CM Level-8 Question Bank
CM Level-8 Question Bank
Name:
Class: Section:
This series is based on the original Computer Masti series created by Prof. Sridhar Iyer, Dr. Farida Khan, Vijayalakshmi Chitta, Usha Viswanathan, Malati Baru and Kaumudi
Sahasrabudhe.
The Next Curriculum Series is an initiative of Next Education India Private Limited.
Next Education acknowledges the contribution of all the authors and reviewers in the creation of this book.
Copyright © Next Education India Private Limited.
All rights reserved.
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or
otherwise, without prior written permission of Next Education.
The authors and the publisher shall be neither liable nor responsible to any person or entity with respect to any loss or damage arising from the information contained in the
book and any associated material whether physical, electronic or mechanical.
Every effort has been made to trace the copyright holders and to obtain their permission for the use of copyrighted material. The publisher apologises for any errors or
omissions and would be grateful for notification of any corrections that should be incorporated in future reprints or editions.
Computer Masti Teacher Manual 1
ISBN: 978-93-86356-39-0
Published 2017
NEIPL/NB/CM-V4/AK17 :
Computer Masti has been designed and created at Computer Science and Engineering Department at IIT Bombay.
Contents
2. Inside Internet ........................................................................................ 01
7. SystemConfigurationandTroubleshooting................................. 55
Explain different types of network and Explain the term LAN. Understanding
its components/ Explain what
LAN,WLAN, WAN, packet and packet-
switching is
Explain the term WAN. Understanding
Explain the term WLAN. Understanding
Applications
Explain the term router. Understanding
State what is a router and its function? State what is a router and its function. Understanding
Explain the term packet. Understanding
Understanding Explain the E S - LA 12. What is the difference between Client/Server Network and A peer to peer network makes use of a group of computers to
terms server- Peer to Peer Network? share information. The information is stored on the different
client with computers connected within the network instead of a central
respect to location. The information in such a network is difficult to track as
Internet users need to remember the exact location of the resources.
network.
In a client-server network the server is the central location from
where information is accessed by the users or clients. The
information is easier to access as it is stored in a single location.
Understanding Explain the E S - LA 13. Answer the following in brief. i. LAN, or local area network, and WAN, or wide area network, are
terms LAN and i. What is the difference between LAN and WAN. Give Example two types of networks that enable interconnectivity between
WAN. of each. computers. LANs are used where the number of users is less such
ii. What is meant by single user internet connection with as in a home, office or school. WANs are used on a much larger
examples? scale such as in cities or across countries, a popular example being
iii. What is meant by multi user internet with example? the Internet. LANs are faster and more secure while WANs provide
coverage over a large area. LANs are often privately owned by a
single constituent while WANs are often owned by multiple
constituents.
ii. Using which of the below option can the receiver be sure ii. In which the receiver needs to be sure of the sender's identity
of the sender's identity and that an imposter has not sent and that an imposter has not sent the message.
the message.
a. Message Authentication
a. Message Authentication b. Entity Authentication
b. Entity Authentication c. Message Nonrepudiation
c. Message Nonrepudiation d. Message Integrity
d. Message Integrity
23.
23. State True or False. i. In digital Signature, we use the private and public Key to the
i. In digital Signature, we use the private and public Key to sender A.TrueB. False
the sender
A. True B. False 24.
i. This process of building a secret code by transforming
24. Fill in the blanks. information Using an algorithm is called encryption.
i. This process of building a secret code by transforming ii. The process of getting the plain text from the ciphertext is
information Using an algorithm is called ___________. called Decryption.
ii. The process of getting the plain text from the ciphertext is iii. Cipher is the code or the algorithm used in the encryption
called and decryption of data.
____________. iv. Key is the secret of the cipher, known only to the
iii. _________ is the code or the algorithm used in the authorized people.
encryption and decryption of data.
iv. _______ is the secret of the cipher, known only to the
authorized people.
Understanding Explain the E O - SA 26.Connect the Blocks in order to form a proper Network
process of Diagram.
exchange of
information
through Internet Internet
Internet
networks.
Switch Switch
IP Phone IP Phone
Desktop PC Desktop PC
Router Router
Printer Printer
Server Server
Understanding Explain the E S - LA 27. Answer the following in brief. i. A firewall secures a network from unauthorized access and
types of firewall i. What are the different Types of Firewall and their functions? communication. A firewall can be of two types - software and
and their ii. Explain with the help of diagram the operation of Firewall hardware.
functions. Software Firewall: A software firewall is usually installed on
desktops and laptops along with the OS. It monitors the
applications that access the Internet and allows only those that are
approved by the user.
Hardware Firewall: A hardware firewall router passes data
between networks and also contains hardware firewall
components. Its actions are similar to the software firewall but it
has many more options.
ii. An Intranet is
a. A private company network that includes external
specified users
b. A private Company Network
c. A Network Filling System
d. A Network Operating system
Understanding Explain WAN E O - SA 30. Choose a correct option. How are the Computers in a WAN iii
Connected?
i. Cables
ii. Intranet
iii. Telephonic Lines
iv. Internet
Remembering Define UPS E O - SA 31. Fill in the blanks. Uninterrupted power supply (UPS)
i. _____________ is an electrical equipment used to
protect the servers from power disruptions
Analysing Select the type D O - SA 32. Help Rohan figure out the missing component in the iii
of internet following illustration.
connection
based on the
necessity.
i. CD
ii. Modem
iii. 3G
iv. Dongle
Understanding Explain data E O - SA 34. Sonal has sent a message to Reena. She has used a i. Encryption
security messaging service which ensures user privacy. Which of the
enforced to below process does the messaging service use to guarantee
secure privacy?
information in
Internet.
i. Encryption
ii. Identification
iii. Decryption
iv. Conversion
Analysing Identify the D O - SA 35. Find the missing component from the following illustration. iii
type of
connection
based on the
network
service.
i. Switch
ii. Keyboard
iii. Modem
iv. Router
Understanding Explain the D O - SA 37. Find the missing component in the following figure. iv
term server-
client with
respect to
Internet
network.
i. Dongle
ii. UPS
iii. Router
iv. Server
Analysing Select the type D O - SA 38. Rajesh uses a laptop while working in the office. He has to i
of internet coordinate with his colleagues due to which he works from
connection different locations. Which of the below type of Internet
based on the connections would be suitable for him?
necessity. i. Wi-Fi
ii. Broadband Modem
iii. USB Dongle
iv. DSL
vi.Facebook and Myspace are all examples of what type of vi. Facebook and Myspace are all examples of
services? services?
a. E- Learning a. E- Learning
b. Social Networking b. Social Networking
c. Web Portal c. Web Portal
d. Wiki d. Wiki
vii.Twitter is an Example of what type of service? vii. Twitter is an Example of what type of serv
a. Blogging a. Blogging
b. Programming b. Programming
c. Gaming c. Gaming
d. Microblogging d. Microblogging
viii. In a relation to mobile digital devices, what does the viii. In a relation to mobile digital devices, wha
term ‘app’ mean? ‘app’ mean?
a. An abbreviation of apple, the technology corporation a. An abbreviation of apple, the technology c
b. An application designed to run on the Apple iPhone b. An application designed to run on the Apple
c. An application designed to run on the Apple iPod c. An application designed to run on the Apple
d. An application designed to run on a mobile device d. An application designed to run on a mobile
x. What is this Icon, often seen on websites, used for ? x. What is this Icon, often seen on websites, use
a. Sending Content to your mobile device
b. Bookmarking sites in your websites a. Sending Content to your mobile device
c. Peer-to-peer File Sharing b. Bookmarking sites in your websites
d. Sharing web content via Social Networking Social News c. Peer-to-peer File Sharing
and bookmarking sites d. Sharing web content via Social Networking S
and bookmarking sites
xi.What does this icon mean when seen on a website, and
what is it used for ?
xi. What does this icon mean when seen on a w
a. News, click to show the most recently uploaded content
b. Wireless connection, click to link to wireless devices what is it used for
c. RSS feed, click to subscribe to updates (e.g. blog posts) a.News, click to show the most recently uploade
d. Share, click to share content via social networks and b.Wireless connection, click to link to wireless d
Social news sites c.RSS feed, click to subscribe to updates (e.g. b
d.Share, click to share content via social networ
xii. Which of the below media are used by Social news sites
Networking Sites for communication?
a. Audio xii. Social Network Sites use which media for co
b. Video a. Audio
c. Text b. Video
d. All of the above c. Text
d. All of the above
xiii. Which phrase best describes what people do at social
Networking sites. Choose your correct answers xiii. Which phrase best describes what people d
a. They interact with countries Networking sites? Choose your correct answers
b. They browse articles and other content a. They interact with countries
c. They code pages in HTML b. They browse articles and other content
d. They interact with each other c. They code pages in HTML
d. They interact with each other
xiv. Twitter was founded in the year _________.
a.2005 xiv. Twitter was founded in the year _________
b.2006 a.2005
c.2003 b.2006
Understanding List examples E O SA 3. Match the icons on the left with Social Networking Sites given on the right. 3. Match the icons on the left with Social
of social Networking Sites given on the right.
networking I. 1. Twitter
websites. I. 3. Blogger
II. 2. Skype
II. 5. Facebook
III. 3. Blogger
III. 10. Google Plus
IV. 4. Youtube
IV. 9. Hike
V. 5. Facebook
V. 8. Linkedin
VI. 6. Whatsapp
VI. 6. Skype
VII. 7. Instagram
VII. 1. Twitter
VIII. 8. Linkedin
VIII. 6. Whatsapp
IX. 9. Hike
Applying Apply healthy E O SA 4. State if it is Do or Don’t for Social Networking Sites. Do’s - i, iii, iv, vii
practices
(SMART PLUS i. Ankita sets privacy setting to the most secure setting available. Don’ts – ii, v, vi
rules) while ii. Vaibhav likes to post information that would let everyone know about a vacation
using Internet or whether he is out of town for few days.
for social iii. Prachi makes unique password for every social media site.
interaction. iv. Riddhi is selective about accepting request from a friend or follower on a social
media account.
v. Priya clicks on the link even though it appears to be unusual or suspicious because
it is sent by friends.
vi. Ruchita posted online something personal and gave permission to everyone to
access it.
vii. Archit unfriends someone who is offending him and is not liking what they are
posting.
iii. Types
Bookmarking, Sharing, Blogging, Forums,
News, Profile Updates
ix.Same as i
iii. You are playing a game online, and the person you’re playing against starts talking
to you. ‘Hey, you’re really good at this game. Would you like to come my house and
show me how to get to the next level’? What do you say back?
a. Hold on while I ask my mum
b. No and tell someone about it
c. Yes please, but once I’ve done my homework
d. I’m not sure, do I know you?
Applying Apply healthy D S Lab Activity 10. Create a twitter account of your class and sent out a word and let your friends give
practices synonym, antonyms and examples to foster stronger and more descriptive writing.
(SMART PLUS
rules) while
using Internet
for social
interaction.
Applying Apply healthy D S Lab Activity 11. Conduct a mock interview round on Skype where one students will play a
practices interviewer and the other student as interviewee. Share your experience about the
(SMART PLUS interview with your friends by blogging the details on the whole experience on blogger.
rules) while Describe features of social networking.
using Internet
for social
interaction.
Understanding List uses of D S Lab Activity 12. Explore these Social Networking Sites and state how they can help you in education-
social i. DoResearch4me
networking ii. Hey Math! Challenge
sites for iii. Class Notes
educational iv. QuoteURL
purposes. v. CourseFeed
vi. PollDaddy
Understanding List examples E O SA 13. Which Social Networking sites would you suggest for the following: i. Flipkart, Amazon
of social i. Riya wants to buy new clothes and she doesn’t have time to go and shop- ii. Wikipedia, About.com
networking ii. Mohan’s teacher has given him a project to look for information about India’s iii. IRCTC
websites along
Prime Minister- iv. Twitter, Facebook
with the
purpose. iii. Radha is planning to trip to Mumbai and she wants to book train ticket v. Quora, techspot
iv. Anita’s friend shifted to New Jersey and Anita doesn’t have her Phone number and
wants to reach her to wish her Happy Birthday-
Applying Apply healthy E S LA 14. Answer the following in your own words: i. not in all the cases
practices i. Is it safe to play games and have fun on the internet? ii. 13 years
(SMART PLUS ii. How old do you have to be to have your own account on Facebook? iii. It is strongly recommended that a
rules) while iii. What kind of password should you use? password must be a combination of Upper
using Internet iv. Who should you go or report to when you feel unsafe or uncomfortable while on & Lower case alphabets, and atleast one
for social internet? number and special character
interaction. iv. to a trusted adult
Understanding Describe D S LA 15. Write a report on: Register/Create profile: Each user fills an
features of i. Features of Social Networking Sites online form with details about age,
social education, location, likes, dislikes and
networking.
hobbies. The user can add friends,
categorize them into groups, decide how
his/her profile is viewed and by whom it is
viewed.
Security settings: The user can configure
settings where she decides which content
on her page is public or private. The user
can block content from being viewed by a
list of users, can report SPAM and flag
content.
Networking features: Activities that the
user can perform:
Chat or use instant messaging services to
communicate with other online users.
Upload photos and videos so that they can
be viewed by others.
Play games.
Enter comments on content generated by
other users.
Send email.
Search and support: The user can search for
content based on keywords, interests,
schools. The user also has support in the
Applying Apply healthy E S LA 23. List the steps to create a profile on “CNET”.
practices
(SMART PLUS
rules) while
using Internet
for social
interaction.
Understanding Describe E S LA 24. Compare the security and privacy features available in Facebook and Twitter.
features of
social
networking.
Understanding Describe D S LA 25. In a group of five, create a quiz of 10 questions on the topic “Search features
features of available in WordPress”.
social
networking.
Understanding Describe E S Lab Activity 26. Create a collage of 5 of your friends using Photobucket. List three of the features you
features of liked the most.
social
networking.
Understanding Describe D S LA 27. Develop an advertisement on how crowdsourcing can help in improving quality of
features of products.
social
networking.
Applying Apply healthy D S Lab Activity 28. Map your own territory! – Using Google Maps/ Yahoo maps, tag your own residence
practices on the map.
(SMART PLUS
rules) while
using Internet
for social
interaction.
Understanding Describe D S Lab Activity 29. Create your own tour map of your favorite places on Google Map.
features of
social
networking.
Understanding List uses of E S LA 30. Write a short essay on “Evolution of location based services”.
social
networking
sites.
Understanding Describe E S Lab Activity 32. Compare the storage space offered by various SNS: Google Drive, DropBox, etc.
features of
social
networking.
Understanding List uses of D S LA 33. Write a short essay on “MOOCS” with examples.
social
networking
sites for
educational
purposes.
Understanding List pros and E S LA 34. In pairs, discuss the pros and cons of SNS being used in education.
cons of social
networking.
Understanding List examples D S Lab Activity 35. Create a list for the following.
of social i. SNS for booklovers and features they offer
networking ii. SNS for educators and activities they can do through these sites.
websites along iii. SNS for artists and tools that these sites offer.
with the
purpose.
Understanding Describe D S Lab Activity 36. Populate a spreadsheet with links of SNS that might be useful for grandparents. Also
features of list the purpose of each website.
social
networking.
Understanding Describe D S Lab Activity 37. Conduct a survey to find out which SNS are being used by:
features of i. Age group of 8 to 16 years
social ii. Age group of 30 to 45 years
networking. iii. Teachers in your school
iv. Management in your school
Understanding Describe D S LA 38. Create a campaign strategy for “Clean Nation Mission” in groups of five.
features of
social
ii. Which of the following are the networking features of an SNS? You could choose
more than one option.
a. Import photos from other SNS
b. Instant messaging
c. Play games
d. Report abuse
3. Sequence the below given steps to create a blog using google blogger.
i. Publish and view the blog
ii. Name your blog and choose a template
iii. Start blogging
Create a blogging
iv. Sign in
Understanding account with a E O - SA c
website or blogger.
a. IV-III-II-I
b. IV-III-I-II
c. IV-II-III-I
d. IV-I-II-III
Understanding List down the E O - SA 7. What is the purpose of blogging? Option d: All of the above
purpose of a. Sharing information
blogging. b. Making money by offering consultancy
c. Uploading videos and pictures of favourite stars
d. All of the above
Applying Create a blogging D Lab activity 8. Write down a blog of 100 words about your favourite teacher. Publish
account with a it and share it with your friends.
website or blogger.
Understanding List down the E S - LA 9. Write down 3 different purposes of blogging. 1. Sharing
purpose of information/opinions
blogging. 2. Providing consultation
3. To keep in touch with
friends and family
Remembering List some blogging E O - SA 10.Which of these is not a blogging website? Option c: Yahoo
websites. a. Wordpress
b. Google Blogger
c. Yahoo
d. Tumblr
Understanding Explain the term E O - SA 11. Read the following statements if you agree tick on ‘yes’ or else i - Yes
blogging with ‘no’.
examples. i. Is it possible to insert a hyperlink within the content of the blog.
(Yes/No)
Remembering List some blogging E O - SA 12. _________ and _________ are the examples of blogging websites. Wordpress, Tumblr
websites. (Wordpress / Linkedin / Tumblr / Yahoo / Facebook)
Understanding Create a blogging E O – SA 15. Read the following statements if you agree tick on ‘yes’ or else i - No
account with a ‘no’. ii- Yes
website or blogger. i. Prakash does not have a gmail account. Can he create his blog
using google blogger without creating an account? (Yes/No)
ii. Ethen is not familiar with HTML syntax. Can she create a blog?
Remembering Create a blog using E O - SA 18. _____ is used to create web pages HTML
HTML tags.
i. Hypotextmarkup language
ii. Heterotextmadeup language
iii. Hypertext Markup language
iv. Homotextmadeup language
Remembering Create a blog using E O - SA 20. _____ or _____ on a HTML page helps in formatting/editing the Tags, Elements
HTML tags. text.
Remembering Create a blog using D O - SA 21. The opening and closing tags in HTML are: i
HTML tags. i. <>&</> respectively
ii. </>&<>respectively
iii. <>&<-> respectively
iv. <->&<> respectively
Understanding Create a blog using D O - SA 22. How are command texts distinguished from a normal text? iii
HTML tags. i. By making the command text as Bold.
ii. By using different font size for normal text.
iii. By giving a special marking to command texts
iv. Keywords are distinguished automatically by HTML.
Remembering Create a blog using E O - SA 23. Command texts are also called as _____ Tags
HTML tags.
Remembering Create a blog using E O - SA 24. _____ is a system of distinguishing command text from normal iv
HTML tags. text.
i. Markout Language
ii. Markin Language
iii. Markdown Language
iv. Markup Language
Applying Create a blog using E Lab activity 25. Akbar wants to see the HTML code of his school's website.
HTML tags. - Help him in doing the same.
- Write down atleast 5 different tags used.
Applying Create a blog using D Lab activity 26. Write the HTML code for the following:
HTML tags. Welcome to my cookery blog
Tody we will discuss how to prepare indian tea!
Follow the following simple steps:
1. Collection of ingredients
Indian tea
Sugar
Milk
Ginger
Pot
Tea strainer
2. Crush ginger and boil water
3. Add sugar and tea
4.Add milk
5. Pour using tea strainer
Enjoy 'Chai'!
Remembering Create a website E O - SA 27. Read the following statements if you agree tick on ‘yes’ or else Yes
using Google apps. ‘no’.
i. Is it possible to create a simple website without coding in
HTML? (Yes/No)
Understanding Create a website E O - SA 28. Tools like Google sites (http://www.sites.google.com) and Wix creating simple websites
using Google apps. (http://www.wix.com) are used for ________________. without coding in HTML
Remembering Create a website D O - SA 29. Pick the odd one out. iii
using Google apps. i. Drupal
ii. Joomla
iii. Wix
iv. Tinyurl
Applying Apply the E O - SA 32. Why are the different texts of different sizes in a website? iii
guidelines of
designing a website i. It looks good
while planning for ii. It is a design flaw
it. iii. To communicate importance of topics
iv. None of these
a. V-III-II-I-IV
b. V-II-III-I-IV
c. V-II-III-IV-I
d. V-III-II-IV-I
Applying Explain the ticket E Lab activity 37. Go to www.makemytrip.com. Search for the cheapest flight rates
booking available on Delhi-Mumbai and Mumbai-Delhi route. Book tickets
transactions using (go till payment window) for today, 7th day from today and 30th
a website. day from today.
Applying Explain the buying E Lab activity 38. Go to at least 3 different e-commerce websites (Amazon, flipkart,
and selling of e-commerce) and find the "Samsung Galaxy 6" prices. Make sure
products through that the specifications are same on each e-commerce websites.
websites. Which website have the least prices?
Remembering Apply the E O - SA 40. Which of the following is NOT a back end technology i
guidelines of i. Flash
designing a website ii. MySQL
while planning for iii. Oracle
it. iv. ASP.NET
Remembering Explain the term D S - SA 42. RSS stands for ________________. Really Simple Syndication
blogging with or Rich Site Summary (RSS
examples. 0.91)
or RDF Site Summary (RSS 0.9
and 1.0)
or Real-time Simple
Syndication (RSS 2.0)
Understanding Explain the term D S - LA 43. Why and where is RSS used? RSS takes the latest headlines
blogging with from different web sites, and
examples. pushes those headlines down
to your computer for quick
scanning.
<body> </body>
<h1>Hi There!</h1>
<p>I am feeling happy today.</p>
</body>
Remembering Create a blog using E O – SA 45. State true or false for the below given HTML tags and their effects c
HTML tags. on the web pages.
i. <i> Italic
ii.<b> make the font size big
iii. <ul> unordered list
iv.<ol> hyperlink content
a. TFTT
b. TFFF
c. TFTF
d. FTFT
Remembering Apply the E O - SA 46. Identify the below given front end website designing tool from the ii
guidelines of given logo.
designing a website
while planning for
it.
i. Flash
ii. Java
iii. Visual Basic
iv. Ajax
Remembering List the units of E O - SA 3. Replace the question marks to form a meaningful conversion.
binary
numbers.
Remembering List the units of E O - SA 7. State True or False for the following.
binary i. 1 Gigabyte(GB)= 1024 Megabyte(MB) i. True
numbers. ii. 10 Megabyte(MB)= 1024 Kilobyte(KB) ii. False
iii.1024 Gigabyte(GB)= 1 Terabyte(TB) iv. True
Remembering List the units of E O - SA 10. Answer in one or two words. i. 1000
binary i. For converting a number Kilobytes to Megabytes, Sonam ii. 1024
numbers. should multiple the number by? iii.1024
ii. Rehan wants to convert 3 TB to Gigabytes so he will have to iv.1 MB folder size
multiply 3 by?
iii. How many times Joseph will have to add 3 KB to get the
Understanding Convert E O - SA 16. Convert the filled numbers to their corresponding number 1
numbers from systems in the space given in the table. Decimal Binary Octal Hexadecimal
one number Decimal Binary Octal Hexadecimal 170 10101010 252 AA
system to 10101010 342 101010110 526 156
another. 342 97 01100001 141 61
61
Understanding Convert E S - SA 17. Write down the steps for converting (116)16 to octal. i. Convert hexadecimal to binary
numbers from (116)16 =(000100010110)2
one number ii. Convert binary to octal
system to (000100010110)2=(426)8
another.
Understanding Convert E S - SA 18. Write down the steps to convert(104)10 to hexadecimal. 18.Write down the steps to convert(104)10 to hexadecimal
Understanding Convert E O - SA 21. Rehan wants to know the steps to be used right from i. Divide by 2, keep track of the remainder.
numbers from conversion of decimal number system to binary. Arrange ii. First remainder is bit 0 (LSB, least significant bit).Second remainder is bit 1.
one number them in a correct sequence by writing a number in the box iii. Continue the process till the quotient becomes zero.
system to next to it. Write 1 for the first step, 2 for the second step iv. Write the reminders from bottom to up in left to right order as shown.
another. and 3 for the third step.
i. Write the reminders from bottom to up in left to right
order as shown.
ii. First remainder is bit 0 (LSB, least significant
bit).Second remainder is bit 1.
iii. Divide by 2, keep track of the remainder.
iv. Continue the process till the quotient becomes zero.
Applying Convert E O - SA 22. Suresh sends a message to his friend in binary form. The “Hello”
alphabets to message reads as “01001000 01100101 01101100 01101100
binary numbers 01101111”. Write down the message that his Friend Rizwan
and vice-versa.
gets to read after decoding the binary code.
Understanding Convert E O - SA 23. Calculate the hexadecimal values that correspond to the
numbers from decimal values from 140 to 150. 140 8C
one number 141 8D
system to
Remembering List the units of D S - Lab 24. Form a group of 4 students and assign them one computer
binary exercise in lab each. Distribute the task in such a way that one
numbers. student finds out the size of RAM in GB and hard disk and
others convert it into KB,MB and TB respectively.
Applying Convert E O - SA 25. Each alphabet is one byte long. How many bytes do you 25.
alphabets to think the following statement has? “The word binary means 21 bytes
binary numbers two”.
and vice-versa. i. 20 bytes
ii. 19 bytes
iii. 22 bytes
iv. 21 bytes
Understanding Convert D S - Lab 26. Form a team of two student, go to the url:
numbers from exercise http://forums.cisco.com/CertCom/game/binary_game_pag
one number e.htm and play the binary game. Find out which team
system to
finishes the game at the earliest.
another.
Understand Explain what is E S - LA 27. Describe the binary number system. Computers store all data, like information, instructions, files, images, sound and video as
binary number numbers.All the data has to be converted to numbers in binary form to be processed by the
system. computer.
The word binary means two. The binary form code is formed by using only two values ‘0’ and
‘1’.
This is called the binary number system, or the base-2 system. Each digit in a binary number
is called as bit. A sequence of 8 bits is called byte.
Bit -0 1
A bit is the smallest unit of data in computer processing. Bit is derived from the words Binary
digit. A bit represents a digit in the binary system. A bit can only have the value 0 or 1.
An example: 1101 is a binary number and is 4 bits long.
Byte - 1 1 1 0 1 1 1 0
A Byte is a group of 8 bits. Bytes are the standard unit of storage in a computer.
An example: 10110111 is a byte and can represent data like text, pixels or sound in a
computer.
Understanding Identify and E S - LA 28. State and explain the different number systems with Decimal - The decimal numeral system has 10 as its base. It is the most widely used number
differentiate respect to the base and the digits used to represent the system.
between numbers.
Hexadecimal - The Hexadecimal numeral system has 16 as its base. It uses sixteen distinct
symbols, digits 0–9 to represent values from zero to nine, and A, B, C, D, E, F to represent
values ten to fifteen.
Understanding Explain what is E S – LA 27. Explain the steps in which the computer stores a text file. The computer uses alphabet to binary conversion for the same.
binary number Alphabets to Binary Conversion:
system.
Each letter has a length of 8 bits or 1 byte.
Different codes are used to distinguish between uppercase and lowercase.
For uppercase code will be 010 and for lowercase it will be 011.
Convert each letter to its decimal equivalent i.e. 1 - a , 2 - b, .....26 – Z
Convert decimal number to binary number.
Understanding Explain what is D S - LA 29. Decide and explain which number system should be used in Solution-In most modern computing devices, a bit is usually represented by an electrical
binary number modern computing and electric devices. voltage or current pulse, or by the ON – OFF state of a switch in a circuit. Thus the computer
system. uses the base-2 system i.e binary number system because it makes it a lot easier to
implement programs and data with current electronic technology. Bits can be implemented
in many forms. Here the ON state is denoted by ‘1’ and OFF by ‘0’ in binary number system.
Understanding Identify and E O - SA 28. With the help of a diagram interpret all possible inter-
differentiate conversions in different number systems (octal, decimal, The inter-conversion from one system to another involves 12 possible combinations
between binary, hexadecimal).
different
number
systems.
Applying Convert D S - SA 30. Write a message to your friend and ask him/her to decode
alphabets to it using the given figure.
binary numbers
and vice-versa.
Understanding Convert E O - SA 32. Help Raju complete the blanks to get a meaningful
numbers from conversion.
one number
system to
another.
Understanding Convert E O - SA 38.Choose the correct option.While converting a number from eight
numbers from decimal to octal we have to keep on dividing the number and
one number then the quotient obtained in each step by ______ till we get
system to zero in quotient.(ten/two/sixteen/eight)
another.
Understanding Explain what is E O - SA 39.Find the odd one out. i. Bit
binary number i. Bit, Byte, Terabyte, Gigabyte ii. 1000
system. ii.0100,0110,0011,1000
Understanding Identify and E O - SA 40.Find the odd one out: Unary
differentiate i. Binary, Unary, Decimal, Hexadecimal
between
different
number
systems.
Understanding Identify and E O - SA 41.Find the error if any and correct it. i. Eight symbols are needed to represent all digits in octal number system.
differentiate ii. 1024 Gigabytes makes one Terabyte
between i. Sixteen symbols are needed to represent all digits in iii. Correct
different octal number system.
number ii. 1000 Gigabytes makes one Terabyte
systems. iii. (91)8 is not possible
(10010110)2=(96)16
Applying Convert E S - SA 43.Explain the steps to convert “Computer”to binary 43.Explain the steps to convert “Computer”to binary
alphabets to
binary numbers Solution-
and vice-versa.
i. Different codes are used to distinguish between uppercase and lowercase. For uppercase
code will be 010 and for lowercase it will be 011.
C-010,o-011,m-011,p-011,u-011,t-011,e-011,r-011
C-3,o-15,m-13-,p-16,u-21,t-20,e-5,r-18
C-01000011
o-01101111
m-01101101
p-01110000
u-01110101
t-01110100
e-01100101
r-01110010
Understanding Convert E Lab 44.Form groups of two and convert from binary to decimal and
numbers from exercise decimal to binary using the following link.
one number http://easycalculation.com/binary-converter.php.
system to
another.
Understanding Explain what is E O – SA 45.State whether incorrect or correct. .Correct
binary number ii. Incorrect- (correct:bit)
system. i. Bits are abbreviated by ‘b’ and bytes are abbreviated by ‘B’. iii. Incorrect-(correct:binary form)
ii.Each digit in a binary number is called as byte iv. Incorrect-(correct:binary digit)
iii. All the data has to be converted to numbers in decimal form to
be processed by the computer.
iv. Bit is derived from Base Digit
a. Pictures
b. JPEG
c. Numbers
d. Alphabets
a. 111101010
b. 1010101
c. 00000110
d. 111111111
ii.Each alphabet is one byte long. How many bytes do you think
the following statement has?
“Eight bits makes one byte ”
iii.Each alphabet is 1 byte long. How many bits does the word
“Computer” have?
Applying Install an E S - LA 3. Tejas wants to use VLC media player on his operating system. List
application. down the steps to download and install the application in order to Solutions-
help Tejas. x Download the package for your particular Operating System (OS),
keeping in mind the right version.
x Ensure that the repository is a reliable site before downloading and
installing an application.
x On Window OS install virus protection on your system and scan the
downloaded package before installing it.
x For Ubuntu, download .deb package which is used by Ubuntu Software
Center (USC) to install software.
x Provide the path of the downloaded and extracted files .dir to the
installer.
x Update yourself about the latest developments in the OS that is being
used and details of software that you are using.
Applying Install an E O - SA 4. Rehan is trying to configure his system in such a way that he can
application. find an application as soon as he logs in. He is confused about the
order of steps to be followed. Help him in sequencing the steps. i. Select any application from startup applications in system menu,
click on add.
i. The application is added. ii. Enter name, enter comment and then click on browse
ii. Select application (required), click on add. iii. Select application (required), click on add.
Analysing Distinguish E O - SA 8. State whether true or false. 8. State whether true or false.
between user i. Users cannot install new applications. Only a system administrator i. True
and system can install the applications. ii. True
administrator ii. If a user deletes some system file inadvertently, then the system iii. True
privileges. may crash.
iii. To keep the system in a consistent and secure state for all the
users, it is always a good idea to work as a user even if you own the
system.
Analysing Distinguish E O - SA 9.Ankit is a normal user. State whether the following actions taken i. Incorrect-Because this application may be required by another user.
Create and delete files Create and delete files The user can create new
The users can see the items in files and delete files in the
the folder, but not open any folder, in addition to being
of them. able to access existing files.
Understanding Explain the E O - SA 14. Amruta’s computer had to be formatted due to some virus issues. Solution-She should take a backup of her files by copying the same in an
importance of She is not able to retrieve her presentation file. Suggest her the external device like CD or pendrive in future for preventing the loss of data in
maintaining measure that she can take in order to avoid similar problems in computer due to any reason. She can also create a backup of her files by
backup of files future. copying it on an internet storage server.
Applying Install an E S - LA 16. Explain the concept of plug and play with an example. The ability of a computer to automatically configure and make a newly
application. connected device available to the user, is called plug and play. For example a
pendrive is connected through USB to the computer. Almost immediately the
user can read content from the pen drive and write to it. After plugging the
device to the computer it almost immediately starts ‘playing’ or using it,
without having to restart the computer.
Applying Install an E O - SA 17. Mr. Parag is downloading an application for the first time, which 17. Mr.Parag is downloading an application for the first time, which of the
application. of the following options would be of the best help to him? following options would be of the best help to him?
i. Buy a book about downloading an application a. Buy a book about downloading an application
ii. Call his office and ask the administrator b. Call his office and ask the administrator
iii. Look into the ‘Help’ option in the application
c. Look into the ‘Help’ option in the application
iv. Ask his friend
d. Ask his friend
Analysing Distinguish E O - SA 18. John is a normal user. He is currently using Windows. He wants to 18. John is a normal user. He is currently using Windows. He wants to add a
between user add a new OS-Linux to his system for a project. Which of the new OS-Linux to his system for a project. Which of the following options
and system following options would be of the best help to him. would be of the best help to him..
administrator
privileges and a. Download and install a. Download and install
backup. b. Send a request to the System Administrator to do the same. b. Send a request to the System Administrator to do the same.
c. Ask a technician c. Ask a technician
d. iv. None of the above d. None of the above
Applying Install an E O - SA 19. Strike out the wrong option. 19.Strike out the wrong option
application. i. (Internet/Storage Repository) is a location from which applications 1. (Internet/Storage Repository)is a storage location from which applications
Remembering Identify the E O - SA 2.(Privilege/Permission) specify how a file or directory is accessed and the
basic ii.(Privilege/Permission) specifies how a file or directory is accessed actions that can be performed on the file by users on the computer.
components of and the actions that can be performed on the file by users on the
a computer. 3. (Home/Menu bar) is an important icon on desktop which helps us find
desktop. applications and settings.
Remembering Set permissions E O - SA iii. (Home/Menu bar) is an important icon on desktop which helps
to share files us find applications and settings.
and folders.
Applying Perform basic E S - LA 20. Mohak is trying to use the mouse after connecting it to his laptop. 20. Mohak is trying to use the mouse after connecting it to his laptop. But it is
troubleshooting But it is not working. What steps should he take to troubleshoot? not working. What steps should he take to troubleshoot?
for devices and
applications. Solution-
USB mouse
PS/2 mouse
Wireless mouse
Applying Perform basic E S - LA 21. Your web browser is not working right. What steps would you Solution-
Remembering Identify the E Lab exercise 25.Try to change a few settings of your system like brightness,
basic screensaver etc.
components of
a
desktop.
Applying Install an D Lab exercise 27. Download a software for an educational game from
application. sourceforge.net. Install the same and use it.
Understanding Explain the E Lab exercise 28. Create a presentation for binary numbers and backup the same
importance of by uploading a copy of the same on Google Drive.
maintaining
backup of files
For Windows
Applying Install an E O - SA 32. Ankita wants the Tux Paint application installed on her desktop on 32. Ankita wants the Tux Paint application on desktop. Guide her with the
application. Windows OS. Guide her with the steps. steps.
Solution-
1. Right click the Tux Paint icon.
2. Select the option 'Create Shortcut'.
Remembering Identify the E O - SA 34.Rakhi got stuck while adding an application. Guide her by
basic replacing question marks and find the missing component in the
components of following picture:
a
desktop.
Applying Install an E S - SA 36.Explain a few actions that can be performed on a file. 36.Explain a few actions on file
application. Solution-
Actions on the file:
Execute: Allow the file to be run as a program. Example: Application file like
Open Office, games.
Open with: Choose an application with which the file can be opened.
Applying Perform basic E O - SA 37.Complete the passage for Troubleshooting using Stepwise Thinking 37.Complete the passage for Troubleshooting using Stepwise Thinking
troubleshooting
for devices and First write the _______ or ___ that you wish to resolve. Then write the First write the problem or issue that you wish to resolve. Then write the steps
applications. _______ that you need to take. This will help you to remember the that you need to take. This will help you to remember the actions that you will
actions that you will be taking, avoid repetition of the same steps and be taking, avoid repetition of the same steps and to better understand the
to better understand the problem and its possible solution problem and its possible solution
Applying Perform basic E O - SA 38. Shantanu is facing issues in working of a device. He is using the 38. Shantanu is facing issues in working of a device .He using following
troubleshooting following techniques to troubleshoot. Say which one is correct? techniques to troubleshoot. Say which one is correct?
for devices and
applications. 1.Correct
i. Check configuration and settings (whichever is relevant to that
particular device). 2.Incorrect
Applying Perform basic E O - SA 39.Complete the passage for Troubleshooting using Information n
troubleshooting Gathering Remember to gather any information such as screenshots of error messages,
for devices and the screen going blank, software freezing or any peripheral devices beeping.
Remember to _________such as screenshots of error messages, the
applications. You can make use of this information to properly convey the problem to a
screen going blank, software freezing or any peripheral devices beeping.
system administrator in case you need help.
You can make use of this information to properly convey the problem to
a __________ in case you need help.
Applying Perform basic E O - SA 40. Complete the passage for Troubleshooting using Logical Thinking
troubleshooting Once you have listed the steps and gathered the necessary information you can
for devices and Once you have listed the____ and gathered the necessary information begin to resolve the issue. Begin with simple solutions such as checking the
applications. you can begin to resolve the issue. Begin with ____ such as checking connections, restarting the computer or closing and re-launching an
the connections, restarting the computer or closing and re-launching application. Use the technique of elimination by testing each step and checking
an application. Use the technique of _________ by testing each step to see if it gives the desired result. This will help you to narrow down to the
and checking to see if it gives the desired result. This will help you to possible source.
______to the possible source.
Applying Perform basic E O - SA 42. Sequence the measures that you can use while troubleshooting
troubleshooting network connectivity issues. i. For wired network, check if the network cable is connected and the
for devices and indicator LED is blinking. And for wireless network, check if the wireless is
applications. i. Inform the system administrator if there are any network error ON. Also check if the wireless switch in the vicinity is working.
messages. ii. Check if network has been enabled.
ii. For wired network, check if the network cable is connected and iii. Inform the system administrator if there are any network error
the indicator LED is blinking. And for wireless network, check if messages.
the wireless is ON. Also check if the wireless switch in the
vicinity is working.
iii. Check if network has been enabled.
Applying Perform basic E O - SA 43. Shantanu is facing issues in working of an application .He using i. 1.Correct
troubleshooting following techniques to troubleshoot. Say which one is correct? ii. 2.Correct
for devices and iii. 3.Incorrect
applications. i. Check if the application is installed on the computer.
ii. Check if the user has permission to use the software.
iii.Ask the administrator to change permissions if required is not a
good option
Applying Perform basic E S - LA 44. Juhi is facing a problem with Libre Office as it is working very
troubleshooting slowly. Help Juhi with the best steps to troubleshoot her problem. 1. Close and re-launch the application.
for devices and 2: Update the application to the latest version. You may need to use a CD or
applications. connect to the Internet to check for any updates.
3: If the application freezes, use the task manager to close the application and
then launch it again.
4. Restart the computer
5. Scan the computer using an anti-virus software. A malware may be slowing
things down.
6. Check available disk space. If your hard drive is out of space you will need to
delete any files or programs that you don’t need.
Applying Perform basic E O - SA 46.View the screenshot and identify what is displayed? User Forum
troubleshooting
for devices and
applications.
Applying Perform basic D O - SA 47.Sequence the three screenshots by replacing the question mark to
troubleshooting form a meaningful order of ending a process.
for devices and
applications.
Understanding Explain the E O - SA 49. Give examples of the backup options possible. Solution-
importance of
maintaining 1,Copy the files in an external device like pendrive or CD.
backup of files.
2.Upload the files on an internet storage server(maybe Google Drive)
4. The output of a certain program is given. Write the program using for The output of a certain program is given. Write the program using
statementOutput – for statement
10 Output –
9 10
8 9
7 8
6 7
5 6
4 5
3 4
2 3
1 2
0 1
0
Solution –
for i = 10 to 0 step -1
print i
next i
Applying Write a program E S - LA 5. Answer the below questions. Write the syntax for ‘if’ statement
to control the Answer – The syntax for ‘if’ statement is
repetition of a i. Write the syntax for ‘if’ statement if condition then
sequence of ii. Write the syntax for ‘for’ statement statement(s) to execute when true
instructions with end if
iii. Write the syntax for ‘while’ statement
a condition.
iv. How does a ‘for’ statement works?
Write the syntax for ‘for’ statement
Applying Write a program D O - SA 6. Write a program in BASIC 256 to find the squares of numbers less than Write a program in BASIC 256 to find the squares of numbers less
to control the 1000. than 1000
repetition of a Answer –
sequence of #square of numbers less than 1000
instructions with
n=1
a condition.
while n<1000
print n*n
pause 0.5
n = n+1
endwhile
Applying Write a program D O - LA 7. Write algorithm to generate a Fibonacci series. Write algorithm to generate a Fibonacci series
to control the Answer –
repetition of a #Generate a Fibonacci series upto a given number
sequence of input “Enter a number”,num
instructions with
print “Fibonacci series upto” +num
a condition.
print
a=0
b=1
while b<num
print b+“;”
c=a+b
a=b
b=c
end while
Understanding Explain the E S - LA 10. Answer the below questions. Define subroutine
importance of Answer - A Subroutine is used to repeat a block of code at different
subroutines i. Define a subroutine places in a program.
while writing ii. List down the advantages of using subroutines
programs. List down the advantages of using subroutines
Answer -
Advantages of using a subroutine:
x Multiple calls to a block of code are possible, at different
times in the program.
x They reduce the chances of typing errors when the same
code has to be used in multiple places in the program.
x A program is easy to read, since the main steps can be easily
followed.
x Programs are easier to design, since the main steps are
written. The subroutines contain the details of these steps.
x When more than one programmer works on a program, each
programmer can choose a subroutine to write independently
and also test it. Then the subroutines can be called in the
desired sequence.
subtract
result = num1 - num2
print num1 +"-"+ num2+ "="+ result
return
mult
result = num1 * num2
print num1 +"*"+ num2+ "="+ result
return
division
result = num1 / num2
print num1 +"/"+ num2+ "="+ result
return
Operators Operations
< Less than
expression1<expression2
Return true if expression1 is
less than expression2, else
return false.
<= Less Than or Equal
expression1 <= expression2
Return true if expression1 is
less than or equal to
expression2, else return false.
> Greater Than
expression1 > expression2
Return true if expression1 is
a. N < 1000
b. N < N + 1
c. N > 1
d. N > 1000
a. Tri
b. angle
c. ang
d. gle
a. 22
b. 25
c. 26
d. 28
Understanding Define database. E S - SA 3. What does control mean in a database? Control means to restrict the users to access and modify the
tables or data in the database
Understanding Define data base E O - SA 6. Select the correct option. Qi. Option c:Microsoft Access
management system. i. Identify the DBMS Package.
a. Microsoft Word
b. Microsoft Powerpoint
c. Microsoft Access
d. Microsoft Excel
Understanding Define data base E S - SA 7. What is a primary key ? The unique column which uniquely identifies a record is called
management system. the primary key
801 56 79 74
802 77 66 86
803 72 75 62
804 83 85 91
Applying Query database for E Lab Question 12. For the queries given below, write the names i. Table : Student_details
information. of tables that will be used for the query(refer Condition : Place LIKE 'Mumbai'
to the tables of previous question), the Result: Abdul, rohit, shweta, jyoti only from mumbai
condition and the result that will be displayed ii. Table : Student_details , Student_Score
for the query: Condition : Science > 80
Result: Only Jyoti and tejas have got above 80 in
i. Students Name from Mumbai science
ii. Students Name who scored more than 80 in iii. Table : Student_details , Student_Score
Science Condition : Science > 75 and Maths > 75
iii. Students Name who scored more than 75 in Result: Only Jyoti and tejas have got above 75 in both
Science and Maths math and science
iv. Students Name who scored more than 80 in iv. Table : Student_details , Student_Score
Science,Maths and English Condition : Science > 80 and Maths > 80 and English
v. Students Name from Pune who scored more > 80
than 80 in Science or Maths or English Result: Jyoti
v. Table : Student_details , Student_Score
Condition : Place LIKE 'Pune' and Science > 80 or Maths
> 80 or English > 80
Result for the query will be tejas, he only is the student
from pune, not rohit.
Understanding Define query. E O – SA 13. A _______ is a special view of a table Query
corresponding to some desired information to be
extracted.
Understanding Define query. E O – SA 14. A ____________ helps in extracting correct Primary key
information from a table.
Understanding Define query. E O – SA 15. State whether the following statements are true i. FALSE
or false.
i. A query applied on multiple tables may or may
not contain a common data field.
Remembering Identify the steps to E O - SA 16. State whether the following statements are true i. FALSE
create a database. or false.
i. Assigning aliases to the fields names is required
while extracting information from the tables
Remembering Identify the steps to E O - SA 17. Select the correct sequence of steps to be iii
create a database. followed while creating a database:
i. Register a database -> Select Create a new
database -> Name the database
ii. Select Create a new database -> Name a
database -> Register a database
Applying Design a database D O - SA 25. In a school, there are 35 students that includes 20 Delete Cascade
table. boys and 15 girls. Out of the 15 girls, two girls
have left the school and their records need to be
deleted from the master table School_data and
Girls_Data
Which option can be used in order to deleted
records from the both tables?
Applying Design a database D O - SA 26. Tejas is studying in Vidhyaniketan School in Update Cascade
table. Mumbai. Her father has been transferred to a
different location in Mumbai. She wants her
address to updated in the school database tables.
Which option can used for it?
Applying Design a database D O - SA 27. What option can Megha use during creation of a Alias
table. query to give user friendly names to field names
like ‘Date of Birth’ for DOB column?
Applying Design a database D Lab Activity 28. Using a DBMS, design a database table for books
table. you are studying in class. Below mentioned
details are required.
(Book_Title , Author Name , Publisher)
Applying Design a database D Lab Activity 29. Using a DBMS, design a database table for
table. students studying in your class. Below mentioned
details are required.
(Roll number , Name , Age, Gender, Address)
Applying Design a database D Lab Activity 30. Create a primary key for the following table.
table. Table Name : Book_Details
Columns : Title ,Book_ID, Descriptions, Author,
Publisher
Applying Design a database D Lab Activity 31. Create two tables in Microsoft Access. Enter
table. details of 10 students and their marks in each
subject.
Table1: Students_details( Student_Id , Name ,
Age, Gender)
Table2: Annual_exam ( Student_Id ,
Maths,Science,English)
Applying Design a database D Lab Activity 32. Create a relationship between two tables. Table1:
table. Students_details( Student_Id , Name , Age,
Gender)