Information Technology
(402)
Class-10
Book- Employability
Skill
Unit 3 Information and
Communication Technology Skills
Session 1 Basic Computer Operations
A. Multiple
choice questions
Read the
questions carefully and circle the letter (a), (b), (c) or (d) that best
answers the question.
1. Which of
the following functions is not performed using a mouse?
(a) Turn on (b)
Hover
(c) Right click (d)
Drag and Drop
Ans: (a) Turn on
2. What is
the term used when you press and hold the left mouse key and move the mouse
around?
(a) Highlighting (b)
Dragging
(c) Selecting (d)
Moving
Ans: (b) Dragging
3. Here are
the steps that take place when starting a computer. Rearrange the steps in the
correct order.
(a) Desktop appears after login (b)
Login screen appears
(c) Power on Self-Test (POST) starts (d) Operating system starts
(e) Welcome screen appears
Ans: (c) Power on Self-Test (POST) starts --(d) Operating system
starts --(e) Welcome screen appears--(b) Login screen appears--(a) Desktop
appears after login
B.
Subjective questions
1. What is
the function of the ENTER key?
Ans: The label on this key can be either ENTER or RETURN,
depending on the brand of
computer that you are using. You use the ENTER or the RETURN
key to move the cursor to the beginning of a new line
2. How will
you prevent others from using your computer?
Ans: A login ID
and password is like a key to the lock which allows you to use the computer. When
you login to the computer with your login-ID and password, the computer knows
that you are an authorised person and allows you to work on the applications in
the computer. Once you finish working, you must log out or sign out so that no
one else can see your work.
3. Demonstrate
the process of starting a computer.
Ans: To start a computer, press the Power button on the CPU.
This will start the operating system and display the Ubuntu desktop or the main
screen on the monitor.
4. Identify
the various keys on a keyboard and their associated functions.
Ans:Keyboard: A
keyboard is an input device used to type text, numbers and commands into the
computer Some keyboards may have fewer function keys.
(a) Control keys: Keys, such as Control (CTRL), SHIFT, SPACEBAR, ALT, CAPS
LOCK and TAB,are special control keys that perform special functions depending
on when and where they are used.
(b) Enter key: The label on this key can be either ENTER or RETURN,
depending on the brand of computer that you are using. You use the ENTER or the
RETURN key to move the cursor to the beginning of a new line. In some programs,
it is used to send commands and to confirm a task on a computer.
(c) Punctuation
keys: Punctuation keys includekeys for
punctuation marks, such as colon (:),
semicolon (;), question mark (?), single quotation marks
(‘ ’), and double quotation marks (“ ”).
(d) Navigation
keys: Keys, such as the arrow keys, HOME, END,
PAGE UP, and PAGE DOWN are navigation keys. These are used to move up and down,
right and left in a document. The HOME and END keys move the cursor to the
left/right end of a line of text, respectively. The PAGE UP and PAGE DOWN keys
are used to move one page up and one page down, respectively.
(e) Command keys: Keys, such as INSERT (INS), DELETE (DEL), and BACKSPACE
are command keys. When the INSERT key is turned ON, it helps you overwrite
characters to the right of the cursor. The DELETE key and the BACKSPACE key are
used to remove typed text, characters and other objects on the right and left
side of the cursor, respectively.
(f) Windows key: Pressing this key opens the Start menu
5. Perform various mouse functions.
Ans: Mouse : A mouse is a small device that you can use to move, select and open
items on your computer screen.
Mouse Functions are:
Roll Over or Hover: Some actions can be done by simply rolling
over or hovering over an item. When you bring the mouse over a file in File
Explorer, it will show
the details of that file
Point and Click :As you
move the mouse on your desk, a pointer moves correspondingly on your screen.
The mouse allows you to select an item on the screen. When you click a
particular file, it gets selected .
Drag and Drop : To move an item, you need to click it, and then holding
the mouse button down, move the item to a new location. After you move the item
to the new location, you release the mouse button. This is called drag and
drop. When you drag a file in File Explorer, you can pick it up from the
present location and drop it in a new location where you release the mouse .
Double-click: Double-clicking means to quickly click the left mouse
button twice. When we double click on a file, it will open the file.
Session 2 Performing Basic File Operations
A. Multiple
choice questions
Read the
questions carefully and circle the letter (a), (b), (c) or (d) that best
answers the question.
1. Which one
of the following shortcut keys is used to paste a file?
(a) Ctrl + C (b)
Ctrl + P
(c) Ctrl + V (d)
Ctrl + X
Ans: (c) Ctrl + v
2. Which of
the following is a valid file extension for Notepad file?
(a) .jpg (b)
.doc
(c) .text (d)
.txt
Ans: (d) .txt
3. What keys
do you use to copy something?
(a) Ctrl+X (b)
Ctrl+C
(c) Ctrl+Z (d)
Ctrl+Y
Ans: (b) Ctrl+C
B.
Subjective questions
1. How is a
computer file system similar to our physical file system in a school?
Ans: In any school (or office), each teacher has a separate cabinet
where they keep the
files of different students or classes on separate
shelves. Similarly, information on a computer is stored in electronic files,
which can be put into separate folders It is easier to manage the electronic
files as they can be simply copied, moved, renamed or even deleted.
2. What are
the steps you will perform to save a text file in Ubuntu?
Ans: To save the file click Save. In
the Save As dialog box, browse to the Desktop folder, type the name as ‘Neha’
and click Save .
3. Describe
what computer files and folders are.
Ans: All information stored in a computer is kept in files. Each file is given a file name and has
a file name extension that identifies the file type. The file name and file
name extension are separated by a period or a ‘dot’. For example, a document
(e.g., Neha) created using Notepad (a type of computer application to create simple text
files) will have the extension .txt. There are other types like .doc, .xls, etc. An image
file usually has an extension .jpg
while a sound file usually has .mp3.
A folder is a location where a group of files can be stored.
Session 3 Computer Care and Maintenance
A. Multiple
choice questions
Read the
questions carefully and circle the letter (a), (b), (c) or (d) that best
answers the question.
1. What
happens if you leave a device plugged in even after it is charged 100%?
(a) It can break. (b)
It can stop functioning.
(c) It can over-heat. (d)
Data can get corrupt.
Ans: (c) It can over-heat.
2. How can
an anti-virus protect your device?
(a) It can protect it from over-heating. (b) It can increase its performance.
(c) It can prevent data from getting corrupt. (d) It can backup data.
Ans: (c) It can prevent data from getting corrupt.
3. Which
option is not required to keep a device cool?
(a) Keep the device unplugged when in use.
(b) Do not cover a laptop with a blanket.
(c) Make sure computer’s CPU fan is working.
(d) Avoid leaving the device in the sun.
Ans: (a) Keep the device unplugged when in use.
4. Which of
the following is essential for maintaining keyboard?
(a) Turn the
keyboard upside down and shake it to remove foreign material.
(b) Blow
dust and other particles with help of a blower.
(c) Use a
very dilute combination of soap and water applied with a non-abrasive cloth to
remove stains from the keycaps.
(d) All of
the above.
Ans: (d) All
of the above.
B.
Subjective questions
1. Explain
how to clean a computer on a daily basis.
Ans: Keeping a Device Clean : Cleaning a device, such as a computer or
mobile means
to keep the screen, keyboard and mouse clean.
(i) Keyboard: First we should not eat
anything over a keyboard. Crumbs can damage the internal parts of a keyboard.
You can clean a keyboard with a soft brush to remove crumbs and dust particles.
(ii) Screen: You can wipe the screen with
a soft cloth to remove any finger marks.
(iii) Be careful with food and drinks: Avoid eating and keeping glasses of water or cups of coffee near a computer
. Any liquid spilt over an electronic device can spoil it beyond repair.
(iv) Handle devices carefully: Handle and move your laptop carefully and avoid dropping or banging it
against a hard surface. Even a short fall can damage the screen or the hard
disk and make the device useless. Using a cover for your mobile and a padded
case for moving your laptop protects the
device from damage.
(v) Keep the computer cool: If a computer, laptop or mobile device gets overheated, the internal parts
can be damaged. The CPU has an internal fan to keep it cool. We should make
sure the fan is functioning. You can also use an external fan as shown in
Figure 3.24. Avoid leaving a device in the sun or in a closed car. We should be
careful when using a laptop while sitting in bed and make sure that the fan in
not covered.
(vi) Do not overcharge your battery: Sometimes we keep a device plugged in for charging even after it is fully
charged. If we leave the device plugged in for a long time , it can overheat
the battery. This reduces the battery life.
Always unplug the device once it is charged 100%.
(vii) Always plug in
devices carefully: Any device being connected to a laptop or
computer such as a USB drive or headphones, should be done gently. It should
not be forced into the port. If you find it difficult to plug in a device,
change the direction and try instead of trying to force it in.
(viii) Do
not run too many programs at a time: When too
many programs are running at the same time as shown in Figure 3.26, the
computer can become slow and even crash. If a program/app is not being used, it
should be closed so that other programs can work smoothly.
2. How can
you increase the performance of a computer?
Ans: If we have been using a computer for a long time we have
a lot of unnecessary files and data, such as temporary files and images. When
they use too much hard-disk space, the performance of the computer goes down.
It is important that we keep cleaning by removing any extra files. We can use
some disk cleaner software, which help us clean up the unnecessary files.
3. Identify
the importance of taking care of computers.
Ans: A computer is a delicate machine with a lot of moving
electronic parts. We need to protect it from dust and damage. If we are
careless, it will not work efficiently. Computers and mobiles are very
expensive. When we take good care of them on a regular basis, we
can use them for a longer time. This will help us save
money as we do not need to buy new devices too often.
4. List the
various ways in which computers can be damaged.
Ans: Computers can crash, humans can make mistakes and natural
disasters, such as floods can happen. So, it is important for companies,
hospitals, banks, etc., to keep their information safe — so that their business
can continue to function smoothly and their customers do not face problems.
5.Demonstrate
how to prevent damage and take care of computers.
Ans: Backup Your Data : Backing up data means to save the information
present
on your computer on another device, such as
CD/DVD drives as shown in Figure 3.28 or hard disk. Data can recovered from
here in case the computer stops working completely.
Scanning and Cleaning Viruses : Sometimes computer viruses can enter a
computer
from such attacks we can install anti-virus
software.This will prevent any viruses from entering and will also clean any
viruses that may enter our system before they affect the data.
Increasing Computer Performance :If we have been using a computer for a long
time we have a lot of unnecessary files and data, such as temporary files and
images. When they use too much hard-disk space, the performance of the computer
goes down. It is important that we keep cleaning by removing any extra files.
We can use some
disk cleaner software, which help us clean up
the unnecessary files.
Removing SPAM from your Computer : Sometimes we get mails from companies
who are advertising a product or trying to attract
you to their website. Such mails are
called SPAM. We should never respond to SPAM
and delete it on a regular basis.
Session 4 Computer Security and Privacy
A. Multiple choice questions
Read the questions carefully and circle the letter (a), (b), (c) or (d)
that best answers the question
1. What should you do to ensure secure online transactions?
(a) Lock your computer
(b) Give credit card or bank details only on safe websites
(c) Use anti-virus
(d) Do not use pirated software
Ans: (b) Give credit card or bank details only on safe websites
2. Which of the following trap small children into inappropriate relations?
(a) Online predators (b)
Worms
(c) Trojan Horse (d)
Anti-Virus
Ans: (a) Online predators
3. What should a strong password consist of?
(a) Only letters (b)
Numbers and special characters
(c) Name of a person
(d) Letters, numbers and special characters
Ans: (d) Letters, numbers and special characters
B. Subjective questions
1. Explain how Trojan Horse virus works.
Ans: Trojan Horse: A Trojan
Horse disguises itself i.e., it appears to be a useful software program but
once it reaches a computer it starts behaving like a virus and destroying data.
2. List the various ways you can use to protect your data. / List the
various ways to protect data.
Ans: To protect our data from theft and viruses we can take
the following measures:
(a) Use passwords
to login to your computer: Use passwords that
are difficult to guess. Passwords are difficult to hack if they are a mix of
small (For example ‘a b c d’) and capital letters For example, ‘H J E R’),
numbers (For example ‘8 7 6 5’) and special characters
(For example, ’% ^ # $’). This would prevent unauthorised
people from using your computer.
(b) Install
Anti-virus and Firewall: Anti-viruses and
Firewall monitor the data coming in and out of a computer and prevent and
viruses from entering. Anti-viruses can also detect and clean viruses that may
have entered a computer.
(c) Encrypt Data: This is usually done by banks and companies in which
important customer
information is stored. They can encrypt their entire hard
disk using encrypting feature in Windows (Bitlocker). This would force users to
use a decryption password (or key) before starting the computer thus preventing
unauthorised usage.
(d) Secure sites: Give details of your credit card or bank account only on
secure sites. See in the address bar of the browser. If the site address starts
with https://and a lock symbol, then it is safe to give your credit card and
bank details.
3. Identify the importance of securing our computers and data.
Ans: Computer security is important because it
keeps your information protected. It's also important for your computer's overall
health; proper computer security helps prevent
viruses and malware, which allows programs to run quicker and smoother.
4. List the various threats to a computer and its data.
Ans: Threats are the ways in which personal information can be
leaked from a computer
without our knowing.
(a) Theft: Theft means stealing of information or hardware. These
maybe of three types:
• Physical: Where a person may steal your desktop computer or laptop.
• Identity: Where a hacker steals your personal information and assumes
your identity. Using this false identity, the hacker can gain access to your
account information or perform illegal activity.
• Software
Piracy: This is stealing of software and includes
using or distributing unlicensed and unauthorized copies of a computer program
or software.
(b) Virus: Viruses are computer programs that can damage the data
and software programs or steal the information stored on a computer. Major types
of viruses are Worms and Trojan Horse.
• Worms: These are viruses that replicate themselves and spread to
all files once they
attack a computer. This makes it very difficult to remove
them.
• Trojan Horse: A Trojan Horse disguises itself i.e., it appears to be a
useful software program but once it reaches a computer it starts behaving like
a virus and destroying data.
• Online
Predator: Online predators are people who trap you
into inappropriate relationships. They
may be older people posing to be your age, bullying you into doing illegal
activities online and sometimes face to face.
• Internet Scams:
Sometimes you may receive very attractive
offers saying you have won
a huge money in a lottery and that you can claim the
prize by depositing a certain amount
of money. When you deposit the money using credit card or
online banking, you not
only lose the deposit money but your card / account
information may be misused later.
No comments:
Post a Comment