UNIT 3 Notes
UNIT 3 Notes
Answer (A)
2. What is the term used when you press and hold the left mouse key and move the mouse
around?
Answer (B)
Answer (D)
4. What happens if you leave a device plugged in even after it is charged 100%?
A) It can break. B) It can stop functioning. C) It can overheat. D) Data can get corrupt.
Answer (C)
C) It can prevent data from getting corrupt .D) It can backup data.
Answer (C)
A) Keep the device unplugged when in use. B) Do not cover a laptop with a blanket.
C) Make sure the computer's CPU fan is working. D) Avoid leaving the device in the sun.
A) Turn the keyboard upside down and shake it to remove foreign material.
C) Use a very dilute combination of soap and water applied with a non-abrasive cloth to
remove stains from the keycaps.
Answer (D)
SECTION B
SUBJECTIVE TYPE QUESTIONS
1. Here are the steps that take place when starting a computer. Rearrange the steps in
correct order.
a. Desktop appears after login
b. Login screen appears
c. Power on self-test(POST)starts
d. Operating system starts
e. Welcome screen appears
Ans:
Power on Self-Test (POST) starts.
Operating system starts.
Welcome screen appears.
Login screen appears.
Desktop appears after login.
2. Write the steps to create a new file.
1. Open an application (Word, PowerPoint, etc.) and create a new file like you
normally would. ...
2. Click File.
3. Click Save as.
4. Select Box as the location where you'd like to save your file. If you have a
particular folder that you'd like to save it to, select it.
5. Name your file.
6. Click Save.
Boot sector viruses can cause a computer to be unable to boot, it may boot to a blue
screen, or the OS will not start, or a black screen with an error message may occur
Ans. To prevent computers from being used by unauthorized persons it must be locked
when the users are not working on it. This will ensure that no unauthorized person can
see or make changes to our information without taking our permission. To make sure the
computer is locked, the login IDs and passwords must be created. A login ID and
password is like a key to the lock which allows the user to use the computer only if the
entered login ID and password match with the computer database. Once finished the
work, the user must log out or sign out so that no one else can see the work.
(i) Keyboard: Clean a keyboard with a soft brush to remove crumbs and dust particles.
(ii) Screen: Wipe the screen with a soft cloth to remove any finger marks.
(iii) Be careful with food and drinks: Avoid eating and keeping glasses of water or cups
of coffee near a computer.
(iv) Handle devices carefully: Handle and move your laptop carefully and avoid dropping
or banging it against a hard surface.
(v) Keep the computer cool: If a computer, laptop or mobile device gets overheated, the
internal parts can be damaged. The CPU has an internal fan to keep it cool. We should
make sure the fan is functioning. Avoid leaving a device in the sun or in a closed car. We
should be careful when using a laptop while sitting in bed and make sure that the fan is
not covered.
(vi) Do not overcharge your battery: Sometimes we keep a device plugged in for charging
even after it is fully charged. If we leave the device plugged in for a long time, it can
overheat the battery. This reduces the battery life. Always unplug the device once it is
charged 100%.
(vii) Always plug in devices carefully: Any device being connected to a laptop or
computer such as a USB drive or headphones, should be done gently. It should not be
forced into the port. If you find it difficult to plug in a device, change the direction and
try instead of trying to force it in.
(viii) Do not run too many programs at a time: When too many programs are running at
the same time, the computer can become slow and even crash. If a program/app is not
being used, it should be closed so that other programs can work smoothly.
9. How can you increase the performance of a computer?
Ans. The ways to increase the performance of a computer are:
Ans. The various ways to protect our data from theft and viruses are:
(a) Use passwords to log in to your computer: Use passwords that are difficult to guess.
Passwords are difficult to hack if they are a mix of small (For example ‘a b c d’) and capital
letters (For example, ‘H J E R’), numbers (For example ‘8 7 6 5’) and special characters (For
example, ’% ^ # $’). This would prevent unauthorized people from using your computer.
(b) Install Anti-virus and Firewall: Anti-viruses and Firewalls monitor the data coming in and out
of a computer and prevent viruses from entering. Anti-viruses can also detect and clean viruses
that may have entered a computer.
(c) Encrypt Data: This is usually done by banks and companies in which important customer
information is stored. They can encrypt their entire hard disk using the encryption feature in
Windows (Bit locker). This would force users to use a decryption password (or key) before
starting the computer thus preventing unauthorized usage.
(d) Secure sites: Give details of your credit card or bank account only on secure sites. See in the
address bar of the browser. If the site address starts with https://and a lock symbol, then it is safe
to give your credit card and bank details