0% found this document useful (0 votes)
20 views4 pages

Computer 1st Puc

Uploaded by

shravyajj3412
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views4 pages

Computer 1st Puc

Uploaded by

shravyajj3412
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 4

Main Exam - 8 Marks

1. What is a digital footprint? Explain its types.


A digital footprint is the trail of data left behind by users while interacting
online.

Active Digital Footprint: Data intentionally shared, such as social media posts or
online forms.

Passive Digital Footprint: Data collected without user awareness, such as cookies
or browsing history.

2. Explain net etiquette in detail.


Netiquette refers to guidelines for proper online behavior:

Use respectful language.

Avoid all caps (shouting).

Respect others' privacy.

Cite sources when sharing content.

Refrain from spamming or trolling.

3. Explain communication etiquette in detail.


Communication etiquette ensures clear and polite exchanges:

Be concise and clear in your messages.

Use proper salutations and grammar in emails.

Avoid interrupting others.

Listen actively during conversations.

4. Explain social etiquette in detail.


Social etiquette involves respectful and considerate behavior:

Be punctual.

Dress appropriately for occasions.

Avoid interrupting others.

Show gratitude and respect differing opinions.

5. What are the ways to protect intellectual property?

Use trademarks, patents, and copyrights.


Monitor for potential infringements.

Sign non-disclosure agreements (NDAs).

Educate employees about intellectual property rights.

6. What is hacking? Explain its two types.


Hacking is unauthorized access to computer systems or networks.

Ethical Hacking: Done legally to identify vulnerabilities.

Malicious Hacking: Performed to steal, damage, or disrupt systems.

7. What are the safety measures to prevent cybercrimes?

Use strong, unique passwords.

Enable two-factor authentication.

Avoid downloading files from untrusted sources.

Regularly update software and use antivirus protection.

8. In what ways is IPR violated?

Plagiarism: Copying someone’s work without credit.

Counterfeiting: Selling fake products under a brand name.

Piracy: Unauthorized distribution of software, movies, etc.

Trademark infringement: Using a brand name illegally.

9. What are the examples of identity theft?

Using stolen credit card details.

Hacking social media accounts to impersonate someone.

Opening bank accounts using stolen personal information.

Filing fraudulent tax returns for refunds.

10. How does the role of ergonomics impact health?


Ergonomics ensures a comfortable and safe working environment:
Proper posture reduces back pain.

Adjustable screens and chairs minimize strain on the eyes and body.

Regular breaks improve focus and reduce fatigue.

Ergonomic keyboards prevent wrist injuries.

---

Strings Questions

1. How to access characters in a string?


Characters can be accessed using indexing. Example:

string = "hello"
print(string[0]) # Output: h
print(string[-1]) # Output: o

2. Discuss to which data type a string belongs. Explain with a proper example.
Strings belong to the sequence data type. They are immutable. Example:

string = "hello"
print(type(string)) # Output: <class 'str'>

3. Explain string operations.


Common string operations include:

Concatenation (+): Combining strings.

Repetition (*): Repeating strings.

Membership (in): Checking for substrings.

Example:

string = "hello"
print("he" in string) # Output: True

4. List any five built-in functions of strings.

len(): Returns the length of a string.

upper(): Converts all characters to uppercase.

lower(): Converts all characters to lowercase.

replace(): Replaces a substring with another.

strip(): Removes leading/trailing whitespaces.


5. What is string slicing, and how is it useful?
String slicing extracts specific parts of a string using [start:end:step].
Example:

string = "hello"
print(string[1:4]) # Output: ell

6. What would be the output of the following return statements?

"pvt" + "hon" → "pvthon"

"hi" * 3 → "hihihi"

You might also like