Friday, February 12, 2021

Class-8 Chapter-12 Solved Exercise

 

Class -8

Chapter-12

MCQ

1              A

2              A

3              B

4              B

5              A

6              C

True/ False

1              F

2              T

3              F

4              F

5              T

6              F

Fill in Blanks

1              Cyber Threat

2              Personal Information

3              Password

4              Social Engineering

5              Cookies

6              Worm

Match The following

1              D

2              E

3              A

4              C

5              B

6              G

7              F

One Word Answer

1             

Ans. A Trojan Horse is programme to deceive the user by appearing to be a genuine file (like an image or video or a software utility).

2             

Ans. Adware is short form for advertising –supported software.

3             

Ans. Cookies are data sent from a website and stored in a user’s web browser while a user is browsing a website.

4             

Ans. Kespersky, Symantec, AVG

5             

Ans. Denial of Service (DOS)

 

Answer the Following

1.

Ans. Cyber threat is any such act which can result in an undesirable incident that could harm to your computer activities .

2.

Ans.  Worm:- Worm is a software program that actively transmit itself over a network to infect other computer but unlike a virus.

Spyware:- Spyware includes software programs that are installed on your computer to steal information from your computer on an ongoing basis without your knowledge.

3.

Ans. Many Spammers and hackers send e-mails to unsuspecting persons to get their credit card or bank information. Such messages are called Phishing Messages.

4.

Ans. Spam messages are sent to lure you to take actions that may lead to other unwanted implications like downloading of malware on your computer. These unwanted messages by email or even by SMS are known as Spam.

5.

Ans. A firewall is a system designed to prevent unauthorized use of and access to your computer. A firewall can be either hardware or software. If you are using Windows, you can use the built-in Windows firewall.

Monday, February 8, 2021

Class-7 Chapter-11 Solved Exercise

 

Class-7

MCQ

1          A

2          D

3          C

4          B

5          D

6          A

7          C

True / False

1          T

2          F

3          T

4          T

5          F

6          T

7          F

8          F

9          T

10       T

Fill in The Blanks

1          E-Commerce

2          EFT

3          E-governance

4          E-education

5          Blogs

6          Social Networking

7          Distort

8          Facebook

9          Linkedin

 

Matching

1          E         

2          A

3          B

4          C

5          D

6          G

7          F

Short Answer Type Questions

1.

Ans. Video Conferencing

2.

Ans. Usenet

3.

Ans. Facebook

4.

Ans. E –Commerce is the buying and selling of goods and services on the Internet.

5.

Ans. E-government

6.

Ans. Linkedin

7.

Ans. EFT

8.

Ans. Cybersafety is the safe and responsible use of Information and communication Technologies over the Internet.

9.

Ans. Our Password should be formed in Combination of Upper and Lower case letters, symbol and numbers

10.

Ans. Legally Purchased Antivirus 

 

Long Answer Type Questions

1.

Ans. Video conferencing is a live conference conducted by using the electronic media and the Internet.

2

Ans. Retail stores, Cinema Halls, Banks providing services.

3.

Ans. Payment of Telephone bills, Submission of Online forms, Payment of Income Tax.

4.

Ans. Blogs are virtual diaries created by individuals and stored on the Internet.

Topic – Computer Knowledge

5.

Ans. The websites where people meet online and exchange messages, comments, pictures and videos are known as social networking sites.

6.

Ans. 1. You can communicate with your old friends who are members on the same social networking site.

2. Not only will you make new friends, you will also learn about new culture or even new languages.

7.

Ans. 1. Use a strong Password.

2. Don’t posted your full information on the Internet.

8.

Ans. Twitter is a website that offers a social networking and microblogging service, enabling its users to send and read messages called tweets.      

 

Class-8 Chapter-11 Solved Exercise

 

Class -8

MCQ

1          C

2          A

3          B

4          A

5          D

True/ False

1          T

2          T

3          T

4          F

5          F

6          T

7          F

8          T

9          T

10       T

Fill in the blanks

1          Style

2          HTML

3          Use

4          Selector

5          Property

6          Values

7          Inline

8          Background –color

Matching

1          C

2          A

3          B

4          F

5          D

6          E

One word Answer

1          Cascading Style Sheets

2          A CSS comment begins with /*, and ends with */.

3          Property is used to underline, over line, and strikethrough text.

4          Values could be normal, bold, bolder, lighter, (number), XX-small, X-small, medium, large, X-large, XX-large, larger and smaller.

5          We can change the width, style and color of the border.

6          Border, Width, Height and opacity

 

Answer the following:

1          Font Family : Property is used to change the face of a font. Values could be any font.

            Font Size: Property is used to increase or decrease the size of a font.

2          Font Weight: Property is used to increase or decrease how bold or light a font appears.

3          Text Transform: Property is used to capitalize text or convert to uppercase or lower case letters.

4          Border: Property is used to set border.

            Border width: Specifies the thickness of the border.

            Border Style: Specifies the style of the border which can be any of the mentioned value.

            Border color: specifies the color of the border

5          Image: Properties to change the height, width of the image and to apply the border to image. We can also change the opacity of any image. Using border, width, height and opacity property we can alter any image.

Class -6 Chapter-11 Solved Exercise

 

MCQ

1          C

2          B

3          A

4          A

5          C

True/ False

1          T

2          F

3          F

4          T

Fill in the blanks

1          Blind Carbon Copy

2          Signature

3          Junk

4          +

5          Exact Phrase

Matching

1          B

2          D

3          A

4          E

5          C

 

One Word Answers

1          Carbon Copy

2          We can send a picture, sound or video clip as an attachment with your e-mail.

3          To Compose a new e-mail

4          A signature

5          SPAM mail

6          + sign in front of a keyword to include it in the search result and the – sign to exclude it from the search result.


Answer the following

1          In the e-mail screen, Cc : is the acronym for the Carbon Copy and Bcc: is the acronym for the Blind Carbon Copy.

2          SPAM mail is the practice of sending huge volumes of unsolicited e-mail for advertisements.

3          Favorites are a feature provided by the Internet browser tool that allow a user to store and return to his or her favorite website directly.

4          When you enter a search term that consists of more than one word, like math puzzle, you can get results where both terms can be present in any order and anywhere in the search result.

5          + sign in front of a keyword to include it in the search result and the – sign to exclude it from the search result.