Class 10 Computer Applications Top 49
Class 10 Computer Applications Top 49
Applications
Top 49
Questions
Networking
Question
Why do we need computer networks?
Answer
(i) Networks enable resource sharing across the globe.
(ii) Networks provide high reliability by having alternate copies of data. Presence of multiple CPUs means
that if one goes down, the others may be able to take over its work. This ability to work in the face of hardware
problems is of atmost importance in military, banking, air traffic control, nuclear reactor safety, etc.
(iii) Networks enable a client/server model with clients as small computers, one per user, with data kept on
one or more shared file server machines. Eg. Software installation can be on server and this can save cost of
buying license for every machine.
Question
Differentiate between LAN and WAN.
Answer
Question
Distinguish between MAC address and IP address with the help of example of each.
Answer
Question
What are the types of IP addresses?
Answer
IP addresses are of two types:
Static IP Address: Static IP addresses are those types of IP address that never change once they are
assigned to a device on a network. No doubt this type of addressing is cost effective but could have a high
security risk. Static IP addresses are mostly used by web, email and gaming servers who don’t care much
about hiding their locations.
Dynamic Address: A Dynamic IP address changes each time the device logs into a network. This kind of IP
address is very tough to trace and are used by companies and business firms.
Question
How does WWW work?
Answer
The World Wide Web (WWW) is a network of online content that is formatted in HTML and accessed via
HTTP. The term refers to all the interlinked HTML pages that can be accessed over the Internet.
The WWW system is based on the client/sever architecture. A web client sends request for information to
any web server. This is a program upon receipt of which the server sends the document requested to the
requesting client.
Typically the client program (browser) runs on a separate machine from that of the server. the server takes
care of all the issues related to document storage, whereas the task of presenting the information to the
user is left to the client program.
The protocol that web clients and servers use to communicate with each other is called the Hypertext
Transfer Protocol (HTTP). All web clients and servers must use HTTP in order to send/receive hypermedia
documents. For this reason, web servers are often called HTTP servers.
Question
What is the difference between HTTP and HTTPS?
Answer
Question
Advantage of Talnet:
The main advantage of using Telnet is that the user can make changes related to system which is not
possible in any other method. All type of resources can be shared.
Question
Enlist the difference between FTP and TELNET.
Answer
Question
e-Commerce:
Able to do online transactions.
No need to go to bank for updating the passbook depositing the money.
Online Shopping.
Question
Mention the services which are provided by transactional category of an e-banking.
Answer
There are no geographical barriers and the services that can be offered at a minimum cost.
Through Internet banking, you can check your transactions at any time and as many times as you want
to.
If the fund transfer has to be made outstation, where the bank does not have a branch, the bank would
demand outstation charges, whereas with the help of online banking, it will be absolutely free for you.
Internet banking deploys the Internet as a medium for financial transaction. e.g. a customer login to his
or her bank account by accessing the bank Website
Question
“Use of e-governance has its social and economic impacts.” Justify.
Answer
e-Governance harnesses information technologies (such as Wide Area Networks, the internet, and mobile
computing) to transform relations with citizens, businesses, and other arms of government.
These technologies can serve a variety of different ends; better delivery of government services to citizens,
improved interactions with business and industry, citizen empowerment through access to information, or
more efficient government management. The resulting benefits can be less corruption, increased
transparency, greater convenience, revenue growth, and/or cost reductions.
Question
Write a short note on Video Conferencing.
Answer
Video conferencing is a communications technology that integrates video and audio to connect users
anywhere in the world as if they were in the same room. This term usually refers to communication between
three or more users who are in at least two locations, rather than oneon-one communication, and it often
includes multiple people at each location.
Each user or group of users who are participating in a video conference typically must have a computer, a
camera, a microphone, a video screen and a sound system. Another requirement is a connection to the
communications system that is being used, which in the 21st century usually is the Internet but might also be
a satellite-based system, a broadcast signal or other communications technology.
Advantages:
When using video conferencing, participants can see and hear each other in real time or close to it,
allowing natural face-to-face conversations and visual elements that are not possible with voice-only
communications technology.
It saves time and money
Disadvantages:
Expensive
Lack of familiarity with technology can cause frustration.
Question
Differentiate between TDMA and CDMA.
Answer
Question
Explain Global System for Mobile GSM communications.
Answer
GSM is a digital mobile telephony system that is widely used in Europe and other parts of the
world.
GSM uses a variation of time division multiple access (TDMA) and is the most widely used of the
three digital wireless telephony technologies (TDMA, GSM, and CDMA).
GSM digitizes and compresses data, then sends it down a channel with two other streams of user
data, each in its own time slot.
It operates at either the 900 MHz or 1800 MHz frequency band.
Question
Advantages:
Higher efficiency and productivity of staff
The quality and flexibility of services offered to customer
The ability to accept payments wirelessly
Improved networking capabilities
Disadvantages:
Costs: New technologies and devices are often costly to purchase and require ongoing maintenance and
upkeep.
Workplace distractions: As the range of technologies and devices increases, so does the potential for
them to disrupt productivity and work flow in the business.
Additional training needs: Staff may need instructions and training on how to use new technology.
Increased IT security needs: Portable devices are vulnerable to security risks, especially if they contain
sensitive or critical business data.
HTML
Question
They are identified by a symbol. It may be a square, a circle or a disc. The attribute TYPE helps in using
the symbols to create a list. This attribute takes the value as the name of the symbol.
<ul type=”square”>
<ul type=”disc”>
<ul type=”circle”>
This is a container tag. It has both the opening and the closing tag. The listing is created under it using
the <li> tag. Again <li> tag is a container tag. The data item to be listed is input between the opening <li>
Example:
Question
How will you nest an unordered list inside an ordered list?
Answer
<html>
<head>
<title> set of list </title>
</head>
<body>
<ol>
<li> First order point
<ul>
<li>First unordered list item</li>
<li>Second unordered list item</li>
</ul>
</li>
<li>Another ordered point</li>
</ol>
</body>
</html>
Question
What are the attributes of audio tag?
Answer
Question
School Timetable:
Question
Post: It appends form data inside the body of the HTTP request (data is not shown in URL). It has no size
limitations. Form submissions with Post cannot be bookmarked.
Question
Attributes of checkboxes:
NAME: It adds an internet name to the field so the program that handles the form can identify the fields.
VALUE: It defines what will be submitted if checked.
ALIGN: It defines how the text field will be aligned form.
Valid Entries are: TOP, MIDDLE, BOTTOM, RIGHT, LEFT TEXTTOP, BASELINE, ABSMIDDLE, ABSBOTTOM.
TABINDEX: It defines in which order the different fields should be activated when the visitor clicks the tab
key.
Question
(b) External style sheet: An external style sheet is a separate file where you can declare all the styles that
you want to use on your website. You can then link to the external style sheet from all your HTML pages. A
cascading style sheet file will have an extension as .css and it will be included in HTML files using <link>
tag.
(c) Inline styles: The inline style is specific to the tag itself. It uses the HTML “style” attribute to style a
specific tag
Cyber Ethics
Question
What is cryptography?
Answer
Cryptography is a technology which keeps the messages secret from unauthorized access. Sender of the
information encrypts the data using a secret code and only the specified receiver can decrypt the data using
the same or a different secret code.
To encrypt a message, the message is passed to an algorithm that transforms the message using a key into a
meaningless script called cryptogram or ciphertext. The ciphertext can be sent to the intended recipient. The
recipient has a key to decrypt the ciphertext back to the original message.
Question
The practice of copying software is a serious problem in some countries. Copying music, films and
software illegally means that there is less money available to pay the writers, developers and artists.
Question
Explain the concept of Digital Divide stating causes for it and measures to reduce the divide.
Answer
The Digital Divide, or the digital split, is a social issue referring to the differing amount of information between
those who have access to the Internet and those who do not have access. The term became popular among
concerned parties, such as scholars, policy makers, and advocacy groups, in the late 1990s. Broadly speaking,
the difference is not necessarily determined by the access to the Internet, but by access to ICT (Information
and Communication Technology) and to media that the different segments of society can use. With regards to
the Internet, the access is only one aspect, other factors such as the quality of connection and related
services should be considered. The problem is often discussed in an international context, indicating certain
countries are far more equipped than other developing countries to exploit the benefits from the rapidly
expanding Internet. The digital divide is not indeed a clear single gap which divides a society into two groups.
Researchers report that disadvantage can take such forms as lowerperformance computers, lower-quality or
high price connections difficulty of obtaining technical assistance, and lower access to subscription-based
contents.
The idea that some information and communication technologies are vital to quality civic life is not
new. Some suggest that the Internet and other ICTs are somehow transforming society, improving
our mutual understanding, eliminating power differentials, realizing a truly free and democratic world
society, and other benefits.
Question
Explain IPR and what are the two main types of IPR?
Answer
IPR (Intellectual Property Rights) allow creators, or owners of patents, trademarks or copyrighted works to
benefit from their own work or investment in a creation. Owners holding IPR can prevent the use of their
intellectual property.
Trade Marks: Trade Marks have been defined as any sign, or any combination of signs capable of
distinguishing the goods or services of one undertaking from those of other undertakings.
Copyright: Copyright is a legal means of protecting an author‘s work. It is a type of intellectual property that
provides exclusive publication, distribution, and usage rights for the author. Therefore, any original content
published on the web is protected by copyright law.