Python Tutorial: AI-ICT SKILLS-II

Thursday, 7 September 2023

AI-ICT SKILLS-II

 ICT SKILLS-II

Quick Revision Notes

1. Control Program controls and manages all the hardware and memory resources of the computer system It regulates the activities of the CPU and allocates memory space whenever required. It coordinates to schedule the data to be received or sent through input and output devices.

2. In Distributed Operating System, processing is carried independently in more than one location but with sharing of computational capacity. It is accessed by set of computers Interconnected by a network. It gives an impression to the user that he is working on a single system.

3. Microsoft Windows is a widely used graphical user interface operating system for personal computers and mobiles that provide a standard appearance on a rectangular screen. It was first introduced in 1985. In Windows, the user need not remember all the commands but needs to recognize the graphical representation for the application on the screen in order to use them.

4. A panel (in Linux) or taskbar (in Windows) is an area on the desktop that is used as a link to open and close programs and it also allows the user to switch between the opened applications or programs. It is a thin strip like bar that lies at the bottom of the screen. Panel/Taskbar contains Start/Main Menu button, Quick Launch toolbar and System Tray.

5. A device driver is a form of software that enables a hardware device to be compatible with the computer. It activates the specific hardware device that can be easily interpreted by the CPU resources. Device drivers are operating system specific and hardware dependent computer programs, which may automatically get activated whenever that hardware device is attached to the computer.

6. To clean your keyboard use compressed air. Compressed air is pressurized air contained in a can with a very long nozzle. Try to blow air in between the keys to remove dust.

7. Malware refers to infectious programs that hamper the functioning of a computer system. It is an unwanted software which is designed to damage a computer system. Some common types of malware are virus. worms, trojan horse, spyware, etc.

8. Antivirus are remedial software that scan, detect, clean and remove virus from a computer system. Some antiviruses also help to recover the data which is lost. Once the antivirus software is installed on a computer, it prompts and informs the user if there is an attack of virus on the computer.

9. Always use passwords that are difficult to guess. Passwords are difficult to hack if they are a mix of small letters (a, b, c, d, etc.), capital letters (A, B, C, D, etc.), numbers (8, 7, 6, 5, etc.) and special characters (% ^,#, 5, etc.). This would prevent unauthorised people from accessing your computer.

Objective Questions-

Multiple Choice Questions (MCQs)

1. The…………………… serves as the interface between the user and the computer. (CBSE Sample Paper, 2020)

a. Operating System                                                                                       b. Antivirus

c. Input Device                                                                                                  d. Maximize Button

2. …………………….is a location on the computer where a group of files can be stored.

a. Filegroup                                                                                                        b. Folder

c. File                                                                                                                     d. None of these

3 . A notepad file has……………………….extension.

a.jpg                                                                                                                      b. .doc

c.rtf                                                                                                                        d. .txt

4. What can a computer virus NOT do?

a. Infect files                                                                                                      b. Infect printer

c. Corrupt files                                                                                                   d. Make the computer slow

5. You want to record a song on your computer. Which device will you use?

a. Microphone                                                                                                  b. Mouse

c. Keyboard                                                                                                        d. Printer

6. …………………… and …………………………programs offer real-time protection monitoring your computer for any and

changes by malware software.

a. Cookies, Antivirus                                                                                       b. Antivirus, Passwords

d. Antivirus, Antivirus                                                                                     c. Antispyware, Cookies

7. Which of the following functions is not performed using a mouse?

a. Turn on                                                                                                            b. Hover

c. Right click                                                                                                        d. Drag and Drop

8. A………...is a device that converts digital computer signals into analog signals.

a. Router                                                                                                             b. Cable

c. Repeater                                                                                                         d. Modem

9. In a network when all computers are as efficient as CPU then……………….type of Architecture. it is active.

a. Client-Server                                                                                                 b. P2P

c. WAN                                                                                                                 d. None of these

10. ………………….disguises itself initially appears useful program but destroys data when it is active.

a. Spam                                                                                                                b. Trojan Horse

c. Worms                                                                                                             d. both b and c

11. Which one of the following is an example of Operating System?

a. Microsoft Word                                                                                            b. Microsoft Windows

c. Microsoft Excel                                                                                             d. Microsoft Access

12. Here are the steps that take place when starting a computer. Rearrange the steps in the correct order

i. Desktop appears after login                                                                     ii. Login screen appears

iii. Power on Self-Test (POST) starts                                                         iv. Operating system starts

v. Welcome screen appears

a. i)->) -> ii) -> Iv)->v)                                                                                      b. ii)-> iv)->) -> v)->1)

c) -> Iv)->v)->) -> 1)                                                                                          d. III)->v) -> iv)->) -> 1)

13. A......operating system is a computing environment that reacts to input within a specific period of time.

a. Single-User                                                                                                    b. Multi-User

c. Real-Time                                                                                                       d. Distribute

14. Identify the measure to protect computer from threats and viruses:

a. Sharing password with friends                                                               b. Allow anyone to use your device

c. Use Antivirus                                                                                                 d. Leave computer without logging out

15. The cleaning of software installed in the computer cannot be achieved by…………………………………

a. Disk cleanup                                                                                                  b. Backup

c. Cleaning CPU cabinet                                                                                 d. Installing antivirus software (CBSE, 2022)

16. GUI stands for…………………..

a. Graphical User Interaction                                                                       b. Graphical User Interface

c. Graphical Upper Interface                                                                       d. Geographical User Interaction [CBSE, 2022]

17. The shortcut used for copying is:

a. Ctrl+C                                                                                                               b. Ctrl+V

c. Ctrl+A                                                                                                               d. Ctrl+P

Ans.wers

1.       a

2.       b

3.       d

4.       b

5.       a

6.       d

7.       a

8.       d

9.       b

10.   b

11.   b

12.   c

13.   c

14.   c

15.   c

16.   b

17.   a

 

 

Very Short/Short Ans.wer Questions

A. Fill in the blanks.

1. ...........is a portable operating system.

2. ……………….. is the latest version of Windows OS.

3. ………………. is referred as the basic structure and concise format to arrange the set of information with their names.

4. ……………… is the core area of hard disk storage where the most important programs like OS are stored

5. …………………… are operating system specific and hardware dependent computer programs, which automatically get activated whenever that hardware device is attached to the computer.

Ans.wers:

1.       UNIX

2.       Windows 11

3.       File System

4.       Boot Sector

5.       Device derivers

B. Ans.wer the following questions.

1. Write down the steps to create a folder in C drive with your name.

Ans.. Step 1: Right-click in the location(C:/drive).

        Step 2: Now, right click again and select New option. (CBSE Sample Paper, 2020)

        Step 3: Type in your name to save the folder with your name.

2. How can a virus infect a computer? List two ways.

Ans.. a. Through infected files attached in emails

         b. Through infected pen-drives

3. How can you increase the performance of a computer?

Ans.. a. Uninstall unnecessary software.

         b. Use Disk Cleanup software regularly.

4. Explain Worms and Trojan Horse.

Ans.. Worms: These are viruses that replicate themselves and spread to all files once they attack a computer. This makes it very difficult to remove them.

Trojan Horse: A Trojan Horse disguises itself i.e., it appears to be a useful software program but once it reaches a computer it starts behaving like a virus and destroys data.

5. Why should we take care of our computers and mobiles?

Ans.. Computers and mobiles are very expensive. When we take good care of them on a regular basis, we can use them for a longer time. This will help us save money as we do not need to buy new devices too often.

6 . Write the keyboard shortcut for the following:

a. Print                                  b. Undo                c. Cut                    d. Open a new file in Notepad

Ans.. a. Ctrl+P                    b. Ctrl+Z               c. Ctrl+X               d. Ctrl+N

7. What are the file extensions of the following files?

a. Text file                           b. Image file                       c. Sound file                        d. Word file

Ans.. a. Text file: .txt       b. Image file: .jpg             c. Sound file:.mp3            d. Word file: .doc

8. What are Spam mails? Explain.

Ans.. Spam are the unwanted mails usually sent by advertising companies. These mails get stored in SPAM folder automatically. We should not open such mails and delete it on a regular basis.

9. Write four signs that indicate that your computer is infected with virus are:

Ans.. The four signs that indicate that your computer is infected with virus.

a. Computer runs very slow i.e., speed of execution is slow.                          b. There can be change in the file size.

c. Computer often stops responding                                                                        d. Computer restarts on its own.

10. What do these abbreviations stand for.

a. CUI    b. GUI   c. FSF     d. GNU                 e. BOSS                 f. CDAC                 g.PDA                    h. PIM                   i. PnP     j.MBR

Ans.. a. Character User Interface                                               b. Graphical User Interface

c. Free Software Foundation                                                       d. Genuinely Not Unix

e. Bharat Operating System Solution                                       f. Centre for Development of Advanced Computing

g. Personal Digital Assistance                                                      h. Personal Information Management                                   

i. Plug and Play                                                                                  j. Master Boot Record                                                                   

11. Differentiate between CUI and GUI.

Ans..

CUI OS

GUI OS

In CUI OS, the user sends commands and instructions to the computer in character form, Le, by typing commands at the command prompt.

The display on the screen does not contain any graphics.

In GUI OS, the interface is graphical, ie, the user interacts with the computer using figures and graphics on the screen. It is basically men driven.

CUI OS is not as interactive and user friendly as GUI OS.

GUI OS is user friendly and interactive.

Examples are MS-DOS and UNIX

Examples are Windows and Linux.

12. Write any four functions of OS.

Ans.. Four functions of an operating system are as follows:

Device Management: OS directly controls the operation of the input-output devices, like controlling the action of the printer, or the CD-ROM drive.

• Process Management: OS handles the scheduling and synchronization of processing, suspension and resumption of processes. OS independently prioritizes jobs for processing inside a computer.

• Memory Management: OS co-ordinates and controls the use of memory in a computer.

• Security Management: OS protects information and resources against destruction and unauthorized usage.

13. What is Spyware?

Ans.. Spyware is a program which infects and collects information of the computer without the owner's knowledge or consent. A spyware generally infects a computer system by getting trAns.mitted through Internet via websites, webpages or emails. It intrudes into a computer and silently steals the data of the computer. In other words, it refers to that kind of software which can track the activities of a computer system and report to the users Keylogger is an example of a spyware.

Unit Test-2

A. Tick the correct option,

1. In which of the following operating systems do users use to interact with the computer using figures and graphics

on the screen?

a. Distributed OS                                                                                              b. Character User Interface OS

c. Graphical User Interface OS                                                                    d. None of these

2. Which of the following options should we consider while creating a password?

i. Small letters                   ii. Capital letters                               iii. Special characters

a. Only (i)                             b. Only (ii)                           c. Only (iii)                           d. All of them

3. Which of the following statement is INCORRECT regarding antivirus?

a. Some of the antivirus programs help us recover the data which has been lost.

b. It uses to scan, detect, clean and remove virus from a computer system.

c. It is used to make our password strength strong

d. It controls and manages all the hardware and memory resources of the computer system.

4. Which of the following drivers gets automatically activated whenever that hardware device is attached to the

computer?

a. Software                         b. Device                             c. Antivirus                          d. Programs

5. In which of the following years was Microsoft Windows introduced?

a. 1985                                  b. 1990                                  c. 1980                                  d. 1982

B. Ans.wer the following questions.

1. What is device driver?

2. Define antivirus?

3. What is malware and what are its types?

4. What is the main role of the control program?

No comments:

Post a Comment