ICT Skills Class X Question Bank PDF
Document Details
Uploaded by PerfectDetroit
Tags
Summary
This document is a question bank on Information and Communication Technology (ICT) skills for Class X. It covers topics such as ICT devices, default settings, computer parts, operating systems, mobile operating systems, keyboard functions, mouse functions, file operations, and security.
Full Transcript
CLASS X Information technology (402) ICT SKILLS 1. WHAT IS ICT? GIVE SOME EXAMPLES OF ICT DEVICES Ans: ICT stands for Information and Communication Technology. ICT refers to all the methods, tools, concepts related to storing,...
CLASS X Information technology (402) ICT SKILLS 1. WHAT IS ICT? GIVE SOME EXAMPLES OF ICT DEVICES Ans: ICT stands for Information and Communication Technology. ICT refers to all the methods, tools, concepts related to storing, recording and sending digital information. ICT skills help us to communicate, run our business and stay connected with our family and friends. Eg of ICT devices: Tablets, smartphones and laptops 2. WHAT ARE DEFAULT SETTINGS? Ans: Settings that are standard or pre-defined in a software are called default settings. Some examples of default settings are the default page orientation of Writer is Potrait and default font is ‘Times New Romans’. 3. WHAT ARE THE TWO MAIN PARTS OF A COMPUTER. EXPLAIN THEM BRIEFLY. Ans: A computer system consists of two main parts - the hardware and the software. The physical parts that we can see and touch are called hardware. It is the machinery of a computer. These are the keyboard, monitor, CPU, etc. Software is the part that we cannot see, Eg: All the computer applications, such as browsers, games, Office tools, etc., are software programs that perform particular functions. Some other examples are Antivirus software, Operating system, PDF viewer etc. 4. EXPLAIN ABOUT OPERATING SYSTEM. GIVE EXAMPLES. Ans: The most important software in any computer is the Operating System (OS). This is the software that starts working as soon as we switch on a computer. It displays the desktop on the monitor. Some of the most commonly used operating systems for laptops and desktop are Ubuntu, Microsoft Windows and Mac OS. 5. DO MOBILE PHONES HAVE OPERATING SYSTEMS? Ans: Mobile devices also have an operating system that helps them perform their functions. Some of the mobile operating systems are Apple iOS and Google Android. 6. WHAT ARE THE BASIC FUNCTIONS THAT RUNS WHEN A COMPUTER IS STARTED? Ans: A computer automatically runs a basic program called BIOS (Basic Input/Output System) as soon as it is switched on or the power button is pushed on. The BIOS first does a self-test. If the self-test shows that the system is fine, the BIOS will load the Operating System. 7. WHY ARE LOGIN AND LOGOUT FEATURES REQUIRED IN EVERY COMPUTER? Ans: Login-IDs and passwords makes sure that our computers are locked. A login and password is like a key to the lock which allows you to use the computer. When you login to the computer with your login-ID and password, the computer knows that you are an authorised person and allows you to work on the applications in the computer. Once you finish working, you must log out or sign out so that no one can see your work and all the data in the computer is secure. 8. WHAT IS A KEYBOARD? WHAT ARE THE DIFFERENT CLASSIFICATION OF KEYS IN THE KEYBOARD? Ans: A keyboard is an input device. 1. Function Keys :Keys labeled from F1 to F12 are function keys. You use them to perform specific functions. Their functions differ from program to program. The function of the F1 key in most programs is to get help on that program. 2. Control keys: Keys, such as Control (CTRL), SHIFT, SPACEBAR, ALT, CAPS LOCK and TAB, are special control keys that perform special functions depending on when and where they are used. 3. Enter key: The label on this key can be either ENTER or RETURN, depending on the brand of computer that you are using. This key is to move the cursor to the beginning of a new line. Or used to send commands and to confirm a task on a computer. 4. Punctuation keys: Punctuation keys include keys for punctuation marks, such as colon (:), semicolon (;), question mark (?), single quotation marks (‘ ’), and double quotation marks (“ ”). 5. Navigation keys: Keys, such as the arrow keys, HOME, END, PAGE UP, and PAGE DOWN are navigation keys which are used to move up and down, right and left in a document. The HOME and END keys move the cursor to the left/right end of a line of text, respectively. The PAGE UP and PAGE DOWN keys are used to move one page up and one page down. 6. Command keys: Keys, such as INSERT (INS), DELETE (DEL), and BACKSPACE are command keys. When the INSERT key is turned ON, it helps you overwrite characters to the right of the cursor. The DELETE key and the BACKSPACE key are used to remove typed text, characters and other objects on the right and left side of the cursor, respectively. 7. Windows key: Pressing this key opens the Start menu 9. WHAT ARE SOME OF THE FUNCTIONS PERFORMED BY THE MOUSE? Ans: 1. Roll Over or Hover Some actions can be done by simply rolling over or hovering over an item. When you bring the mouse over a file in File Explorer, it will show the details of that file 2. Point and Click As you move the mouse on your desk, a pointer moves correspondingly on your screen. The mouse allows you to select an item on the screen. When you click a particular file, it gets selected. 3. Drag and Drop To move an item, you need to click it, and then holding the mouse button down, move the item to a new location. After you move the item to the new location, you release the mouse button. This is called drag and drop. When you drag a file in File Explorer, you can pick it up from the present location and drop it in a new location. 4. Double-click Double-clicking means to quickly click the left mouse button twice. When we doubleclick on a file, it will open the file. 10. MULTIPLE CHOICE QUESTIONS: 1. Which of the following functions is not performed using a mouse? (a) Turn on (b) Hover (c) Right click (d) Drag and Drop 2. _________________ disguises itself and appears to be a useful software program but once it reaches a computer it starts behaving like a virus and destroys data. a. Trojan Horse b. Worm c. Hacker d. SPAM 3. What is the term used when you press and hold the left mouse key and move the mouse around? (a) Highlighting (b) Dragging (c) Selecting (d) Moving 4. Here are the steps that take place when starting a computer. Rearrange the steps in the correct order. (a) Desktop appears after login - 5 (b) Login screen appears - 4 (c) Power on Self-Test (POST) starts - 1 (d) Operating system starts - 2 (e) Welcome screen appears – 3 11. WHAT ARE SOME OF THE BASIC FILE OPERATIONS PERFORMED ON A COMPUTER? Ans: Information on a computer is stored in electronic files, which can be put into separate folders. It is easier to manage the electronic files as they can be copied, moved, renamed or even deleted which are some of the basic file operations. 12. EXPLAIN BRIEFLY ABOUT FILES. Ans: File - All information stored in a computer is kept in files. Different files store different information such as text, images, videos or audios. “Filename.File extension” -> This name identifies the file type Eg: name.txt, image.gif, sound.mp3, video.mp4 Some more extensions are:.doc,.docx,.jpg,.png,.html,.pdf 13. WHAT ARE FOLDERS? A folder is a location where a group of files and other sub folders can be stored. 14. HOW DOES ONE CREATE A FILE? Open a text editor or word processor. Type the text. Save or Save As the file. Type the desired file name and the file is saved in any location you choose. 15. HOW DOES ONE CREATE A FOLDER? Open the File Explorer To create a folder 1. Choose a location where the folder has to be created 2. Right-click and then choose the ‘New Folder’. 3. Type the name of the folder as desired. 16. SHORTCUT KEYS: CTRL+z — undo CTRL+y — redo CTRL+a — select all CTRL+x — cut CTRL+c — copy CTRL+v — paste CTRL+p — print CTRL+s — save 17. MULTIPLE CHOICE QUESTIONS: 1. Which one of the following shortcut keys is used to paste a file? (a) Ctrl + c (b) Ctrl + p (c) Ctrl + v (d) Ctrl + x 2. Which of the following is a valid file extension for Notepad file? (a).jpg (b).doc (c).text (d).txt 3. What keys do you use to copy something? (a) Ctrl+x (b) Ctrl+c (c) Ctrl+z (d) Ctrl+y 18. LIST SOME SIMPLE WAYS TO TAKE CARE OF YOUR DEVICE. 1. Do not eat anything over a keyboard 2. Wipe the screen with a soft cloth to remove any finger marks. 3. Avoid eating and keeping glasses of water or cups of coffee near a computer 4. Handle devices with care and caution 5. Keep the computer cool 6. Do not overcharge the batteries 7. Always plug in devices carefully. 8. Do not run too many programs at a time 19. WHAT IS BACKING UP OF DATA? Backing up data means to save the information present on your computer on another device, such as CD/DVD drives or hard disk. Data can recovered from here in case the computer stops working completely. 20. WHAT DOES ANTI-VIRUS MEAN? An anti-virus is a software that prevents viruses from entering our computer and will also clean any virus that may enter our system before they affect the data. 21. WHAT IS SPAM? Sometimes we get mails from companies who are advertising a product or trying to attract you to their website. Such mails are called SPAM. We should never respond to SPAM and delete it on a regular basis. 22. DEFINE I. IDENTITY THEFT II. SOFTWARE PIRACY i. Where a hacker steals your personal information and assumes your identity, it is called identity theft. Using this false identity, the hacker can gain access to your account information or perform illegal activity. ii. Software Piracy is stealing of software and includes using or distributing unlicensed and unauthorised copies of a computer program or software. 23. DEFINE THE FOLLOWING: i. Virus - Viruses are computer programs that can damage the data and software programs or steal the information stored on a computer. Example: Trojan horse, Worms ii. Worms - These are viruses that replicate themselves and spread to all files once they attack a computer. iii. Trojan Horse: A Trojan Horse Virus disguises itself as a useful software program but once it reaches a computer it starts behaving like a virus and destroying data. iv. Strong Password: Passwords must be strong with alphanumeric characters and symbols making it difficult for unauthorized users to enter. 24. MULTIPLE CHOICE QUESTIONS: 1. What should you do to ensure secure online transactions? (a) Lock your computer (b) Give credit card or bank details only on safe websites (c) Use anti-virus (d) Do not use pirated software 2. Which of the following trap small children into inappropriate relations? (a) Online predators (b) Worms (c) Trojan Horse (d) Anti-Virus 3. What should a strong password consist of? (a) Only letters (b) Numbers and special characters (c) Name of a person (d) Letters, numbers and special characters