0% found this document useful (0 votes)
212 views24 pages

IT-IMPORTANT QUESTIONS CODE 402 (1)

Uploaded by

PB 35 GS Vlogs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
212 views24 pages

IT-IMPORTANT QUESTIONS CODE 402 (1)

Uploaded by

PB 35 GS Vlogs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 24

DIGTAL DOCUMENTATION

1. What are Styles ?. What are the advantages of using styles.


Answer – Styles are pre-defined formatting attributes in digital document processing that can
be used to apply consistent formatting to text and other elements. The advantages of using
styles include –
 Consistency throughout the document
 Efficiency in formatting the document
 Flexibility in making changes to the document
 Improved accessibility for users with assistive technologies.
2. Give any four styles supported by OpenOffice.org
Answer – OpenOffice.org supports various styles, including:
 Paragraph Styles: Used to format paragraphs, including indentation, line spacing, and
font size.
 Character Styles: Used to format individual characters, including font type, size, color,
and style.
 Page Styles: Used to format the overall appearance of a page, including margins,
headers, and footers.
 List Styles: Used to format bulleted or numbered lists, including the type of bullet or
number, indentation, and spacing.
3. What is the best way to load styles from a template or another document?
Answer –You can copy styles by loading them from a template or another document, for
example:
1. Open the document into which you wish to paste the styles.
2. In the Styles and Formatting window, click on Load Styles after long-clicking on the arrow
next to the New Style from Selection symbol.
3. Locate and choose the template you wish to copy styles from in the Load Styles window
4. Choose the style categories you want to copy. If you want the copied styles to overwrite
any styles with the same names in the document you’re putting them into, select
Overwrite.
5. To copy styles from another document, click the From File button to bring up a box
where you may choose the required file.
4. How can you modify the style?
Answer – Styles can be changed in a variety of ways in OpenOffice.org.
• Load or copy styles from another document or template
• Update a style from a selection
5. How can we create our own styles?
Answer – There are two different ways to create a style –
 Creating a new style from a selection – You can copy a new style from an existing
style. This new style will only be applied to this document and will not be saved in the
template.
 Dragging And Dropping To Create A Style – You can drag and drop a text selection
into the Styles and Formatting window to create a new style.
6. Explain any five Graphic filters.
Answer – The following are four graphic filters:
a. Invert – Changing the color in the color image, and giving brightness in grayscale image.
b. Solarization – Increasing the effects of excessive light in a photograph.
c. Posterize – Reduces the number of colours in a picture to make it look like a painting.
d. Charcoal – The image is displayed as a charcoal sketch.
e. Mosaic – Combines groupings of pixels into a single colour area.
Digital Documentation Class 10 Questions and Answers
7. Explain Image Cropping
Answer – Image cropping is the process of removing unwanted parts of an image by selecting
and keeping a specific portion of the image while discarding the rest. Method for cropping
image are right-click the image and choose Picture from the pop-up menu to begin cropping it.
Select the Crop page in the Picture dialogue box.
The following parameters can be controlled on the Crop page:
Keep scale / Keep image size –
1. When Keep scale is chosen (the default), cropping the image has no effect on the
image’s scale.
2. Cropping creates enlargement (for positive cropping values), shrinking (for negative
cropping values), or distortion of the image when Keep image size is selected, so the
image size remains constant.
Left, Right, Top, and Bottom –
You can crop the image using the dialog box, you can enter left, right, top and bottom margins
to crop the image.
1. Keep scale – using this option you can crop the image without changing the size of the
image.
2. Keep image size – Without changing the height and width of the image you can crop
the image using keep image size.
8. List any three methods of inserting images in a text document.
Answer – The three methods for inserting images in digital documents are –
 Drag and Drop
 Inserting image from clipboard
 Insert image from Scanner
9. What do you understand by the terms:
a. Text Wrapping
b. Anchoring
Answer –
a. Text Wrapping – Text wrapping describes the relationship between graphics and the
surrounding text, which may wrap around the graphic on one or both sides, be overprinted
behind or in front of the graphic, or be overprinted behind or in front of the graphic.
b. Anchoring – The graphics’ reference point is referred to as IT. This point could represent
the object’s location on the page or in the frame. An anchor point is always present in an
image.
10. What are templates? What are the advantages of using templates?
Answer – A template is a type of document that you can use to make a similar type of
document. Templates can contain text, graphics, style, design.
Advantage of template are –
a. Document creation is made easier with templates.
b. It save time to giving style in document
c. The use of templates helps to keep the audience’s interest.
11. What is the difference between styles and templates?
Answer –
a. Style – Styles ensure that your formatting is consistent throughout a document.
b. Template – Templates allow you to reuse text and maintain a consistent look and feel
across many projects.
12. Explain different ways of creating a template.
Answer – There are two ways to create templates in a document.
Creating a template from a document –
1. Create or edit a new or existing document of the type you wish to use as a template.
2. Fill in the blanks with the content and styles you desire.
3. Select File > Templates > Save from the main menu.
Creating a template using a wizard –
Wizards can be used to construct letter, fax, agenda, presentation, and Web page templates.
The Fax Wizard, for example, walks you through the following options:
1. Fax machine type (business or personal)
2. Document components such as the date, topic line (for business faxes), salutation, and
closing
3. Information about the sender and receiver options (business fax)
4. Inclusion of text in the footer (business fax)
13. What do you mean by table of content?
Answer – The table of contents tool in Writer allows you to create an automated table of
contents from your document’s headings.
Many of the elements are used in table of content –
a. E# – It indicate chapter number
b. E – It represents the entry text
c. T – It represents tab stop
d. LS – It represents start of a hyperlink
e. LE – It represents End of a hyperlink
14. Explain Mail Merge.
Answer – A mail merge is a method of personalizing a message you’ve written and sending it
to a large group of people, giving the impression that you prepared the letter specifically for
them.
15. What are the advantages of Mail Merge?
Answer – Advantages of mail merge are –
a. It’s simple to send the same mail to a big group of recipients using the Mail Merge tool.
b. We don’t have to type each recipient’s name separately in each letter when we use Mail
Merge.
c. It’s one of the most efficient ways to mass-produce hundreds of personalized letters in a
short amount of time.
d. It is simple to amend the letter because any change made in the main letter will be reflected
in all other recipients’ letters.
16. Give examples of databases in which the Data Source can be created.
Answer – Any database that supports Open Database Connectivity (ODBC) can be utilized as a
data source. They can also be made in spreadsheets using Excel, or other similar software.
For example –
a. Spreadsheet
b. Text file
c. CSV file
d. OpenOffice base or Access
Q. Explain the concept of styles in digital documents and how they are useful for
formatting text and paragraphs.
Answer – Styles in digital documents are a useful feature that enables users to apply a
predefined set of formatting options to text and paragraphs in a single click. A style can
encompass font size, typeface, color, paragraph spacing, alignment, and other formatting
options. Consistent use of styles throughout a document can help ensure a consistent and
polished appearance, enhance readability, and save time by avoiding manual formatting
changes. Overall, styles are a powerful tool that can significantly improve the efficiency and
effectiveness of digital document processing.
Q. How can styles be used to create a table of contents in a digital document?
Answer – To create a table of contents in a digital document, styles can be utilized by
assigning particular styles to headings and subheadings throughout the document. By applying
the “Heading 1” style to primary section headings and the “Heading 2” style to subheadings,
users can generate an automatic table of contents that lists all of the document’s sections and
subsections in a structured and organized manner.
This saves time and effort since users don’t have to manually create a table of contents, and it
also ensures that the document is consistent and easy to navigate for the reader. In short,
using styles to create a table of contents is a powerful feature of digital documents that
improves the overall readability and usability of the document.

Q. How can the use of styles help to improve the accessibility of a digital document?
Answer – Styles are an effective means of enhancing the accessibility of digital documents as
they provide a consistent structure and formatting that is easy for users with visual
impairments to navigate. By utilizing styles to define headings and subheadings, document
creators can establish a clear hierarchy of information that can be interpreted effectively by
screen readers.
This results in a document that is more user-friendly and inclusive, as it enables individuals
with visual impairments to easily access and understand the content. Ultimately, incorporating
styles into digital documents can have a positive impact on the overall accessibility and
usability of the document, which is a crucial consideration in today’s increasingly diverse and
inclusive society.
Q. How can the use of styles improve the efficiency of document creation and
editing?
Answer – Styles can enhance the efficiency of document creation and editing by enabling
users to quickly and easily apply formatting options to text and paragraphs. By defining a set
of styles that reflect the formatting options commonly used in the document, users can swiftly
apply those styles to text and paragraphs with a single click, streamlining the process and
saving time.
This feature allows for consistency in formatting, reduces the possibility of errors, and
improves the overall productivity of document creation and editing. In summary, using styles is
a powerful tool that significantly enhances the efficiency of digital document processing.
Q. How can styles be used to ensure consistency in a collaborative digital
document?
Answer – Using styles in a collaborative digital document can ensure consistency by defining
a set of agreed-upon formatting options. This allows all collaborators to use the same styles
throughout the document, resulting in a consistent appearance and better readability.
Q. How can styles be used to format text or paragraphs in a way that reflects the
document’s purpose or audience?
Answer – Users can use styles to ensure that the digital document effectively communicates
its message by applying styles that reflect its purpose or target audience. Furthermore, they
can modify existing styles or create new ones to satisfy the document’s unique requirements.
This approach results in a more readable and engaging document that is tailored to its
intended purpose.
Q. What is a table of contents in a digital document, and how can it benefit the
reader?
Answer – A table of contents in a digital document is a list of the document’s sections or
chapters with corresponding page numbers or hyperlinks. It provides an overview of the
document’s structure and helps the reader navigate the document quickly and easily. By using
a table of contents, the reader can locate specific sections of the document without having to
manually search for them, saving time and improving the reading experience.
Q. How can a table of contents be created and formatted in a digital document?
Answer – To create and format a table of contents in a digital document, users can follow
these steps:
 Assign unique heading styles to each section or chapter of the document.
 Insert a table of contents using the appropriate option from the menu or toolbar.
 Customize the table of contents by choosing the desired style and formatting options to
match the document’s design and layout.
 Update the table of contents whenever changes are made to the document’s structure or
content to ensure its accuracy and usefulness to the reader.
Q. What are some best practices for creating a table of contents in a digital
document?
Answer – When creating a table of contents in a digital document, it is important to use
descriptive and accurate section or chapter headings, update the table of contents as changes
are made to the document, use accurate hyperlinks or page numbers, customize the
formatting to match the document’s design, and test the table of contents to ensure it is user-
friendly and easy to navigate.

Q. How can the use of a table of contents benefit the author of a digital document?
Answer – Using a table of contents can be advantageous for the writer of a digital document
in various ways. By presenting a structured and well-organized summary of the document’s
content, the writer can ensure that the document is easily comprehensible and coherent.
Consequently, this can save time and minimize the possibility of mistakes that may arise when
the reader has to search for particular sections or chapters manually.
ELECTRONIC SPREADSHEET
1. What is Consolidating data?
Answer – The Data Consolidation tool summarises data from multiple worksheets or
workbooks into a single worksheet that you can simply update. Consolidate has a graphical
interface for copying data from one set of cells to another and then performing one of a dozen
operations on it. Consolidation allows the contents of cells from many sheets to be
consolidated in one location.
2. What is Subtotal?
Answer – SUBTOTAL: totals/adds data in an array—that is, a collection of cells with column
and/or row labels. You can choose arrays and then apply a statistical function (sum, average,
max, min) to them using the Subtotals dialogue. To maximise efficiency, a function can be
applied to up to three sets of arrays.
3. What is Goal Seek?
Answer – The word “goal seeking” refers to the act of determining your input value based on
a previously determined output value. The method entails the use of a certain operator in a
formula that may be calculated with computer software.
Example: Set Cell: This specifies the cell whose value will be changed to the desired value
after the Goal Seek operation is completed.
For instance, Jack received a 25 out of 30 in English and a 22 out of 30 in Math. In order to
calculate the score in IT, he needs to acquire an overall score of 85 percent. As a result, a goal
has been established, and according to it, Jack will discover one unknown variable, IT marks.
4. What is Scenario?
Answer – Scenarios are a tool to test “what-if” questions. Each scenario is given a unique
name and can be changed and presented independently. Only the content of the currently
active scenario is printed when you print the spreadsheet. A scenario is essentially a set of
saved cell values that you may use in your calculations. Using the Navigator or a dropdown list
displayed beside the changing cells, you may simply switch between these sets.
5. What is Solver?
Answer – The Solver option in the Tools menu is essentially a more advanced version of Goal
Seek. The Solver, on the other hand, deals with equations involving several unknown variables.
It is meant to minimise or maximise the result based on a set of rules that you specify.
6. Differentiate between relative and absolute hyperlinks.
Answer – An absolute hyperlink will stop working only if the target is moved. A relative
hyperlink will stop working only if the source and target locations change relative to each
other.
Suppose, if you have two spreadsheets in the same folder linked to each other and you move
the entire folder to a new location, a relative hyperlink will not break a link.
7. How can we rename a worksheet in Spreadsheet?
Answer – There are three ways you can rename a worksheet, and the only difference between
them is the way in which you start the renaming process. You can do any of the following:
Double-click on one of the existing worksheet names. Right-click on an existing worksheet
name, then choose Rename from the resulting Context menu. Select the worksheet you want
to rename (click on the worksheet tab) and then select the Sheet option from the Format
menu. This displays a submenu from which you should select the Rename option.

8. How can we rename a worksheet in Spreadsheet?


Answer – You can rename a worksheet in three different ways, with the only difference being
how you begin the renaming process. You can choose from the following options:
Select one of the existing worksheet names with a double-click.
Right-click an existing worksheet name, then select Rename from the Context menu that
appears.
Select the worksheet you want to rename (by clicking on the worksheet tab), then choose
Sheet from the Format menu. This brings up a submenu, from which you should choose
Rename.
8. What is the advantage of sharing worksheet data?
Answer –
Enhance the speed of data entering
To facilitate collaboration, make things easy.
9. Explain features and use of Record changes.
Answer – Calc offers a feature that allows you to keep track of what data was modified, when
it was updated, who performed the modification, and which cell it happened in.
A coloured border appears around a cell where changes were made, with a dot in the upper
left-hand corner. Other reviewers will easily notice which cells have been changed. A strong
coloured bar indicates a deleted column or row.
10. What is the purpose of adding comments?
Answer – Comments from reviewers and authors can be added to explain their changes.
11. How can we add comments to the changes made?
Answer – To add a remark to a modification, use the following syntax:
Make the necessary changes to the spreadsheet.
2. Select the cell that has been changed.
3. Select Edit > Changes > Comments from the drop-down menu. The following dialogue box
appears. Calc’s automatically added comment displays in the title bar of this dialogue and is
not editable.
4. Click OK after typing your own comment.
12. Explain features of accepting or rejecting changes.
Answer – The beauty of the recording changes mechanism becomes apparent when you
receive a worksheet with changes. You can now go through each change like the original
author and decide how to proceed. To get started, do the following:
1. Open the worksheet that has been changed.
2. Select Edit > Changes > Accept or Reject from the drop-down menu. The dialogue box
displayed below will appear.
3. Calc goes through each modification one by one. As you go through the process, you can
accept or reject each adjustment. If you wish to, you can also pick Accept all and reject all.
13. What are Macros? How can we record a Macro?
Answer – When the same set of operations must be completed repeatedly, such as formatting
or applying a similar formula to a similar piece of data, macros can save time. It can be used to
name and track a sequence of events.
To record a macro, follow these steps:
1. Input data
2. Before performing any operation, go to tools->macro->record macro.
3. Now repeat the motion you just did.
4. Select “Stop Recording” from the drop-down menu. Now save the macro by giving it a
name.

RELATIONAL DATABASE MANAGEMENT SYSTEM


1. What is a database?
Answer – A database is an organized collection of data. Databases can store, retrieve and
manage large amounts of data. The database stores the information in the form of a table.
2. What is the purpose of a Database Management System?
Answer – A database management system (DBMS) is a software package which manages and
maintains data in a database. A DBMS enables several user application programs to access the
same database at the same time. It enables organizations to easily create databases for a
variety of purposes. A database is a comprehensive collection of data records, files, and other
items.
3. How is data organized in a database?
Answer – There are two way to organized data in database –
a. Flat File – It stores the data in a single table and it is suitable for small amounts of data.
b. Relational – It stores the data in a multiple table and all the tables are connected to each
other using a common field with the help of relationships.
4. What do you mean by Database Servers?
Answer – Database servers are powerful computers that store and manage data on a server.
This type of server is dedicated to a single purpose and helps to hold the database and run
only DBMS and related software.
5. Give the Advantages of database?
Answer – Advantages of database are –
a. Reduce Data Redundancy – When the same data set is stored in two or more locations,
this is referred to as data redundancy. As a result, this helps in the protection of duplicate data
in a database.
b. Sharing of Data – Databases can share the data with multiple users at a time. There are
multiple levels of authorization to access the data, and as a result, the data can only be shared
with those who are permitted.
c. Data Integrity – The term “data integrity” refers to the accuracy and consistency of the
data in the database. Data integrity also refers to data safety.
d. Data Security – You know that data is very important, databases give privileges to
authorized users and allow them to access the database using username and password.
e. Privacy – A database’s privacy rule says that only authorized users are permitted to access
the database in accordance with its privacy constraints. For example – if you log in your Gmail
account then you will see your email only, you will not see any other account email.
f. Backup and Recovery – Backup and recovery are handled automatically by the Database
Management System.
g. Data Consistency – Data consistency ensures the modification in the data will be the
same for all the users who are accessing the database. For example if you have registered a
train ticket from IRCTC website then whatever changes are there it will be the same for all the
users who are trying to reserve the ticket.
6. What are the key features of a database?
Answer – Some of the key features of database are –
a. Multiple table can be store in a single database
b. Database can share the data to multiple users
c. Database can create backups automatically
d. Database save storage space
e. Large amount of data can be managed by database
f. Each table in a database contains separate information
g. Provides high level security

7. What is RDBMS?
Answer – RDBMS stands for Relational Database Management System is an upgraded version
of DBMS, RDBMS stores the data in the form of a table. In RDBMS multiple tables can be linked
together, and support multiple users to access the database.
8. What different types of keys are available in RDBMS?
Answer – The different keys available in RDBMS are –
a. Primary Key (PK) – A primary key is a unique value that identifies a row in a table. If the
primary key is defined to any table column it means the duplication will be not allowed.
b. Composite Primary Key – When a primary key is applied to one or more columns in the
same table is known as Composite Primary Key.
c. Foreign Key (FK) – By default columns are foreign key, foreign key points to the primary
key of another table.
9. What are the different database objects?
Answer –
a. Table – A table is a collection of data components structured in the form of vertical columns
and horizontal rows.
b. Columns / Fields / Attributes – Columns or Fields or Attributes all are the same, A column
is a collection of data values of a single data type, one for each row in a table. It is also known
as the heading of the column.
c. Rows / Records / Tuples – A row, also known as a Record or Tuple, is a single data item in
a table. A database table can be represented as a series of rows and columns or fields. Each
row in a table represents a set of related data, and each row has the same structure.
10. What are data types?
Answer – Datatypes are used to define the type of data that will be stored in the database.
Data types in the OpenOffice base are classified into five types.
a. Numeric Types – Numeric data types are used to describe numerical values for fields in a
database table. Numeric data types used for numbers and decimals.
Some of the important numeric data types are –
a. Boolean b. Integer c. Numeric
d. Decimal e. Float f. double
b. Alphanumeric Types – Alphanumeric data types are used to describe character values for
fields in a database.
Some of the important alphanumeric data types are –
a. Longvarchar b. Char
c. Varchar d. Varchar_ignorecase
c. Binary Types – For storing data in binary formats, binary data types are used. Binary data
types in a database can be used to store images, music files, and so on.
Some of the important Binary data types are –
a. Varbinary b. Binary c. Longvarbinary
d. Date time – Date and time data types are used to describe date and time values for fields
in a database table.
Some of the important Date time data types are –
a. Date b. Time c. Timestamp
11. In how many ways tables can be created in Base?
Answer – There are two different ways to creating the table in database –
a. Using Design View
b. Using Wizard

12. Define the structure of a table.


Answer – A table is a collection of data components structured in the form of vertical columns
and horizontal rows.
13. Differentiate between Tuples and Attributes of a table.
Answer – Tuple is a single data item in a table. A database table can be represented as a
series of rows and columns or fields.
An attribute is a collection of data values of a single data type, one for each row in a table.
14. What is referential Integrity?
Answer – Referential integrity is used to keep data maintained, accurate and consistent.
Data in Base can be connected between two or more tables using primary key and foreign key
constraints.
Referential integrity helps to –
a. If there is no connected record in the main key table, records are added to a related table.
b. Changing values in a primary if there are any dependent records in the linked table
c. If there are any matching linked records in an associated table, records from a primary key
table are deleted.
15. What is the advantage of relationships between two tables?
Answer – Advantage of relationships between two tables are –
a. Save time as there is no need to enter the same data in separate tables.
b. Reduce data-entry errors.
c. Summarize data from related tables.
16. What is the file extension for databases created using OpenOffice.Org Base?
Answer – Extension for OpenOffice base is .odb.
17. List any three file formats that can be managed using OpenOffice.Org Base?
Answer – The three file formats are –
a. .odt – This file format use for create digital document file
b. .odd – This file format use for create spreadsheet
c. .odp – This file format use for creating presentation file
18. How many types of relationships can be created in Base? Explain each of the
them.
Answer – There are three types of relationships –
a. One to One – Both tables in this relationship must have primary key columns.
b. One to Many or Many to One – One of the tables in this relationship must have a primary
key column.
c. Many to Many – The primary key column is not present in any of the tables in this
relationship.
19. What do you mean by Sorting? In how many ways it can be done?
Answer – Sorting means arranging the data in ascending or descending order.
The two way to arranging the data is –
a. Ascending
b. Descending
20. Explain Referential Integrity with the help of an example.
Answer – Referential integrity is used to keep data maintained, accurate and consistent.
Data in Base can be connected between two or more tables using primary key and foreign key
constraints.
For example – Suppose there is two table “Student_details” and “fee_details”,
In the student_details table fields are –
Grno, Student_name, Address, phone_number ( here Grno is primary key)
In the Fee_details table fields are –
Grno, Fee_date, Amount (here Grno is foregn key)
Here, both have a common field “Grno” this is known as referential Integrity.

21. How many types of language are there in the database?


Answer – Three are two types of languages –
DDL (Data definition language) – Data definition language is used to design and modify the
structure of a database.
Common DDL commands are
a. Create – This command is used to create database
b. Alter – This command is used to modify the database.
c. Drop – This command is used to delete database tables.
DML (Data manipulation language) – Data manipulation language provides commands for
manipulating data in databases.
Common DML commands are
a. Select – This command is used to display information from the database.
b. Insert – This command is used to insert new records in the database.
c. Delete – This command is used to delete records from the database.
d. Update – This command is used to modify records in the database.
22. Name DML commands.
Answer – Data manipulation language (DML) access and manipulate data in existing tables.
Name of DML commands –
a. Select b. Insert c. Update d. Delete
23. What is the purpose of using queries?
Answer – Queries are commands that describe the data structure as well as manipulate the
data in the database. The purpose of a query is to do calculations, integrate data from many
tables, and add, alter, or delete data from a database.
24. Which clause of Select statement helps to display specific data?
Answer – Where clause is used to display specific data from the database.
25. Differentiate between Where clause and Orderby clause of SQL statements.
Answer – Where clause is used to display specific data from the database and Orderby used
to display data in ascending order or descending order.
26. State the purpose of Update Command with the help of an example.
Answer – The update statement is used to modify records in the table. Example of update
command is – Update Student_details set Location = ‘Pune’ where Rollno = 10;

27. Consider the following table “Students”


Student_Nam Gende
Rollno DOB Address Mobile_no Percentage
e r

1 Jugal 10/01/2003 Mumbai 5555555555 M 98

2. Pratigya 24/03/2002 Pune 4444444444 F 82

3 Sandeep 12/12/2003 Delhi 8888888888 M 91

Banglor
4 Sangeeta 01/07/2004 6666666666 F 96
e

5 Satti 05/09/2002 Mumbai 7777777777 M 89


Write SQL commands:
a. To display all the information from the table whose address is ‘Mumbai’.
Answer – Select * from students where address = “Mumbai”;
b. To list the details of all the students whose percentage is between 90 to 100.
Answer – Select * from students where percentage >= 90 and percentage <= 100;
c. To display the name of all the students whose gender is Female.
Answer – Select Subject from students where Gender = ‘F’;
d. To display the list of names of all the students in alphabetical order.
Answer – Select * from students order by Student_Name;

29. Write the SQL commands to answer the queries based on Fabric table
FABRICID FNAME TYPE DISC

F001 Shirt Woolen 10

F002 Suit Cotton 20

F003 Tunic Cotton 10

F004 Jeans Denim 5

a. Write a query for insert the following record


(“F005”, “Kurta”, “Woollen”,5)
Answer – insert into Fabric values (‘F005’, ‘Kurta’, ‘Woolen’,5);
b. Write a query to display only those fabric whose disc is more than 10
Answer – select * from Fabric where Disc>10;
c. To display those record whose type is ‘Woolen’
Answer – select * from Fabric where type = ‘Woolen’;
d. To modify the fabric shirt by increasing discount by 10
Answer – update fabric set Disc = Disc + 10 where Fname = ‘Shirt’;
e. To delete the record of fabric F003 from table
Answer – delete from Fabric where FabricID =‘F003’;

30. Consider the following Vendor table and write the queries
VendorID VName DateofRegistration Location

V001 Mother Dairy 20-01-2009 Delhi

V002 Havmor 01-04-2015 Gujrat

V003 Amul 12-05-2012 Kolkata

V004 Kwality Walls 15-10-2013 Mumbai

a. Write a Query to display all records


Answer – Select * from Vendor;
b. Write a Query to add a new row with the following details
(‘’V005‟, ‘’Vadilal‟,’’2010-03-20‟, „Pune‟)
Answer – Insert into Vendor values (‘V005’, ‘Vadilal’, 2010-03-20, ‘Pune’);
c. Write a query to modify the location of V003 from Kolkata to Gujrat
Answer – Update Vendor Set location= “Gujrat‟ Where location= “Kolkata‟;

Database Management System Class 10 Questions and Answers


31. Consider the following table “ITEM”:
Itemno Iname Price Quantity

11 Soap 40 80

22 Powder 80 30

33 Face cream 250 25

44 Shampoo 120 100

55 Soap box 20 50

a. Display the total amount of each item. The amount must be calculated as the
price multiplied by quantity for each item.
Answer – Select price * quantity from item;
b. Display the details of items whose price is less than 50.
Answer – Select * from item where price < 50;
32. Identify the columns and data types of a table: Airlines. Mention at least four
columns with data type.
Answer –
Columns Data type
Flight No Text
No.of Passengers Integer
Airlines Text
Arrival_Time Date/Time
Departure_Time Date/Time
Fares Decimal

33. Identify the columns and data types of a table: Students. Mention at least four
columns with data type.
Answer –
Columns Data type
RollNo Integer
Student_name Varchar(20)
Father_name Varchar(20)
Mother_name Varchar(20)
Address Varchar(50)
DOB Date
34. Why there is a need to create Forms?
Answer – A form allows the user to enter information into a database in a systematic manner.
It is a user-defined interface that allows users to see, enter, and edit data directly in database.
35. What is the purpose of creating Reports?
Answer – Reports help to present the data in proper manner which is stored in the database,
It also displays the data in summary format.

37. Differentiate between Forms and Reports.


Answer –
Form
a. Forms are used to store the data in the semantic way
b. Edit, delete & modify can be easily managed
c. Auto calculation can be done easily
Report
a. Report display the data in the presenting format
b. Report can display all the record from the table
c. Edit, delete & modification cannot be done through report
d. You can take printout with the help of report
38. Can a form display data from queries?
Answer – Yes form can display the data from queries, with the help of query you can filter the
data and you can display in the form.
39. In how many ways Forms and Reports can be created in a database?
Answer – There are two ways to create a form and report in the database.
a. Using Wizard
b. Using Design View
WEB SECURITY
1. What do you mean by Accessibility?
Answer – Computer Accessibility helps the disabled user to work on a computer. There are
different types of accessibility options available in the operating system, for example – Sticky
Keys, Filter Keys, Toggle Keys, Sound Tab, SoundSentry, ShowSound, Display Tab, Hight
Contract etc. Computer Accessibility is also known as Assistive Technology.
2. What are Sticky Keys?
Answer – Sticky Keys is an accessibility feature which is designed to help the user having
physical disabilities. It also helps other users who have repetitive strain.
3. What are Filter Keys?
Answer – It helps the people having hand tremors, helping to type easily, ignore brief or
repeated keystrokes.
4. What are Toggle Keys?
Answer – Toggle Keys helps the people having vision problems or cognitive disabilities. When
ToogleKeys is turned on, computer generate the sound when the Caps Lock, Num Lock, or
Scroll Lock keys are pressed.
5. What is the use of Sound Sentry?
Answer – SoundSentry helps the users who have auditory impairments. SoundSantry
generates visual warning to the auditory impairments people like blinking title bar, and
flashing border instead of sound.
6. What is the purpose of ShowSounds?
Answer – ShowSound instructs the user or conveys the user with the help of sound. It also
provides information visually, through text or using informative icons.
7. What is the purpose of High Contrast?
Answer – High Contrast helps the user who has a vision impairment. For example, in the
computer you can change the Size of the font, Color of the text and the background.
8. What are Cursor Options?
Answer – Cursor is also an accessibility feature that helps the user who has a vision
impairment by changing the blink rate of the cursor and width of the cursor.
9. What is the purpose of MouseKeys?
Answer – The users who have a problem handling a mouse. MouseKeys accessibility features
help the user to use the keyboard as a pointing device instead of a mouse.
10. What is the purpose of Serial Keys?
Answer – Instead of using Keyboard or Mouse if you want to add some other input device in
the computer then the serial keys will help you. For example you can add Sip, Puff and Breath
Switches devices.
11. What is a computer network?
Answer – A computer network is a group of computers and other hardware components that
are linked together by communication channels (cables or satellites) to share resources and
information.
12. What are the different Network architectures?
Answer – There are two different ways to design the network architecture –
a. Peer – to – Peer Network Architecture – Peer to peer networks are those in which all
computers have the same status. In most cases, each endpoint in such a network has an
equally competent CPU.
b. Client – Server – Architecture – Client server networks are networks in which certain
computers perform specific tasks and provide services to other computers in the network.
13. What are the major types of Network?
Answer – There are two major types of network in computer system –
a. Local Area Network (LAN) – A local area network (LAN) is a network that connects
computers and devices in a specific geographic region, such as a home, school, computer lab,
office building, or inside the buildings.
b. Wide Area Network (WAN) – Wide area network covers a broad area like across
metropolitan, regional, or national boundaries. The Internet is a collection of Wide area
networks.
14. What is the Internet?
Answer – The Internet is a global network of interconnected computer networks that service
billions of people across the world using the standard Internet protocol. It’s a network made up
of millions of public, private, business, academic, and government networks. The internet is
one of the most useful technologies of our daily life, assisting us in our personal and
professional life.
15. What is the World Wide Web?
Answer – The World Wide Web is also known as WWW or W3, is a network of interconnected
hypertext documents accessible via the Internet. A web browser allows you to see websites
that contain text, photos, videos, and other multimedia, as well as navigate between them
using hyperlinks.
16. What are the advantages of a computer network?
Answer – Advantages of computer network are –
a. File Transfer – Users can transfer text files, spreadsheets, presentations, audio files, video
files, etc from one computer to another computer.
b. Hardware Sharing – Computer networks can share hardware resources such as scanner,
printer etc.
c. Internet Sharing – Instead of paying for several Internet connections for each computer,
you can get a single Internet connection and share it with other computers in a network.
d. Usage of network based application – Another advantage is the availability of web
browsers, email clients, chat applications, audio and video calling, and so on.
17. What do you mean by ISP?
Answer – If you want Internet connection in your computer you require Internet Service
Provider (ISP), IPS helps to connect user computers to the internet. Internet Service Providers
include Bharat Sanchar Nigam Limited (BSNL), Airtel, MTS, Vodafone, and others.
18. What is Modem?
Answer – Previously we were taking internet connection from landline phones, but in landline
phones whatever information is coming that is in the form of analog and computer
understanding digital signal. So, Modem helps to convert analog signals to digital signals and
digital signals to analog signals.

19. What are the different types of Internet connectivity?


Answer – There are two types of Internet connectivity available (Wired connectivity & Wireless
connectivity)-
Wired connectivity
a. Dial-Up – Previously we were connecting to the internet with the help of dial – up system.
Means first we have to dial a particular number and then the internet will be established.
b. DSL – Digital Subscriber Line (DSL) provides Internet connection by transferring digital data
over the wires of a local telephone network.
c. Cable Internet Access – Cable Internet Access is delivered using existing cable TV
networks, similar to DSL, which is delivered via existing telephone lines.
Wireless connectivity
a. 3G or 4G – 3G stands for third Generation and 4G stands for fourth Generation, it is mobile
telecommunication services and network.
b. WiMax – WiMax (Worldwide Interoperability for Microwave Access) is a wireless technology
providing mobile broadband connectivity across the cities and countries, for example Jio
WiMax.
c. Wi-Fi – Wi-Fi is wireless connectivity which provides high – speed internet connections to
multiple users.
20. What is packet switching?
Answer – Packet switching is a way of sending data across a network in the form of packets.
For example, if 10KB file you want to transfer to another computer, the packet switching will
divide this 10KB file in different packets, and one by one this packet is sent to destination
computer, If in between some packets are missing or damaged then destination computer can
ask for resend packet once again, when the computer receives the packet then the computer
will send acknowledgement to sender computer this method is known as packet switching.
21. What is Instant messaging software?
Answer – Instant messaging (IM) is a type of text-based communication in which two people
participate in a single conversation using their computers or mobile devices in an Internet-
based chatroom.
22. Key Features of an Instant Messaging?
Answer –
a. Text Message can be sent to multiple people
b. Video & Audio calling & conferencing
c. File transfer
d. Save message for future reference
23. What are general rules and etiquettes to be followed while chatting.
Answer – The general rules and etiquettes are –
a. Message should be short and to the point
b. Before start chatting, first ask person have a time to chart or not
c. Know about your topic
d. Don’t type your message in uppercase
e. Give time to respond other people
24. What is a blog?
Answer – Blog is just like a journal where an individual or group of people share their
information, thoughts, activities or knowledge. Blogs are similar to online personal diaries in
that they are simple sharing of knowledge. With the help of a blog you can share events,
announcements, news and reviews etc.
25. Give examples of free blogs?
Answer – There are many free blogs provider websites are available for example –
a. www.wordpress.com
b. www.blogger.com
c. www.blog.com
d. www.weebly.com
e. www.blogsome.com
26. What is an Offline Blog editor? Give examples of offline free blog editors
Answer – Suppose you don’t have an active internet connection in your home and you are a
blog writer, Offline blog editor helps bloggers to write posts offline and when the internet
connectivity is available then it will upload automatically. Offline free blog editors are –
a. Qumana
b. Windows Live Writer
c. Blogdesk
27. What is an Online transaction?
Answer – Online transactions help the user to transfer funds via the internet. When we are
doing online translation many protocols and security measures are used for a safe and secure
process. Example – Https, SSL, IOTP etc.
28. What are the different situations while doing online shopping?
Answer –
a. A customer does not have enough time to go shopping.
b. Visiting a store costs more than purchasing a product online.
c. Online, you can get a product or service that is not available in your local market.
29. What are the popular Online transaction websites?
Answer – Some of the popular online transaction are –
a. IRCTC
b. Flipkart
c. EBay
d. Redbus
30. How to create a secure password?
Answer – The general guideline for managing strong password are –
a. Length of the password should be 12 – 14 character
b. Don’t use dictionary word, your name, or any common word
c. Include number, symbol, uppercase letter and lowercase letter in the password.
d. Use a random password if possible.
31. What are cookies?
Answer – A cookie is just a little bit of text that a website sends to your browser. It assists the
site in remembering information about your visit, which can make it easier to return to the site
and make it more helpful to you.
32. What are firewalls?
Answer – Firewalls, which can be software or hardware, can help to keep a computer and a
network secure. Firewalls examine network traffic to determine whether it should be allowed or
denied.
33. What is built – in password management?
Answer – When password is used in the browser then built – in password manager store the
password. When users attempt to log in to websites, browsers frequently prompt them to auto-
fill their usernames and passwords.
34. What are the basic safety rules of an organization?
Answer – The safety rules to follow at workplace are –
a. Fire Safety
b. Falls and slips
c. Electrical Safety
d. Use of first aid

35. What are the basic fire safety rules followed in an organization?
Answer – The most basic fire safety rules are –
a. Fire escape plans must be installed
b. Organization have to conduct regular drills
c. Smoke alarms must be installed
d. Keep workplace a no – smoking zone
e. Regular maintenance of safety equipment.
36. What are the falls and slips safety rules?
Answer – The rules for falls and slips safety rules are –
a. Keep the moving are clean and dry
b. Workplace must be proper ventilated
c. Wear non slippery footwear
d. Oil spills, dust must be cleaned immediately.
37. What are the basic electricity safety rules?
Answer – Electricity safety rules are –
a. A recognized organization should authorize the electrical equipment.
b. Workers should be trained in the safe use of electrical equipment.
c. Electrical equipment that has been damaged or is dangerous should be replaced
immediately.
d. Heat-emitting equipment should be maintained separate from electrical equipment.
e. Make sure that the outlets/circuits are not overloaded.
38. What are the safety rules of first aid?
Answer – The safety rules of first aid are –
a. Assure the injured to remain calm and not to panic
b. If they are in shock, keep them warm.
c. In the instance of a back/neck injury, do not move the victim.
39. Examples of occupational hazards?
Answer – Examples of occupational hazards are –
a. Physical hazards
b. Chemical hazards
c. Biological hazards
d. Behavioral hazards
e. Radiological hazards
f. Ergonomic hazards
40. What are the different types of accidents?
Answer – The different type of accidents are –
a. Accidents at workplace – Slips and fall accidents
b. Industrial disease / illness
c. Road traffic accidents
d. Clinical Accidents
e. Sports related accidents
41. What care should an organization take to handle accidents?
Answer – The safety rules an organization take to handle accidents are –
a. Safety measures should be installed in workplace
b. Immediately call the medical team for any injury
c. Stay alert
d. Pay attention to and follow emergency drills

42. What are the Hazards?


Answer – A hazard is defined as anything that has the potential to cause injury, damage, or
loss of health or life.
There are different types of hazards –
a. Physical
b. Chemical
c. Biological
d. Mechanical
43. Give a checklist for workstations to minimize the hazards.
Answer – Checklist of workstations are –
a. allow enough space for the user to change positions comfortably
b. give sufficient lighting
c. have windows with changeable coverings to control the amount of sunlight
d. be sufficiently spacious when a workstation is shared by more than one person
44. Give a checklist for computers to minimize the hazards.
Answer – Checklist for computers are –
a. show well-defined characters of appropriate size and spacing
b. Have a stable image
c. Have easily adjustable brightness and contrast
d. Keyboard should have keys with clearly visible symbols
e. Keyboard should have a gap in front to give support for the user’s hands or arms
45. Give a checklist for the work surface to minimize the hazards.
Answer – The work surface should –
a. give sufficient space for the user
b. have a low reflective surface
c. be of sufficient size to allow the screen, keyboard, and other peripherals to be placed
flexibly
d. have a stable and adjustable document holder that is at the same height as the screen and
at the same viewing distance as the screen
46. Explain the term ‘ Evacuation’
Answer – Evacuation is the process of removing people from a location in the case of
emergency or disaster.
a. In the case of emergency, every organization must ensure the following points for
evacuation:
b. Every organization have an evacuation policy
c. In the case of an emergency, the organization must have a specified gathering place.
d. In the case of an emergency, an organization must have a buddy system for special needs
or disabilities people.
e. Floor plans should be placed in every floor
f. Frequently drills should be conducted.
47. Explain the term ‘ Evacuation Policy’
Answer – Every company must have an evacuation plan. All Team Leaders are accountable for
notifying their staff about the policy. When the Team Leader informs you of these things, pay
close attention. Negligence at this time may result in the loss of life.
48. Explain Buddy System to implement evacuation efficiently in case of emergency
Answer – A ‘buddy system’ for those with special needs or disabilities problem. This approach
ensures that people with disabilities are properly assisted and guided out of the premises or
impacted area. If you’re a buddy to someone, make sure they’re secure at the assembly point
with you.

49. Explain the importance of a healthy lifestyle.


Answer – ‘A healthy way of life leads to a healthy being.’ A healthy lifestyle has a long-term
impact on an individual, resulting in a healthy environment at home and at work. A happy and
healthy employee will always give the best.
50. Give any four points of a healthy lifestyle.
Answer – The four points of a healthy lifestyle are –
a. Physical activities
b. Healthy eating habits
c. Sound sleep
d. Stress management
EMPLOYABILITY SKILLS
Self Management Skills
1. To become successful in life, which basic self – management skills do you require?
Answer – To become successful in life, we have follow following basic skills –
a. Self-awareness: Request honest feedback. Get a better understanding of your personality
and work-related skills. Consider how you handled issues in your regular contacts and how you
may have handled them better.
b. Responsibility: Taking responsibility is very important. Accepting ownership is the step
towards self – development, For example, If you’ve been given an assignment by a teacher,
ensure you take complete ownership.
Even if you are unable to accomplish the assignment on time, you must notify it and then
make the necessary adjustments.
c. Time Management: Make a list of the tasks you need to get done. Make a schedule for
yourself and stick to it.
d. Adaptability: Always stay up to date on best practices and fresh information. Prepare
yourself for new adjustments so you can make a smooth transition.
2. What is Stress?
Answer – Our emotional, mental, physical, and social responses to perceived demands or
threats are referred to as stress. Stressors are the pressures or threats that people face.
For example –
a. You’re only a few days away from your examinations, yet you’re feeling unprepared.
b. you are experiencing a loss of someone close in the family.
c. You’re concerned about what others will think of you if you don’t dress properly or speak
confidently.
d. you are stressed due to lack of sleep.

3. What are the three steps to manage Stress?


Answer – The three steps to manage stress are –
a. Be aware that you are stressed – Look for stress symptoms such as headaches,
insomnia, melancholy, excessive worrying, anxiousness, and so on. We can manage stress if
we are aware of it.
b. Identify What is causing you stress – Find out the reason for your stress. Is it because
of exams, family pressures, money issues, not eating good food, etc.?
c. Apply stress management methods – To effectively manage your time, use time
management tools. Concentrate on the most important things and complete them.
Talk to a friend or family member about the problem. Take time to recharge by exercising,
watching movies, or doing anything else that makes you feel good.
4. What are the different stress management techniques?
Answer – Some of the stress management techniques are –
a. Time management
b. Organizing academic life, no delaying
c. Healthy diet
d. Positivity in your life
e. Physical exercise and fresh air
f. Proper sleep
g. Holidays with family and friends
5. What is emotional Intelligence in Self – Management skills?
Answer – The ability to recognize and regulate one’s own emotions, as well as the emotions of
others, is referred to as emotional intelligence.
a. Emotional Awareness – The ability to recognize and name one’s own feelings is known as
emotional awareness.
b. Harnessing Emotions – The ability to harness and apply emotions to tasks such as
thinking and problem solving is referred to as “harnessing emotions.”.
c. Managing Emotions – Managing Emotions entails the ability to control one’s own emotions
when appropriate, as well as helping others in doing the same.
6. How to manage emotional intelligence?
Answer – To manage emotional intelligence you have to follow below steps.
a. Understand your emotions – Analyze your behavior and make a list of the areas where
you need to improve. Then you can focus on the areas where you need to grow.
b. Rationalize – Don’t make quick judgments; instead, view logically through.
c. Practice – Keep yourself calm by doing meditation and yoga.
7. How can you identify your Strengths and Weaknesses?
Answer – The techniques for identifying our strengths and weaknesses are –
Finding Strengths
 Think of anything that you are always successful at.
 Think about what others like in you.
 Take out time and think about what you do well
Finding Weaknesses
 Point out the areas where you struggle and the things you find difficult to do.
 Look at the feedback others usually give you.
 Be open to feedback and accept your weaknesses without feeling low about it.
8. Types of Motivation?
Answer – there are two types of motivation
a. Internal Motivation – Many things we do which make us happy, feel good and healthy.
b. External Motivation – If you are working for recognition, respect and appreciation.
9. What are the qualities of Self – motivated people?
Answer – The qualities of Self – motivated people are –
 Know what they want from life
 Are focused
 Know what is important
 Are dedicated to fulfill their dreams
10. How to build Self – Motivation?
Answer – There are four steps to build self – motivation.
 Find out your strength
 Set and focus on your goals
 Develop a plan to achieve your goals
 Stay loyal to your goals
11. How to Set Goals in Self Management Skills?
Answer – We can use different techniques to set goals.
a. Specific – Always set your clear and specific goals.
b. Measurable – A measurable goal answers the questions “How much?”, “How many?” and
“How do I know that I have achieved results?”
c. Achievable – Breaking down big goals into smaller parts will make the goal achievable.
d. Realistic – A realistic goal would be something that we want to achieve and can work
towards.
e. Time bound – A goal should have a timeframe by when the goal needs to be achieved.
12. What are the benefits of time management?
Answer – Time management is the thinking skill that helps you to –
a. Complete tasks on time
b. Submit homework and assignments on time
c. You can identify how long it will take you to do something.
13. What are the four steps for effective time management?
Answer – The four steps for time management are –
a. Organize – We make plans for our day-to-day activity.
b. Prioritize – We build a to-do list with all of our activities on it, and we organize them in
order of importance.
c. Control – We have a control over our activities and time
d. Track – We keep track of where we’ve spent our time.
14. How can I improve my time management?
Answer –
a. Any planned action should not be delayed or postponed.
b. Organize your room and desk at school.
c. Create a “NO DISTURBANCE ZONE” where you may sit and finish important tasks without
being disturbed.
d. Use waiting time productivity
e. Prepare a “To-do” list
f. Priorities
g. Replace ineffective activities with productive ones.
Basic ICT Skills
1. What is ICT?
Answer – Information and Communication Technology (ICT) is an acronym for information and
communication technology.
ICT helps in the proper sharing, receiving, and processing of information, and an ICT device is
a device that is used for processing, storing, and delivering information to others.
Examples of ICT devices are – Laptop, Desktop, Tablets and Smartphones.
2. Objectives of Information and communication technology? Advantages and
disadvantages of ICT.
Answer – Full form of ICT is Information and communication technology. The goal of ICT is to
bridge the gap between parents, educators, and students by encouraging sustainable,
cooperative, and transparent communication methods.
Advantages of ICT
a. Enhanced the modes of communication
b. Independent learning platforms Cost – efficient
c. Enhanced data and information security
d. Paperless – Eliminate the usage of paper
e. Better teaching and learning methods
f. Web – based LMS tools

Disadvantages of ICT
a. Traditional books and handwritten methods are at risk.
b. Managing courses online is difficult
c. Teachers require experience to handle ICT
d. Risk of cyber attacks and hacks
e. Misuse of technology
3. Difference between Hardware and Software?
Answer – A computer system consists of two main parts – Hardware and Software
a. Hardware – Hardware is a physical part of a computer system. We can feel and touch the
hardware devices. example – CPU, Mother Board, Hard Disk, Keyboard, Mouse, Printer etc.
b. Software – Software related to the programs which perform different types of tasks on the
computer system. Program is a collection of Instructions. It also helps the computer to perform
the specific task. Example – Open Office Base, Spreadsheet, Presentation etc.
4. What is BIOS?
Answer – BIOS stands for Basic Input/ Output System, It helps the computer system to identify
(Self-test) the paraperaphal devices which are connected to the computer system and helps
computers to load Operating System properly.
5. What are the different types of keys in Keyboard?
Answer –
a. Function keys – F1 to F12 are function keys in the keyboard, function keys are used for
specific purposes.
b. Control keys – SHIFT, CONTROL (CTRL),ALT, SPACEBAR, TAB AND CAPS LOCK are known as
a control key, these keys are used as per the demand.
c. Enter key – ENTER or RETURN keys are known as Enter key, depending on the brand of
computer that you are using.
d. Punctuation keys – It includes keys for punctuation marks, such as colon (:), semicolon (;),
question mark (?), single quotation marks (‘ ’), and double quotation marks (“ ”).
e. Navigation keys – END, HOME, PAGE DOWN, PAGE UP and Arrow keys are known as
navigation keys, these keys are used to move up, down, left or right in the document.
f. Command keys – BACKSPACE, INSERT (INS) and DELETE(DEL) are known as command
keys. INSERT key allows you to overwrite characters to the right side.
The DELETE command key and BACKSPACE key are used to remove typed text, character, or
any other objects from the right and left side of the cursor.
g. Windows key – Windows key is used to open the Start menu.

6. What is the purpose of Mouse?


Answer – The purpose of the mouse is –
a. Roll Over or Hover – Whenever we bring the mouse over the files, it shows the details of
the file.
b. Click or Double Click – Mouse allows you to select, open or delete files and folders from
the computer system.
c. Drag and Drop – Click on the file and drag and drop your file where you want.
7. What are files and folders in a computer system?
Answer –
a. File – File is a collection of information different types of files store different types of
information. Every file has a file name and extension that identifies the type of file.
b. Folder – Folder is a collection of files or a group of files.

8. How to maintain a computer system?


Answer – Some simple ways to take care of computer system are –
a. Keeping a Device Clean – Always keep a device clean, such as the keyboard, the screen, and
the mouse. Handle your gadget with care, keep it cool, and don’t overload your battery.
b. Prepare a Maintenance Schedule – Make a schedule for computer maintenance.
Daily Maintenance
a. Clean up your email inbox
b. Save Important attachments and save in folder
Weekly Maintenance
a. Clean your Keyboard, monitor, CPU and printer
b. Backup your data
Monthly Maintenance
a. Clean unused photographs
b. Clean up Download folder
c. Uninstall unused programs
d. Run full system virus scan
e. Run disk – cleaner software
Yearly / Annual Maintenance
a. Clean up social media accounts
b. Clean up e-mail contact list
c. Update your operating System
9. How to increase Computer performance?
Answer – We frequently install a large number of applications, which slows down the
computer. Always attempt to uninstall unnecessary applications, temporary files, and antivirus
software updates.
10. What is a Security Break?
Answer – Security break is leakage of information stored in a computer.
Your personal information can be lost or leaked in two ways –
We are not cautious when it comes to disclosing personal information via the internet. We
share our account information and passwords on unsafe websites.
A person gets unauthorized access to our computer. This can happen at work if we don’t log
out before leaving the computer.
11. What are the threats?
Answer – Threats are ways in which personal information from a computer can be released
without our knowledge.
a. Theft – Theft means stealing of information or hardware. These maybe of three types:
i. Physical – Where a person may steal your desktop computer or laptop.
ii. Identity – A hacker gets your personal information and uses it to impersonate you. The
hacker can use this fake identity to get access to your account information or engage in illegal
activity.
b. Software Piracy – This is stealing of software and includes using or distributing unlicensed
and unauthorized copies of a computer program or software.
i. Virus – Viruses are computer programmes that can corrupt data and software
applications, as well as steal data from computers. Worms and Trojan Horses are two major
forms of viruses.
ii. Worms – Worms are viruses that replicate and spread to all files on a computer once
they attack a computer. This makes it very difficult to remove them.
A Trojan Horse appears to be a useful software programme, but once it reaches a computer, it
begins to behave like a virus and destroys the data.
iii. Online Predator – Online predators are persons who use the internet to trap you into
unhealthy relationships. They could be older people appearing as your age who harass you
into doing unlawful things online.
iv. Internet Scams – You may occasionally receive highly appealing offers claiming that
you have won a large sum of money in a lottery and that you can claim your win by depositing
a specific amount of money. When you deposit money with a credit card or through online
banking, you not only lose the deposit money but your card / account information may be
misused later.
12. How can we protect our data?
Answer – To protect our data from theft and viruses we can take the following measures –
a. Use Strong password in your account – Make your passwords difficult to guess. When
creating a new password, attempt to use a combination of
 Small Character
 Capital Character
 Special Character
 Numbers
b. Install Antivirus and Firewall –Anti-virus software and a firewall protect your data from
virus and from hackers.
c. Encrypt your data – Keep your information in an encrypted format to keep it safe from
unauthorized users.
d. Open only secure site – Before visiting a website, make sure the address begins with
https://. A website that begins with https:// is a secure website.
Entrepreneurship and Society
1. What qualities are required for successful entrepreneurs?
Answer – Successful entrepreneurs have the following qualities.
a. They are confident, They believe in themselves and their abilities.
b. They keep trying new ideas in their business
c. They are creative and think differently about business ideas.
d. They do not give up when they face difficulty.
e. They make decisions after thinking about them.
f. They are patient
g. They take responsibility for their actions
h. They work hard
2. What do entrepreneurs do when they run their business?
Answer –
a. Fulfill Customer Needs – A product or service that people want is referred to as demand.
Entrepreneurs discover what people desire. Then students use their imaginations to come up
with a business plan to address that demand.
b. Use Local Materials – Entrepreneurs produce low-cost items by using the materials and
people available to them.
c. Help Society – Entrepreneurs have a good interaction with the general public. They gain
money by doing things that help society. Some business people donate money to create
schools and clinics, while others work to save the environment.
d. Create Jobs – They buy more material, and from more people. They also hire more people
to work for them. In this way, more people have jobs.
e. Sharing of Wealth – Wealth means having enough money to live a comfortable life. As
entrepreneurs grow their business.
f. Lower Price of Products – The price of a product decreases when more entrepreneurs sell
the same thing. In India, for example, as more mobile phones were sold, the cost of the phone
decreased.
3. Qualities of an Entrepreneur?
Answer – Qualities of entrepreneur are –
a. I believe in myself and what I can do. I am confident.
b. I think of different ways to solve a problem. I am creative.
c. I work hard on every task.
d. Problems take time to get solved. I am patient about solving them.
e. I take responsibility for my actions and mistakes.
f. I do not give up when I face a problem.
g. I keep trying new ideas.
h. I think before I make a decision.
4. What are the misconceptions of Entrepreneurship?
Answer – Misconceptions of Entrepreneurship are –
a. It is a common misconception that every company idea must be unique or exceptional.
b. A person needs a lot of money to start a business.
c. Entrepreneurs are born, not made.
d. A person having a big business is an entrepreneur.
5. What is wage employment?
Answer – Wage management is based on work grades and performance parameters. Wage
management’s goal is to take reward and give high performance standards in the business.
The wage management does not take too much risk but entrepreneurs have to take risks.
6. Difference between Self employment & Wage employment?
Answer – There are two ways a person can earn a living.
a. Self Employment – An entrepreneur is a self-employed individual who runs a business to
meet a need by experimenting with new ideas.
i. Enter – When an entrepreneur first starts business, they are simply getting their
feet wet in the business world.
ii. Survive – There are a lot of entrepreneurs around nowadays. In a competitive
market, the entrepreneur must remain competitive.
iii. Grow – An entrepreneur considers growing his or her business once it has
reached a certain level of stability.
b. Wage Employment – Wage management is based on work grades and performance
parameters. Wage management’s goal is to take reward and give high performance standards
in the business.
Entrepreneurial Skills
1. What is Entrepreneurship?
Answer – An entrepreneur is a person who creates a new business, takes risks, brings new
ideas to start a business and is self employed.
2. What are the different ideas entrepreneurs add?
Answer – New ideas with which an entrepreneur adds varieties of product, new services, cost
reduction ideas, or new marketing techniques.
3. Characteristics of Entrepreneurs?
Answer – Adaptable and flexible to achieve the goals of enhancing quality and customer
satisfaction
1. Believe in hard work
2. Ability to take up risks
3. Money Management
4. Knowledge of the product and services and their need or demand in the market
5. Effective planning and execution
6. Financial literacy

You might also like