ICT SKILLS-II
Quick Revision
Notes
1. Control
Program controls and manages all the hardware and memory resources of the
computer system It regulates the activities of the CPU and allocates memory
space whenever required. It coordinates to schedule the data to be received or
sent through input and output devices.
2. In
Distributed Operating System, processing is carried independently in more than
one location but with sharing of computational capacity. It is accessed by set
of computers Interconnected by a network. It gives an impression to the user
that he is working on a single system.
3. Microsoft
Windows is a widely used graphical user interface operating system for personal
computers and mobiles that provide a standard appearance on a rectangular screen.
It was first introduced in 1985. In Windows, the user need not remember all the
commands but needs to recognize the graphical representation for the
application on the screen in order to use them.
4. A panel (in
Linux) or taskbar (in Windows) is an area on the desktop that is used as a link
to open and close programs and it also allows the user to switch between the
opened applications or programs. It is a thin strip like bar that lies at the
bottom of the screen. Panel/Taskbar contains Start/Main Menu button, Quick
Launch toolbar and System Tray.
5. A device
driver is a form of software that enables a hardware device to be compatible
with the computer. It activates the specific hardware device that can be easily
interpreted by the CPU resources. Device drivers are operating system specific
and hardware dependent computer programs, which may automatically get activated
whenever that hardware device is attached to the computer.
6. To clean
your keyboard use compressed air. Compressed air is pressurized air contained
in a can with a very long nozzle. Try to blow air in between the keys to remove
dust.
7. Malware
refers to infectious programs that hamper the functioning of a computer system.
It is an unwanted software which is designed to damage a computer system. Some
common types of malware are virus. worms, trojan horse, spyware, etc.
8. Antivirus
are remedial software that scan, detect, clean and remove virus from a computer
system. Some antiviruses also help to recover the data which is lost. Once the
antivirus software is installed on a computer, it prompts and informs the user
if there is an attack of virus on the computer.
9. Always use
passwords that are difficult to guess. Passwords are difficult to hack if they
are a mix of small letters (a, b, c, d, etc.), capital letters (A, B, C, D,
etc.), numbers (8, 7, 6, 5, etc.) and special characters (% ^,#, 5, etc.). This
would prevent unauthorised people from accessing your computer.
Objective
Questions-
Multiple Choice Questions (MCQs)
1. The…………………… serves as the interface between the user and
the computer. (CBSE Sample Paper, 2020)
a. Operating System b.
Antivirus
c. Input Device d.
Maximize Button
2. …………………….is a location on the computer where a group of
files can be stored.
a. Filegroup b.
Folder
c. File d.
None of these
3 . A notepad file has……………………….extension.
a.jpg b.
.doc
c.rtf d.
.txt
4. What can a computer virus NOT do?
a. Infect files b.
Infect printer
c. Corrupt files d.
Make the computer slow
5. You want to record a song on your computer. Which device
will you use?
a. Microphone b.
Mouse
c. Keyboard d.
Printer
6. …………………… and …………………………programs offer real-time
protection monitoring your computer for any and
changes by malware software.
a. Cookies, Antivirus b.
Antivirus, Passwords
d. Antivirus, Antivirus c.
Antispyware, Cookies
7. Which of the following functions is not performed using a
mouse?
a. Turn on b.
Hover
c. Right click d.
Drag and Drop
8. A………...is a device that converts digital computer signals
into analog signals.
a. Router b.
Cable
c. Repeater d.
Modem
9. In a network when all computers are as efficient as CPU
then……………….type of Architecture. it is active.
a. Client-Server b.
P2P
c. WAN d.
None of these
10. ………………….disguises itself initially appears useful
program but destroys data when it is active.
a. Spam b.
Trojan Horse
c. Worms d.
both b and c
11. Which one of the following is an example of Operating
System?
a. Microsoft Word b.
Microsoft Windows
c. Microsoft Excel d.
Microsoft Access
12. Here are the steps that take place when starting a
computer. Rearrange the steps in the correct order
i. Desktop appears after login ii.
Login screen appears
iii. Power on Self-Test (POST) starts iv.
Operating system starts
v. Welcome screen appears
a. i)->) -> ii) -> Iv)->v) b.
ii)-> iv)->) -> v)->1)
c) -> Iv)->v)->) -> 1) d.
III)->v) -> iv)->) -> 1)
13. A......operating system is a computing environment that
reacts to input within a specific period of time.
a. Single-User b.
Multi-User
c. Real-Time d.
Distribute
14. Identify the measure to protect computer from threats
and viruses:
a. Sharing password with friends b.
Allow anyone to use your device
c. Use Antivirus d.
Leave computer without logging out
15. The cleaning of software installed in the computer
cannot be achieved by…………………………………
a. Disk cleanup b.
Backup
c. Cleaning CPU cabinet d.
Installing antivirus software (CBSE, 2022)
16. GUI stands for…………………..
a. Graphical User Interaction b.
Graphical User Interface
c. Graphical Upper Interface d.
Geographical User Interaction [CBSE, 2022]
17. The shortcut used for copying is:
a. Ctrl+C b.
Ctrl+V
c. Ctrl+A d.
Ctrl+P
Ans.wers
1. a |
2. b |
3. d |
4. b |
5. a |
6. d |
7. a |
8. d |
9. b |
10. b |
11. b |
12. c |
13. c |
14. c |
15. c |
16. b |
17. a |
|
Very Short/Short Ans.wer
Questions
A. Fill in the blanks.
1. ...........is a portable operating system.
2. ……………….. is the latest version of Windows OS.
3. ………………. is referred as the basic structure and concise
format to arrange the set of information with their names.
4. ……………… is the core area of hard disk storage where the
most important programs like OS are stored
5. …………………… are operating system specific and hardware
dependent computer programs, which automatically get activated whenever that
hardware device is attached to the computer.
Ans.wers:
1.
UNIX |
2.
Windows 11 |
3.
File System |
4.
Boot Sector |
5.
Device derivers |
B. Ans.wer the following questions.
1. Write down the steps to create a folder in C drive
with your name.
Ans.. Step
1: Right-click in the location(C:/drive).
Step 2:
Now, right click again and select New option. (CBSE Sample Paper, 2020)
Step 3:
Type in your name to save the folder with your name.
2. How can a virus infect a computer? List two ways.
Ans.. a. Through
infected files attached in emails
b. Through
infected pen-drives
3. How can you increase the performance of a computer?
Ans.. a.
Uninstall unnecessary software.
b. Use Disk
Cleanup software regularly.
4. Explain Worms and Trojan Horse.
Ans.. Worms:
These are viruses that replicate themselves and spread to all files once they
attack a computer. This makes it very difficult to remove them.
Trojan Horse: A Trojan Horse disguises itself i.e.,
it appears to be a useful software program but once it reaches a computer it
starts behaving like a virus and destroys data.
5. Why should we take care of our computers and mobiles?
Ans.. Computers
and mobiles are very expensive. When we take good care of them on a regular
basis, we can use them for a longer time. This will help us save money as we do
not need to buy new devices too often.
6 . Write the keyboard shortcut for the following:
a. Print b. Undo c. Cut d.
Open a new file in Notepad
Ans.. a. Ctrl+P b. Ctrl+Z c. Ctrl+X d. Ctrl+N
7. What are the file extensions of the following files?
a. Text file b.
Image file c. Sound
file d. Word file
Ans.. a. Text
file: .txt b. Image file: .jpg c. Sound file:.mp3 d. Word file: .doc
8. What are Spam mails? Explain.
Ans.. Spam are
the unwanted mails usually sent by advertising companies. These mails get
stored in SPAM folder automatically. We should not open such mails and delete
it on a regular basis.
9. Write four signs that indicate that your computer is
infected with virus are:
Ans.. The four
signs that indicate that your computer is infected with virus.
a. Computer runs very slow i.e., speed of execution is slow. b. There can be change
in the file size.
c. Computer often stops responding d.
Computer restarts on its own.
10. What do these abbreviations stand for.
a. CUI b. GUI c. FSF d.
GNU e. BOSS f. CDAC g.PDA h.
PIM i. PnP j.MBR
Ans.. a.
Character User Interface b.
Graphical User Interface
c. Free Software Foundation d.
Genuinely Not Unix
e. Bharat Operating System Solution f. Centre for Development of
Advanced Computing
g. Personal Digital Assistance h. Personal
Information Management
i. Plug and Play j.
Master Boot Record
11. Differentiate between CUI and GUI.
Ans..
CUI OS |
GUI OS |
In CUI OS,
the user sends commands and instructions to the computer in character form,
Le, by typing commands at the command prompt. The display
on the screen does not contain any graphics. |
In GUI OS,
the interface is graphical, ie, the user interacts with the computer using
figures and graphics on the screen. It is basically men driven. |
CUI OS is not
as interactive and user friendly as GUI OS. |
GUI OS is
user friendly and interactive. |
Examples are
MS-DOS and UNIX |
Examples are
Windows and Linux. |
12. Write any four functions of OS.
Ans.. Four
functions of an operating system are as follows:
• Device Management: OS directly controls the
operation of the input-output devices, like controlling the action of the
printer, or the CD-ROM drive.
• Process Management: OS handles the scheduling and
synchronization of processing, suspension and resumption of processes. OS
independently prioritizes jobs for processing inside a computer.
• Memory Management: OS co-ordinates and controls the
use of memory in a computer.
• Security Management: OS protects information and
resources against destruction and unauthorized usage.
13. What is Spyware?
Ans.. Spyware is
a program which infects and collects information of the computer without the
owner's knowledge or consent. A spyware generally infects a computer system by
getting trAns.mitted through
Internet via websites, webpages or emails. It intrudes into a computer and
silently steals the data of the computer. In other words, it refers to that
kind of software which can track the activities of a computer system and report
to the users Keylogger is an example of a spyware.
Unit Test-2
A. Tick the correct option,
1. In which of the following operating systems do users use
to interact with the computer using figures and graphics
on the screen?
a. Distributed OS b.
Character User Interface OS
c. Graphical User Interface OS d.
None of these
2. Which of the following options should we consider while
creating a password?
i. Small letters ii.
Capital letters iii.
Special characters
a. Only (i) b.
Only (ii) c.
Only (iii) d.
All of them
3. Which of the following statement is INCORRECT regarding
antivirus?
a. Some of the antivirus programs help us recover the data
which has been lost.
b. It uses to scan, detect, clean and remove virus from a
computer system.
c. It is used to make our password strength strong
d. It controls and manages all the hardware and memory
resources of the computer system.
4. Which of the following drivers gets automatically
activated whenever that hardware device is attached to the
computer?
a. Software b.
Device c.
Antivirus d. Programs
5. In which of the following years was Microsoft Windows
introduced?
a. 1985 b.
1990 c.
1980 d.
1982
B. Ans.wer the following questions.
1. What is device driver?
2. Define antivirus?
3. What is malware and what are its types?
No comments:
Post a Comment