Full width home advertisement

Grade 10 Revision

Post Page Advertisement [Top]

Computer Fundamental Possible Conceptual Questions (10 Sets)

Computer Fundamental Possible Conceptual Questions (10 Sets)
Set-1
1.Define computer network.
Ans: The interconnection of two or more than two computers by the means of transmission medium like cables or without cables in order to share data, software, applications and other resources is known as computer network.

2.What is internet and email?
Ans: The interconnection of several thousands of computers of different type belonging to various networks all over the world is known as internet.
E-mail is one of the most popular services of internet which helps to transmit data, text files, and digital photos, audio or video files from one computer to another over the internet.

3.Write down any four application areas of multimedia.
Ans: The four application areas of multimedia are:
•Adding special effects in movies
•Video games
•Public Accessing
•Animated Advertisement

4.List any four measures to protect computer software.
Ans: The four measures to protect computer software are:
•Backup
•Password
•Defragmentation
•Scan disk

5.How can we protect computer from computer virus?
Ans: We can protect computer from virus by the following ways:
•Install a powerful anti-virus program and update its virus definition file frequently.
•Do not use pirated software.
•Do not open suspicious emails and attachment file sent by unknown persons.
•Do not use free distributed software.


Set-2

a) List out any four reasons of using computer network.
Ans: The four reasons of using the computer network are as follows:
• To share hardware devices like printer, hard disk, scanner, etc.
• To share the different software packages.
• To exchange information rapidly in the computer network.
• To access updated data by all computers of the network.

b) How does virus spread from one computer to another?
Ans: Virus spread from one computer to another by following ways:
• Downloading files or programs from websites which are not secured.
• Opening of the virus infected e-mail, message and attached files.
• Using pirated software.
• Sharing of infected external portable disks like floppy disk, pen drive or CD.

c) List any four media used in multimedia technology.
Ans: The four media used in multimedia technology are as follows:
i) Audio ii) Animation iii) Video iv) Graphics

d) Define the term computer security. Also mention the technique to protect data from the virus.
Ans: Computer security refers to the security given to the computer for the protection of data, application, software and hardware from being lost or damaged due to accidental or intentional harm.
The technique to protect data from viruses is to use antivirus software.

e) Mention advantages and disadvantages of e-mail.
Ans: The advantages of e-mail are as follows:
• It is fast, economic and instant communication media.
• Any form of data like text, pictures, audio or video can be sent through e-mails.
The disadvantages of e-mail are as follows:
• Minor mistakes in e-mail address may deliver the mail to a wrong address.
• Since, it may passes through a vast electronic network. It may be seized in between


Set-3
a. How does computer network reduces cost of operation?
Ans: Computer network reduces cost of operation because it allows sharing of resources like hardware ,software and services. For example a printer or one internet connection can be shared by all users of a network. In this way it helps to save the cost of buying extra hardware or service. Problems can be solved by one or few experts from one place. This saves the cost of hiring experts for all the branches of the office and the cost of travel by the expert to different branches.

b. Define the term internet. List out any two services provided by the internet.
Ans: Internet can be defined as the interconnection of several thousands of computers belonging to various networks all over the world.
any two services provided by the internet are as follows:
•e-commerce
•IRC(internet relay chat)

c. Define computer security. List out any two measures to protect computer.
Ans: Computer security can be defined as the security given to the data, software and the hardware for their protection from being lost or damaged due to accidental or intentional harm.
two measures to protect computer are:
•password
•insurance policy

d. What are the reasons of making computer viruses? Explain
Ans: The reasons of making computer viruses are:
•to stop software piracy
•to entertain users by displaying interesting messages and pictures
•to steal data and information
•to expose the programmers ability
•to earn money

e. What is cyber law? List any two subjects included in cyber law.
Ans: The law which governs the legal issues in the cyber space regarding the internet or www for digital data processing wand transaction is known as cyber law.
two subjects included in cyber law are:
•Electronic and digital signature law
•intellectual property law


Set-4

1. What is meant by data communication? Explain with any two examples.
Ans: A data communication is the collection of hardware, software and other devices in order to exchange data, information and voice between two or more than two devices through a bounded or unbounded media.
The two examples of data communication re:
• E-mail
• Chat

2.Differentiate between chat and email clearly.
Ans: The differences between chat and email are:
Chat
i. We can send and receive instant message with each other in real time.
ii.It is used for informal communication

E-mail
i.There is no need to send instant message. The user can read, reply or ignore the message according to his/her wish.
ii.It is used for formal communication

3.Write any four ways of protecting computer from viruses.
Ans: The four ways of protecting computer from viruses are:
• Install a powerful anti-virus program to protect and update its virus definition file frequently.
• Do not use the pirated software.
• Do not open suspicious emails and attachments files send by the unknown person.
• Do not use freely distributed software.

4. How can multimedia help in education field?
Ans: Multimedia can help in education field in the following ways:
• It makes presentation of the related subject matter attractive.
• It makes teaching-learning easier in classroom.
• Presentation can be done in a big screen so that many students can see it.
• It makes easy to share views, thoughts and ideas among students.

5. What is meant by computer security? List out any four software security measures.
Ans: The security given to the computer for the protection of computer hardware, software and other resources from being lost or damaged due to accidental or intentional harm is known as computer security.
Any four software security measures are:
• Defragmentation
• Scan disk
• Backup
• Password

Set-5
a) What is LAN?List out the types of LAN topologies.
Ans: A LAN is a network of computers that are relatively near to each other and are connected in a way that enables them to communicate by cable and a small wireless device.
The types of LAN topologiesare :
• Bus Topology
• Star Topology
• Ring Topology

b) How does Internet differ from Intranet? Explain.
Ans: Internet differs from Intranet as Internet is the interconnection of several thousands of computers of different types belonging to various networks all over the world whereas Intranet is a private computer network that uses the internet protocol to securely share any part of information of organization.

c) What are the precautions to protect data from viruses?
Ans: The precautions are:
i. Do not download files and programs from the websites without scanning
ii. Use properly working antivirus software
iii.Do not exchange internal disk among computers
iv. Scan the mail or unknown files of Internet before opening in your computer

d) How do you know that your computer is infected from viruses?
Ans: We can know our computer is infected from viruses when:
i. Programs take a long time to load
ii. Unusual increase of the disk space and grow in file size
iii.Corrupting the system’s data takes place
iv. Renaming of files with different names

What are the requirements of multimedia computer system?
Ans: The requirements are:
i.Hardware Requirements: Sound Card, Graphics Card, Projector, CD/DVD, Microphone etc.
ii. Software Requirements: Adobe photoshop, Ms-Powerpoint, VlC player, Adobe Premiere etc.


Set-6
a. In what way does the client server network differ from peer to peer network? Explain
Ans: The difference between client server and peer to peer network are as follows:-
Client Server
1. It consists of at least one or more server with one or more clients
2.It provides centralized network administration.
3. It provides high reliable security of data and resources.
4.It is suitable for large organizations

Peer -Peer
1.It is a group of computers in which each computer act both as client and server
2. It lacks centralized network administration
3. It lacks proper security of data and resources
4. It is suitable for small office and homes

Note: You can better write the difference in tabular form


b. Differentiate between Email and EFax.
Ans:
Email
i.Email is one of the popular services of Internet which allows exchange of information and computer files between computers over a network using Internet.
ii. It requires email server

E-fax
i.It is the service of Internet through which user can send and receive faxes directly from a computer to another
ii. It does not require email server



c.What is a backup? Why backups play a vital role in computer security.
Ans: Backup is the system of copying data and programs into another location or creating a duplicate copy of a file.
Backups are vital to computer security because it saves data and programs from being lost or damaged due to accidental or intentional harm. When data and programs get lost, we can recover from backup.

d.Why IT policy is important in our country. Explain.
Ans: IT policy is important because IT plays a vital role to build up knowledge based society and boost up the economic condition of any country. For example we can take importance of IT policy in Nepal. Such as, IT policy is needed for Nepal to provide the general people access to IT to make knowledge based society to established knowledge based industry and to change the economic conditions of people.\

e.What do you mean by virtual reality?
Ans: Virtual reality is an artificial environment created with computer hardware and software and presented to the user in such a way that it appears real.



Set-7
1. What is communication media? List any two advantages of client-server network model.
Ans: A communication media is a channel through which data/ signals can be transmitted from one point to another.
Any two advantages of client/server network model are:
•It provides high level of security, since only the authorized person gets access to the service of the network.
•The controlling and managing of workstation computers are done by powerful centralized server computer. So, administration work becomes easier.
2. What is internet? List nay two advantages of email.
Ans: The interconnection of million thousands of computers of different types belonging to various networks all over the world is known as internet.
The advantages of email are:
•It is fast, economic and instant communication media.
•Any form of data like text, image, audio, or video can be sent through e-mail.

3. List any four advantages of multimedia.
Ans: The four advantages of multimedia are:
• It makes easy to share views, ideas and thoughts among various people around the world.
• It can store the data and information for a long period.
• It is very cheap to get the knowledge about the related subject matter in a short time through multimedia.
• It makes the presentation of the related subject matter attractive.

4. What is the role of UPS in the computer security?
Ans: The role of UPS is to control the fluctuation of electric voltage and provide enough backup electric power to the computer system when there is power failure so important data or files can be stored and computer can be turned off properly.

5. List any four preventive measures for protecting computer from computer viruses.
Ans: Any four preventive measures of protecting computer from computer virus are:
•Install a powerful anti-virus program to protect and update its virus definition file frequently.
•Do not use the pirated software.
• Do not open suspicious emails and attachments files send by the unknown person.
•Do not use freely distributed software.


Set-8
1. What is telecommunication? List any two elements of telecommunication.
Ans: A system of transmission of sounds, images, text or data in the form of electronic signals is known as telecommunication.
Any two elements of telecommunication are:
• A transmitter that takes information and converts it to signal.
• A transmission medium that carries the signal.

2. Write any two advantages of email service of internet.
Ans: The two advantages of e-mail service of the internet are as follows:
• It is fast, economic and instant communication media.
• Any form of data like text, image, audio, or video can be sent through e-mail.

3. What is hardware security? Suggest any two techniques for securing computer hardware.
Ans: The security given to the computer hardware tools and equipment’s from being lost or damages due to accidental or intentional harm is known as hardware security.
The techniques for securing computer hardware are:
• Insurance Policy
• Power Protection Device
• Protection from Dust and Extreme Temperature.
• Regular maintenance

4. What is multimedia?
Ans: The integration of several form of media such as text, image, audio, video and animation in order to present the data and information in more interactive and attractive way is known as multimedia.

5. What is a computer virus? Five an objective of developing a computer virus.
Ans: The type of computer program written by the computer programmer with the intent of damaging and destroying the data and resources located in the computer memory are known as computer viruses.
The objectives of developing computer virus are:
• To stop software piracy.
• To entertain user by displaying interesting messages or pictures.
• To destroy data, information and files.
• To expose the programmers ability.
• To earn money.



Set-9
1. Define ring topology with figure.
Ans: The topology in which computers are connected in the shape of circle without any end points is known as ring topology.
The figure of ring topology is:



2. What is a browser? Write any one difference between upload and download.
Ans: A computer program that access web pages and displays them on the user’s screen is known as web browser.
One difference between upload and download are:
Upload Download
• Upload refers to the process of copying files or documents or programs or data from the user computer to the internet. • Download refers to The process of copying data or programs or files or documents from the internet to users computer.

3.Name any two media used in multimedia technology. What is digital signature?
Ans: Any two media used in multimedia are:
• Text
• Audio
Digital signature is a security mechanism system in the cyberspace for digital data processing and transaction.

4.What do you mean by backup? Write any two ways to protect hardware.
Ans: A copy of a file that is used in the place of original file being corrupted is known as backup.
Any two ways to protect computer hardware are:
• Regular maintenance
• Insurance Policy

5.How can we confirm that the computer is virus infected? What measures can be adopted to protect computer from virus?
Ans: We can confirm that computer is virus infection by the following ways:
• Program takes long time to load.
• The floppy disk or hard disk is suddenly accessed without a logical reason.
• Increased use of disk space and growth in file size.
• Renaming the files and folders without the knowledge of the user.

The measures that can be adopted to protect computer from viruses are:
• Install a powerful anti-virus program to protect and update its virus definition file frequently.
• Do not use the pirated software.
• Do not open suspicious emails and attachments files send by the unknown person.
• Do not use freely distributed software

Note: For exam, you can write 2-2 points only


Set-10
1. What is network protocol? Give any two examples of protocols belongings to TCP/IP family.
Ans: A set of rules that must be followed by sender and receiver to make communication possible is known as network protocol.
Two examples of protocols belonging to TCP/IP family are:
• FTP(File Transfer Protocol)
• HTTP(Hyper Text Transfer Protocol)

2.Mention any four symptoms of computer virus.
Ans: Any four symptoms of computer virus are:
• Program takes long time to load.
• The floppy disk or hard disk is suddenly accessed without a logical reason.
• Increased use of disk space and growth in file size.
• Renaming the files and folders without the knowledge of the user.

3. What do you mean by cyber law? When was cyber law of Nepal introduced?
Ans: The law which governs the legal issue in the cyberspace regarding the Internet or WWW for digital data processing and transaction is known as cyber law.
Cyber law was introduced in Nepal on 30stBhadra 2061 B.S. (15th September 2004 A.D.)

4. What is interactive multimedia? List any two interactive multimedia?
Ans: Interactive multimedia is the integration of several forms of media such as text, audio, video, graphics and animation that is used to display information in more attractive and understandable way.
Any two interactive multimedia are:
• Multimedia in advertisement
• Special effect in movies

5. What is website? Give any two examples of website that belongs to Microsoft Corporation.
Ans: Website is a collection of web pages that can be published by an organization or individual.
Any two examples of websites that belongs to Microsoft Corporation are:
• www.msn.com
• www.microsoft.com


No comments:

Post a Comment

Bottom Ad [Post Page]