Saturday, April 10, 2021

Class-8 Chapter-1

Short Questions

Q.1 Define an operating system? Mention any two operating System.

Ans. Operating System is an important part of a computer system which controls all other components of the computer system.

Example – Windows XP, Windows 7

Q.2 What is the difference between CUI and GUI?

Ans. CUI (Character user Interface ) helps the user to type commands to communicate with the operating System.

GUI (Graphical User Interface ) Allows the users to selects options, picture etc. from menus so that they may communicate with the operating system.

Long Question

Q.1 What is an Open Source Operating System? Give an example.

Ans. In operating system, everyone can have access to code of Open Source software. Using it, we can modify and share it.

Example – Linux.

Q.2 Write any four functions of operating systems.

Ans.       1. The OS manages files, saves our work, organizes our files, finds files that we have saved and loads files for us.

                2. The OS distributes memory space to program and data

3. The OS manages the computer’s hardware such as hard disk & motherboard etc.

4. The OS accepts data from input devices and transfers it to the computer’s memory.

Q.3 What are utilities? Give two examples.

 Ans.  Utilities are helpful in computer maintenance tasks.

Example :-           1. They can compress a file to save space on backing up the storage.

2. They help to recover data from damaged files.

MCQ

1.  a. Operating System

2.  a. 1985

3. a. Operating System

4. c. Quick Dirty Operating System


Class -6 Chapter-1

 

A. Tick () Mark the correct Option

1. ______ computers are designed in a way that you can place all the units, The system unit, input device, as well as the output on a desk.

Ans.  c. Desktop

2. A _____ computer is also called a Notebook.

Ans.  c. Laptop

3. PARAM is the example of which of the following?

Ans. c. Super Computer

4. Mini Computer were developed in ___________.

Ans. b. 1960

B. Fill in the blanks

1. Hybrid computers are combination of _Analog_ and digital.

2. PCs, banking , Sales analysis are __Purpose__ computers.

3. _Mini Computer_ were developed in 1960s.

4. _Embedded_ Computers are the micro-processor built in various products.

5. Palmtop    computer is small enough to fit in the palm of a hand.  

C. Short Questions.

Q.1.  What is a workstation?

Ans. A workstation has more powerful microprocessor and a higher-quality monitor too.

Q.2 Write two features of two Computers.

Ans.       1. Super computer can process billion of instructions per second (BIPS).

                2. Super computers are used for tasks that required intensive calculations.

Q.3 What are embedded computers?

Ans. Embedded computers are placed within a large product. They are small in size. They can perform many types of tasks.

Q.4. What is tablet?

Ans. Tablet is a special type of notebook computers which function by just touching the screen.

D. Long Questions ;-

Q.1 How are super computers different from micro computer.

 Ans. Super Computer Specifies that these are the fastest and the most expensive ones in the world. They can process billions of instructions per second (BIPS).

Micro computers use a microprocessor chip called CPU. They are also known as personal computers.

Q.2 On the basis of operation, how are computers classified?

Ans. On the basis of operation computer classified into three types.

1. Analog Computer.

2. Digital Computer

3. Hybrid Computer.

E. Give the difference between :

Q.1 Micro Computers and Mainframe computers.

Ans. Micro Computers:  Micro computers use a microprocessor chip called CPU. They are also known as personal computers.

Mainframe Computers: A mainframe Computer can process millions of instructions per second (MIPS)

Q.2 Palmtop and PDA.

Ans. Palmtop: Palmtop can be easily fit in the palm of our hand, so they got the name palmtop.

PDA: PDA (Personal Digital Assistant) is a handheld device. It is a combination of computing, telephone/fax, and networking features.

Q.3 Desktop and Palmtop computers.

Ans. Desktop: Desktop Computers are designed in such a way that we can place all the units (the system unit, input device and the output unit) on a single desk.

Palmtop: Palmtop can be easily fit in the palm of our hand, so they got the name palmtop.

F. How have computers have made our day-to day live easier:

Q.1 MIPS

Ans. MIPS: MIPS (Millions instructions per Second) They use more than one processor chip.

Q.2 PDA

Ans: PDA:  PDA (Personal Digital Assistant) is a handheld device. It is a combination of computing, telephone/fax, and networking features.

Friday, February 12, 2021

Class-8 Chapter-12 Solved Exercise

 

Class -8

Chapter-12

MCQ

1              A

2              A

3              B

4              B

5              A

6              C

True/ False

1              F

2              T

3              F

4              F

5              T

6              F

Fill in Blanks

1              Cyber Threat

2              Personal Information

3              Password

4              Social Engineering

5              Cookies

6              Worm

Match The following

1              D

2              E

3              A

4              C

5              B

6              G

7              F

One Word Answer

1             

Ans. A Trojan Horse is programme to deceive the user by appearing to be a genuine file (like an image or video or a software utility).

2             

Ans. Adware is short form for advertising –supported software.

3             

Ans. Cookies are data sent from a website and stored in a user’s web browser while a user is browsing a website.

4             

Ans. Kespersky, Symantec, AVG

5             

Ans. Denial of Service (DOS)

 

Answer the Following

1.

Ans. Cyber threat is any such act which can result in an undesirable incident that could harm to your computer activities .

2.

Ans.  Worm:- Worm is a software program that actively transmit itself over a network to infect other computer but unlike a virus.

Spyware:- Spyware includes software programs that are installed on your computer to steal information from your computer on an ongoing basis without your knowledge.

3.

Ans. Many Spammers and hackers send e-mails to unsuspecting persons to get their credit card or bank information. Such messages are called Phishing Messages.

4.

Ans. Spam messages are sent to lure you to take actions that may lead to other unwanted implications like downloading of malware on your computer. These unwanted messages by email or even by SMS are known as Spam.

5.

Ans. A firewall is a system designed to prevent unauthorized use of and access to your computer. A firewall can be either hardware or software. If you are using Windows, you can use the built-in Windows firewall.

Monday, February 8, 2021

Class-7 Chapter-11 Solved Exercise

 

Class-7

MCQ

1          A

2          D

3          C

4          B

5          D

6          A

7          C

True / False

1          T

2          F

3          T

4          T

5          F

6          T

7          F

8          F

9          T

10       T

Fill in The Blanks

1          E-Commerce

2          EFT

3          E-governance

4          E-education

5          Blogs

6          Social Networking

7          Distort

8          Facebook

9          Linkedin

 

Matching

1          E         

2          A

3          B

4          C

5          D

6          G

7          F

Short Answer Type Questions

1.

Ans. Video Conferencing

2.

Ans. Usenet

3.

Ans. Facebook

4.

Ans. E –Commerce is the buying and selling of goods and services on the Internet.

5.

Ans. E-government

6.

Ans. Linkedin

7.

Ans. EFT

8.

Ans. Cybersafety is the safe and responsible use of Information and communication Technologies over the Internet.

9.

Ans. Our Password should be formed in Combination of Upper and Lower case letters, symbol and numbers

10.

Ans. Legally Purchased Antivirus 

 

Long Answer Type Questions

1.

Ans. Video conferencing is a live conference conducted by using the electronic media and the Internet.

2

Ans. Retail stores, Cinema Halls, Banks providing services.

3.

Ans. Payment of Telephone bills, Submission of Online forms, Payment of Income Tax.

4.

Ans. Blogs are virtual diaries created by individuals and stored on the Internet.

Topic – Computer Knowledge

5.

Ans. The websites where people meet online and exchange messages, comments, pictures and videos are known as social networking sites.

6.

Ans. 1. You can communicate with your old friends who are members on the same social networking site.

2. Not only will you make new friends, you will also learn about new culture or even new languages.

7.

Ans. 1. Use a strong Password.

2. Don’t posted your full information on the Internet.

8.

Ans. Twitter is a website that offers a social networking and microblogging service, enabling its users to send and read messages called tweets.      

 

Class-8 Chapter-11 Solved Exercise

 

Class -8

MCQ

1          C

2          A

3          B

4          A

5          D

True/ False

1          T

2          T

3          T

4          F

5          F

6          T

7          F

8          T

9          T

10       T

Fill in the blanks

1          Style

2          HTML

3          Use

4          Selector

5          Property

6          Values

7          Inline

8          Background –color

Matching

1          C

2          A

3          B

4          F

5          D

6          E

One word Answer

1          Cascading Style Sheets

2          A CSS comment begins with /*, and ends with */.

3          Property is used to underline, over line, and strikethrough text.

4          Values could be normal, bold, bolder, lighter, (number), XX-small, X-small, medium, large, X-large, XX-large, larger and smaller.

5          We can change the width, style and color of the border.

6          Border, Width, Height and opacity

 

Answer the following:

1          Font Family : Property is used to change the face of a font. Values could be any font.

            Font Size: Property is used to increase or decrease the size of a font.

2          Font Weight: Property is used to increase or decrease how bold or light a font appears.

3          Text Transform: Property is used to capitalize text or convert to uppercase or lower case letters.

4          Border: Property is used to set border.

            Border width: Specifies the thickness of the border.

            Border Style: Specifies the style of the border which can be any of the mentioned value.

            Border color: specifies the color of the border

5          Image: Properties to change the height, width of the image and to apply the border to image. We can also change the opacity of any image. Using border, width, height and opacity property we can alter any image.

Class -6 Chapter-11 Solved Exercise

 

MCQ

1          C

2          B

3          A

4          A

5          C

True/ False

1          T

2          F

3          F

4          T

Fill in the blanks

1          Blind Carbon Copy

2          Signature

3          Junk

4          +

5          Exact Phrase

Matching

1          B

2          D

3          A

4          E

5          C

 

One Word Answers

1          Carbon Copy

2          We can send a picture, sound or video clip as an attachment with your e-mail.

3          To Compose a new e-mail

4          A signature

5          SPAM mail

6          + sign in front of a keyword to include it in the search result and the – sign to exclude it from the search result.


Answer the following

1          In the e-mail screen, Cc : is the acronym for the Carbon Copy and Bcc: is the acronym for the Blind Carbon Copy.

2          SPAM mail is the practice of sending huge volumes of unsolicited e-mail for advertisements.

3          Favorites are a feature provided by the Internet browser tool that allow a user to store and return to his or her favorite website directly.

4          When you enter a search term that consists of more than one word, like math puzzle, you can get results where both terms can be present in any order and anywhere in the search result.

5          + sign in front of a keyword to include it in the search result and the – sign to exclude it from the search result.