Computers Worksheet
Computers Worksheet
—------------------------------------------------------------
LONG ANSWER QUESTIONS
1.What is a computer?Explain any two limitations and characteristics of a
computer?
A. Computer is a programmable electronic device that accepts input, processes the data
according to a set of instructions and gives some meaningful output.
Characteristics:
1. Speed:
A computer works at an amazing speed. The work which is done by a normal person in 2-3
hours can be done by a computer in a fraction of seconds.
2. Accuracy:
A computer performs its task with great accuracy. It does not commit any mistakes. Errors occur
only when the input is incorrect.
Limitations:
1. Limited Intelligence: As compared to human beings computers have limited IQ.
2. Dependence on Power: A Computer is an electronic machine and thus its dependence on
power makes it costly.
Compiler Interpreter
1.A Compiler converts an entire program 1.An Interpreter converts a program written
written in a High Level an Language into in a High Level Language into Machine
Machine Language code language program line by line.
2.It converts the entire program at one go. 2.It converts the HLL program line by line
If an error is found, it will give the error list and simultaneously executes the converted
along with the line numbers. Once the line. If an error is found, it will display the
errors are removed, the compiler compiles error and will not proceed till the error is
the program. rectified.
3. A compiler is not required in the memory 3.An interpreter is required in the memory
after compilation. along with the program for its execution.
MAN stands for metropolitan area network. It covers a larger area than LAN such as small
towns, cities, etc. MAN connects two or more computers that reside within the same or
completely different cities. MAN is expensive and should or might not be owned by one
organization.
WAN stands for wide area network. It covers a larger area than LAN as well as a MAN such as
country/continent etc. WAN is expensive and should or might not be owned by one organization.
PSTN or satellite medium is used for wide area networks.
6. Write about various safety measures to protect your system from malware attack ?
A.Following methods can be used for protecting our system from Malware attack.
1. Security Programs: The anti-virus should be regularly updated. It should also be
programmed to regularly scan and quarantine the system.
2. Secure Internet access: Be vigilant when accessing or uploading information on the
Internet.Only secure sites should be used for financial transactions and no personal
information should be shared.
3. Regular security updates: Keep your applications and operating system updated at all
times. Special attention should be paid to security updates and security bulletins for
each software or application being used.
4. Avoid Spams: Mails from unwanted and unwanted sources should be deleted without
reading or downloading. Any attachments in such mails should never be downloaded or
installed onto the system.
5. Scanning all portable devices: Scan all portable storage devices before use as these
are the most common sources of infection in computers.
SHORT ANSWER QUESTIONS
7.What is the difference between EPROM and EEPROM?
EPROM EEPROM
1. The contents can be erased using 1. In this type of ROM the contents can be
ultraviolet rays and then reprogrammed by erased by using high voltage electricity.
an EPROM programmer.
2. While erasing contents by using 2. The entire contents may not be erased
ultraviolet rays, the entire content has to be as it has the option to delete selective
erased. portions of memory.
3. The chip needs to be physically removed 3. The chip does not need to be physically
from the system for erasing the bits. removed from the system for erasing the
bits.
9.What is an Operating system? Name the major functions of the operating system.
A.An Operating System is the interface between the computer hardware and the end-user.
Processing of data, running applications, file management and handling the memory is all
managed by the computer OS. An operating system is the most important software that runs on
a computer.
The main functions of operating system are:
1) Processor Management
2) Memory Management
3)Device Management
4) File Management.
10.What are icons? Describe any three categories of System icons?
A. IONS: Small graphic symbols that are displayed on the desktop are called icons
System Icons: System Icons are displayed along the left edge of the screen. These icons are
created automatically by windows during its installation. Some system icons are :
1. My Computer
2. Recycle Bin
3. My Documents
4. Internet Explorer etc.
Computer: The complete information regarding the system drives and other peripherals can be
viewed under the computer icon.
Recycle bin: works like a trash bin , in which you throw the waste papers. It is a folder that
holds the deleted objects. You can also retrieve the deleted files, until you have emptied the
recycle bin.
Document :is a folder which is used to keep the commonly used documents. You can access
them easily when required.
24.Name the popular encryption software which can be downloaded free of charge?
A.FlexCrypt is the popular encryption software which can be downloaded free of charge.
25.Dhruv is working in the National weather Forecasting Agency.His job is to
telecast the daily weather forecast to the national television. Which type of
computer is used to forecast the weather conditions?
A.Supercomputer is used to forecast the weather conditions.
26.Name two types of Impact printers?
A.Impact printer refers to a class of printers that work by banging a head or needle against an
ink ribbon to make a mark on the paper. This includes dot-matrix printers, daisy-wheel printers,
and line printers. They are also called “character printers”.
Impact printers are classified into two types:
1) Daisy Wheel Printers.
2) Dot-Matrix printers.
27.Name the type of software that can be used for publication of a brochure or a
newspaper?
A.PageMaker, CorelDRAW,InDesign etc. are the softwares that can be used for publication
of a brochure or a newspaper?
28.Which Operating systems allow more than one user to use the same computer
at the same time or different times?
A.Multi user Operating systems allow more than one user to use the same computer at the
same time or different times.
29. Mention different components of the operating system.
A. The operating system has two components:
1. Shell 2. Kernel
30.What is a Plotter?
A.A Plotter is a vector graphic printing device which interprets commands from a computer to
make line drawing on paper with one or more automated pens.
31.What is Phishing?
A.Phishing is the fraudulent attempt to obtain sensitive information such as usernames,
passwords and credit card details by disguising as a trustworthy entity in an electronic
communication.
32.When was the Information Technology Act introduced by the Indian
government?
A.Information Technology Act2000 also known as ITA-2000 or IT Act introduced on October
17,2000.
33. What are the two types of software?
A. 1. System software 2. Application software
34.Name the port which is used to connect a Flash drive?
A.USB port used to connect a Flash drive.
35. Mention different types of ROM.
A. Masked ROM, PROM, EPROM, EEPROM.
36. What are the two types of primary memory?
A. RAM and ROM
37. Mention different types of RAM.
A. DRAM,SRAM,SDRAM,DDR.
38. Mention the most common types of monitor.
A. 1. CRT 2. LED 3. LCD
39. What is protocol?
A. Protocol means set of rules.
40. What is FTP?
A. File transfer protocol is standard internet protocol. It is one of the simplest and easiest ways
to exchange files between two or more computers.
*******************