0% found this document useful (0 votes)
18 views5 pages

UNIT 3 Notes

Uploaded by

Payal Kharva
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views5 pages

UNIT 3 Notes

Uploaded by

Payal Kharva
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

UNIT 3

INFORMATION AND COMMUNICATION TECHNOLOGY


Section A

1. Which of the following functions is not performed using a mouse?

A) Turn on B) Hover C) Right-click D) Drag and Drop

Answer (A)
2. What is the term used when you press and hold the left mouse key and move the mouse
around?

A) Highlighting B) Dragging C) Selecting D) Moving

Answer (B)

3. . Which of the following is a valid file extension for Notepad file?

A) .jpg B) .doc C) .text (POST) starts D). txt

Answer (D)

4. What happens if you leave a device plugged in even after it is charged 100%?

A) It can break. B) It can stop functioning. C) It can overheat. D) Data can get corrupt.

Answer (C)

5. How can an antivirus protect your device?

A) It can protect it from overheating. B) It can increase its performance.

C) It can prevent data from getting corrupt .D) It can backup data.

Answer (C)

6. Which option is not required to keep a device cool?

A) Keep the device unplugged when in use. B) Do not cover a laptop with a blanket.

C) Make sure the computer's CPU fan is working. D) Avoid leaving the device in the sun.

Prepared By: Ms. Dhivya Reviewed By: MS .Hazeena , Ms. Anisha


Answer (A)

7. Which of the following is essential for maintaining a keyboard?

A) Turn the keyboard upside down and shake it to remove foreign material.

B) Blow dust and other particles with help of a blower.

C) Use a very dilute combination of soap and water applied with a non-abrasive cloth to
remove stains from the keycaps.

D) all of the above

Answer (D)
SECTION B
SUBJECTIVE TYPE QUESTIONS
1. Here are the steps that take place when starting a computer. Rearrange the steps in
correct order.
a. Desktop appears after login
b. Login screen appears
c. Power on self-test(POST)starts
d. Operating system starts
e. Welcome screen appears
Ans:

Power on Self-Test (POST) starts.
 Operating system starts.
 Welcome screen appears.
 Login screen appears.
 Desktop appears after login.
2. Write the steps to create a new file.
1. Open an application (Word, PowerPoint, etc.) and create a new file like you
normally would. ...
2. Click File.
3. Click Save as.
4. Select Box as the location where you'd like to save your file. If you have a
particular folder that you'd like to save it to, select it.
5. Name your file.
6. Click Save.

Prepared By: Ms. Dhivya Reviewed By: MS .Hazeena , Ms. Anisha


3. How a computer file system similar to our physical file system in a school?
Ans. In any school, each teacher has a separate cabinet where they keep the files of
different students or classes on separate shelves. Similarly, information on a computer is
stored in electronic files, which can be put into separate folders. It is easier to manage the
electronic files as they can be simply copied, moved, renamed or even deleted.
4. How can you view the properties of a file? Write the simple steps.
To view information about a file or folder, right-click it and select Properties. You can
also select the file and press Alt + Enter. The file properties window shows you
information like the type of file, the size of the file, and when you last modified it.
5. What is boot sector virus? Explain in detail.
Boot sector viruses are a type of malware that infects a system’s boot partition or the
master boot record (MBR) of a hard disk. A boot sector is the section of a disk containing
the code and data needed to start the operating system (OS) of a computer. While the
computer is starting up and before security software is engaged, the virus executes its
malicious code.
Symptoms of a Boot Sector Virus
Users are unlikely to know if they have a boot sector virus until they run
an antivirus solution or conduct a malware scan. There are a few different signs that a
computer has been infected with a boot sector virus. Here are some examples:
 Boot sector viruses, like most others, can cause your computer to slow down

 Files may start to be encrypted or disappear altogether

 Boot sector viruses can cause a computer to be unable to boot, it may boot to a blue
screen, or the OS will not start, or a black screen with an error message may occur

6. Explain how Trojan horse works?


Ans. A Trojan horse, or Trojan, is a type of malicious code or software that looks
legitimate but can take control of your computer. It is designed to harm your computer
without knowing you. It can steal the data, manage or change the data by itself. This will
harm your computer or network.

7. How will you prevent others from using your computer?

Ans. To prevent computers from being used by unauthorized persons it must be locked
when the users are not working on it. This will ensure that no unauthorized person can
see or make changes to our information without taking our permission. To make sure the
computer is locked, the login IDs and passwords must be created. A login ID and
password is like a key to the lock which allows the user to use the computer only if the
entered login ID and password match with the computer database. Once finished the
work, the user must log out or sign out so that no one else can see the work.

8. Explain how to clean a computer on a daily basis.


Prepared By: Ms. Dhivya Reviewed By: MS .Hazeena , Ms. Anisha
Ans. The ways to clean a computer on a daily basis are:

(i) Keyboard: Clean a keyboard with a soft brush to remove crumbs and dust particles.

(ii) Screen: Wipe the screen with a soft cloth to remove any finger marks.

(iii) Be careful with food and drinks: Avoid eating and keeping glasses of water or cups
of coffee near a computer.

(iv) Handle devices carefully: Handle and move your laptop carefully and avoid dropping
or banging it against a hard surface.

(v) Keep the computer cool: If a computer, laptop or mobile device gets overheated, the
internal parts can be damaged. The CPU has an internal fan to keep it cool. We should
make sure the fan is functioning. Avoid leaving a device in the sun or in a closed car. We
should be careful when using a laptop while sitting in bed and make sure that the fan is
not covered.

(vi) Do not overcharge your battery: Sometimes we keep a device plugged in for charging
even after it is fully charged. If we leave the device plugged in for a long time, it can
overheat the battery. This reduces the battery life. Always unplug the device once it is
charged 100%.

(vii) Always plug in devices carefully: Any device being connected to a laptop or
computer such as a USB drive or headphones, should be done gently. It should not be
forced into the port. If you find it difficult to plug in a device, change the direction and
try instead of trying to force it in.

(viii) Do not run too many programs at a time: When too many programs are running at
the same time, the computer can become slow and even crash. If a program/app is not
being used, it should be closed so that other programs can work smoothly.
9. How can you increase the performance of a computer?
Ans. The ways to increase the performance of a computer are:

1) Uninstall unnecessary software

2) Limit the programs at the startup

3) add more RAM to your PC

4) Check for spyware and viruses

Prepared By: Ms. Dhivya Reviewed By: MS .Hazeena , Ms. Anisha


5) Use Disk Cleanup and defragmentation

6) Consider a startup SSD


8. List the various ways you can use to protect your data.

Ans. The various ways to protect our data from theft and viruses are:

(a) Use passwords to log in to your computer: Use passwords that are difficult to guess.
Passwords are difficult to hack if they are a mix of small (For example ‘a b c d’) and capital
letters (For example, ‘H J E R’), numbers (For example ‘8 7 6 5’) and special characters (For
example, ’% ^ # $’). This would prevent unauthorized people from using your computer.

(b) Install Anti-virus and Firewall: Anti-viruses and Firewalls monitor the data coming in and out
of a computer and prevent viruses from entering. Anti-viruses can also detect and clean viruses
that may have entered a computer.

(c) Encrypt Data: This is usually done by banks and companies in which important customer
information is stored. They can encrypt their entire hard disk using the encryption feature in
Windows (Bit locker). This would force users to use a decryption password (or key) before
starting the computer thus preventing unauthorized usage.

(d) Secure sites: Give details of your credit card or bank account only on secure sites. See in the
address bar of the browser. If the site address starts with https://and a lock symbol, then it is safe
to give your credit card and bank details

Prepared By: Ms. Dhivya Reviewed By: MS .Hazeena , Ms. Anisha

You might also like