https://docs.google.com/presentation/d/1PnkzmTVvxVRvkkY9APHjaoL32aBtmSBK073Zl9J226E/edit?usp=drivesdk
Monday, April 12, 2021
Saturday, April 10, 2021
Class-8 Chapter-1
Short Questions
Q.1 Define an operating system? Mention any two operating System.
Ans. Operating System is an important part of a computer system which controls all other components of the computer system.
Example – Windows XP, Windows 7
Q.2 What is the difference between CUI and GUI?
Ans. CUI (Character user Interface ) helps the user to type commands to communicate with the operating System.
GUI (Graphical User Interface ) Allows the users to selects options, picture etc. from menus so that they may communicate with the operating system.
Long Question
Q.1 What is an Open Source Operating System? Give an example.
Ans. In operating system, everyone can have access to code of Open Source software. Using it, we can modify and share it.
Example – Linux.
Q.2 Write any four functions of operating systems.
Ans. 1. The OS manages files, saves our work, organizes our files, finds files that we have saved and loads files for us.
2. The OS distributes memory space to program and data
3. The OS manages the computer’s hardware such as hard disk & motherboard etc.
4. The OS accepts data from input devices and transfers it to the computer’s memory.
Q.3 What are utilities? Give two examples.
Ans. Utilities are helpful in computer maintenance tasks.
Example :- 1. They can compress a file to save space on backing up the storage.
2. They help to recover data from damaged files.
MCQ
1. a. Operating System
2. a. 1985
3. a. Operating System
4. c. Quick Dirty Operating System
Class -6 Chapter-1
A. Tick () Mark the correct Option
1. ______ computers are designed in a way that you can place all the units, The system unit, input device, as well as the output on a desk.
Ans. c. Desktop
2. A _____ computer is also called a Notebook.
Ans. c. Laptop
3. PARAM is the example of which of the following?
Ans. c. Super Computer
4. Mini Computer were developed in ___________.
Ans. b. 1960
B. Fill in the blanks
1. Hybrid computers are combination of _Analog_ and digital.
2. PCs, banking , Sales analysis are __Purpose__ computers.
3. _Mini Computer_ were developed in 1960s.
4. _Embedded_ Computers are the micro-processor built in various products.
5. Palmtop computer is small enough to fit in the palm of a hand.
C. Short Questions.
Q.1. What is a workstation?
Ans. A workstation has more powerful microprocessor and a higher-quality monitor too.
Q.2 Write two features of two Computers.
Ans. 1. Super computer can process billion of instructions per second (BIPS).
2. Super computers are used for tasks that required intensive calculations.
Q.3 What are embedded computers?
Ans. Embedded computers are placed within a large product. They are small in size. They can perform many types of tasks.
Q.4. What is tablet?
Ans. Tablet is a special type of notebook computers which function by just touching the screen.
D. Long Questions ;-
Q.1 How are super computers different from micro computer.
Ans. Super Computer Specifies that these are the fastest and the most expensive ones in the world. They can process billions of instructions per second (BIPS).
Micro computers use a microprocessor chip called CPU. They are also known as personal computers.
Q.2 On the basis of operation, how are computers classified?
Ans. On the basis of operation computer classified into three types.
1. Analog Computer.
2. Digital Computer
3. Hybrid Computer.
E. Give the difference between :
Q.1 Micro Computers and Mainframe computers.
Ans. Micro Computers: Micro computers use a microprocessor chip called CPU. They are also known as personal computers.
Mainframe Computers: A mainframe Computer can process millions of instructions per second (MIPS)
Q.2 Palmtop and PDA.
Ans. Palmtop: Palmtop can be easily fit in the palm of our hand, so they got the name palmtop.
PDA: PDA (Personal Digital Assistant) is a handheld device. It is a combination of computing, telephone/fax, and networking features.
Q.3 Desktop and Palmtop computers.
Ans. Desktop: Desktop Computers are designed in such a way that we can place all the units (the system unit, input device and the output unit) on a single desk.
Palmtop: Palmtop can be easily fit in the palm of our hand, so they got the name palmtop.
F. How have computers have made our day-to day live easier:
Q.1 MIPS
Ans. MIPS: MIPS (Millions instructions per Second) They use more than one processor chip.
Q.2 PDA
Ans: PDA: PDA (Personal Digital Assistant) is a handheld device. It is a combination of computing, telephone/fax, and networking features.
Friday, February 12, 2021
Class-8 Chapter-12 Solved Exercise
Class -8
Chapter-12
MCQ
1 A
2 A
3 B
4 B
5 A
6 C
True/ False
1 F
2 T
3 F
4 F
5 T
6 F
Fill in Blanks
1 Cyber Threat
2 Personal Information
3 Password
4 Social Engineering
5 Cookies
6 Worm
Match The following
1 D
2 E
3 A
4 C
5 B
6 G
7 F
One Word Answer
1
Ans. A Trojan Horse is programme to deceive the user by appearing to be a genuine file (like an image or video or a software utility).
2
Ans. Adware is short form for advertising –supported software.
3
Ans. Cookies are data sent from a website and stored in a user’s web browser while a user is browsing a website.
4
Ans. Kespersky, Symantec, AVG
5
Ans. Denial of Service (DOS)
Answer the Following
1.
Ans. Cyber threat is any such act which can result in an undesirable incident that could harm to your computer activities .
2.
Ans. Worm:- Worm is a software program that actively transmit itself over a network to infect other computer but unlike a virus.
Spyware:- Spyware includes software programs that are installed on your computer to steal information from your computer on an ongoing basis without your knowledge.
3.
Ans. Many Spammers and hackers send e-mails to unsuspecting persons to get their credit card or bank information. Such messages are called Phishing Messages.
4.
Ans. Spam messages are sent to lure you to take actions that may lead to other unwanted implications like downloading of malware on your computer. These unwanted messages by email or even by SMS are known as Spam.
5.
Ans. A firewall is a system designed to prevent unauthorized use of and access to your computer. A firewall can be either hardware or software. If you are using Windows, you can use the built-in Windows firewall.
Monday, February 8, 2021
Class-7 Chapter-11 Solved Exercise
Class-7
MCQ
1 A
2 D
3 C
4 B
5 D
6 A
7 C
True /
False
1 T
2 F
3 T
4 T
5 F
6 T
7 F
8 F
9 T
10 T
Fill in The
Blanks
1 E-Commerce
2 EFT
3 E-governance
4 E-education
5 Blogs
6 Social Networking
7 Distort
8 Facebook
9 Linkedin
Matching
1 E
2 A
3 B
4 C
5 D
6 G
7 F
Short
Answer Type Questions
1.
Ans. Video
Conferencing
2.
Ans. Usenet
3.
Ans.
Facebook
4.
Ans. E
–Commerce is the buying and selling of goods and services on the Internet.
5.
Ans.
E-government
6.
Ans. Linkedin
7.
Ans. EFT
8.
Ans.
Cybersafety is the safe and responsible use of Information and communication
Technologies over the Internet.
9.
Ans. Our
Password should be formed in Combination of Upper and Lower case letters,
symbol and numbers
10.
Ans.
Legally Purchased Antivirus
Long Answer
Type Questions
1.
Ans. Video
conferencing is a live conference conducted by using the electronic media and
the Internet.
2
Ans. Retail
stores, Cinema Halls, Banks providing services.
3.
Ans.
Payment of Telephone bills, Submission of Online forms, Payment of Income Tax.
4.
Ans. Blogs
are virtual diaries created by individuals and stored on the Internet.
Topic –
Computer Knowledge
5.
Ans. The
websites where people meet online and exchange messages, comments, pictures and
videos are known as social networking sites.
6.
Ans. 1. You
can communicate with your old friends who are members on the same social
networking site.
2. Not only
will you make new friends, you will also learn about new culture or even new
languages.
7.
Ans. 1. Use
a strong Password.
2. Don’t
posted your full information on the Internet.
8.
Ans.
Twitter is a website that offers a social networking and microblogging service,
enabling its users to send and read messages called tweets.
Class-8 Chapter-11 Solved Exercise
Class -8
MCQ
1 C
2 A
3 B
4 A
5 D
True/ False
1 T
2 T
3 T
4 F
5 F
6 T
7 F
8 T
9 T
10 T
Fill in the blanks
1 Style
2 HTML
3 Use
4 Selector
5 Property
6 Values
7 Inline
8 Background –color
Matching
1 C
2 A
3 B
4 F
5 D
6 E
One word Answer
1 Cascading
Style Sheets
2 A CSS comment
begins with /*, and ends with */.
3 Property is
used to underline, over line, and strikethrough text.
4 Values could
be normal, bold, bolder, lighter, (number), XX-small, X-small, medium, large,
X-large, XX-large, larger and smaller.
5 We can change
the width, style and color of the border.
6 Border,
Width, Height and opacity
Answer the following:
1 Font Family :
Property is used to change the face of a font. Values could be any font.
Font Size:
Property is used to increase or decrease the size of a font.
2 Font Weight:
Property is used to increase or decrease how bold or light a font appears.
3 Text
Transform: Property is used to capitalize text or convert to uppercase or lower
case letters.
4 Border:
Property is used to set border.
Border
width: Specifies the thickness of the border.
Border
Style: Specifies the style of the border which can be any of the mentioned
value.
Border
color: specifies the color of the border
5 Image: Properties
to change the height, width of the image and to apply the border to image. We
can also change the opacity of any image. Using border, width, height and
opacity property we can alter any image.
Class -6 Chapter-11 Solved Exercise
MCQ
1 C
2 B
3 A
4 A
5 C
True/ False
1 T
2 F
3 F
4 T
Fill in the blanks
1 Blind Carbon
Copy
2 Signature
3 Junk
4 +
5 Exact Phrase
Matching
1 B
2 D
3 A
4 E
5 C
One Word Answers
1 Carbon Copy
2 We can send a
picture, sound or video clip as an attachment with your e-mail.
3 To Compose a
new e-mail
4 A signature
5 SPAM mail
6 + sign in
front of a keyword to include it in the search result and the – sign to exclude
it from the search result.
Answer the following
1 In the e-mail
screen, Cc : is the acronym for the Carbon Copy and Bcc: is the acronym for the
Blind Carbon Copy.
2 SPAM mail is
the practice of sending huge volumes of unsolicited e-mail for advertisements.
3 Favorites are
a feature provided by the Internet browser tool that allow a user to store and
return to his or her favorite website directly.
4 When you
enter a search term that consists of more than one word, like math puzzle, you
can get results where both terms can be present in any order and anywhere in
the search result.
5 + sign in
front of a keyword to include it in the search result and the – sign to exclude
it from the search result.
Go To Other Website
-
Q.1 Ans. \t 2. Ans. \n 3. Ans. a=int(input("enter value = ")) 4. Ans. When we enter some commands at the Shell prompt and see the...
-
Class-6 Chapter-3 A. Choose the correct option. 1. Ripping helps to save media files as: Ans. d. All of these 2. ...
-
Chapter-3 Fill in blanks and Matching