desktop is/are :
a. Desktop
b. Wallpaper
c. Taskbar
d. All of the above
Ans. d. All of the above
Q97. Which icon allows user to access all drives, files, and folders on the computer.
a. Recycle Bin
b. Computer
c. Application
d. Start button
Ans. b. Computer
Q98. The main components of Taskbar is/are
a. Start button
b. Active Applications
c. Date/Time icon
d. All of the above
Ans. d. All of the above
Q99. Deleted files and folders are stored in _______________
a. Recycle bin
b. My Computer
c. Control Panel
d. None of the above
Ans. a. Recycle bin
Q100. Everything we store in computer is stored in the form of a __________
a. Folder
b. Sub folder
c. File
d. None of the above
Ans. c. File
Questions ans Answers:
Q1. Mention any three functions of operating system.
Ans. Three functions of operating system are : (Write any three)
1 It checks whether the device is functioning properly or not.
2. It controls software resources of the computer.
3. It manages the computer memory
4. It manages the structure of the files and directories on a computer system.
5. It keeps track of the amount of disk space used by a specific file.
6. It allows you to create, copy, move and delete files
Q2. What is the name given to the screen that appears after Windows operating system is loaded?
Ans. Desktop
Q3. Small images on the desktop are called _________.Ans. Icons
Q4. Name two common icons on the Desktop .
Ans. Two common icons on the Desktop are
a. Computer Icon
b. Recycle bin
Q5. Name the icon that provides access to all the drives, files and folders on a computer.
Ans. Computer icon provides access to all the drives, files and folders.
Q6. Name the button to the left of the taskbar.
Ans. Start Button
Q7. Picture for the desktop background is called ____________.
Ans. Wallpaper
Q8. Write any four components of Windows 7 Desktop.
Ans. Four components of Windows 7 Desktop are :
a. Taskbar
b. Wallpaper
c. Icons
d. Start Button
Q9. Taskbar is the long horizontal bar present at the ________________ of the screen.
Ans. Bottom
Q10. To left of the Taskbar is the ___________(Start button, Date/Time) and to the right appears ________________ (Start button, Date/Time)
Ans. Start button, Date/Time
Q11. Files and folders deleted by the user are stored in the _________
Ans. Recycle Bin
Q12. To change the name of the folder, right-click and select _______________option from the Shortcut menu.
Ans. Rename
Q13. Expand GUI and CUI.
Ans. GUI : Graphical User Interface
CUI : Character User Interface
Q14. Windows Operating System is an example of ______ (GUI / CUI)
Ans. GUI
Q15. Disk Operating System is an example of ___________ (GUI / CUI)
Ans. CUI
Q16. How can you delete a folder?
Ans. To delete a file or a folder:
Click the file or the folder.
Press the Delete key.
Or
Right-click and select Delete option from the Shortcut menu.
Q17. Name the place where deleted files are placed.
Ans. Recycle Bin
Q18. How can you empty the recycle Bin?
Ans. We can empty the recycle Bin
Right-click the Recycle Bin icon and then
click Empty Recycle Bin.
(OR)
Double-click the Recycle Bin icon.
The Recycle Bin window appears.
Click Empty the Recycle Bin.
Q19. What is the possible cause of slowing down of computer?
Ans. A large number of files are stored on the computer. These files can be disorganized and fragmented
and may result in slowing down of the computer.
Q20. Why keyboard should be covered if not in use?
Ans. Dirt and dust can cause damage to the keyboard. Keys of the keyboard may not function properly if dirt enters the keys.
Q21. What general precautions should you take while cleaning the computer/components?
Ans. General precautions to be taken while cleaning the computer components are:
a. Always Power Off the computer system before cleaning.
b. Do not allow the cleaning liquid to drip near the circuit board.
c. Never spray cleaning fluid directly on the component of the computer. First spray the liquid on the cloth and then wipe the component.
Q22. List some of the maintenance activities for the computer system.
Ans. Some of the maintenance activities are:
1 Keep the components of the computer, like keyboard, mouse, monitor, etc. clean.
2. Replace hardware that is not functioning properly
3. Keep food items away from the computer.
4. Cables and chords should not be messed up
Q23. Why regular disk defragmentation should be done?
Ans. A regular disk defragmentation should be done to remove all unnecessary information that slows
down the computer. Disk defragmentation done at regular intervals helps the disc space to be used
at an optimal level.
Q24. Mention few ways in which a computer gets infected with virus.
Ans. A computer can get infected with virus in any of the following ways:
a. Infected files
b. Infected pen drives
c. Infected CD-ROMs/DVD-ROMs
d. Through infected file attachment of e-mails
Q25. Can computer virus infect hardware?
Ans. No
Q26. What are the common signs of a virus attack?
Ans. Some of the common signs of a virus attack are:
a. Computer runs very slow
b. There is change in the file size.
c. Computer often stops responding.
d. There is an increase in number of files (unusual)
e. Unusual error message appears on the screen.
f. Computer restarts on its own.
Q27. How can you prevent your computer from virus infection?
Ans. To prevent our computer from being infected with virus, we should install anti-virus software, run it
periodically and keep it updated
Q28. What is the use of antivirus software? Name any two commonly used anti-virus software.
Ans. Antivirus software is used to detect and remove malicious programs from the computer.
Some examples of antivirus software are McAfee Virus Scan, Norton AntiVirus, Microsoft Security essentials, and Quick Heal.
Q29. How are temporary files created in computer?
Ans. Temporary files are created when you are running computer programs. Microsoft Windows and Windows programs often create a .TMP file as a temporary file. Temporary files are also created by web browsers to store your web browser history.
Q30. Why we should remove temporary files from the computer?
Ans. Temporary files take up a large amount of disk space and makes the computer slow so should be removed to clear space.
Q31. Identify which of the following is a temporary file.
a. Project.docx
b. Mathsite.tmp
Ans. Mathsite.tmp
Q32. How can you select all the files in a folder using the keyboard?
Ans. Press Ctrl + A, to select all the files in the folder.
Q33. Which key combination will you press to get the Run dialog box?
Ans. Press Windows button + R on the keyboard to get the Run dialog box
Q34. What command will you write in the Run dialog box to open the Temp folder?
Ans. %temp%
Q35. What are cookies?
Ans. Cookies are small files which are stored on a user’s computer when you visit a website on the internet.
Q36. What is a firewall in computing?
Ans. A computer firewall is a network security system that monitors and controls incoming and outgoing network traffic based on user-defined security rules.
Q1. What do you mean by ICT?
Ans. ICT stands for Information and Communication Technology. ICT refers to all the tools
related to storing, recording and sending digital information.
Q2. Differentiate between Hardware and Software ?
Ans.
Hardware | Software |
The physical components that we can see and touch. | It is a set of programs/instructions that perform a specific task |
Monitor, Keyboard are examples of Hardware | MS Paint, MS Word are examples of Software. |
Q3. What do you mean by Operating System?
Ans. Operating System : It is a software that act as an interface between the user and the computer.
Q4. Give two examples of mobile operating system.
Ans. Two examples of mobile operating system :
a. Apple iOS
b. Google Android
Q5. Name two operating systems for laptops or desktop.
Ans. Two operating systems for laptops or desktop are:
a. Ubuntu
b. Microsoft Windows
Q6. Identify me
a. I am a physical part of computer.
b. I am a collection of instruction doing specific task.
c. I am the software that starts working as soon as we switch on a computer.
d. I am an input device used to type text, numbers etc
e. I am a small device that you can use to move, select and open items on your computer screen.
Ans.
a. Hardware
b. Software
c. Operating System
d. Keyboard
e. Mouse
Q7. Expand BIOS?
Ans. BIOS stands for Basic Input/Output System
Q8. What do you mean by Input device? Give two examples.
Ans. Those devices which are used to feed data/command into the computer are called Input device. for example Keyboard and Mouse.
Q9. What do you mean by drag and drop?
Ans. Moving an item from one location to another with the help of mouse button. This is called drag and drop.
Q10. Differentiate between files and folder.
Ans.
File | Folder |
A place where information is stored in computer. | A location where a group of files can |
It has a name and extension both | It has only name. |
Q11. Write the extension for the following.
a. A Notepad file
b. A Sound File
c. An image file
Ans. Extensions are
a. .txt
b. .mp3
c. .jpg
Q12. The file name and file name extension are separated by a ________________
Ans. dot ( . )
Ans. The steps to create folder on desktop are:
1. Right-click on desktop and then choose the ‘New Folder’.
2. Type the name of the folder.
Q14. Write the shortcut command for the following.
a. Cut
b. Copy
c. Paste
d. Undo
e. Redo
f. Select all
Ans. Shortcut commands are:
a. Cut ———– Ctrl + X
b. Copy ———– Ctrl + C
c. Paste ———– Ctrl + V
d. Undo ———– Ctrl + Z
e. Redo ———– Ctrl + Y
f. Select all ———– Ctrl + A
Q15. Write the basic tips for taking care of Laptop/Desktop.
Ans. Basic tips for taking care of Computer are :
Avoid eating anything over a keyboard.
Wipe the screen with a soft cloth.
Avoid eating or drinking near computer.
Handle and move your laptop carefully.
Q16. What do you mean by Data Backup?
Ans. Backing up data means to save the information present on your computer on another device, such as CD/DVD drives or hard disk.
Q17. What do you mean by Spam?
Ans. We get mails from companies who are advertising a product or trying to attract you to their website. Such mails are called Spam.
Q18. How can you increase the performance of a computer?
Ans. We can increase the performance of a computer by
a. Using an updated Antivirus Software
b. Removing unnecessary files and data, such as temporary files and images.
Q19. ________________ is leakage of information stored in a computer.
Ans. Security break
Q20. What do you mean by Virus?
Ans. Viruses are computer programs that can damage the data and software programs or steal the information stored on a computer.
Q21. Name two types of Virus.
Ans. Worms and Trojan Horse
Q22. Differentiate between Worms and Trojan Horse.
Ans.
Worms | Trojan |
These are viruses that replicate and | A Trojan Horse seems to be a useful program |
Q23. What do you mean by Online predators?
Ans. Online Predator: Online predators are people who trap you into inappropriate relationships.
Q24. Write few tips to protect your data from online theft and viruses.
Ans. Few tips to protect our data from online theft and viruses are:
a. Use passwords to login to your computer:
b. Install Anti-virus and Firewall:
c. Use Data Encryption
d. Give details of your credit card or bank account only on secure sites
Q25. What do you mean by threats to Computer?
Ans. Threats are the ways in which personal information can be leaked from a computer without our knowing.
Q26. List the various threats to a computer and its data.
Ans. The various threats to a computer and its data are:
1 Virus
2. Phishing
3. Online theft
4. Cyber crime
5. Hacking
Q27. __________________ is stealing of software and using of unlicensed and unauthorized copies of a computer software.
Ans. Software Piracy
Q28. What is ‘s’ in “https”?
Ans. ‘s’ stands for secure.
Q29. Name the encrypting feature of Windows.
Ans. BitLocker
Q30. List the various types of keys available on Keyboard.
Ans. The various types of keys available on Keyboard are :
a. Control keys
b. Function Keys
c. Alphabet Keys
d. Numeric Keys
e. Navigation Keys
Q31. When the ____________ key is turned ON, it helps to overwrite characters to the right of the cursor.
Ans. INSERT
Q32. Name two keys available on keyboard which are used to remove typed text or characters.
Ans. Delete and Backspace
Q33. _________ key helps to move the cursor to the beginning of a new line.
Ans. RETURN or ENTER
Q34. Pressing ______________ key opens the Start menu.
Ans. Windows
Q35. Name any two file extensions.
Ans. Two file extensions are :
a) .txt
b) .doc
c) .jpg
d) .xls
Comments
Post a Comment