CBSE CS

Class 9 Computer Applications (165)

Computer Application class 9 Syllabus

Join us on Social Media for unlimited benefits

Answers of Computer Application class 9 Kips Book (165)

CHAPTER-1: COMPUTER SYSTEM BRAIN DEVELOPER

 
 

Multiple Choice Questions

Question 1

Which of the following is not a characteristic of a computer?

  1. Reduces paper work
  2. Less storage capacity
  3. Accuracy
  4. Speed

Answer

Less storage capacity

Reason — A computer has great storage capacity.

Question 2

The final output available to a user on the monitor is known as …………… .

  1. Hardcopy
  2. Software
  3. Softcopy
  4. Bytes

Answer

Softcopy

Reason — The final output available to a user on the monitor is known as softcopy.

Question 3

Which of the following is not a part of a CPU?

  1. MU
  2. ALU
  3. VDU
  4. CU

Answer

VDU

Reason — VDU (Visual Display Unit) is not a part of a CPU. Memory Unit (MU), Arithmetic Logic Unit (ALU) and Control Unit (CU) are parts of a CPU.

Question 4

The component which is responsible for the control of all mathematical calculations and logical operations of a computer is called …………… .

  1. ALU
  2. CU
  3. MU
  4. ROM

Answer

ALU

Reason — The component which is responsible for the control of all mathematical calculations and logical operations of a computer is called Arithmetic Logic Unit (ALU).

Question 5

The process of converting unorganized data into meaningful information according to user’s instructions is called …………… .

  1. Input
  2. Storage
  3. Output
  4. Processing

Answer

Processing

Reason — The process of converting unorganized data into meaningful information according to user’s instructions is called Processing.

Question 6

Unorganized raw facts and figures given to a computer are collectively called …………… .

  1. ROM
  2. Information
  3. Output
  4. Data

Answer

Data

Reason — Unorganized raw facts and figures given to a computer are collectively called Data.

Question 7

The basic organization of a computer does not consist of …………… .

  1. Keyboard
  2. Input unit
  3. Output unit
  4. CPU

Answer

Keyboard

Reason — The basic organization of a computer does not consist of Keyboard.

Question 8

ROM stores a set of instructions called …………… .

  1. DRAM
  2. PROM
  3. BIOS
  4. SRAM

Answer

BIOS

Reason — ROM stores a set of instructions called BIOS (Basic Input Output System).

Question 9

The type of ROM which can have its contents erased by ultraviolet light is called …………… .

  1. PROM
  2. EPROM
  3. EEPROM
  4. Flash memory

Answer

EPROM

Reason — The type of ROM which can have its contents erased by ultraviolet light is called EPROM (Erasable Programmable Read Only Memory).

Question 10

A commonly used storage device is …………… .

  1. RAM
  2. ROM
  3. Hard disk
  4. SRAM

Answer

Hard disk

Reason — A commonly used storage device is Hard disk.

Question 11

The smallest unit of memory is …………… .

  1. Byte
  2. Bit
  3. Nibble
  4. Kilobyte

Answer

Bit

Reason — The smallest unit of memory is Bit.

Question 12

The special high speed memory which stores frequently used instructions so that a CPU can access them quickly is called …………… .

  1. DRAM
  2. Cache
  3. PROM
  4. Flash memory

Answer

Cache

Reason — The special high speed memory which stores frequently used instructions so that a CPU can access them quickly is called Cache memory.

Question 13

The memory which is programmed at the time of manufacturing and cannot be modified later is called …………… .

  1. EPROM
  2. PROM
  3. ROM
  4. RAM

Answer

PROM

Reason — The memory which is programmed at the time of manufacturing and cannot be modified later is called Programmable Read Only Memory (PROM).

Question 14

In which form is the data represented in Digital computers?

  1. Analog form
  2. Decimal form
  3. Binary form
  4. Octal form

Answer

Binary form

Reason — The data is represented in binary form in digital computers.

Question 15

Which of the following category is not included in Microcomputers?

  1. Tablet PC
  2. Laptop computer
  3. Supercomputer
  4. Handheld devices

Answer

Supercomputer

Reason — Supercomputer is not included in Microcomputers.

Question 16

A computer is not able to …………… .

  1. Think
  2. Reduce usage of paper
  3. Reduce manpower
  4. Increase efficiency

Answer

Think

Reason — A computer is not able to think. It only follows the instructions of its user.

Question 17

The speed of a CPU is measured in …………… .

  1. MB
  2. CB
  3. TB
  4. Mhz

Answer

Mhz

Reason — The speed of a CPU is measured in Mhz.

Question 18

…………… is a quick and convenient way to send short messages.

  1. MMS
  2. SMS
  3. E-Mail
  4. None of these

Answer

SMS

Reason — SMS is a quick and convenient way to send short messages.

 

 

 

Fill in the blanks

Question 1

Read only memory is a part of …………… memory.

Answer

Read only memory is a part of internal memory.

Question 2

…………… is a component of CPU that controls the transfer of data and instructions among other units of computer.

Answer

Control unit is a component of CPU that controls the transfer of data and instructions among other units of computer.

Question 3

Computers have …………… IQ.

Answer

Computers have zero IQ.

Question 4

A microprocessor is a …………… where a large number of circuit elements are integrated.

Answer

A microprocessor is a chip where a large number of circuit elements are integrated.

Question 5

The speed of a CPU is determined by the number of …………… executed by it per second.

Answer

The speed of a CPU is determined by the number of instructions executed by it per second.

Question 6

The speed of external memory is much …………… than internal memory.

Answer

The speed of external memory is much slower than internal memory.

Question 7

The three components of a CPU are …………… , …………… and …………… .

Answer

The three components of a CPU are Memory unit , Control unit and Arithmetic Logic Unit.

Question 8

Primary memory is of two types, …………… and …………… .

Answer

Primary memory is of two types, Random Access Memory and Read Only Memory.

Question 9

The primary use of ROM is during the …………… process, which contains initial program to start a computer.

Answer

The primary use of ROM is during the Booting process, which contains initial program to start a computer.

Question 10

A computer compiles results using …………… unit.

Answer

A computer compiles results using processing unit.

Question 11

…………… memory is a special high speed memory, which stores frequently used instructions.

Answer

Cache memory is a special high speed memory, which stores frequently used instructions.

 

 

 

 

State True or False

Question 1

Primary memory is used to store large amount of information permanently.

Answer

False

Reason — Primary memory stores data and programs temporarily as long as they are being executed as primary memory has limited storage capacity.

Question 2

MMS can be used for sending pictures and videos through mobile phones.

Answer

True

Reason — MMS can be used for sending pictures and videos through mobile phones.

Question 3

The functions of a computer are – Input, Process, Storage, and Output.

Answer

True

Reason — The functions of a computer are – Input, Process, Storage, and Output.

Question 4

The Control Unit stores data and instructions in memory storage devices.

Answer

False

Reason — The Memory Unit stores data and instructions in memory storage devices.

Question 5

A processor is a system board and is the most important hardware component of a computer.

Answer

True

Reason — A processor is a system board and is the most important hardware component of a computer.

Question 6

Data required for processing is transferred from a secondary memory to a primary memory.

Answer

True

Reason — Data required for processing is transferred from a secondary memory to a primary memory.

Question 7

1 Giga Byte is equal to 1024 Tera Byte.

Answer

False

Reason — 1 Giga Byte is equal to 1024 Mega Byte.

Question 8

RAM and ROM are also called Immediate Access Storage.

Answer

True

Reason — RAM and ROM are also called Immediate Access Storage (IAS) as the CPU can access its data very fast as compared to data in the secondary memory.

Question 9

Flash Memory is a specific type of EEPROM that can be erased and reprogrammed into big sections instead of one byte at a time.

Answer

True

Reason — Flash Memory is a specific type of EEPROM that can be erased and reprogrammed into big sections instead of one byte at a time.

Question 10

Nibble is a group of 8 bits.

Answer

False

Reason — Nibble is a group of 4 bits.

 

 

 

 

Application Based Questions

Question 1

Which type of computers do Indian Railways use to interact with the customers for the various online functions, like booking, cancellation, showing the current status and so on?

Answer

Mainframe computers are used by the Indian Railways to interact with the customers for the various online functions, like booking, cancellation, showing the current status and so on

Question 2

I am a perfect combination of Analog and Digital computer. I accept analog signals, convert them to digital and process them in digital form. Who am I?

Answer

Hybrid computer is a perfect combination of the Analog and Digital computer. It accepts analog signals, converts them to digital and processes them in the digital form.

Question 3

Rahul is working in the National Research Centre which predicts natural calamities, like earthquake, tsunami, etc. Which type of computer is used in this kind of research?

Answer

Super computer is used in the National Research Centre which predicts natural calamities, like earthquake, tsunami, etc.

Question 4

Ms Khanna is a professor of English in a university. She has to keep herself updated with the latest research in her field. She is not comfortable in using a keyboard. Which type of computer will you suggest her considering the nature of her job and preference?

Answer

She can use a Tablet PC as it does not have a keyboard. It has a touch screen which is used to write directly on the screen rather than typing on a keyboard.

Question 5

I am a component of CPU which performs logical operations. Identify me.

Answer

Arithmetic and Logical Unit

 

 

 

 

Short Answer Type Questions

Question 1

What are the basic organizations of a computer system?

Answer

A Computer System has three important parts-

  1. Input Unit
  2. Central Processing Unit
  3. Output Unit

Question 2

Mention the three components of a CPU.

Answer

The three components of a CPU are:

  1. Memory Unit (MU)
  2. Arithmetic and Logical Unit (ALU)
  3. Control Unit (CU)

Question 3

What are the major strengths of a computer? Name them.

Answer

The major strengths of a computer are:

  1. Speed
  2. Accuracy
  3. Reliability
  4. Storage Capacity
  5. Versatility
  6. Reduction in Manpower
  7. Reduction in Paper work

Question 4

Name the two types of primary memory.

Answer

The two types of primary memory are:

  1. Random Access Memory (RAM)
  2. Read Only Memory (ROM)

Question 5

Give a real life example of RAM and ROM.

Answer

A blackboard is like a RAM that is constantly overwritten with the new data. A blackboard can be cleaned just as the data in the RAM is lost once the power is switched off.

An audio-video disk resembles a ROM. Once the songs are burned on a CD, the disc contents cannot be changed.

Question 6

Which unit is used to measure the speed of a processor?

Answer

The speed of a processor is measured in Megahertz (MHz).

Question 7

Name a storage device that is a part of secondary memory.

Answer

Hard disk is a storage device that is a part of secondary memory.

Question 8

Which is the smallest unit of memory?

Answer

The smallest unit of memory is bit that can hold a single state – either 0 or 1.

Question 9

What is the full form of BIOS?

Answer

The full form of BIOS is Basic Input/Output System.

Question 10

Name any two processor (chip) manufacturing companies.

Answer

Two processor (chip) manufacturing companies are Intel and AMD.

Question 11

Give three examples of input and output devices.

Answer

Three examples of input devices are keyboard, mouse and scanner.

Three examples of output devices are monitor, printer and speaker.

Question 12

Write any five characteristics of a computer.

Answer

Five characteristics of a computer are:

  1. Speed
  2. Accuracy
  3. Reliability
  4. Storage Capacity
  5. Versatility

 

 

 

 

Long Answer Type Questions

Question 1

Explain any two limitations and characteristics of a computer.

Answer

Two limitations of a computer are:

  1. Limited Intelligence — As compared to human beings computers have limited IQ.
  2. Dependence on Power — A computer is an electronic machine and thus its dependence on power makes it costly.

Two characteristics of a computer are:

  1. Speed — A computer works at an amazing speed. The work which is done by a normal person in 2-3 hours can be done by a computer in a fraction of seconds.
  2. Accuracy — A computer performs its task with great accuracy. It does not commit any mistakes. Errors occur only when the input is incorrect.

Question 2

How are computers used in the field of Research and Education?

Answer

Computers facilitate research work in a very effective way by performing complex computations, which sometimes seem impossible for humans. Some of them are listed below:

  1. The computations required for launching a new satellite into space.
  2. Earthquake and Tsunami warnings are possible with the aid of computers.
  3. Weather forecasting is done with the help of computers.
  4. Impact of nuclear tests can be studied using computers.

Computers aid in the field of education in the following ways:

  1. The multimedia rich computerized animations and videos help students to understand the concepts in a very simple and effective manner.
  2. Virtual classrooms use video conferencing and online modules of study material for learning.
  3. With the advent of e-learning, students can study according to their time schedule.
  4. Online entrance exams at national and international level are being conducted with the help of computers.
  5. The results of various education boards as well as entrance exams are available online.
  6. Students can find information about various colleges through the Internet and can apply online for the desired courses.

Question 3

How are computers used in the field of sports and military?

Answer

Computers are used extensively in the field of sports.

  1. The sports equipments used by athletes are first tested on computers.
  2. There is a large number of computerized training equipment, which have inbuilt programs to train the sports person.
  3. The training of athletes is done with the aid of computers.
  4. Updation of scoreboards, recording speed of players, action replays, and printing and selling of tickets are some of the sports related activities which are also done with the help of computers.

Computers play a vital role in the field of military.

  1. Computers are used in the design and development of high-tech weapons for defense where absolute accuracy is essential.
  2. Computerized simulation exercises are very helpful in training the pilots.
  3. Computers help in fighting terror and terrorists and their hideouts can be located anywhere in the world with high accuracy.
  4. Computer technology enables governments around the world to successfully execute their plans through effective planning.

Question 4

Explain the importance of computers in the government sector and law enforcement.

Answer

Government sector is making use of computer technology for official correspondence, budgeting, accounts, reporting, payroll, attendance, uploading of various schemes, forms, etc. Sectors like the census bureau, income tax, airlines, and railways, electricity boards, and telephone exchanges have benefitted greatly from the computer technology.

Computers play an important role in law enforcement. The traffic police uses speed cameras on traffic lights to monitor people for law violation. The police also uses computers to track the information of stolen automobiles and mobile phones in order to catch the criminals in less time.

Question 5

What are the application of computers in engineering and manufacturing fields?

Answer

Computers play a significant role in the field of engineering and manufacturing.

  1. Architects and engineers take the aid of Computer Aided Design (CAD) and Computer Aided Engineering (CAE) for designing and manufacturing high quality products, like cars and planes.
  2. Architects use computers for designing the layout of buildings and other civil engineering structures.
  3. Advanced industrial robots are used to perform skillful and repetitive work.
  4. Manufacturing with the support of robots and computers is called Computer Aided Manufacturing (CAM).

Question 6

Explain the input, process and output cycle for the withdrawal of 2000 rupees from your savings account, using an ATM card.

Answer

The input, process and output cycle for the withdrawal of 2000 rupees from my savings account, using an ATM card is as follows:

Input:

  1. Insert ATM card — ATM card is inserted into the card reader slot on the ATM machine.
  2. Enter PIN — Enter the PIN on the ATM’s keypad.
  3. Enter the amount to withdraw which in this case will be 2000.

Process:

  1. Card authentication — The ATM machine processes the information on the card and authenticates the card.
  2. PIN verification — The entered PIN is then validated to ensure it matches the one associated with the bank account.
  3. Account verification — The ATM establishes a connection with the bank’s computer system to verify the account details, balance, and transaction limits.
  4. Funds availability check — The system checks if the account has sufficient funds to complete the withdrawal, else the transaction will be declined.
  5. Dispense 2000 rupees — The ATM processes the withdrawal request, and the cash dispenser mechanism inside the ATM is activated to count and dispense 2000 rupees in the form of bank notes.
  6. Update account balance — The bank’s computer system updates the account balance to reflect the withdrawal.

Output:

  1. Dispensed cash — The ATM dispenses the requested amount (2000 rupees) in banknotes through a secure slot.
  2. Optional receipt — Optionally, the ATM may offer you a transaction receipt.
  3. Transaction completion — The ATM returns your card, and the display usually shows a message indicating that the transaction is complete.

Question 7

Differentiate between Primary and Secondary memory.

Answer

Primary MemorySecondary Memory
It is the main memory of the computer system.It is the auxiliary memory from where stored data can be retrieved.
Data and instructions get erased as soon as the computer is switched off.Data or instructions are stored for future use, even when the computer has been switched off.
It provides faster data access.It provides slower data access.
It is used for processing data.It is used for storing large amounts of data permanently.
It is small in size.It is of large size.
It is also called main memory or internal memory.It is also called auxiliary memory or external memory.
Examples are RAM and ROM.Examples are hard disk, CD, DVD, flash drive etc.

Question 8

What is a CPU? Explain the different parts of a CPU.

Answer

CPU is the main unit of a computer. It controls all the internal and external devices of a computer and performs arithmetic and logical operations. CPU is very small and is referred to as a microprocessor.

There are mainly three components of a CPU:

  1. Memory Unit (MU) — The memory unit is the principal storage of the computer. It stores both data and instructions. Computer memory is classified into two categories:
    i. Internal Memory — It stores data and programs temporarily as long as they are being executed. It is very fast and expensive but has limited storage capacity. For example, RAM and ROM.
    ii. External memory — It stores data and programs permanently. For example, hard disk, CD/DVD etc.

  2. Arithmetic and Logical Unit (ALU) — All the arithmetical and logical operations are performed through this unit. An arithmetical operation includes addition, subtraction, multiplication, division and logical operations include all types of comparisons.

  3. Control Unit (CU) — This unit controls each and every part of the computer system along with the peripherals. It extracts the instructions from memory, decodes them and sends the necessary signals to ALU to perform the required operation. It is also called the central nervous system of a computer system as it manages all other units.

Question 9

What do you know about Microcomputers? Explain any two types of Microcomputers, which you commonly find in day to day life.

Answer

Microcomputers or personal computers use a microprocessor. They cost less and are very small in size. The most popular type of personal computers are the IBM PC and the Apple. The desktop computers that we use in our school labs, offices, homes etc. are micro-computers.

Two types of Microcomputers are:

  1. Notebook Computer — It is an extremely light weight personal computer. It weighs around 5-6 pounds and is smaller in size than a laptop computer. A notebook does not have an integrated DVD drive like laptop. It generally has smaller memory than a laptop.
  2. Tablet PC — A tablet PC looks similar to a laptop. A Tablet PC does not have a keyboard. It has a touch screen which is used to write directly on the screen rather than typing on a keyboard. Some common examples of Tablet PCs are Apple iPad, Samsung Galaxy Tab, etc.

Question 10

Explain the most powerful category of computers.

Answer

The most powerful category of computers is super computers. These are the most powerful, the most expensive and the fastest computers in the world and are capable of processing trillions of instructions per second.

These computers are used by the government agencies, such as the Internal Revenue Service (IRS), the National Weather Service, and the National Defense Agency. These are also used in space exploration, large organizations, research laboratories, aerospace centers, and large industrial units.

The examples of Super computers are CRAY- 1, CRAY- 2, Control Data CYBER 205 IBM Road Runner, ETAA -10, etc.

CHAPTER-2: INPUT AND OUTPUT DEVICES BRAIN DEVELOPER

Question 1

Which of the following is not an I/O device?

  1. Printer
  2. CPU
  3. Plotter
  4. Scanner

Answer

CPU

Reason — CPU is the brain of the computer Printer and plotter are output devices and scanner is an input device.

Question 2

Which of the following is not a pointing device?

  1. Mouse
  2. Light pen
  3. Keyboard
  4. Trackball

Answer

Keyboard

Reason — Keyboard is not a pointing device. Mouse, light pen and trackball are pointing devices.

Question 3

Which of the following is not a storage device?

  1. CD ROM
  2. DVD
  3. Plotter
  4. Flash drive

Answer

Plotter

Reason — Plotter is an output device. CD ROM, DVD and flash drive are storage devices.

Question 4

Whom do you think is the most probable user of a Light Pen?

  1. Computer Programmer
  2. Graphic Designer
  3. Journalist
  4. Scientist

Answer

Graphic Designer

Reason — Graphic Designer is the most probable user of a Light Pen.

Question 5

Name the type of mouse which uses laser technology to detect the motion of the ball.

  1. Optical mouse
  2. Mechanical Mouse
  3. Opto Mechanical mouse
  4. All of these

Answer

Optical mouse

Reason — Optical mouse uses laser technology to detect the motion of the ball.

Question 6

Which is a vector based graphical printing device?

  1. Printers
  2. Plotters
  3. Scanners
  4. Light pen

Answer

Plotters

Reason — Plotter is a vector based graphical printing device.

Question 7

Which device scans images, documents, and saves them on a computer as a digital image?

  1. MICR
  2. Joystick
  3. Scanner
  4. None of these

Answer

Scanner

Reason — Scanner scans images, documents, and saves them on a computer as a digital image.

Question 8

Which type of plotter is used to produce continuous output such as plotting earthquake activity?

  1. Drum plotter
  2. Flatbed plotter
  3. Disk platters
  4. None of these

Answer

Drum plotter

Reason — Drum plotter is used to produce continuous output such as plotting earthquake activity.

Question 9

The diameter of the standard CD is …………… .

  1. 70 mm
  2. 80 mm
  3. 120 mm
  4. 180 mm

Answer

120 mm

Reason — The diameter of the standard CD is 120 mm.

Question 10

The rate of data transmission of a DVD is faster than …………… .

  1. Blu-ray Disk
  2. CD-ROM
  3. Hard disk
  4. Memory stick

Answer

CD-ROM

Reason — The rate of data transmission of a DVD is faster than CD-ROM.

Question 11

The disk which uses blue violet laser to read and write is …………… .

  1. DVD
  2. Flash drive
  3. Blu-ray Disk
  4. CD ROM

Answer

Blu-ray Disk

Reason — The disk which uses blue violet laser to read and write is Blu-ray Disk.

Question 12

The …………… offers more than five times the storage capacity of a traditional DVD.

  1. CD
  2. Light pen
  3. Blu-ray Disk
  4. Flash drive

Answer

Blu-ray Disk

Reason — The Blu-ray Disk offers more than five times the storage capacity of a traditional DVD.

Question 13

A portable memory data storage device which is mainly used to transfer files from the hard drive of one computer to another is …………… .

  1. Flash drive
  2. Blu-ray Disk
  3. Memory stick
  4. CD-ROM

Answer

Flash drive

Reason — A portable memory data storage device which is mainly used to transfer files from the hard drive of one computer to another is Flash drive.

Question 14

Which removable flash memory card format was launched in 2003 as a joint effort of Sony and Scan Disk?

  1. Memory Stick Duo
  2. Memory Stick Pro
  3. Magic Gate
  4. None of these

Answer

Memory Stick Pro

Reason — Memory Stick Pro is a removable flash memory card format was launched in 2003 as a joint effort of Sony and Scan Disk.

Question 15

The speed of a Dot Matrix printer is measured in …………… .

  1. dpi
  2. cps
  3. bits
  4. All of these

Answer

cps

Reason — The speed of a Dot Matrix printer ranges from 50 (characters per second) to 500 (characters per second).

Question 16

Dot-Matrix printer is a type of …………… .

  1. Impact printer
  2. Non-Impact printer
  3. Manual printer
  4. Matrix printer

Answer

Impact printer

Reason — Dot-Matrix printer is a type of impact printer.

Question 17

Which of the following is an output device?

  1. Mouse
  2. CPU
  3. VDU
  4. Joystick

Answer

VDU

Reason — Visual Display Unit (VDU) is an output device.

Question 18

A laser printer uses …………… .

  1. Heat sensitive paper
  2. Spray ink
  3. Photocopy technology
  4. None of these

Answer

Photocopy technology

Reason — A laser printer uses Photocopy technology.

Question 19

Which of the following is used as an internal memory?

  1. CD ROM
  2. PROM
  3. Hard disk
  4. Memory stick

Answer

PROM

Reason — Programmable ROM (PROM) is used as an internal memory.

Question 20

Main memory is …………… in nature.

  1. Non-volatile
  2. Volatile
  3. Both 1 and 2
  4. None of these

Answer

Both 1 and 2

Reason — RAM and ROM are both main memory. RAM is a volatile memory and ROM is a non-volatile memory.

Question 21

MICR stands for …………… .

  1. Magnetic Ink Character Reader
  2. Magnetic Inch Character Reader
  3. Magnetic Ink Code Reader
  4. None of these

Answer

Magnetic Ink Character Reader

Reason — MICR stands for Magnetic Ink Character Reader.

Fill in the blanks

Question 1

The printed information on the paper is called …………… .

Answer

The printed information on the paper is called hardcopy.

Question 2

The first scanner was the …………… scanner introduced in 1957.

Answer

The first scanner was the Drum scanner introduced in 1957.

Question 3

…………… printers produce images by spraying tiny droplets of ink onto the paper.

Answer

Ink-jet printers produce images by spraying tiny droplets of ink onto the paper.

Question 4

…………… is a type of scanner that can detect marks made with ink or pencil.

Answer

Optical Mark Reader (OMR) is a type of scanner that can detect marks made with ink or pencil.

Question 5

…………… is the light sensitive pointing device.

Answer

Light pen is the light sensitive pointing device.

Question 6

…………… is used to read characters from a printed page to the computer.

Answer

Optical Character Reader (OCR) is used to read characters from a printed page to the computer.

Question 7

A CD can hold up to …………… MB of data whereas a DVD can hold upto …………… GB of data.

Answer

A CD can hold up to 900 MB of data whereas a DVD can hold upto 17 GB of data.

Question 8

Memory stick was launched by …………… in October 1993.

Answer

Memory stick was launched by Sony in October 1993.

Question 9

…………… is a new optical disk format that is rapidly replacing DVD.

Answer

Blu-ray Disk is a new optical disk format that is rapidly replacing DVD.

Question 10

The …………… prints its output on special heat sensitive paper.

Answer

The Thermal Printer prints its output on special heat sensitive paper.

State True or False

Question 1

A scanner is an output device.

Answer

False

Reason — A scanner is an input device.

Question 2

Storage capacity of a DVD is more than the capacity of Blu-ray Disk.

Answer

False

Reason — Blu-ray disk can store upto 6 times the data stored in a regular DVD.

Question 3

Inkjet is a non-impact printer.

Answer

True

Reason — Inkjet is a non-impact printer.

Question 4

An LCD monitor allows the user to input information by touching the icons on the screen.

Answer

False

Reason — ♦A touch screen isa special monitor that allows the user to input information by touching the icons on the screen.

Question 5

Speech software is an output device to play sound.

Answer

False

Reason — Speaker is an output device to play sound.

Question 6

Bar Code Reader is an input device used for marking objective type questions.

Answer

False

Reason — Optical mark Reader is an input device used for marking objective type questions in various examinations.

Question 7

There are two types of printers.

Answer

True

Reason — There are two types of printers — Impact Printer and Non-impact Printers.

Question 8

A Flatbed plotter is also known a Roller plotter.

Answer

False

Reason — A Flatbed plotter is also known as a Table Plotter.

Question 9

A microphone is an input device used to record and store sound into a computer.

Answer

True

Reason — A microphone is an input device used to record and store sound into a computer.

Question 10

There are 12 Function keys on the keyboard.

Answer

True

Reason — There are 12 Function keys on the keyboard.

Question 11

Objects are created in 3D using additive process.

Answer

True

Reason — Objects are created in 3D using additive process.

Application Based Questions

Question 1

Kartik is applying for a graduate engineering program in a university. He wants to email his application along with the copies of his certificates. Which device will he prefer to create a digital copy of his certificates to attach with his application?

Answer

Kartik can use a scanner.

Question 2

Meenu wants to create a high quality drawing in a variety of colours. Which device should she use for the same?

Answer

Meenu can use a light pen to create a high quality drawing in a variety of colours.

Question 3

A Model school requires 1000 copies of high quality black and white printouts quickly. It requires the output to be printed quietly since an important meeting is being conducted in the office. Specify the type of printer for the above assignment.

Answer

Laser printer will be ideal for the above assignment.

Question 4

I am a printer which operates like a typewriter. Identify me.

Answer

Daisy Wheel Printer operates like a typewriter.

Question 5

Rita wants to enter numbers at a fast pace to perform mathematical calculations. Which type of keys will you suggest her to input data from the keyboard?

Answer

Rita can use the numeric keypad present on the right side of the keyboard.

Question 6

Little Scholars Public School wants to take a backup of its school management information software for record purpose. Which storage device is the most suitable for this large amount of information?

Answer

A hard disk is the most suitable storage device for storing this large amount of information.

Question 7

Mohit requires a black and white print out of his presentation on ‘Reduction of Waste in the Environment’. He needs two copies of the presentation. Which printer is best suited for this work?

Answer

He can use laser printer.

Short Answer Type Questions

Question 1

Which type of printer does not use physical impact while transferring characters to paper?

Answer

Non-impact printer does not use physical impact while transferring characters to paper.

Question 2

Name two types of Impact printers.

Answer

Two types of Impact printers are:

  1. Daisy Wheel Printer
  2. Dot Matrix Printer

Question 3

Name the device which is used to give instruction to the computer.

Answer

Input devices are used to give instruction to the computer.

Question 4

What are the four components of a computer?

Answer

The four components of a computer are:

  1. Input unit
  2. Central Processing unit
  3. Output unit
  4. Secondary Storage unit

Question 5

Name any two pointing devices.

Answer

Two pointing devices are mouse and joystick.

Question 6

Write the types of plotters. Name any two manufacturers of plotters.

Answer

The types of plotters are :

  1. Flatbed Plotter
  2. Drum Plotter

Two manufacturers of plotters are Hewlett Packard and Roland.

Question 7

What is the storage capacity of Blu-ray Disk in GB?

Answer

Blu-ray disk can hold upto 25 GB of data on a single layer and 50 GB of data on a dual layer disk.

Question 8

Name the versions and format of a DVD.

Answer

The versions of a DVD are single-sided and double-sided.

A DVD is available in many formats such as :

  1. DVD – R
  2. DVD – RW
  3. DVD – R and DVD – RW have two additional formats, which are + and -. For example: DVD – R and DVD + R.

Question 9

When and by whom was hard disk invented? Write the other name of hard disk.

Answer

Hard disk was introduced in 1954 by an IBM team led by Rey Johnson. The other name of hard disk is Winchester Disk.

Question 10

Write the full form of VDU, CD-ROM, MICR, OCR, and OMR.

Answer

VDU — Visual Display Unit

CD-ROM — Compact Disk – Read Only Memory

MICR — Magnetic Ink Character Reader

OCR — Optical Character Reacher

OMR — Optical Mark Reader

Question 11

Name the port which is used to connect a Flash drive.

Answer

Flash drive is plugged into the USB port of the computer.

Question 12

Define some places where you find the application of touch screen.

Answer

Some places where we can find the application of touch screens are:

  1. ATMs (Automated Teller Machines) use touch screens for user input and help in completing transactions.
  2. Touch-sensitive whiteboards are commonly used in educational settings.
  3. Many video game consoles utilize touch screens for gameplay and navigation.
  4. Point-of-Sale (POS) Systems use touch screen in retail, restaurants, and hospitality for processing transactions and managing orders.
  5. Automotive touch screens in cars allow drivers to control navigation, entertainment and climate settings in vehicles.
  6. Touch screens are used in ticket vending machines at subway stations, bus stops, and railway stations.

Long Answer Type Questions

Question 1

List the different types of mouse. Explain them.

Answer

The different types of mouse are as follows:

  1. Mechanical Mouse — This type of mouse has a metal or rubber ball on its lower side that can roll in all the directions. The screen pointer moves according to the movement of the ball which is detected by the mechanical sensors within the mouse.
  2. Opto-Mechanical Mouse — This type of mouse uses a mechanism similar to the mechanical mouse. The only difference is that it uses optical sensors to detect the movement of the ball.
  3. Optical Mouse — An optical mouse does not have any mechanical moving parts. The laser technology is used to detect the movement of the mouse. It is more efficient and expensive than the Mechanical and Opto-Mechanical mouse.

Question 2

Differentiate between Impact and Non Impact printers.

Answer

Impact PrintersNon Impact printers
It forms characters by striking a print hammer against an inked ribbon.It forms characters without making direct contact with the paper.
It uses either ribbon or carbon paper.It uses ink cartridges.
It makes noise while printing.It prints smoothly on the paper.

Question 3

Discuss the features and applications of an MICR.

Answer

MICR stands for Magnetic Ink Character Recognition. This technology allows computers to read information from the printed documents.

  1. MICR characters are printed in special typefaces with a magnetic ink or toner, usually containing iron oxide.
  2. As a machine decodes the MICR text, it first magnetizes the characters in the plane surface of the paper.
  3. The characters are passed over an MICR read head, a device similar to the playback head of a tape recorder.
  4. As each character passes over the head, it produces a unique wave form that can easily be identified by the system.
  5. MICR codes can easily be read by humans.

MICR is used mainly by the banking industry to:

  1. Ease the processing and clearance of cheques
  2. Streamline the processing and clearance of other documents
  3. Identify the document’s originality

Question 4

Write the difference between a DVD and a CD.

Answer

CDDVD
CD stands for Compact Disc.DVD stands for Digital Versatile Disc.
The storage capacity varies from 650 MB to 900 MB.A DVD can hold 4.7 GB to 17 GB of data.
CDs are made of a polycarbonate disc with a reflective aluminum layer on one side.DVDs are made of a polycarbonate disc with a reflective aluminum layer on both sides.
CDs are more likely to be scratched or damaged, which can cause data loss.DVDs are more durable than CDs as they have a protective layer on both sides of the disc.

Question 5

Explain the functions and usage of a bar code reader.

Answer

A barcode reader is an input device that scans barcodes and decodes the information they contain. A bar code is a combination of dark and light stripes. It is a computer readable representation of information, present in visual format. A bar code reader consists of a light source, a lens, and a light sensor for translating the optical impulses into electrical signals.

Barcode readers are used for a variety of purposes such as :

  1. Tracking inventory
  2. Processing transactions
  3. Asset tracking
  4. Package tracking
  5. Time and attendance
  6. Software upgrades

Question 6

Explain the three main types of Non Impact printers.

Answer

The three main types of Non Impact printers are:

  1. Thermal Printers — Thermal printers use a special heat sensitive paper. Characters are formed when heated elements come in contact with the heat sensitive paper, thus forming darkened dots. The standard of print produced is poor. Thermal printers are widely used in battery powered equipments, such as portable calculators.
  2. Ink-jet Printers — They produce images by spraying tiny droplets of ink onto the paper. They have very high quality output and can also produce coloured graphics. These printers are less noisy. The average quality of inkjet printers is 300 dpi (dots per inch). They use coloured cartridges which combine magenta, yellow, and cyan inks to create colour tones. A black cartridge is also used for crisp monochrome output. They are cheap and ideal for home/office.
  3. Laser Printers — Laser printers use photocopy technology to print. They use a laser beam and dry powdered ink to produce a fine dot matrix pattern. The quality of output on paper is very good. They can also produce very high quality images. They are mostly used for DTP (Desktop Publishing) purpose. They can print about 6 to 10 pages per minute. They have a very high resolution ranging from 600-1200 dpi (dots per inch).

Question 7

Write the types of monitors? Explain their features.

Answer

The different types of monitors are:

  1. Cathode Ray Tube (CRT) Monitors — The features of a CRT monitor are:

    1. CRT monitors consist of an electron gun.
    2. In these monitors, a beam of electrons lights up the pixels/phosphor dots, which form the inner coating of the screen.
    3. Colour is achieved by combining Red, Green, and Blue (RGB) shades of different intensities.
    4. CRT monitors are bulky and occupy a lot of space.
    5. They are available in various sizes, like 14 inches, 15 inches, 17 inches, and 21 inches.
    6. A CRT monitor still has better contrast ratios and viewing angles than any other type of computer monitor.
  2. Liquid Crystal Display (LCD) Monitors — The features of LCD monitors are :

    1. LCD monitors are relatively thinner and lighter than CRT monitors.
    2. They use the light modulating properties of Liquid Crystals (LCs).
    3. Liquid Crystals do not emit light directly.
    4. They save a lot of space and can be mounted on walls.
    5. They provide a wide viewing angle and come in various sizes ranging from 17 inches to 60 inches.
    6. They display sharp images and require less power to run.
    7. They are used in a wide range of applications including computer monitors, television, instrumental panels, aircraft cockpit displays, etc.
    8. They are also used in devices, such as clocks, watches, calculators, gaming devices, and telephones.
  3. Light Emitting Diode (LED) Monitor — LED display has the following features:

    1. LED monitors are light emitting diodes that act as performance boosters in them.
    2. LED monitors offer better colour quality, clarity, and display than the LCD monitors.
    3. These monitors are flat, thinner and lighter in weight.
    4. The biggest advantage of LED display is its efficient and low energy consumption, which is especially needed for handled and chargeable devices, such as mobile phones, tablets, and laptops.
    5. These monitors are in maximum use nowadays.

Question 8

Discuss the various types of memory sticks.

Answer

The various types of memory sticks are:

  1. Memory Stick PRO — It was introduced in 2003 as a joint effort of Sony and SanDisk. It is available in storage sizes up to 2 GB.
  2. Memory Stick Duo and Memory Stick PRO Duo — These are basically smaller versions of the Memory stick and Memory stick Pro. Memory stick Duo was replaced by Memory Stick Pro Duo due to its increased size limitation and slow transfer speed. With faster data transfer speed and high capacity flash memory, a Memory Stick Pro Duo card perfectly meets the requirements of a portable digital device.
  3. Magic Gate — It is a copy protection technology introduced by Sony in 1999. It is a form of DRM (Digital Rights Management) that allows for protected content to be transferred to and from a memory card and utilized on a device, such as an MP3 player or cellular phone. It encrypts the data stored on a card and enforces control over how files are copied. It is typically used for audio and video but can also be used for contents in other formats.

Question 9

Differentiate between Flatbed Plotter and Drum Plotter.

Answer

Flatbed PlotterDrum Plotter
It is also known as a Table Plotter.It is also known as a Roller Plotter.
Flatbed plotters hold the paper still while the pen moves. They place the paper on a flat surface.Drum plotters roll the paper over a cylinder. They wrap the paper around a drum.
Flatbed Plotter are comparatively larger.Drum plotters are generally smaller.
Flatbed plotters have lower resolutions.Drum plotters have lower resolutions.
They are less noisy.They are more noisy.
THey are used for printing graphs.They are used to produce continuous output, such as plotting earthquake activity.

Question 10

Explain the various types of keys of a keyboard.

Answer

The various types of keys of a keyboard are:

  1. Typing Keys — These keys include letters (Alphabet keys), numbers (Number keys), punctuation (. , : ; ‘ “) and Special Symbol (+ – – $ keys) etc. These keys also include the Shift, Caps Lock, Spacebar, Backspace, and the Tab keys.
  2. Control Keys — These keys are either used alone or in combination with other keys to perform an action. Ctrl, Alt, Windows logo key, and the Esc key are various examples of Control keys.
  3. Navigation Keys — They are used for moving through documents or web pages and sometimes for editing the text. These keys include the Arrow keys, HOME, END, PgUp, PgDn, DELETE, and INSERT keys.
  4. Function Keys — They are used to perform specific tasks. They are placed on the top row of the keyboard and are labelled as F1, …, F12. These keys have different functions in different programs.
  5. Numeric Keypad — The numeric keypad consists of number keys from 0 to 9, the arithmetic operators and the decimal point. It is placed on the right side of a keyboard and is used for entering numbers at a faster pace.

Question 11

Discuss the features and applications of web cam.

Answer

A webcam is the short form of the web camera. It is a device primarily used to share a live image in real time to or through a computer in a network.

A webcam is connected to the computer by a USB cable or built into computer hardware, such as laptops. When sent to a remote location, the videos can be recorded, viewed, saved on the hard drive or live-streamed over the internet.

A webcam is widely used in organizations for video conferencing. They can also be used for video telephony, live streaming, social media, security, video surveillance etc.

CHAPTER-3: TYPES OF SOFTWARE BRAIN DEVELOPER

 

Multiple Choice Questions

 

Question 1

A master control program that runs the computer is an …………… .

  1. Interpreter
  2. Assembler
  3. Compiler
  4. Operating System

Answer

Operating System

Reason — A master control program that runs the computer is an Operating System.

Question 2

Which of the following is not a hardware component?

  1. Laser Printer
  2. Mouse
  3. Keyboard
  4. Operating System

Answer

Operating System

Reason — Operating System is a software component.

Question 3

GUI is used as an interface between …………… .

  1. Hardware and Software
  2. User and Hardware
  3. Software and User
  4. Man and Monitor

Answer

User and Hardware

Reason — GUI is used as an interface between User and Hardware.

Question 4

MS PowerPoint is an example of …………… .

  1. Database Software
  2. Multimedia Software
  3. Presentation Software
  4. None of these

Answer

Presentation Software

Reason — MS PowerPoint is an example of Presentation Software.

Question 5

Which of the following is not a function of an Operating System?

  1. File Management
  2. Memory Management
  3. Processor Management
  4. Database Management

Answer

Database Management

Reason — Database Management is not a function of an Operating System.

Question 6

Which of the following is CUI based Operating System?

  1. MS DOS
  2. Windows Vista
  3. Windows XP
  4. All of these

Answer

MS DOS

Reason — MS DOS is CUI based Operating System.

Question 7

It is a collection of one or more programs, which is designed to control the overall operation and performance of the computer system.

  1. Utility Software
  2. System Software
  3. Application Software
  4. Customised Software

Answer

System Software

Reason — System Software is a collection of one or more programs, which is designed to control the overall operation and performance of the computer system.

Question 8

Which language processor converts a program written in a High Level Language into Machine Language program line by line?

  1. Interpreter
  2. Operating System
  3. Compiler
  4. None of these

Answer

Interpreter

Reason — Interpreter converts a program written in a High Level Language into Machine Language program line by line.

Question 9

Disk cleanup is a …………… tool.

  1. Virus Scanner Cleaner
  2. Disk Management
  3. File Folder Management
  4. Encryption

Answer

Disk Management

Reason — Disk cleanup is a Disk Management tool.

Question 10

Which type of Application software is used in the Billing System?

  1. Specific Purpose
  2. General Purpose
  3. Customized
  4. None of these

Answer

Customized

Reason — Customized Application software is used in the Billing System.

Question 11

Which type of Application software is the Kaspersky?

  1. Disk Management
  2. File Folder Management
  3. Decryption
  4. Virus Scanner Cleaner

Answer

Virus Scanner Cleaner

Reason — Kaspersky is a type of Virus Scanner Cleaner Application software.

Question 12

Which software acts as a co-ordinator between hardware and software?

  1. Interpreter
  2. Compiler
  3. Language
  4. Operating System

Answer

Operating System

Reason — Operating System acts as a co-ordinator between hardware and software.

Question 13

The physical component of the computer system which we can touch and feel is called …………… .

  1. Software
  2. Operating System
  3. Hardware
  4. Application Software

Answer

Hardware

Reason — The physical component of the computer system which we can touch and feel is called Hardware.

Question 14

General Purpose Application Software includes …………… .

  1. Presentation Software
  2. DBMS
  3. Word Processing
  4. All of these

Answer

All of these

Reason — General Purpose Application Software includes Presentation Software, DBMS and Word Processing software.

Question 15

Which software is commonly designed to meet the needs of individual or organisations ?

  1. Specific Purpose
  2. General Purpose
  3. Customised
  4. None of these

Answer

General Purpose

Reason — General Purpose software is commonly designed to meet the needs of individual or organisations.

Question 16

Assembly language uses …………… codes.

  1. Decimal
  2. Binary
  3. Mnemonic
  4. Machine

Answer

Mnemonic

Reason — Assembly language uses Mnemonic codes.

Question 17

…………… do not need web access and run independently on computer.

  1. Web apps
  2. Desktop apps
  3. Native app
  4. None of these

Answer

Desktop apps

Reason — Desktop apps do not need web access and run independently on computer.

Question 18

…………… are designed keeping in mind the device specifications.

  1. Native app
  2. Web apps
  3. Desktop apps
  4. None of these

Answer

Native app

Reason — Native apps are designed keeping in mind the device specifications.

Question 19

…………… are usually smaller in size as the devices on which they are installed have limited memory.

  1. Desktop apps
  2. Web apps
  3. mobile apps
  4. None of these

Answer

mobile apps

Reason — Mobile apps are usually smaller in size as the devices on which they are installed have limited memory.

Question 20

…………… apps are usually browser based and stored on a remote server.

  1. Native
  2. Hybrid
  3. Web
  4. Mobile

Answer

Web

Reason — Web apps are usually browser based and stored on a remote server.

 

 

Fill in the blanks

Question 1

The collection of programs and procedures that instructs a computer how to perform different types of tasks is called …………… .

Answer

The collection of programs and procedures that instructs a computer how to perform different types of tasks is called Software.

Question 2

The …………… software support the smooth functioning of the computer and run the various programs efficiently.

Answer

The Utility software support the smooth functioning of the computer and run the various programs efficiently.

Question 3

…………… helps to reduce consumption of storage space and ensures faster transfer of large files.

Answer

Compression helps to reduce consumption of storage space and ensures faster transfer of large files.

Question 4

…………… is the facility to free up disk space by deleting files that are not being used for a long time.

Answer

Disk Cleanup is the facility to free up disk space by deleting files that are not being used for a long time.

Question 5

A …………… program helps to perform calculations, analyze data, and display the information in a tabular manner.

Answer

Spreadsheet program helps to perform calculations, analyze data, and display the information in a tabular manner.

Question 6

A …………… transforms human readable source code of an entire program into machine language code.

Answer

Compiler transforms human readable source code of an entire program into machine language code.

Question 7

…………… are special programs which control the execution of a particular hardware device.

Answer

Device Drivers are special programs which control the execution of a particular hardware device.

Question 8

DTP stands for …………… .

Answer

DTP stands for Desktop Publishing.

Question 9

…………… is a process of conversion of data into a form that cannot easily be understood by anyone.

Answer

Encryption is a process of conversion of data into a form that cannot easily be understood by anyone.

 

State True or False

Question 1

School software is a part of General Purpose Application Software.

Answer

False

Reason — School software is a part of Customised Application Software.

Question 2

Decryption is the process of converting the data which cannot be understood by all humans.

Answer

False

Reason — Encryption is the process of converting the data which cannot be understood by all humans.

Question 3

Mobile apps are usually developed for a specific Operating System and device.

Answer

True

Reason — Mobile apps are usually developed for a specific Operating System and device.

Question 4

The Antivirus software in our computer guarantees the 100% protection from virus.

Answer

False

Reason — An Antivirus software in a computer does not guarantee the 100 % protection from virus, as the installed Antivirus program would not be able to detect new virus programs.

Question 5

Tally, Wings and Busy are some popular accounting software in India.

Answer

True

Reason — Tally, Wings and Busy are some popular accounting software in India.

Question 6

The storage of a file in several non-contiguous areas of a disk rather than a single contiguous unit is called Disk Cleanup.

Answer

False

Reason — The storage of a file in several non-contiguous areas of a disk rather than a single contiguous unit is called Disk Fragmentation.

Question 7

DBMS is a Utility software.

Answer

False

Reason — DBMS is a General Purpose Application Software.

Question 8

Interpreter converts and executes machine language to High Level Language line by line.

Answer

False

Reason — Interpreter converts and executes High Level Language to machine language line by line.

Question 9

Encryption is done using an algorithm called cipher.

Answer

True

Reason — Encryption is done using an algorithm called cipher.

Question 10

You cannot easily create, add, find, update, and sort the information stored in a database.

Answer

False

Reason — We can easily create, add, find, update, and sort the information stored in a database.

 

 

Application Based Questions

Question 1

Match the correct application software for corresponding task.

COLUMN ACOLUMN B
Accounting ManagementManaging records of fee collection in school
Attendance SystemCalculating the profit – loss in an organisation
Payroll SystemRoad Toll Tax
School SoftwareComputation of salary of employees in a factory
Reservation SystemMonitoring the teacher’s record for presence or absence
Billing SystemBooking for air tickets

Answer

COLUMN ACOLUMN B
Accounting ManagementCalculating the profit – loss in an organisation
Attendance SystemMonitoring the teacher’s record for presence or absence
Payroll SystemComputation of salary of employees in a factory
School SoftwareManaging records of fee collection in school
Reservation SystemBooking for air tickets
Billing SystemRoad Toll Tax

Question 2

Which General Purpose Application Software package will you recommend to New Girls Public School for producing school accounts?

Answer

Tally

Question 3

Rohit has to transfer a large presentation file to his head office which is located in another country. Which Utility software tool will you recommend him for this task?

Answer

Rohit can use a compressor software to compress the file and make it smaller in size. Then, he can use cloud services to transfer the file to his head office.

Question 4

Encryption is the process of conversion of data into a form that cannot be easily understood by anyone except those possessing special information, usually referred as a key. This is done using an algorithm. Name the algorithm.

Answer

Cipher

Question 5

At times the hard disk of a system fails and loses all the files stored in it. Thus, in order to restore original files at the time of such failures what advice will you give to a multinational organization manufacturing apparels?

Answer

I will advise the multinational organization to keep their files and data in back up storage devices in order to restore original files at the time of such failures.

 

 

Short Answer Type Questions

 

Question 1

Name the two types of software.

Answer

Two types of software are:

  1. System Software
  2. Application Software

Question 2

What is System software?

Answer

System software is a collection of one or more programs, which are designed to control the overall operation and performance of a computer system. For example, operating system,device drivers etc.

Question 3

What is the utility of disk cleanup?

Answer

Disk Cleanup utility searches the computer hard disk for unnecessary files that are not being used for a long time and occupying huge amount of space. It helps to free up disk space by deleting these files which can be of the following types- Temporary internet files, Downloaded program files, Recycle bin files, Windows temporary files, etc.

Question 4

Briefly describe the disk defragmenter program.

Answer

A Disk Defragmenter program is used to rearrange all files and directories into one contiguous area of disk and consolidate the free space in one contiguous block. This helps in smooth and speedy retrieval of data from the disk.

Question 5

Where is encryption primarily used?

Answer

Encryption is primarily used in defense services. It is even used in civilian systems, like Online Banking, E-commerce, Mobile Services, etc., to facilitate secret communication and privacy of data.

Question 6

Name the most popular encryption software which can be downloaded free of charge.

Answer

Flexcrypt is the most popular encryption software which can be downloaded free of charge.

Question 7

Give two examples of each:
a. Operating System
b. Desktop Publishing Software
c. Database Management System
d. Backup Software
e. Antivirus Software
f. Programming Language

Answer

a. Operating System — Windows XP, Linus

b. Desktop Publishing Software — PageMaker, CorelDRAW

c. Database Management System — MS-Access, Oracle

d. Backup Software — Delta copy, Ace Backup

e. Antivirus Software — McAfee, Norton

f. Programming Language — Java, Python

Question 8

Write one example of each:
a. CUI (Operating System)
b. GUI (Operating System)
c. Compression Software
d. Multimedia Software
e. Presentation Software

Answer

a. CUI(Operating System) — DOS

b. GUI (Operating System) — Windows XP

c. Compression Software — WinZip

d. Multimedia Software — Windows Media Player

e. Presentation Software — e. Presentation Software — Microsoft PowerPoint

Question 9

Name any two languages where either interpreter or compiler is used.

Answer

Two languages where either interpreter or compiler is used are Java and C++.

Question 10

Define the following:
a. Assembler
b. Interpreter
c. Compiler
d. Object Code
e. Source Code
f. Program

Answer

a. Assembler — An assembler is a program used to translate mnemonic operation codes to their machine language equivalents.

b. Interpreter — An interpreter converts a program written in a High Level Language into the Machine language program line by line and simultaneously executes the converted line. If an error is found, it displays the error and does not proceed till the error is rectified.

c. Compiler — A compiler is a computer program that transforms human readable source code of an entire computer program into the machine language code. It converts the entire program at one go. If an error is found, it gives the error list along with the line numbers.

d. Object Code — Object code is a set of statements which is usually generated by a compiler after converting a high level language program into machine language.

e. Source Code — Source code is a set of statements in a High-Level programming language.

f. Program — A set of instructions which performs a specified task is called a program.

 

 

Long Answer Type Questions

 

Question 1

What are the functions of Operating System?

Answer

The functions of Operating System are as follows:

  1. Processor Management — An operating system manages the working of the processor by allocating various jobs to it. It also ensures that each process and application receives enough time by the processor to function properly.
  2. Memory Management — An operating system manages the sharing of internal memory among multiple applications. It assigns memory to various programs whenever required. It also frees the memory when it is not in use.
  3. Device Management — An operating system controls the working of all input and output (I/O) devices.
  4. File Management — An Operating System keeps track of information regarding creation, deletion, transfer, copy, and storage of files in an organized way.
  5. Error Detection and Security — It provides security by means of passwords to prevent the misuse of a computer.
  6. Job Scheduling — In a multitasking Operating System where multiple programs run at the same time, the Operating System determines which applications should run in which order and how much time should be allocated for each application in turn.

Question 2

Differentiate between Compression and Defragmentation.

Answer

CompressionDefragmentation
Compression is a technique which is used to compress files.Defragmentation is the process of rearranging all files and directories into one contiguous area of disk.
It helps to reduce the consumption of storage space and ensures faster data transfer.It increases the speed of retrieval of data from the disk.
A compression software like Winzip is used to compress or decompress files.A Disk Defragmenter utility is used to defragment the disk.

Question 3

Distinguish between encryption and decryption.

Answer

EncryptionDecryption
Encryption is the process of conversion of data into a form that cannot be easily understood by anyone except those possessing special information usually referred to as a key.Decryption is the process of converting the encrypted data back into its original form, so that it can be understood by anyone.
The result of encryption is cipher text.The result of decryption is the original text.
It is usually done at the sender’s end.It is usually done at the receiver’s end.

Question 4

What is Customized Software? Give one example.

Answer

Customized software is a software that is specially designed for a particular organization or user according to their requirements. It is built to cater to the needs of a specific company not the mass market.

It can easily be modified according to the changing requirements. It helps integrating different types of work in a single software, thus eliminating the need of purchasing multiple applications and licences.

An example of customized software is commercial websites.

Question 5

How are the desktop apps different from the Web apps?

Answer

Desktop appsWeb apps
Desktop apps can be used on a Desktop or a Laptop.Web apps are usually browser based and stored on a remote server.
These apps do not need web access and run independently on a computer.These apps require an Internet connection.
Installation on the Desktop or Laptop is required to run these apps.Web apps do not need installation. They can be accessed like any other webpage.
Desktop applications require substantial device memory.Web applications require minimum device memory.
For example, Notepad, MS Paint etc.For example, Google Maps, Instant messenger, etc.

Question 6

What is Virus scanner/cleaner? What functions does it perform?

Answer

Virus scanner/cleaner software are computer programs to identify, prevent, and remove viruses from our computer. It helps us to safeguard our data from virus.

Antivirus software performs the following functions in our computer:

  1. Scan the computer files to look for virus.
  2. Identify suspicious behaviour from other computers.
  3. Remove the programs which indicate infection.

Question 7

Discuss the role of DTP software.

Answer

Desktop Publishing packages can combine both text and graphic features to design professional documents for a variety of purposes. DTP software is used by media professionals to outline and execute editorial projects like newsletters, printed forms, advertisements, brochures, posters, magazines, books, etc.

With features for color management, templates, and collaboration, it streamlines the design process. It’s crucial for creating high-quality, error-free print and digital content. This makes DTP software indispensable in various industries, where visually appealing, well-structured documents are essential for effective communication and branding.

Question 8

Discuss the role of Specific Purpose Application Software. Explain any two.

Answer

The Specific Purpose Application Software are developed by programmers to perform only specific tasks. Two Specific Purpose Application Softwares are:

  1. Accounting management — Accounts are the backbone of every organization. Thus, a proper accounting software is needed by all to store and manage these account transactions. Tally is the most popular accounting software in India. Wings and Busy are some other popular accounting software in India.
  2. Reservation System — The need to have an efficient reservation system with global usage patterns for airlines, hotels, etc. has been met by different companies with the integration of databases. Most of the reservation software are web-based. They can store essential data and operate on customer related transactions online. For example, makemytrip.com, yatra.com, etc.

Question 9

Describe the utility of Data backup and Recovery Software.

Answer

Data backup and recovery software is essential for safeguarding valuable digital assets and ensuring business continuity. It provides a means to routinely and securely duplicate critical data, protecting it from loss due to hardware failure, human error, cyber attacks, or disasters.

In the event of data loss, this software enables the rapid restoration of files, databases, or entire systems, minimizing downtime and potential financial losses. Its utility extends to individual users, businesses, and organizations, offering peace of mind, compliance with data protection regulations, and the ability to recover and resume operations swiftly, preserving data integrity and productivity.

Question 10

Write short notes on the following:

  1. Word Processing Software
  2. Database Management System

Answer

  1. Word Processing Software — A word processor helps us to create structured text documents quickly and efficiently. It provides multiple features to manipulate the text in a desired way. we can easily add, delete, rearrange, or beautify the text through formatting and also produce a hard copy of the document. For example, MS-Word, Writer, Word Pro, WordPad, etc.

  2. Database Management System — In a computer, a database software helps us to store and manage a large amount of information in an organized way. We can create, add, find, update, sort, and search the information stored in a database. We can also present the information in the form of professionally designed reports. Some examples of database management software are MS-Access, Oracle, Base, etc.

CHAPTER-4: OPERATING SYSTEM BRAIN DEVELOPER

 

 

Multiple Choice Questions

 

Question 1

Which System Software acts as an interface between hardware and user?

  1. MS Word
  2. MS Excel
  3. MS PowerPoint
  4. Operating System

Answer

Operating System

Reason — Operating System acts as an interface between hardware and user.

Question 2

…………… handles the interaction with users.

  1. Shell
  2. Hardware
  3. Kernel
  4. None of these

Answer

Shell

Reason — Shell handles the interaction with users.

Question 3

Which function of an operating system ensures that each process receives enough time (by the processor) to function properly?

  1. File Management
  2. Job Control
  3. Processor Management
  4. All of these

Answer

Processor Management

Reason — Processor Management is the function of an operating system which ensures that each process receives enough time (by the processor) to function properly.

Question 4

Operating System is a type of …………… software.

  1. System
  2. Application
  3. Utility
  4. Custom

Answer

System

Reason — Operating System is a type of System software.

Question 5

Which type of operating system allows different parts of an application to run simultaneously?

  1. Multitasking
  2. Multithreading
  3. Multiprocessing
  4. Multiuser

Answer

Multithreading

Reason — Multithreading operating system allows different parts of an application to run simultaneously.

Question 6

Mobile operating system is particularly designed to operate …………… .

  1. Smartphones
  2. Television
  3. Washing Machine
  4. Laptop

Answer

Smartphones

Reason — Mobile operating system is particularly designed to operate smartphones.

Question 7

Which of the following is a Multitasking operating system?

  1. Windows 3.1
  2. MS DOS
  3. Windows 7
  4. None of these

Answer

Windows 7

Reason — Windows 7 is a Multitasking operating system.

Question 8

Which type of Interface does the Windows operating system have?

  1. GUI
  2. CUI
  3. Both of these
  4. None of these

Answer

GUI

Reason — Windows operating system has a Graphic User Interface.

Question 9

Which of the following is an example of Single User operating system?

  1. Windows 7
  2. Windows 8
  3. Windows 3.1
  4. Windows Vista

Answer

Windows 3.1

Reason — Windows 3.1 is an example of Single User operating system.

Question 10

iOS is a mobile operating system developed by …………… company.

  1. Microsoft
  2. Apple
  3. Nokia
  4. Google

Answer

Apple

Reason — iOS is a mobile operating system developed by Apple company.

Question 11

UNIX operating system was developed in the year …………… .

  1. 1965
  2. 1906
  3. 1996
  4. 1969

Answer

1969

Reason — UNIX operating system was developed in the year 1969.

Question 12

Which was the first commercially available phone to run Android?

  1. Nokia Lumia
  2. iPhone5
  3. HTC Dream
  4. Samsung Galaxy

Answer

HTC Dream

Reason — HTC Dream was the first commercially available phone to run Android.

Question 13

…………… is loaded first and remains in the memory until the operating system is shut down.

  1. Shell
  2. kernel
  3. Application
  4. None of these

Answer

kernel

Reason — Kernel is loaded first and remains in the memory until the operating system is shut down.

Question 14

…………… contains different modules, which can be dynamically loaded un-loaded.

  1. Monolithic Kernel
  2. Memory management
  3. Microkernel
  4. None of these

Answer

Microkernel

Reason — Microkernel contains different modules, which can be dynamically loaded un-loaded.

Question 15

………………. Operating Systems allow more than one user to use the same computer at the same time or different times.

  1. Multi user
  2. Multi threading
  3. Single user
  4. None of these

Answer

Multi user

Reason — Multi user Operating Systems allow more than one user to use the same computer at the same time or different times.

Question 16

………………. operating systems have the capability to prioritize the processes, minimize execution time, and work independently with no interdependencies.

  1. Real time
  2. Multi user
  3. Distributed
  4. Single user

Answer

Real time

Reason — Real time operating systems have the capability to prioritize the processes, minimize execution time, and work independently with no interdependencies.

Question 17

………………. is a high performance, yet completely free, Unix-like operating system, which is suitable for use on a wide range of computers and other products.

  1. Windows
  2. Unix
  3. Linux
  4. None of these

Answer

Linux

Reason — Linux is a high performance, yet completely free, Unix-like operating system, which is suitable for use on a wide range of computers and other products.

Question 18

What do you call the structure that defines the ways in which files are named and where they are placed logically for storage and retrieval.

  1. Operating System
  2. Computer System
  3. File System
  4. None of these

Answer

File System

Reason — File System defines the ways in which files are named and where they are placed logically for storage and retrieval.

State True or False

 

Question 1

A Computer requires specific instructions to perform each and every task.

Answer

True

Reason — A Computer requires specific instructions to perform each and every task as it has limited IQ.

Question 2

Shell handles the interaction with hardware.

Answer

False

Reason — Kernel handles the interaction with hardware.

Question 3

A user’s interface to the operating system is called a shell.

Answer

True

Reason — A user’s interface to the operating system is called a shell.

Question 4

A Kernel provides a way for a user to communicate with the operating system.

Answer

False

Reason — Shell provides a way for a user to communicate with the operating system.

Question 5

Microkernel are packaged into a single module.

Answer

False

Reason — Microkernel are packaged into different modules such as Device Management, File System, Network Protocol, etc.

Question 6

Kernel is the outermost layer of the operating system and manages the interaction between a user and the operating system.

Answer

False

Reason — Shell is the outermost layer of the operating system and manages the interaction between a user and the operating system.

Question 7

An operating system manages the working of the processor by allocating various jobs to it.

Answer

True

Reason — An operating system manages the working of the processor by allocating various jobs to it.

Question 8

Input devices are not controlled by the operating system.

Answer

False

Reason — Input devices are controlled by the operating system.

Question 9

An operating system keeps track of information regarding creation, deletion, transfer, copy, and storage of files in an organized way.

Answer

True

Reason — An operating system keeps track of information regarding creation, deletion, transfer, copy, and storage of files in an organized way.

Question 10

Microsoft DOS is a multi-user operating system.

Answer

False

Reason — Microsoft DOS is a single-user operating system.

Question 11

In GUI based operating system, the user has to cram all the commands.

Answer

False

Reason — In CUI based operating system, the user has to cram all the commands.

Question 12

Multi-user operating systems allow more than one user to use the same computer at the same time or different times.

Answer

True

Reason — Multi-user operating systems allow more than one user to use the same computer at the same time or different times.

Question 13

Linux and Unix are multiuser operating system.

Answer

True

Reason — Linux and Unix are multiuser operating system.

Question 14

Distributed operating system runs on a single computer.

Answer

False

Reason — Distributed Operating System runs on computers, which are located in different geographical areas, interconnected through a network.

Question 15

Unix operating system was developed in 1969 by a group of AT&T employees at Bell Labs.

Answer

True

Reason — Unix operating system was developed in 1969 by a group of AT&T employees at Bell Labs.

Question 16

UNIX operating system was initially developed in Machine language.

Answer

False

Reason — UNIX operating system was initially developed in Assembly language.

Question 17

Android is an open source platform operating system.

Answer

True

Reason — Android is an open source platform operating system.

Theory Questions

Question 1

What is an operating system? Name the types of OS.

Answer

An operating system is an integrated set of programs that manages various resources and the overall operations of a computer system. It is designed to support the various activities of the computer system in a systematic way. For example, Microsoft Windows, Linux, etc.

The different types of Operating System are:

  1. Single User Operating System
  2. Graphical User Interface
  3. Multi-user Operating System
  4. Multitasking Operating System
  5. Multithreading Operating System
  6. Real time Operating System
  7. Distributed Operating System

Question 2

Describe mobile operating system. Give some example of mobile OS.

Answer

Mobile Operating is particularly designed to operate smartphones, PDAs, tablets and other mobile devices. Mobile Operating System is a software, which provides platform on which other programs or applications can run on mobile devices. It has empowered the users to check their mails, files, and to work on the data from anywhere and anytime.

Some examples of Mobile Operating System are BlackBerry (RIM), Android (Google), iOS (Apple), Symbian (Nokia), and Windows Mobile (Microsoft).

Question 3

Write the full form of the following:
i. BOSS
ii. GUI
iii. OS
iv. CUI

Answer

i. BOSS — Bharat Operating System Solutions

ii. GUI — Graphical User Interface

iii. OS — Operating System

iv. CUI — Character User Interface

Question 4

What is the difference between multiprocessing and multi-threading operating system.

Answer

Multiprocessing OSMulti-threading OS
A multiprocessing OS uses multiple processors to perform tasks within a single system. The processors are connected to divide and execute jobs more quickly. When a job is finished, the results from all processors are compiled to provide the final output.Multithreading OS works by dividing a process into independent units called threads. These threads can then work on the same process simultaneously.
Multiple processes are executed in a parallel fashion.Multiple threads are executed in a parallel fashion.
Multiprocessing requires a significant amount of time and large number of resources.Multithreading requires less time and few resources to create.
For example, Unix.For example, Solaris.

Question 5

Write short notes on:
a. Android operating system
b. iOS operating system

Answer

a. Android operating system — Android is the world’s most popular Mobile Operating System. It is an open source (Linux based) platform initially developed by Android Inc. in October 2003, and later on purchased by Google Inc. in 2005.

The green robot is the logo for the Android operating system. Android OS turns our phone into a powerful web browser, game console, and personal assistant all in one. It was primarily designed for touchscreen portable devices such as smartphones and tablet computer. Android powers some of the best handset and tablet manufacturers in the world like Samsung, HTC, Motorola, Sony, Asus, and many more.

b. iOS operating system — iOS is a mobile operating system developed by Apple. It is the world’s most advanced mobile operating system. It was originally released in 2007 and is used to run the iPhone, iPad, and iPod Touch.

iOS offers multitasking features that allow the applications on iphone to perform tasks in the background which in turn preserves battery life, and moreover, increases performance.iOS devices are created exclusively for its hardware. Apple designs the iOS devices to maintain a high level of security without compromising the user’s experience.

Question 6

How does an operating system provide security?

Answer

The operating system provides various techniques which assures the integrity and confidentiality of user’s data. Following are the security measures which are used to protect the user’s data from threats and intrusion:

  1. Protection against unauthorized access through login and password.
  2. Protection against intrusion by keeping the firewall active.
  3. Protecting against malicious access to system memory.
  4. Displaying messages related to system vulnerabilities.

Question 7

What are the different responsibilities of a kernel?

Answer

Kernel is the core component of an operating system which acts as an interface between applications and the data processing being performed at the hardware level. The kernel is responsible for performing the following tasks:

  1. I/O management
  2. Memory management
  3. Process management for application execution
  4. Device management (through the use of device drivers)
  5. System calls control

Question 8

What is the difference between kernel and shell?

Answer

ShellKernel
An interface to the operating system is called a shell. It is the outermost layer of the operating system and manages the interaction between the user and the operating system.Kernel is the core component of an operating system which acts as an interface between applications and the data processing being performed at the hardware level.
The shell forms the outer layer of the operating system.The kernel forms the inner layer of the operating system.
A shell performs memory management.A kernel performs process management.

Question 9

Write a note on Android operating system.

Answer

Android is the world’s most popular Mobile Operating System. It is an open source (Linux based) platform initially developed by Android Inc. in October 2003, and later on purchased by Google Inc. in 2005.

The green robot is the logo for the Android operating system. Android OS turns your phone into a powerful web browser, game console, and personal assistant all in one. It was primarily designed for touchscreen portable devices such as smartphones and tablet computer.

Android powers some of the best handset and tablet manufacturers in the world like Samsung, HTC, Motorola, Sony, Asus, and many more.

Question 10

What is the difference between single user operating system and multi user operating system ?

Answer

Single user operating systemMulti user operating system
Single User Operating System provides a platform for one user at a time.Multiuser Operating System provides platform for multiple users at a time.
Single User Operating System may be a single user, single task or a single user, multitasking operating system.Multiuser Operating System may be time sharing or multiprocessor system.
Single User Operating System is suitable for personal computers.Multiuser Operating System is suitable for servers and mainframes.
For example, MS DOS.For example, LINUX.

Question 11

How is multithreaded operating system different than multitasking operating system?

Answer

Multitasking OSMultithreading OS
In multitasking OS, the users are allowed to perform multiple tasks by CPU.In multithreading OS, multiple threads are created from a process.
Multitasking involves CPU switching between tasks.Multithreading involves CPU switching between the threads.
In multitasking, the processes share separate memory locations.In multithreading, the processes are allocated the same memory.
The CPU is provided to execute many tasks at a time.The CPU is provided so that multiple threads can be executed at a specific time.
Every process is assigned its own resources.Every process shares the same set of resources with each other
Multitasking is slow in comparison to multithreading.Multithreading is faster.
For example, Windows XP, Windows 7, Windows 8, Windows 8.1, Windows 10.For example, Windows XP, Unix, Linux.

 

CHAPTER-5: WORKING WITH AN OPERATING SYSTEM

 

 

Multiple Choice Questions

 

Question 1

You can use …………… to pin your favourite programs on the taskbar for easy access.

  1. Aero Peek
  2. Jump List
  3. Snap
  4. Pin to Taskbar

Answer

Pin to Taskbar

Reason — You can use ‘Pin to Taskbar’ to pin your favourite programs on the taskbar for easy access.

Question 2

The small graphic symbols displayed on the desktop are called …………… .

  1. Folders
  2. Icons
  3. Files
  4. All of these

Answer

Icons

Reason — The small graphic symbols displayed on the desktop are called Icons.

Question 3

Which of the following option enlarges the Application window?

  1. Restore
  2. Minimize
  3. Close
  4. Maximize

Answer

Maximize

Reason — Maximize option enlarges the Application window.

Question 4

…………… menu provides tutorials, trouble-shooting content, and various support services.

  1. Help and support
  2. Control Panel
  3. Default Programs
  4. None of these

Answer

Help and support

Reason — Help and support menu provides tutorials, trouble-shooting content, and various support services.

Question 5

…………… icon provides quick and easy method to open a file or program which we commonly use.

  1. Shut Down
  2. Shortcut
  3. Recycle Bin
  4. Computer

Answer

Shortcut

Reason — Shortcut icon provides quick and easy method to open a file or program which we commonly use.

Question 6

The Context menu appears on the screen after …………… clicking on an icon.

  1. Help and Support
  2. Double
  3. Right
  4. None of these

Answer

Right

Reason — The Context menu appears on the screen after Right clicking on an icon.

Question 7

When the file is deleted, it goes to the …………… folder.

  1. Documents
  2. Computer
  3. New Folder
  4. Recycle Bin

Answer

Recycle Bin

Reason — When the file is deleted, it goes to the Recycle Bin folder.

Question 8

The first screen of Windows 7 is called …………… .

  1. Work Area
  2. Desktop
  3. Both 1 and 2
  4. None of these

Answer

Desktop

Reason — The first screen of Windows 7 is called Desktop.

Question 9

A …………… is like a container in which you can store similar types of files.

  1. File
  2. Folder
  3. Computer
  4. Documents

Answer

Folder

Reason — A Folder is like a container in which you can store similar types of files.

Question 10

On which bar Start button is located?

  1. Menu bar
  2. Status bar
  3. Task bar
  4. Standard bar

Answer

Task bar

Reason — Start button is located on the Task bar.

Question 11

Which type of Interface does the Windows operating system have?

  1. GUI
  2. CUI
  3. Both of these
  4. None of these

Answer

GUI

Reason — Windows operating system has GUI (Graphical User Interface) type of interface.

Question 12

…………… is a program that helps in viewing and organizing the files and folder on a computer.

  1. Application Window
  2. Desktop
  3. Control Panel
  4. Windows Explorer

Answer

Windows Explorer

Reason — Windows Explorer helps in viewing and organizing the files and folder on a computer.

Question 13

Which key is used to select a consecutive group of files?

  1. Shift
  2. Enter
  3. Ctrl
  4. Alt

Answer

Shift

Reason — Shift key is used to select a consecutive group of files.

Question 14

Which feature allows you to quickly view the desktop without minimizing the open Windows?

  1. Aero peek
  2. Pin to Taskbar
  3. Jump List
  4. None of these

Answer

Aero peek

Reason — Aero peek feature allows us to quickly view the desktop without minimizing the open Windows.

Note — There is a misprint in the question. Option 1 is misprinted as “Arrow Peak” instead of “Aero Peek”.

Question 15

…………… is the quicker way to resize the open window.

  1. Aero peak
  2. Snap
  3. Jump List
  4. None of these

Answer

Snap

Reason — Snap is the quicker way to resize the open window.

Question 16

The …………… folder displays devices connected externally to your computer, including the devices connected wirelessly or over the network.

  1. Music
  2. Document
  3. Devices and Printer
  4. None of these

Answer

Devices and Printer

Reason — The Devices and Printer folder displays devices connected externally to our computer, including the devices connected wirelessly or over the network.

Question 17

The right side of the taskbar is known as the …………… .

  1. Task bar
  2. Desktop
  3. Notification Area
  4. None of these

Answer

Notification Area

Reason — The right side of the taskbar is known as the Notification Area.

Question 18

…………… are created when you install the Windows operating system.

  1. Application Icons
  2. Document Icons
  3. System Icons
  4. None of these

Answer

System Icons

Reason — System Icons are created when we install the Windows operating system.

Question 19

Which icon allows you to access the shared resources, such as files and printers?

  1. My Computer
  2. Network Icon
  3. Document
  4. None of these

Answer

Network Icon

Reason — Network Icon allows us to access the shared resources, such as files and printers.

Question 20

The …………… aspects define the access and data integrity rules.

  1. Security
  2. Search
  3. Navigation
  4. Back up

Answer

Security

Reason — The Security aspects define the access and data integrity rules.

Question 21

…………… view displays the contents as a list of files’/folders’ names preceded by small icons.

  1. Details
  2. Tiles
  3. List
  4. Content

Answer

List

Reason — List view displays the contents as a list of files’/folders’ names preceded by small icons.

Question 22

OEM stands for …………… .

  1. Original Equipment Manufacturer
  2. Original Equipment Maker
  3. Original Equipped Manufacturer
  4. Origin of Equipped Mart

Answer

Original Equipment Manufacturer

Reason — OEM stands for Original Equipment Manufacturer.

Question 23

Which key combination is used to switch to the other application?

  1. CTRL + C
  2. CTRL + A
  3. ALT + TAB
  4. None of these

Answer

ALT + TAB

Reason — ALT + TAB key combination is used to switch to the other application.

Question 24

Which scroll bar is used to move the screen display right and left?

  1. Horizontal scroll bar
  2. Address bar
  3. Vertical scroll bar
  4. None of these

Answer

Horizontal scroll bar

Reason — Horizontal scroll bar is used to move the screen display right and left.

 

 

State True or False

 

Question 1

We cannot add items to the Quick Launch bar.

Answer

False

Reason — We can drag the icon of a program to Quick Launch bar to add it to the Quick Launch bar.

Question 2

To rename a file, you have to right-click on the file and choose Rename option from the Shortcut menu.

Answer

True

Reason — To rename a file, you have to right-click on the file and choose Rename option from the Shortcut menu.

Question 3

To delete a file, you have to right-click on the file and choose Copy from the Shortcut menu.

Answer

False

Reason — To delete a file, you have to right-click on the file and choose Delete from the Shortcut menu.

Question 4

You can find any file or folder in Explorer using View > Find option.

Answer

False

Reason — We can find any file or folder in Windows Explorer using the Search box on the top right side of the screen.

Question 5

List option in View menu allows you to display all the files or folders in multiple columns.

Answer

True

Reason — List option in View menu allows us to display all the files or folders in multiple columns.

Question 6

You cannot delete an existing file.

Answer

False

Reason — We can delete an existing file by using the Delete option.

Question 7

We can restore the files that a Recycle bin folder holds.

Answer

True

Reason — We can restore the files that a Recycle bin folder holds by using the Restore option.

Question 8

Quick Launch bar is present on the Title bar.

Answer

False

Reason — Quick Launch Bar is present on the right side of the Start button on the taskbar.

Question 9

Tiles View displays files and folders as medium sized icons and also displays the size and type of file.

Answer

True

Reason — Tiles View displays files and folders as medium sized icons and also displays the size and type of file.

Question 10

Files and Folders, once deleted cannot be retrieved.

Answer

False

Reason — Files and Folders, once deleted can be restored from the Recycle Bin using the Restore option.

Question 11

Windows Explorer is an application that provides detailed information about files, folders, and drives.

Answer

True

Reason — Windows Explorer is an application that provides detailed information about files, folders, and drives.

Question 12

A deleted file can never be retrieved.

Answer

False

Reason — A deleted file can be retrieved from the Recycle Bin using the Restore option.

Question 13

You can click on application button in the task bar to make an application’s window active.

Answer

True

Reason — We can click on application button in the task bar to make an application’s window active.

Question 14

The button with a small horizontal line is called the Maximize button.

Answer

False

Reason — The button with a small horizontal line is called the Minimize button.

Question 15

There is only one wildcard character commonly supported in Windows, to search for any information.

Answer

False

Reason — Windows supports two wildcard characters (* and ?) to search for any information.

Theory Questions

 

Question 1

What is Windows? Name any three versions of Windows.

Answer

Microsoft Windows is a series of Graphical User Interface (GUi) operating systems, which was developed, marketed, and sold by Microsoft. Windows OS was the first graphical user interface for IBM – compatible PCs.

Three versions of Windows are Windows 98, Windows XP and Windows 7.

Question 2

What is the significance of Taskbar?

Answer

The Taskbar is a vital element of the desktop, providing easy access to programs, open windows, date and time, and background tasks via the Notification Area. Users can also pin frequently used app icons for quick access and utilize the Show Desktop button to instantly view the desktop.

Question 3

Explain the new features of Windows 7.

Answer

The new features of Windows 7 are as follows:

  1. Easy to Use — Windows 7 has a very attractive look with colourful themes and slide shows. It is very easy to use. The use of graphics make it quite interactive.
  2. Multitasking — We can perform more than one task at a time using Windows 7.
  3. Searching made easier — We can quickly search for more things in more places in our computer.
  4. Pinning on Taskbar — We can pin our favourite programs on the taskbar for easy access. Just right-click the program and select Pin to Taskbar option.
  5. Aero Peek — This feature allows us to quickly view the desktop without minimizing the open windows. We just need to hover the mouse pointer over the Show Desktop button at the right edge of the taskbar.
  6. Live Taskbar Preview — We can move the pointer to a taskbar button to see the live preview of its open window in full screen.
  7. Jump Lists — This feature takes us straight to the documents, pictures, songs, or websites we recently visited. A jump list also appears on the Start menu. It provides a quick access to different programs.
  8. Snap — It is the quicker way to resize the open window.
    1. Drag one of the window to the left edge of the screen and another to the right edge. This way we can view two windows side by side.
    2. Dragging the window to the upper edge of the screen will take up the entire screen.
    3. Dragging the window to the lower edge of the screen will expand it vertically.
  9. Shake — Click on the top of a window and without releasing the mouse button, give the mouse a shake. Every open window except the one we are working with will be minimized. Again shake the mouse and all the open windows will be back.

Question 4

What is a shortcut? How can you create a shortcut of any program?

Answer

A shortcut is an icon containing a direct route to a specific object. It is indicated with a small jump arrow in the lower left corner. Double clicking on this icon will activate the related application document or folder, etc.

To create a shortcut of any program, we follow the steps given below:

Step 1: Right-click the program name. A context menu will appear.

Step 2: Select Send To > Desktop (Create shortcut).

Step 3: Choose the Create Shortcut option.

A shortcut icon will appear on the Desktop.

Question 5

Distinguish between Application window and Document window.

Answer

Application windowDocument window
The large window of any application is called the Application window.The smaller window which is inside the Application window is called the Document window.
This window helps the user to communicate with the application program.This window is used for typing, editing, formatting the text or any other work in the program.

Question 6

Can you change the name of an existing file/folder? If yes, then explain how?

Answer

Yes, we can change the name of an existing file/folder.

To rename any file/folder, first select it. Right-click on the selected file/folder and select the Rename option from the Shortcut menu. Now type the new name that we wish to give to the file/folder.

 

 

Application Based Questions

 

Question 1

Ashish made his final year project report and saved it on his laptop. Next day he forgot the location where he had saved it. He has already wasted a lot of time in exploring every folder on the system. Suggest him the best way to search his project report.

Answer

Ashish can use the Search box to find his project report. To search the project report, he can follow the given steps:

Step 1 — Click on the Start button. The Search box is located at the bottom of the left pane.

Step 2 — Type the project report name in the Search box.

Step 3 — As he types, the items that match the text will appear on the Start menu.

Step 4 — The project report will appear and Ashish can find out its location.

Question 2

Rohan has saved a file in his computer with the name, ‘My Project’. Now he wants to change the name of the file to ‘New_Project’. Suggest a suitable method to rename a file.

Answer

To rename the file, Rohan should follow the below steps:

Step 1 — In the file explorer window, select the file he wants to rename.

Step 2 — Right-click on the selected file and select the Rename option from the shortcut menu.

Step 3 — Type the new name and press Enter.

Question 3

Radhika has created a folder named ‘Unwanted Files’, which she has saved in the D: drive. She wants to view the detailed information about her files and folders, including name, type, size, and date modified saved in D: drive. Suggest the best suited view for the same.

Answer

Radhika should use the Details view as this view provides a detailed information about the files and folders, including name, type, size, and date modified.

To view the detailed information about the files and folders, Radhika needs to follow the steps given below:

Step 1 — Click on the drop-down arrow of More option located on the toolbar.

Step 2 — Select the Details option from the drop-down menu. The files and folders will be displayed along with their detailed information, including name, type, size, and date modified saved in D: drive.

Chapter 6: Computer Networking

 
 

 

Multiple Choice Questions

 

Question 1

The computers which are located at far away locations use the …………… system for data communication.

  1. Cable
  2. Hubs
  3. Routers
  4. Telecommunication

Answer

Telecommunication

Reason — The computers which are located at far away locations use the Telecommunication system for data communication.

Question 2

Which one of the following is not an advantage of networking?

  1. Software sharing
  2. Security
  3. Internet sharing
  4. Dependence on electricity

Answer

Dependence on electricity

Reason — Dependence on electricity is not an advantage of networking as the networking equipments require electricity to work.

Question 3

A computer system, which can access a remote service from a server using a network is called a …………… .

  1. Server
  2. NIC
  3. Node
  4. Bridge

Answer

Node

Reason — A computer system, which can access a remote service from a server using a network is called a node.

Question 4

Which of the following is not a basic hardware component which connects the nodes in a network?

  1. Hub
  2. ISP
  3. Bridge
  4. Switch

Answer

ISP

Reason — An ISP (Internet Service Provider) is an organisation that provides the facility of availing internet services against a fee. It is not a basic hardware component which connects the nodes in a network.

Question 5

A computer network restricted to the employees of an organization is known as …………… .

  1. Extranet
  2. Intranet
  3. Modem
  4. Server

Answer

Intranet

Reason — Intranet is a computer network within an organisation, used to share files and resources of the organisation securely.

Question 6

A …………… converts digital signal to analog signal and vice versa.

  1. ISP
  2. Modem
  3. Wi-Fi
  4. Extranet

Answer

Modem

Reason — A Modem converts digital signal to analog signal and vice versa.

Question 7

A computer network, which is used for communication among computers and their peripherals close to each other is called …………… .

  1. WAN
  2. PAN
  3. MAN
  4. None of these

Answer

PAN

Reason — A computer network, which is used for communication among computers and their peripherals close to each other is called PAN (Personal Area network).

Question 8

The maximum number of computers in a LAN can be …………… .

  1. 10
  2. 100
  3. 1000
  4. 10000

Answer

1000

Reason — The maximum number of computers in a LAN can be 1000.

Question 9

The maximum range of MAN can be …………… km.

  1. 10
  2. 20
  3. 40
  4. 50

Answer

50

Reason — The maximum range of MAN can be 50 km.

Question 10

Which of the following is not a web browser?

  1. Google Chrome
  2. Mozilla Fire Fox
  3. Yahoo
  4. Internet Explorer

Answer

Yahoo

Reason — Yahoo is not a web browser.

Question 11

…………… refers to a collection of numbers, characters, symbols, and images.

  1. Information
  2. Data
  3. Knowledge
  4. All of these

Answer

Data

Reason — Data refers to a collection of numbers, characters, symbols, and images.

Question 12

Optical Fiber is a networking medium that transmits …………… instead of electronic signals to send data.

  1. Light rays
  2. Infrared rays
  3. Radio waves
  4. All of these

Answer

Light rays

Reason — Optical Fiber is a networking medium that transmits light rays instead of electronic signals to send data.

Question 13

Optical Fibre cable and Coaxial cables are the categories of …………… .

  1. Guided media
  2. Wireless media
  3. Unguided media
  4. All of these

Answer

Guided media

Reason — Optical Fibre cable and Coaxial cables are the categories of Guided media.

Question 14

…………… cable transmits multiple signals at the same time and is used for longer distances.

  1. Broadband Coaxial
  2. Twisted Pair
  3. Ethernet
  4. None of these

Answer

Twisted Pair

Reason — Twisted Pair cable transmits multiple signals at the same time and is used for longer distances.

Question 15

Which of the following is not an example of wireless media?

  1. Bluetooth
  2. Infrared
  3. Wi-Fi
  4. Optical Fiber

Answer

Optical Fiber

Reason — Optical Fiber is an example of guided media and not wireless media.

Question 16

Which is the most widely used form of wiring medium that transmits transmission over longer distances and at higher bandwidth?

  1. Ethernet
  2. Coaxial cable
  3. Optical Fiber cable
  4. None of these

Answer

Optical Fiber cable

Reason — Optical Fiber cable is the most widely used form of wiring medium that transmits transmission over longer distances and at higher bandwidth.

Question 17

Identify the odd term amongst the following group:

  1. Ethernet Cables
  2. Optical Fiber
  3. Coaxial cable
  4. Bluetooth technology

Answer

Bluetooth technology

Reason — Bluetooth technology is an example of wireless media while Ethernet Cables, Optical Fiber and Coaxial cable are examples of guided media.

Question 18

…………… provides free or low cost online storage for the users.

  1. Reddit
  2. Drop box
  3. Google Play Store
  4. None of these

Answer

Reddit

Reason — Reddit provides free or low cost online storage for the users.

Question 19

A cloud which is accessible to both private and public users is called …………… cloud.

  1. Private
  2. Public
  3. Hybrid
  4. Community

Answer

Hybrid

Reason — A cloud which is accessible to both private and public users is called Hybrid cloud.

Question 20

A protocol used for exchanging files between computers.

  1. TCP/IP
  2. FTP
  3. HTTP
  4. None of these

Answer

FTP

Reason — FTP (File Transfer Protocol) is used for exchanging files between computers.

Question 21

…………… are the two most popular Internet standard protocols for retrieving e-mails.

  1. TCP/IP
  2. HTTP/FTP
  3. IMAP/POP
  4. None of these

Answer

IMAP/POP

Reason — IMAP/POP are the two most popular Internet standard protocols for retrieving e-mails.

Question 22

A communication technology that uses low power radio waves to connect electronic devices wirelessly.

  1. Radio wave
  2. Micro wave
  3. Wi-Fi
  4. None of these

Answer

Micro wave

Reason — Micro wave is a communication technology that uses low power radio waves to connect electronic devices wirelessly.

Question 23

A communication device, used to regenerate a signal.

  1. Hub
  2. Switch
  3. Repeater
  4. None of these

Answer

Repeater

Reason — Repeater is used to regenerate a signal.

Question 24

Video stored in MPEG format have the extension …………… .

  1. avi
  2. wmv
  3. mpg
  4. None of these

Answer

mpg

Reason — Video stored in MPEG format have the extension mpg.

 

Fill in the blanks

 

Question 1

The …………… identifies every single node in a network by providing a unique physical address to it.

Answer

The Network Interface Card (NIC) identifies every single node in a network by providing a unique physical address to it.

Question 2

An …………… refers to a computer network within an organization.

Answer

An Intranet refers to a computer network within an organization.

Question 3

An …………… refers to a computer network that allows controlled access from outside for specific business or educational purpose.

Answer

An Extranet refers to a computer network that allows controlled access from outside for specific business or educational purpose.

Question 4

A cable modem connects to the Internet using a …………… access through a telephone line.

Answer

A cable modem connects to the Internet using a Broadband access through a telephone line.

Question 5

The maximum range of LAN can be …………… Km.

Answer

The maximum range of LAN can be 10 Km.

Question 6

…………… is a type of network that requires a telecommunication media or satellite signals to transfer data.

Answer

WAN (Wide Area Network) is a type of network that requires a telecommunication media or satellite signals to transfer data.

Question 7

The actual protocols of TCP/IP model are called …………… .

Answer

The actual protocols of TCP/IP model are called TCP/IP suite.

Question 8

Bluetooth technology sends information within its personal space called the …………… .

Answer

Bluetooth technology sends information within its personal space called the Personal Area Network (PAN).

Question 9

…………… cable is basically designed for connecting to computers without a hub or a router.

Answer

Cross over cable is basically designed for connecting to computers without a hub or a router.

Question 10

…………… technology requires a line-of-sight connection between transmitter and receiver.

Answer

Infrared Wireless technology requires a line-of-sight connection between transmitter and receiver.

State True or False

Question 1

Data communication means sending data manually from one computer to another.

Answer

False

Reason — Data communication means sending data electronically from one computer to another using a transmission medium. The medium can be guided or unguided.

Question 2

Networking of computers reduces the redundancy of the same data.

Answer

True

Reason — Networking of computers reduces the redundancy of the same data.

Question 3

In a network, internet facility must be installed in every computer.

Answer

False

Reason — In a network, internet facility can be installed on a server and all the computers connected to the server can access the internet service.

Question 4

A LAN is much larger than a MAN.

Answer

False

Reason — The maximum range of LAN can be 10 Kms while a MAN can cover a range of about 50 kms. Thus, MAN is larger than LAN.

Question 5

The maximum range of LAN can be 50 km.

Answer

False

Reason — The maximum range of LAN can be 10 km.

Question 6

Cloud is defined as a set of services available to private individual / organization only.

Answer

False

Reason — A Private Cloud is defined as a set of services available to private individual / organization only.

Question 7

A Gateway is a network point that acts as an entrance to another network.

Answer

True

Reason — A Gateway is a network point that acts as an entrance to another network.

Question 8

IP or Internet Protocol provides a sequence number to each of the packet so that they might reach their destination in the correct order.

Answer

True

Reason — IP or Internet Protocol provides a sequence number to each of the packet so that they might reach their destination in the correct order.

Question 9

Internet browsers have an in-built feature to make FTP requests to other servers.

Answer

True

Reason — Internet browsers have an in-built feature to make FTP requests to other servers.

Question 10

In case of guided media, there is no physical path for data transmission.

Answer

False

Reason — In case of unguided media, there is no physical path for data transmission.

Question 11

Cables are the most common medium for communication.

Answer

False

Reason — Wireless media is the most common medium for communication.

Question 12

Coaxial cable was invented by Oliver Heaviside in 1880.

Answer

True

Reason — Oliver Heaviside, an English physicist, engineer, and mathematician patented the coaxial cable in 1880.

Question 13

Fiber Optic cable transmits electronic signals.

Answer

False

Reason — Fiber Optic cable transmits data converted into light signals.

Question 14

The term node may refer to any device connected to a network.

Answer

False

Reason — A node is a computer system which uses a network to access a remote service from the server.

Question 15

Transmission of computerized data from one location to another is called communication.

Answer

True

Reason — Transmission of computerized data from one location to another is called communication.

Question 16

Picture formats are recognized by the extension like .gif and .jpg

Answer

True

Reason — Picture formats are recognized by the extension like .gif and .jpg

Question 17

Sounds stored in AU format have the extension .mp3

Answer

False

Reason — Sounds stored in AU format have the extension .au.

Application Based Questions

Question 1

Ranjit wants to transfer pictures of a school play from his mobile to Manish’s mobile. Suggest any two wireless mode of transmission which he can use for the same.

Answer

Two wireless modes that can be used are:

  1. Bluetooth
  2. WiFi

Question 2

Which type of network do we use in our homes while connecting a computer system and peripheral device like a printer?

Answer

Personal Area Network

Question 3

Pepsi company has its corporate office in one part of the city while the production unit is in another part of the same city. Which type of network is most suitable for communication between both the units?

Answer

MAN (Metropolitan Area Network) is most suitable for communication between both the units.

Question 4

Which type of network is used by the Indian Railways for providing their online services?

Answer

WAN (Wide Area Network)

Question 5

Raman is travelling by train and has to complete an urgent client assignment. Which wireless media should he use to send the file to his client?

Answer

Raman will use Microwave as the wireless communication media since Microwave communication is extensively used in 3G/4G and WiMax networks.

Question 6

Your Uncle has five offices in different cities. He wants to connect his computers via networking at various offices. Which type of networking will you suggest him to go for?

Answer

Wide Area network

Short Answer Type Questions

Question 1

What is Intranet and how is it different from Extranet?

Answer

Intranet is a computer network within an organisation, used to share files and resources of the organisation securely.

Extranet refers to a computer network that allows controlled access from the outside for specific business or educational purposes.

Question 2

Write the full form of the following:

  1. NIC
  2. ISP
  3. LAN
  4. MAN
  5. WAN
  6. PAN

Answer

  1. NIC — Network Interface Card
  2. ISP — Internet Service Provider
  3. LAN — Local Area Network
  4. MAN — Metropolitan Area Network
  5. WAN — Wide Area Network
  6. PAN — Personal Area Network

Question 3

Who designed FTP originally? When was it published?

Answer

The File Transfer Protocol (FTP) was originally designed by Abhay Bhushan and published in 1971.

Question 4

Write a short note on WiMax.

Answer

WiMax stands for Worldwide Interoperability for Microwave Access. It is a telecommunication protocol that provides fixed and mobile internet services. WiMax requires a tower called WiMax Base Station, that is connected to the Internet using a standard wired high-speed connection. The connectivity between the tower and the end user is provided through microwave link. WiMax technology provides high speed connection upto 75 Mbps over an area of 30 miles for fixed stations and 3-10 miles for mobile stations.

Question 5

Give two examples of each:

  1. Modem
  2. Transmission
  3. Coaxial cable
  4. Wireless Networking Technology

Answer

  1. Modem — Internal modem, External modem.
  2. Transmission — Wired Transmission, Wireless Transmission
  3. Coaxial cable — Baseband Coaxial Cable, Broadband Coaxial Cable
  4. Wireless Networking Technology — Bluetooth, Wi-Fi

Question 6

What is the maximum data transmission range of bluetooth technology?

Answer

The maximum data transmission range of bluetooth technology is 240 metres.

Question 7

What do you understand by the Radio wave?

Answer

Radio waves are a wireless medium for broadcasting radio signals through the air. They have lower frequencies and longer wavelengths. Their frequency ranges from 300 GHz to 30 Hz.

Question 8

Name any three network components.

Answer

Three network components are:

  1. Server
  2. Client
  3. Network Interface Card (NIC)

Question 9

What are the three types of cables used in wired networking technology?

Answer

The three types of cables used in wired networking technology are:

  1. Ethernet Cables
  2. Coaxial cables
  3. Optical Fibre Cables

Question 10

Write an application of Coaxial cable. Why is it called Coaxial cable?

Answer

A Coaxial cable is used by the cable television industry to connect TVs to a cable TV service.

Coaxial cable is called coaxial cable because the two conductors are concentric. This means that the two conductors share the same axis.

Long Answer Type Questions

Question 1

Differentiate between LAN, MAN, and WAN.

Answer

LANMANWAN
It is used for a small networks like a room, office building or campus.MAN is much larger than a LAN setup and can spread across a city.WAN is used to link computers located at far away places (countries or continents).
The maximum range of LAN can be 10 Kilometers.The maximum range of MAN can be 50 Km.The range of WAN is limitless as it uses telecommunication or satellite signals.
The hardware as well as software resources are shared through LAN.The main purpose of a MAN is also to share hardware and software resources.The main purpose of WAN is to share data and information.
LAN is usually used in schools, offices etc.WAN is commonly used in Cable Television Network.WAN is used as internet in houses, schools, banks and private and public sector.

Question 2

Describe the different types of networks.

Answer

There are four types of computer networks:

  1. LAN (Local Area Network) — LAN is used when two or more computers or peripheral devices are connected within a small area, like a room, office building, or a campus. The maximum range of LAN can be 10 Kilometers. The number of computers in a LAN varies from 2 to 1000. The hardware as well as software resources are shared through LAN.
  2. MAN (Metropolitan Area Network) — MAN is much larger than a LAN setup and is spread across a city. The most common example of a MAN type network is Cable Television Network. The main purpose of a MAN is to share hardware and software resources. The maximum range of MAN can be 50 Km.
  3. WAN (Wide Area Network) — WAN is used when we have two or more computers located at far away places, linked by communication facilities, like telecommunication or satellite signals. The most common example of a WAN network is the Internet which is generally used in houses, schools, banks and private and public sector. The main characteristic of a WAN is that it requires a public telecommunication media to transfer data.
  4. PAN (Personal Area Network) — PAN is mainly created for an individual person. It consists of a desktop/laptop computer, a mobile phone, and/or a handheld computing device, such as a PDA or a Smartphone. We can use these networks to transfer files including e-mail, calendar appointments, digital photos, and music. Personal area networks generally cover a range of less than 10 meters.

Question 3

Explain the types of modem.

Answer

Modems are available in two categories:

  1. Internal modem — These are attached to the internal slot of the motherboard. These are categorised as full duplex and half duplex which are used for fax and internet communications. They can also be used for data and voice communication.
  2. External modem — It is a small box connected to the communication port of the computer. It works similar to the internal modem. The only difference is that it is placed outside the CPU box.

Question 4

Explain any four advantages of networking.

Answer

The four advantages of networking are:

  1. Hardware Sharing — In a network, we can share almost every peripheral device, such as a printer, scanner, modem, CD writer, etc., among several computers. All these devices are attached to a remote server, which is shared among multiple computers. This reduces the cost of hardware.
  2. Software Sharing — Every application software can be installed on the main server rather than installing it on every computer individually. Computers in a network can use the required software from the server. This technique saves cost as well as time.
  3. Efficiency of Hardware and Software Resources — In a network, modifications in software or hardware are done at a single point. Since the resources are installed at a single point, all modifications are done at that point rather than in individual computers.
  4. Reduces Redundancy — Since people use the same data in a common workplace, they can share it over a network by saving and storing it centrally. This also reduces the redundancy of the same data.

Question 5

What is the Internet? Write any five uses of it.

Answer

Internet is a computer-based world wide information network. It is composed of a large number of smaller interconnected networks.

Five uses of the Internet are:

  1. Businesses use the Internet to provide access to complex databases, such as financial databases.
  2. Companies carry out electronic commerce (commerce on internet) including advertising, selling, buying, distributing products, and providing after sales services.
  3. Businesses and institutions use the Internet for voice and video conferencing and other forms of communication that enable people to telecommute, or work from a distance.
  4. The use of electronic mail (e-mail) over the Internet has greatly speeded communication between companies among coworkers, and between other individuals.
  5. Individuals use the Internet for communication, entertainment, finding information and to buy and sell goods and services.

Question 6

Differentiate between Ethernet Cables and Fiber Optic cable.

Answer

Ethernet CableFiber Optic cable
Ethernet cables use electric signals as the data transmission medium.Fiber optic cables use light signals as the data transmission medium.
Ethernet cables transmit data at relatively lower speeds.Fiber optic cables transmit data at much higher speeds.
These cables are highly susceptible to electromagnetic and radio interferences.Fiber optic cables are immune to electromagnetic and radio interferences.
Ethernet cables are less secure.Fiber optic cables offer high degree of security.
Ethernet cables are made of copper wires.Fiber optic cables are made of glass or plastic strands.
They are comparatively cheaper.They are expensive.
Ethernet cables are easy to install.The installation of optical fiber cables requires specialized accessories.

Question 7

Differentiate between a server and a client.

Answer

ServerClient
A server is a computer that provides services or resources to other devices present in the network.A client is a computer that requests and consumes services or resources from a server.
Server computers have multiple processors, large amounts of memory, redundant storage, and specialized server operating systems.Clients are typically general-purpose devices with standard hardware configurations and general-purpose operating systems.
Servers are designed to handle multiple client requests simultaneously, managing resources and delivering high performance.Clients are typically focused on user interfaces and user interactions.
Servers continuously listen for incoming client requests and respond to them.Clients initiate communication with the server by sending requests to them over the network. They do not listen for incoming requests.

Question 8

Write the advantages and disadvantages of Infrared wireless technology.

Answer

The advantages of Infrared wireless technology are as follows:

  1. It has low power consumption.
  2. Infrared components are less expensive.
  3. It is more secure than radio-frequency signals.
  4. Direct line of sight requirement of Infrared enhances its security and minimizes interference, making it suitable for short-range, point-to-point communication.

The disadvantages of Infrared wireless technology are as follows:

  1. It has limited range of approx 5 meters and it cannot penetrate walls or other obstacles.
  2. It works only in direct line of sight between the transmitter and receiver. Even the smallest obstruction will disrupt communication.
  3. Infrared communication can take place only between two devices at a time limiting its use to control multiple devices.
  4. It has relatively low data transfer speeds compared to technologies like Bluetooth or Wi-Fi.
  5. Bright ambient light, including sunlight and strong artificial lighting, can interfere with infrared signals and degrade the quality of communication.

Question 9

What is Wi-Fi? Write the advantages and challenges of Wi-Fi.

Answer

Wi-Fi stands for Wireless Fidelity. It creates a Wireless Local Area Network that uses radio waves to send the information. A secure, reliable, and fast wireless connection is established between the electronic devices and the Internet by using this technology. The devices require a wireless adapter connected to them to capture the Wi-Fi signals.

Wi-Fi offers the following advantages:

  1. Wi-Fi has replaced the wired medium completely and can be used to connect to the Internet anywhere, at any time.
  2. It is relatively inexpensive and can also be accessed at places where cables cannot be installed.
  3. One can connect multiple devices through Wi-Fi.

Wi-Fi faces the following challenges:

  1. It has high power consumption.
  2. It is slower than the wired medium.
  3. The transmission breaks or slows down when there is noise interference.

Question 10

How is data different from information?

Answer

Data is different from information in the following ways:

DataInformation
Data is the lowest level of abstraction.Information is one level higher abstraction than data.
Data is unstructured and carries no meaning.Information is derived by interpreting and processing data.
For example, marks such as 67, 88, 90 and 77 are considered data.For example, when these marks are related to a boy named Rohit, a student of class IX who has scored 67 in English, 88 in Maths, 90 in Physics and 77 in Chemistry then it becomes information.

Question 11

What is a network and why is it required?

Answer

A computer network is a group of computers and peripheral devices, connected through a data communication system to facilitate the sharing of hardware and software resources among different users working on different computers.

A computer network is required for the following reasons:

  1. A computer network enables the sharing of hardware and software resources.
  2. Data can be shared over a network by saving and storing it centrally reducing redundancy of the same data.
  3. It helps in saving of paper and time by reducing the need for generating multiple hard copies of the same document.
  4. It enables Internet sharing among the computers in the network thus, reducing internet usage cost.

Question 12

What is cloud computing? Explain different types of cloud services.

Answer

Cloud Computing refers to manipulating, configuring, and accessing the applications online. It offers online data storage, infrastructure, and applications.

The different types of cloud services are:

  1. Public cloud — A public cloud is provisioned for open use by the general public. It has no boundaries and the cloud infrastructure can be used by anyone, anywhere over the Internet.
  2. Private Cloud — A private cloud is owned and used by a single organization over a private network. It centralizes the resources of the organization so that they can be accessed easily by its various departments and offices at different locations.
  3. Hybrid Cloud — A hybrid cloud is a combination of both private and public cloud. This type of cloud offers benefits of multiple deployment models such as the controlled environment in private clouds and rapid elasticity of public clouds.
  4. Community Cloud — The community cloud is provisioned for use by a group of consumers from different organizations who share the same concerns. It may be owned, managed, and operated by one or more of the organizations in the community or a third party.

Question 13

Explain the various long distance communication mediums used in networking.

Answer

The various long distance communication mediums used in networking are:

  1. Coaxial Cables — A Coaxial cable consists of central copper wire surrounded by insulation and then a shield of braided wire.
    1. It is relatively inexpensive and can transmit data at higher rates.
    2. It also provides better immunity against electromagnetic disturbances.
    3. It is mainly used by the cable television industry to connect TVs to a cable TV service.
    4. The two main types of Coaxial cable are:
      1. Baseband Coaxial cable — It supports quick transmission of a single signal at a time. It is mainly used for LANs.
      2. Broadband Coaxial cable — It transmits multiple signals at the same time and is used for longer distances.
  2. Fibre optics — A Fibre optic cable consists of a central glass core containing a bundle of glass threads, surrounded by several layers of protective materials. The glass threads are capable of transmitting data converted into light signals at extremely high speed.
    1. A Fibre optic cable is highly resistant to signal interference and provides better data transmission by providing high bandwidth.
    2. It is fragile and the maintenance cost is high.
  3. Satellite — Satellites create a communication channel between a source transmitter and a receiver at different locations on the Earth. The ground station with the help of a dish antenna sends signal to the satellite, it amplifies the received signal and sends it back to the ground station for relay.
  4. Wimax — WiMax stands for Worldwide Interoperability for Microwave Access. It is a telecommunication protocol that provides fixed and mobile internet services.
    1. WiMax requires a tower called WiMax Base Station, that is connected to the Internet using a standard wired high-speed connection.
    2. The connectivity between the tower and the end user is provided through microwave link.
    3. WiMax technology provides high speed connection upto 75 Mbps over an area of 30 miles for fixed stations and 3-10 miles for mobile stations.
  5. Microwave — Microwave is a wireless communication technology that uses high frequency beams of radio waves to provide high speed signal transmission that can send and receive voice, video, and data information.
    1. The transmission is fast but is limited to line-of-sight transmission, in which signal travels in a straight line with no obstructions between microwave antennas.
    2. Microwave signals are used for both satellite and ground-based communications.
    3. Many TV and telephone communications in the world are transmitted over long distances using microwave signals.
    4. Microwave signals are widely used in radar technology.
  6. Radio wave — Radio waves is a wireless transmission medium that distributes radio signals through the air.
    1. Radio waves are widely used as signals on radio communication.
    2. A transmitter is used to send the broadcast signal and a receiver is needed to accept the signal.
    3. Radio waves have lower frequencies and longer wavelength.
    4. Radio waves can have a frequency range from 300 gigahertz (GHz) to as low as 30 hertz (Hz).

Question 14

What are the advantages and disadvantages of cloud computing?

Answer

The advantages of cloud computing are as follows:

  1. Cost saving — Cloud Computing can significantly lower the company’s IT expenses and requirements as it provides access to numerous storage facilities and applications.
  2. Reliability — It is much more reliable, when it comes to data management, backup, and recovery from failures.
  3. Unlimited Free Storage — Cloud provides unlimited free and secure storage space to store large amounts of information.
  4. Accessibility — Cloud allows easy access to cloud-based services and applications through Internet-enabled devices.

The disadvantages of cloud computing are as follows:

  1. Technical Issues — There are times when cloud system encounters serious technical problems, which may lead to the entire business processes being temporarily suspended.
  2. Security — Storing the company’s sensitive data and important files on third-party cloud providers, always opens up security risks.
  3. Vendor Lock-in — Switching from one cloud service to another may lead to portability and support issues.
  4. Limited Control — The consumer has very little control over the applications, data, and services of cloud.

CHAPTER-7: CYBER SAFETY

 

 

Multiple Choice Questions

 

Question 1

…………… is a social identity that a user establishes during online communities and websites.

  1. Internet identity
  2. Personal identity
  3. Login Information
  4. None of these

Answer

Internet identity

Reason — Internet identity is a social identity that a user establishes during online communities and websites.

Question 2

…………… is a technique used to fetch personal details of a user from his discarded documents.

  1. Dumpster Diving
  2. Shoulder surfing
  3. Identity Theft
  4. None of these

Answer

Dumpster Diving

Reason — Dumpster Diving is a technique used to fetch personal details of a user from his discarded documents.

Question 3

Name the tool which is used for tracking and reporting the traffic received on a particular website.

  1. Google Chrome
  2. Google Analytics
  3. Google Engine
  4. None of these

Answer

Google Analytics

Reason — Google Analytics is used for tracking and reporting the traffic received on a particular website.

Question 4

Which key combination launches the private mode in Firefox?

  1. Ctrl + Shift + P
  2. Ctrl + Shift + N
  3. Ctrl + Shift + F
  4. None of these

Answer

Ctrl + Shift + P

Reason — Ctrl + Shift + P key combination launches the private mode in Firefox.

Question 5

…………… is a technique used to gather web pages across the web and feed them into search engines for web indexing.

  1. Spidering
  2. Phishing
  3. Spoofing
  4. None of these

Answer

Spidering

Reason — Spidering is a technique used to gather web pages across the web and feed them into search engines for web indexing.

Question 6

…………… is a software which keeps a track of all your activities and sends your confidential information to hacker.

  1. Spyware
  2. Adware
  3. Virus
  4. None of these

Answer

Spyware

Reason — Spyware is a software which keeps a track of all your activities and sends your confidential information to hacker.

Question 7

…………… involves an attack coupled with a demand for money to stop further attacks.

  1. Cyber stalking
  2. Cyber extortion
  3. Cyber bullying
  4. None of these

Answer

Cyber extortion

Reason — Cyber extortion involves an attack coupled with a demand for money to stop further attacks.

Question 8

Which one of the following is not a password cracking technique?

  1. Dictionary Attack
  2. Spidering
  3. User Agent
  4. None of these

Answer

User Agent

Reason — User agent refers to the software program, such as our browser or a session initiating application. It is not a password cracking technique.

Question 9

In which year Cyber law was introduced?

  1. 2009
  2. 2001
  3. 2000
  4. None of these

Answer

2000

Reason — With the increase in number of crimes related to the Internet, urgent need was felt to introduce an act of law against such crimes. With this view in mind, the Indian Government introduced Information Technology Act 2000 on October 17, 2000.

Question 10

Mention the cyber crime in which the attacker harasses a victim by using the electronic communication.

  1. Cyber stalking
  2. Cyber espionage
  3. Cyber warfare
  4. None of these

Answer

Cyber stalking

Reason — Cyber stalking is a cyber crime in which the attacker harasses a victim by using the electronic communication.

Question 11

Which software is designed to capture keystrokes without being identified by the user or security program?

  1. Ransomware
  2. Backdoors
  3. Keyloggers
  4. None of these

Answer

Keyloggers

Reason — Keyloggers software is designed to capture keystrokes without being identified by the user or security program.

Question 12

Name the malware program that send unwanted advertisements to the user’s computer which may disrupt user’s working.

  1. Spyware
  2. Adware
  3. Worm
  4. None of these

Answer

Adware

Reason — Adware is a malware program that sends unwanted advertisements to the user’s computer which may disrupt user’s working.

Question 13

Which program can create multiple copies of itself and can consume large portion of system memory?

  1. Worm
  2. Trojan horse
  3. Rootkit
  4. None of these

Answer

Worm

Reason — Worm can create multiple copies of itself and can consume large portion of system memory.

Question 14

Which type of cookies, websites store to get details of a user’s search history and the web browsing history?

  1. First party cookie
  2. Third party cookie
  3. Session cookie
  4. None of these

Answer

Third party cookie

Reason — Third party cookies are stored by websites to get details of a user’s search history and the web browsing history.

Question 15

When we enter the password, which text box displays password strength?

  1. Strength text field
  2. Password text field
  3. User name text field
  4. None of these

Answer

Strength text field

Reason — When we enter the password, the Strength Text field box displays password strength.

Question 16

Which program sends message to the user system that the system is locked and the user will not be able to work on it until one pays a certain amount.

  1. Trojan horse
  2. Ransomware
  3. Keyloggers
  4. None of these

Answer

Ransomware

Reason — A Ransomware program sends message to the user system that the system is locked and the user will not be able to work on it until one pays a certain amount.

Question 17

Name the software that helps the other malware to enter in your system and harm it.

  1. Keyloggers
  2. Ransomware
  3. Backdoors
  4. None of these

Answer

Backdoors

Reason — Backdoors help the other malware to enter in our system and harm it.

Question 18

Which of the following are the types of malicious software?

  1. Anti-virus software
  2. Viruses, worms, trojans
  3. Word Processing packages
  4. None of these

Answer

Viruses, worms, trojans

Reason — Malware is a malicious program that enters into a computer and damages it without the user’s knowledge. These softwares include viruses, worms and trojans.

Question 19

Which one of the following is not the best practice to protect the confidential information?

  1. Use multifactor authentication
  2. Slowing down the network speed
  3. Use Firewall
  4. Engage in Safe web browsing

Answer

Slowing down the network speed

Reason — Slowing down the network speed is not the best practice to protect the confidential information.

Fill in the Blanks

Question 1

…………… is the process of stealing confidential, personal information, and financial information.

Answer

Cyber theft is the process of stealing confidential, personal information, and financial information.

Question 2

VPN stands for …………… .

Answer

VPN stands for Virtual Private Network.

Question 3

The two common cyber crimes are …………… and …………… .

Answer

The two common cyber crimes are Cyber stalking and Cyber bullying.

Question 4

…………… is temporary in nature.

Answer

Session cookie is temporary in nature.

Question 5

…………… are permanently stored on your system.

Answer

Super cookies are permanently stored on your system.

Question 6

To prevent tracking of browsing history, we can use ……………, …………… or …………… .

Answer

To prevent tracking of browsing history, we can use Proxy serverIncognito browsing or VPN.

Question 7

A …………… is a dedicated computer or a software system which acts as an intermediary between an end point device, such as a computer, and another server.

Answer

Proxy server is a dedicated computer or a software system which acts as an intermediary between an end point device, such as a computer, and another server.

Question 8

A VPN allows you to hide your true identity by …………… the data and web traffic.

Answer

A VPN allows you to hide your true identity by encrypting the data and web traffic.

Question 9

Turning your …………… settings to “off” can keep your family’s where-about more private.

Answer

Turning your GPS location settings to “off” can keep your family’s where-about more private.

Question 10

…………… and …………… can serve in cutting your data charges and are helpful in completing work efficiently.

Answer

Open Wi-Fi and Hotspot can serve in cutting your data charges and are helpful in completing work efficiently.

Question 11

A …………… is just like a key to your personal information.

Answer

password is just like a key to your personal information.

Question 12

A password should be minimum …………… characters long.

Answer

A password should be minimum eight characters long.

Question 13

The strength of a password is determined by length, complexity and …………… .

Answer

The strength of a password is determined by length, complexity and unpredictability.

Question 14

…………… is a technique similar to the Dictionary attack but with a little difference that it detects the password using algorithm.

Answer

Brute force attack is a technique similar to the Dictionary attack but with a little difference that it detects the password using algorithm.

Question 15

The term …………… describes a person actively involved in online communities or the Internet in general.

Answer

The term Netizen describes a person actively involved in online communities or the Internet in general.

Question 16

In Windows operating system, the …………… keeps track of a system’s hardware and software.

Answer

In Windows operating system, the registry keeps track of a system’s hardware and software.

Theory Questions

Question 1

How can you prevent the entry of virus into your system?

Answer

We can prevent the entry of virus into our system by following the given safety measures:

  1. Security Programs — The anti-virus should be regularly updated. It should also be programmed to regularly scan and quarantine the system.
  2. Secure Internet access — Be vigilant when accessing or uploading information on the Internet. Only secure sites should be used for financial transactions and no personal information should be shared.
  3. Regular security updates — Keep applications and operating system updated at all times. Special attention should be paid to security updates and security bulletins for each software or application being used.
  4. Avoid Spams — Mails from un-wanted and un-warranted sources should be deleted without reading or downloading. Any attachments in such mails should never be downloaded or installed onto the system.
  5. Scanning All Portable devices — Scan all portable storage devices before use as these are the most common sources of infection in computers.

Question 2

How are the first party cookies different from third party cookies?

Answer

First party cookies are generally used to store our login id, password, autofill information etc. for the frequently visited websites.

Third party cookies are the cookies that websites store to get details of our search history and web browsing history. These are most often used by advertising companies to track us across multiple websites that we visit.

Question 3

What do you mean by Cybercrime?

Answer

Cybercrime refers to any online illegal activity facilitated by the use of electronic communication devices like mobile phones, computers or through networks like the Internet. For example, cyberstalking, cyberbullying, cyberespionage, cyberwarfare, etc.

Question 4

What precautions should be taken to safeguard one’s online identity?

Answer

Some of the precautions that one should take to safeguard their online identity are:

  1. Exclude important personal information like phone number, address, school name, etc. from our social media profiles. Be selective in adding friends and hitting like button.
  2. Turning our GPS location settings to “off” from our phone’s privacy settings to keep our where­abouts more private.
  3. Watch out for ‘phishing’ e-mails. Never react to any messages with account data or passwords. Delete the email.
  4. Use strong passwords that are a combination of letters, numbers and special characters.
  5. Use Private browsing/Incognito Mode that helps us to prevent saving of our details as in the autofill feature, browsing history, data in cookies and location tracking.
  6. Add an extra layer of security by using multi-factor authentication for important online accounts like email, social media, bank accounts, etc.

Question 5

How does a proxy server work to protect your data?

Answer

A proxy server is a dedicated computer or a software system that runs on a computer and acts as an intermediary between an endpoint device, such as a computer and another server from which a user or client is requesting a service. So, the tracking website will get the information on the proxy server and we can still browse the site without disclosing our IP address or location.

Question 6

What do you mean by Cyber terrorism?

Answer

Cyber terrorism is the act of conducting terrorism through the use of computers and the internet in order to cause fear and panic. Cyber terrorism involves large scale disruption of computers, telecommunication networks, or information system so as to compel the government or its people to fulfill some social, religious, or political objectives. Attacks on military installations, power plants, air traffic control, banks, etc. are some examples of cyberterrorism.

Question 7

How firewall can safeguard your data on the network?

Answer

A firewall is a security system that regulates network traffic based on set rules, using hardware, software, or a combination. It safeguards our computer system and data from any unauthorized external source. It blocks all unauthorised users and doesn’t allow them to gain access to our data.

Question 8

What is Phishing?

Answer

Phishing is the act of illegally acquiring personal and sensitive information such as, online banking details, credit card details, and other login details, of an individual by sending malicious e-mails or by creating web pages that can collect this information as they appear to come from very famous organizations.

Question 9

How can you check that the website you are visiting is open in secure mode?

Answer

The URL of a secure website begins with “https” rather than “http”. Also, the Internet browsers display a padlock icon in address bar to indicate that the website is secure. These checks help ensure that the website is opened in secure mode.

Application Based Questions

Question 1

While working, Mrs Sharma’s system stopped functioning suddenly. After her system got repaired, she tried to log in to her e-mail account but could not do so. There was an error of incorrect user name or password.

a. What might be the reason for this?

b. How do you think her password might be altered, if at all?

c. What precautions she should have taken to protect her login details?

Answer

a. The reason might be that Mrs Sharma’s email account got hacked and the hacker changed her password locking her out of her email account.

b. Mrs. Sharma may have used the web browser’s auto-login feature, which saves her username and password for automatic website login. While her system was undergoing repairs, an unauthorized individual could have gained access and altered her password.

c. Mrs. Sharma should have taken the following precautions to protect her login details:

  1. She should have enabled multi-factor authentication for her email account adding an extra layer of security.
  2. She should avoid using the auto login and remember password functionality of the web browsers.

Question 2

Nimmi is planning to spend her vacations abroad and surfed the internet to get details about some of the places. Now she keeps getting e-mails from various unknown sources regarding travel, tourism, hotel booking, etc. What could have been the reason for this and how can she prevent it?

Answer

The reason Nimmi is receiving these emails is likely due to sharing of e-mail id. Nimmi must have shared her mail id with websites while surfing the internet to get details about various locations for vacation. She might have unknowingly subscribed for newsletters as well.

To prevent receiving such unsolicited emails, Nimmi can take the following steps:

  1. Unsubscribe — Check the emails she receives for an “unsubscribe” link.
  2. Be cautious while sharing her mail address — When filling out forms on websites, avoid providing personal information like mail id unless absolutely necessary.

Question 3

Aakriti copied a game from her friend’s system into her laptop. But after she executed this game, some of the data from her laptop was lost. What kind of malware do you think it is and what precautions should be taken to work with it?

Answer

The malware that infected Aakriti’s laptop is a Trojan Horse. At first glance, the Trojan Horse seems to be useful but once it is activated, it harms the system by deleting files or by modifying useful information.

Aakriti can take the following precautions to safeguard her system from malware:

  1. Scanning All Portable devices — All Portable devices should be scanned before use.
  2. Security Programs — Installing reliable anti-virus software and updating it regularly is essential.
  3. Regular security updates — Keep applications and operating system updated at all times.
  4. Backups — Taking backups regularly is a good practice. This not only protects us against data loss but also helps to restore the integrity of the data.

 

Long Answer Type Questions

 

Question 1

What do you mean by online identity? List some threats to your online identity.

Answer

Online identity is a social identity that an internet user establishes in online communities and websites.

Some threats to our online identity are as follows:

  1. Phishing — It is the illegal acquisition of personal and sensitive information (such as, online banking details, credit card details, and other login details) through deceptive emails or fake web pages that mimic well-known organizations.
  2. Dumpster Diving — It is a method cybercriminals use to obtain personal information from discarded documents like bills, credit cards, and passwords, which they can then exploit to steal the online identity of the targetted person.
  3. Shoulder Surfing — It is obtaining personal information, such as a PIN at an ATM machine, personal details while filling up a form, or the lock code of a smartphone through direct observation by looking over a person’s shoulder.
  4. Employment Scam — In this scam, job seekers are promised high-paying jobs in exchange for money and personal information, targeting them via email, leading to identity theft and financial losses.
  5. Pretexting — It is the practice of obtaining a person’s personal information using a fake name or fake company and then selling that information to people who use it to steal that person’s online identity.

Question 2

How can you safeguard your confidential information from getting hacked?

Answer

We can use the following measures to safeguard our confidential information from getting hacked:

  1. Build strong passwords — It is important to create strong passwords for all our online accounts. A strong password should contain both uppercase and lowercase characters, as well as digits and punctuation. It should be atleast eight characters long.
  2. Use multifactor authentication — Multifactor authentication is one of the simplest and the most effective ways to secure data, which adds an extra layer of protection.
  3. Be suspicious of unsolicited e-mail — Be aware of nuisance ads and unsolicited e-mails from unknown sources. Try not to open any attachments that are along with such messages and do not reply to such messages.
  4. Be Aware of Online Posting — One should never post any personal details or one’s location online. Keep the mobile tracking or location tracking feature off, if possible.
  5. Protect our mobile devices — Updating the mobile software on a regular basis will mitigate the risk of a cyber­ criminal exploiting a hole in mobile system.
  6. Engage in safe web browsing — Do not open any link from unknown sources or any pop up that appears. Both could be spyware used to plant tracking cookies on our machine, which can steal our information, direct us to bogus phishing sites, and pound us with pop-ups.
  7. Use safe sites to surf the internet — Always use the sites that start with https:\\. The letter ‘s’ specifies that it is a safe site to be browsed.
  8. Use firewall — A firewall should be implemented to safeguard our computer system and data from any unauthorized external source.
  9. Avoid using computers in public — Avoid using public computers to access private data like e-mails or sharing the private information like credit/debit card details.

Question 3

What is the relevance of private browsing? Explain with the help of an example.

Answer

Private browsing is a means by which we can safeguard our identity and browsing details when online. By enabling incognito browsing mode in our web browsers, we can prevent:

  1. Saving of our details as in the autofill feature
  2. Accidental saving of username and passwords
  3. Saving of browsing history when accessing the web from a public domain
  4. Saving of data in cookies
  5. Location tracking

For example, when we search for flights tickets or hotel rooms online, tracking cookies are generated through which websites remember our travel plans. If we don’t do the booking in that browsing session, it can lead to higher prices when we return. In incognito mode, prices typically stay the same because the site can’t track our previous visits.

Question 4

Mention any two ways by which websites can track you.

Answer

Two ways by which websites can track us are as follows:

  1. IP Address — Data transfer on a network happens through unique numerical addresses called IP addresses, similar to home or office addresses. When we visit a website, our device shares its IP address, allowing the website to roughly estimate our geographical location.
  2. Cookies — Cookies are small data files, which are sent by the website we visit and are generated by our browser. These are then stored on our device. Cookies are used to track our record of visit to a particular website/webpage. There are three types of Cookies —
    1. First Party Cookies — These kinds of cookies are generally used to store login id, password, autofill information etc. for the frequently visited websites.
    2. Third Party Cookies — These are the cookies that websites store to get details of one’s search history and web browsing history. These are most often used by advertising companies to track users across multiple websites that they visit.
    3. Session Cookies — These are temporary cookies that are deleted after we close our browser.

Question 5

Explain the term malware and its types. What precautions should be taken to prevent the entry of malware?

Answer

Malware is a malicious program that enters into a computer and damages it without the user’s knowledge. It not only interrupts the normal working of a computer, but also steals important information of a user.

The different types of malware are:

  1. Adware — Adware are programs that send unwanted advertisements to the user’s computer. These advertisements generally appear in the form of pop ups, which can disrupt user’s working.
  2. Spyware — Spyware is malicious software that can collect various types of personal information, such as tracking the internet surfing habits and visiting web pages by the user or changing the configuration of our system.
  3. Virus — A virus is a contagious program or code that attacks the user’s system and causes damage to data and files on a system.
  4. Worm — A worm is a program which can create multiple copies of itself and can consume large portion of system memory.
  5. Trojan Horse — Trojan Horse is a program that at first glance seems to be useful but once it is activated, it harms the system by deleting files or by modifying useful information.
  6. Denial-of-service attack — It is a harmful program meant to slow down a system. It can block a computer network and makes the software inaccessible to the user.
  7. Rootkit — A malware designed to remotely control our system without being noticed. Once installed it will remotely access and modify sensitive system information without being tracked by any security program.
  8. Backdoors — This software helps the other malware to enter our system and harm it.
  9. Keyloggers — These are software designed to capture keystrokes without being identified by the user or security program.
  10. Ransomware — It sends messages on a user’s system that the system is locked and the user will not be able to work on it until one pays a certain amount.

Some precautions that should be taken to prevent the entry of malware are:

  1. Security Programs — Reliable and updated anti-virus program should be installed on the computer. It should also be programmed to regularly scan and quarantine the system.
  2. Secure Internet access — Only secure sites should be used for financial transactions avoiding sharing of personal information. Installation and download from unauthorised sources should be avoided.
  3. Regular security updates — Always update your applications and OS and pay special attention to security patches and bulletins for each software.
  4. Avoid Spams — Delete and avoid opening emails from unwanted or suspicious sources. Never download or open any attachments from such emails.
  5. Scanning All Portable devices — All Portable devices should be scanned before use.
  6. Backups — Regular backups are essential for data protection and integrity restoration.
  7. Disable cookies, if possible — Cookies should be disabled on the browser to ensure safety of personal information.

Question 6

Explain any four types of Cybercrimes.

Answer

Four types of Cyber crimes are:

  1. Cyber stalking — It is a crime in which the attacker harasses a victim by using electronic communication, such as e-mail, instant messaging, or messages posted to a website or a discussion group for reason of anger, revenge, or control. A stalker may be an online stranger or a person whom the target knows.
  2. Cyber bullying — It is an act of harming or harassing using information technology in a deliberate manner. This includes insulting remarks and threatening messages sent by e-mail, spreading rumours about the person either by e-mails or social networking sites, posting embarrassing photos and videos to hurt the person, derogatory remarks against gender, race, religion, or nationality.
  3. Cyber espionage — It is the practice of using information technology to obtain secret information without permission from its owners or holders. Cyber espionage is most often used to gain strategic, economic, political, or military advantage, and is conducted using cracking techniques and malware.
  4. Cyber Extortion — It is a crime that involves an attack coupled with a demand for money to stop further attacks. Cyber Extortion may involve a DoS (Denial of Service) attack or installation of Ransomware to access and block the system resources of the victim.

Question 7

What is confidentiality of information? Mention any three practices to protect your confidential information.

Answer

Confidentiality of information means that only authorized users can access the personal and sensitive information of any person like their bank details, credit card numbers, aadhaar number, etc.

Three practices to protect our confidential information are as follows:

  1. All our online accounts should be protected with strong passwords.
  2. An extra layer of protection should be added to our online accounts through multi-factor authentication.
  3. A firewall should be implemented to safeguard our computer system and data from any unauthorized external source.

Question 8

Write a note on User Agent.

Answer

User agent refers to the software program such as our browser or a session initiating application. When we initiate a web session, these applications pass our information such as application type, operating system used, software source, version, etc. This information can be tracked and stored by web servers to determine the user’s web activities and behaviour.

Question 9

Write down the steps to protect your password from being hacked.

Answer

We should follow the following steps to protect our password from being hacked:

  1. Make sure that the password is minimum eight characters long.
  2. Use a combination of upper and lower-case letters. Include at least one numeric character and one special character.
  3. Never use personal information like your name, birthday, driving license number or passport number.
  4. Never store the password on computer or mobile phone.
  5. When we are signing in to our account, deselect the auto selected option, “keep me signed in” or “remember me”.
  6. Clear browsing history or cache after online banking and shopping, so that no one can access it.
  7. Always ensure that the site is genuine and secured before providing one’s credentials.
  8. Avoid using passwords like words spelt backwards, misspelt words, abbreviations, and single dictionary words that are easy to figure out.
  9. Do not repeat numbers and letters. Do not include simple sequences or letters that appear in a row on the keyboard, instead use complex sequence.
  10. Always create a unique password for each account. Avoid using the same password for multiple sites to prevent data loss.
  11. The answers we provide for the security questions, should be as strong as our passwords.
  12. Pay attention to the browser’s security signals. If there is anything suspicious, we should refrain from using that resource.

Question 10

Write down the ways to report a cyber-crime.

Answer

In case of any cyber crime, the matter should immediately be reported to either parents or school authorities.

  1. Parents can visit a nearby police station and can lodge a complaint.
  2. The Information Technology Act has global jurisdiction. It means that we can lodge a complaint against the crime from any state or city.
  3. To know more about cyber law or to register a complaint, we can visit the following link: http://www.cybercrimehelpline.com/.

 

CHAPTER-8: MICROSOFT WORD 2010 – I

 

Multiple Choice Questions

 

Question 1

MS Word is a popular …………… program.

  1. Database
  2. Calculation
  3. Presentation
  4. Word Processing

Answer

Word Processing

Reason — MS Word is a popular Word Processing program.

Question 2

The Word application opens a new document with the temporary name …………… .

  1. Document
  2. Book
  3. Document1
  4. Book 1

Answer

Document1

Reason — The Word application opens a new document with the temporary name Document1.

Question 3

Which key combination is used to display and minimize the Ribbon?

  1. Ctrl + F
  2. Ctrl + F1
  3. Ctrl + F2
  4. Ctrl + F3

Answer

Ctrl + F1

Reason — Ctrl + F1 is the shortcut key combination to display and minimize the Ribbon.

Question 4

The larger window of MS Word program is …………… window.

  1. Application
  2. Document
  3. Program
  4. None of these

Answer

Application

Reason — The larger window of MS Word program is Application window.

Question 5

Ribbon is divided into …………… sections.

  1. One
  2. Two
  3. Three
  4. Four

Answer

Three

Reason — Ribbon is divided into three sections.

Question 6

Status bar is located at the …………… of the Document window.

  1. Top
  2. Centre
  3. Left
  4. Bottom

Answer

Bottom

Reason — Status bar is located at the bottom of the Document window.

Question 7

…………… is a temporary storage location.

  1. Clipboard
  2. Rulers
  3. Ribbon
  4. Tabs

Answer

Clipboard

Reason — Clipboard is a temporary storage location.

Question 8

The Exit option is present in the …………… menu.

  1. Tab
  2. Ribbon
  3. File tab
  4. None of these

Answer

File tab

Reason — The Exit option is present in the File tab menu.

Question 9

By default, …………… buttons are present on the Quick Access Toolbar.

  1. Three
  2. Six
  3. Seven
  4. Ten

Answer

Three

Reason — By default, three buttons are present on the Quick Access Toolbar.

Question 10

…………… is an expanded toolbar across the top of the page.

  1. Ribbon
  2. Title Bar
  3. Status bar
  4. Quick Access Toolbar

Answer

Ribbon

Reason — Ribbon is an expanded toolbar across the top of the page.

Question 11

The Vertical Ruler bar formats the …………… alignment of text.

  1. Top
  2. Right
  3. Vertical
  4. Horizontal

Answer

Vertical

Reason — The Vertical Ruler bar formats the Vertical alignment of text.

Question 12

There are …………… layout buttons on the right end of the Status bar.

  1. Three
  2. Four
  3. Five
  4. Six

Answer

Five

Reason — There are five layout buttons on the right end of the Status bar.

Question 13

Which tab menu contains the New option?

  1. Home tab
  2. File tab
  3. Ribbon
  4. None of these

Answer

File tab

Reason — File tab menu contains the New option.

Question 14

Where do you type the text in the Document window?

  1. Status Bar
  2. Ribbon
  3. Work Area
  4. Title Bar

Answer

Work Area

Reason — We type the text in the Work Area of the Document window.

Question 15

Name the feature that automatically shifts the text to the next line if it does not fit in the current line.

  1. Enter
  2. Word Wrap
  3. Word Fit
  4. Word Shift

Answer

Word Wrap

Reason — Word Wrap feature automatically shifts the text to the next line if it does not fit in the current line.

Question 16

On which tab do you find the Show/Hide button?

  1. View
  2. Insert
  3. Home
  4. Mailings

Answer

Home

Reason — The Show/Hide button is present on the Home tab.

Question 17

Which option closes the document without saving any modifications since the last save operation?

  1. Save
  2. Don’t Save
  3. Cancel
  4. All of these

Answer

Don’t Save

Reason — Don’t Save option closes the document without saving any modifications since the last save operation.

Question 18

Which option from the File tab menu is used to close the Word application?

  1. Exit
  2. Close
  3. Word Options
  4. None of these

Answer

Exit

Reason — The Exit option from the File tab menu is used to close the Word application.

Question 19

What is the file extension of Word document?

  1. .docw
  2. .docx
  3. .dow
  4. .docu

Answer

.docx

Reason — The file extension of Word document is .docx.

Question 20

Which bars help to navigate through different portions of a document?

  1. Scroll Bars
  2. Status Bar
  3. Title Bar
  4. Ruler Bars

Answer

Scroll Bars

Reason — Scroll Bars help to navigate through different portions of a document.

Give one word answer

Question 1

Is Word processor an Application Software or System Software?

Answer

Application Software

Question 2

To which Application Software does the Word belong?

Answer

Microsoft Office

Question 3

Name the tab which helps to beautify text in Microsoft Word 2010.

Answer

Home tab

Question 4

Which feature allows a Word processor to send a similar piece of text to multiple users?

Answer

Mail Merge

Question 5

Which section of Microsoft Word window displays the name of the document?

Answer

Title bar

Question 6

Name the feature that provides a brief description of the function of a particular icon or command when you place the cursor on that item.

Answer

Extended Tips

Question 7

Name the bar which contains the View buttons and Zoom slide bar.

Answer

Status bar

Question 8

Which key combination is used to copy the text?

Answer

Ctrl + C

Question 9

Which component of Microsoft Office 2010 contains the menu which is quite similar to the Office Button menu of the Word 2007 versions?

Answer

File tab

Question 10

What is the small blinking vertical line called that you notice on the screen?

Answer

Cursor

Question 11

Which key combination is used to close the Word document?

Answer

Ctrl + W

Question 12

Which button of Zoom slider is used for zooming out?

Answer

Minus

Theory Questions

Question 1

Explain the term Word Processor. Write any five important features of Word processor.

Answer

A Word processor is an application software capable of creating, editing, saving, and printing documents. Unlike a text editor, we can make changes, beautify the text, and also save the document for future use.

Five important features of Word processor are as follows:

  1. Ease And Speed — A word processor provides an easier and faster method to type the text.
  2. Formatting Features — It provides various formatting features, such as Boldface, Italics, Underlining, Font Name, Font Color, WordArt, etc.
  3. Storage Features — It stores all our documents for future use, which can be retrieved whenever we want.
  4. Graphics Features — We can add pictures, drawings, and charts, etc., to our documents. This enhances the overall presentation of a document.
  5. Editing Features — In a word processor, we can edit text by copying, moving, deleting, or inserting sentences, paragraphs, and words. We can also add page numbers, headers, footers, and tables in the document.

Question 2

What are the different components of a Word window?

Answer

The different components of a Word window are as follows:

  1. File tab — On clicking the File tab, we can create a new file, open an existing file, save a file, print a file, and perform many other tasks.
  2. Quick Access Toolbar — The Quick Access Toolbar is located at the upper left corner next to the Word icon. It provides an easy access to the frequently used command buttons. By default, three buttons are present on it which are: Save, Undo, and Redo.
  3. Title bar — Title bar is located at the top of the Word window. It displays the current document and the name of the application in the centre.
  4. Ribbon — Word has a Ribbon which contains eight tabs — File, Home, Insert, Page Layout, References, Mailing, Review, and View. These tabs have individual groups, and the groups have different icons, which in turn represent different commands.
  5. MS Word Tab Groups — The Tab groups are as follows:
    1. Home: Editing, Styles, Paragraph, Font, Clipboard.
    2. Insert: Illustrations, Tables, Pages, Links,Text, Header & Footer, Symbols, Flash.
    3. Page Layout: Page Background, Paragraph, Page Setup, Themes, Arrange.
    4. References: Table of Contents, Footnotes, Citations & Bibliography, Captions, Index, Table of Authorities.
    5. Mailings: Create, Start Mail Merge, Write and Insert Fields, Preview Results, Finish.
    6. Review: Proofing, Language, Comments, Tracking, Changes, Compare, Protect.
    7. View: Document Views, Show, Zoom, Window, Macros.
  6. Groups in Home tab — Home tab has the following groups — Clipboard, Font, Paragraph, Styles, Editing
  7. Work Area — This is the blank area in the document window where we can type, edit, and format the text.
  8. Ruler bars — These bars are present on top and left side of the document. The Vertical Ruler bar formats the vertical alignment of the text. Using the Horizontal Ruler bar, we can modify the indents, margins, tab stops, and page measurement.
  9. Scroll bars — The scroll bars help in navigating through different portions of a document.
  10. Status bar — It is located at the bottom of the Document window. It shows the document’s status, and the Proofing error icon indicates errors when clicked. The View buttons and Zoom Slide bar are on the right side.
  11. Zoom Slider — It lets us zoom in or zoom out our document by moving the slider to the percentage zoom setting.

Question 3

Compare the application of Enter key with the Word Wrap feature.

Answer

Word Wrap feature automatically fits the typed text within the specified left and right margins. There is no need to press Enter key after finishing a line. It is an automatic feature of Word.

In Word, the Enter key is used only in the following cases:

  1. To place text in a new line.
  2. To mark the end of a paragraph.
  3. To leave a blank line in between two paragraphs.

Question 4

Explain the Application and Document windows of the Microsoft Word.

Answer

The open application of MS Word displays two windows on the screen. The larger window is called the Application window and the smaller window which is inside the Application window is called the Document window. The Application window helps the user to communicate with the MS Word program. The Document window is used for typing, editing, and formatting the text.

Question 5

What are Formatting marks? Why are they used?

Answer

Word offers the feature of displaying some special characters, called the Formatting marks, in the text document when certain keys are pressed. Some formatting marks are as follows:

  1. Space mark (.) — Dots(.) show how many times the Spacebar key has been used between each word.
  2. Paragraph mark (¶) — This character represents the position where we have used the Enter key.
  3. Line Break (↵) — This character represents the position where we have used Shift+Enter key combination to mark the end of a line
  4. Tab Mark (→) — This character represents the position where we have pressed the Tab key to mark the Tab stops.

Formatting marks are often useful to see when we are working with heavily formatted documents and need to keep track of our tabs, spaces, blank lines and so on.

Question 6

What do you understand by the term Editing in Microsoft Word?

Answer

Editing text means making corrections to it, and manipulating text in a manner that would lead to the desired end result. This process may include inserting, deleting, copying, moving, finding, and replacing a particular text in a document.

Question 7

Explain the steps to save a document and protect it using a password.

Answer

To save a document and protect it using a password, we follow the steps given below:

Step 1 — Click on the File tab and select the Save As option from the drop-down menu.

Step 2 — The Save As dialog box appears.

Step 3 — Click on the drop-down arrow of the Tools tab and select General Options.

Step 4 — The General Options dialog box will appear with two fields. They are: ‘Password to open’ and ‘Password to modify’.

Step 5 — Type the desired password in the Password to open field. Click on OK.

Step 6 — The Confirm Password dialog box appears. Re-enter the password in order to confirm the password. Then click on OK.

Step 7 — If the password matches, the document is saved with a password protection. If the password does not match, we receive the prompt message to enter the password again.

Question 8

Whenever you try to close a document without saving it, Word displays an Alert message box with 3 different options. Name these options and write down their respective functions.

Answer

Whenever we try to close a document without saving it, Word displays an Alert message box with the following three options:

  1. Save — The document is saved and then closed.
  2. Don’t Save — The document is closed and all the modifications since the last save are lost.
  3. Cancel — Nothing happens and we return to the document.

Question 9

How can you move the text from one location to another using the Shortcut key combination?

Answer

We follow the steps given below to move the text from one location to another using the Shortcut key combination:

Step 1 — Select the desired text.

Step 2 — Press the Ctrl + X (Cut) key combination.

Step 3 — Now bring the pointer to the desired/new location and press the Ctrl + V (Paste) key combination.

The selected text will be pasted at the new location.

Question 10

What are the different ways to delete any text in the document?

Answer

There are two ways to delete any text in the document. They are as follows:

  1. Select the text and press the Delete (Del) key.
  2. Select the text and press the Backspace key.

Question 11

Explain the View buttons located on the Status bar.

Answer

The different View buttons located on the Status bar are as follows:

  1. Print layout — It is selected by default. This view shows the document as it will appear when it is printed.
  2. Full Screen Reading — It shows the complete page on the screen and also displays the multiple pages. This view has several buttons at the top of the page, such as Save, Print Preview and Print, Tools, Mini Translator, Text Highlight Color, and Insert comment. At the centre of the bar, it displays the page number and total number of pages, and at the right end of the bar, View Options menu and Close button are displayed.
  3. Web Layout — This view enables us to see our document as it would appear in a browser, such as Internet Explorer.
  4. Outline — It displays our document in an Outline View. We can move the text up and down, expand and collapse the levels, or change the heading levels.
  5. Draft — It displays a document as a continuous text scroll where page breaks are denoted by dashed lines. This view is helpful if we are using an older or slower computer that cannot display the Print Layout view. Various elements, like headers/footers, backgrounds, pictures, etc., are not displayed in this view.

 

 

Application based Questions

Question 1

The teacher has asked Ramya to create and save a new document in Microsoft Word using the Shortcut key combination. Help her in finishing this task.

Answer

Ramya can create a new document in MS Word by pressing the Ctrl + N key combination.

She can save a new document by pressing the Ctrl + S key combination.

Question 2

Subodh has been punished by his class teacher. She has asked him to write “I will be a disciplined boy” 100 times in his Sports period and submit its hard copy, but he wants to play. Suggest him a shortcut method, so that he could finish his assignment quickly and play as well.

Answer

Subodh can use copy and paste feature to write the given text a hundred times quickly. He can follow the given steps:

Step 1 — Open MS Word and press Ctrl + N key combination to open a new document.

Step 2 — Type “I will be a disciplined boy” on the document.

Step 3 — Hold down Ctrl key and click anywhere on the sentence to select it.

Step 4 — Press Ctrl + C key combination to copy the sentence.

Step 5 — Place the cursor on a new location and press Ctrl + V key combination to paste the sentence. Repeat Step 5 till the sentence is pasted 100 times.

Step 6 — Press Ctrl + P key combination to open Print dialog box.

Step 7 — Select Page layout and Printer and click on Print button.

The document will be printed.

Question 3

Namrata was shown the following window. She could not understand the meaning of some symbols which are shown in this document. Identify and explain these symbols to her.

Namrata was shown the following window. She could not understand the meaning of some symbols which are shown in this document. Identify and explain these symbols to her. Computer Applications Code 165 Kips Cyber Beans Solutions Class 9 CBSE.

Answer

Word offers the feature of displaying some special characters, called the Formatting marks, in the text document when certain keys are pressed. The symbols like ‘¶’ and ‘.’ are known as Formatting marks.

‘¶’ is a paragraph mark. This character represents the position where we have used the Enter key.

‘.’ is a Space mark. It shows how many times the Space bar key has been used between each word.

Question 4

Anamika has written an essay in Microsoft Word that has a lot of extra words. Her teacher has asked her to remove all the extra words. The keyboard and mouse of her computer do not have the following components in working order:

  1. Delete key
  2. Alphabetic key X
  3. Right mouse button

Which alternate method should she adopt to erase the extra words?

Answer

Anamika can select the extra words using a mouse or keyboard and press the Backspace key to delete them from her document.

 

CHAPTER – 9: MICROSOFT WORD 2010 – II

 
 

Multiple Choice Questions

 

Question 1

The general arrangement and appearance of text in a document is known as …………… .

  1. Editing
  2. Formatting
  3. Appearing
  4. Mailing

Answer

Formatting

Reason — The general arrangement and appearance of text in a document is known as formatting.

Question 2

How many types of text formatting do we have in Microsoft Word?

  1. One
  2. Two
  3. Three
  4. Four

Answer

Three

Reason — There are three types of text formatting in Microsoft Word —

  1. Character Formatting
  2. Paragraph Formatting
  3. Page Formatting

Question 3

What does this Align Text Rightbutton signify?

  1. Align Text Left
  2. Align Center
  3. Justify
  4. Align Text Right

Answer

Align Text Right

Reason — This button signifies Align Text Right function.

Question 4

What does this Justify Iconbutton signify?

  1. Align Text Left
  2. Align Center
  3. Justify
  4. Align Text Right

Answer

Justify

Reason — This button signifies Justify function.

Question 5

What does this Decrease Indentbutton signify?

  1. Decrease Indent
  2. Increase Indent
  3. Justify Indent
  4. None of these

Answer

Decrease Indent

Reason — This button signifies Decrease Indent function.

Question 6

Which type of formatting focuses on the appearance of individual character?

  1. Page
  2. Character
  3. Paragraph
  4. All of these

Answer

Character

Reason — Character formatting focuses on the appearance of individual character. From font sizes to font styles, text positioning to text attributes; the Character Formatting includes all attributes that can be used to define the arrangement of a character.

Question 7

Under which tab do we have the Font group?

  1. Home
  2. Insert
  3. View
  4. Mailings

Answer

Home

Reason — Font group is displayed under Home tab.

Question 8

You can change the color of the text by using the …………… option.

  1. Font
  2. Font Effects
  3. Font Color
  4. Position

Answer

Font Color

Reason — We can change the color of the text by using the Font Color option.

Question 9

Which tab contains the Change Case option?

  1. View
  2. Insert
  3. Home
  4. Mailings

Answer

Home

Reason — Home tab contains the Change Case option.

Question 10

Which option in Microsoft Word places the selected text below the baseline?

  1. Superscript
  2. Subscript
  3. Script
  4. Downscript

Answer

Subscript

Reason — Subscript option in Microsoft Word places the selected text below the baseline.

Question 11

Which of the following option indents all lines other than the first line?

  1. Bar Tab
  2. Left Tab
  3. Hanging Indent
  4. None of these

Answer

Hanging Indent

Reason — Hanging Indent option indents all lines other than the first line.

Question 12

What do you call the distance between the written text and the edge of a paper?

  1. Margin
  2. Ruler Line
  3. Alignment
  4. Indent Stop

Answer

Margin

Reason — The distance between the written text and the edge of the paper is called margin.

 

State True or False

Question 1

There are four categories of Text alignment.

Answer

False

Reason — There are two categories of Text alignment —

  1. Horizontal Text Alignment
  2. Vertical Text Alignment

Question 2

The distance from the written text to the edge of the paper is called Margin.

Answer

True

Reason — The distance between the written text and the edge of the paper is called margin.

Question 3

Superscript and Subscript are different forms of Text margins.

Answer

False

Reason — Superscript and Subscript are different forms of Font effects.

Question 4

The default alignment of text in a document is Justified.

Answer

False

Reason — The default alignment of text in a document is Align Text Left.

Question 5

The Tab Selector is present above the Vertical ruler on the left.

Answer

True

Reason — The Tab Selector is present above the Vertical ruler on the left.

Question 6

The shortcut to open the Font dialog box is Ctrl + D.

Answer

True

Reason — The shortcut to open the Font dialog box is Ctrl + D.

Question 7

The Drop cap option is available in the Text group on the Insert tab.

Answer

True

Reason — The Drop cap option is available in the Text group on the Insert tab.

Question 8

The vertical distance between successive lines of text is called Paragraph Spacing.

Answer

False

Reason — The vertical distance between successive lines of text is called Line Spacing.

Question 9

The Page tab is used to edit the page settings.

Answer

True

Reason — The Page tab is used to edit the page settings.

Question 10

You can change the margins of a page by using the Ruler bars.

Answer

True

Reason — You can change the margins of a page by using the Ruler bars.

 

 

Theory Questions

Question 1

Define Margins. Explain the different types of margins along with the method used to set them in Microsoft Word.

Answer

The distance between the written text and the edge of the paper is called margin.

There are four types of margins present in Microsoft Word —

  1. Top Margin — It is the distance between the text and the top edge of the page.
  2. Bottom Margin — It is the distance between the text and the bottom edge of the page.
  3. Left Margin — It is the distance between the text and the left edge of the page.
  4. Right Margin — It is the distance between the text and the right edge of the page.

We can set margins in two ways:

  1. Using the Ruler Bars — To set the left margin, we follow the given steps:
    Step 1 — Place the pointer on the indent markers present on the left Horizontal ruler bar.
    Step 2 — The pointer changes into double-headed arrow.
    Step 3 — Now drag the mouse pointer to the right to increase and to the left to decrease the margin.
    Step 4 — After setting the margin, release the mouse button and observe the changes in the left margin setting on the page.
    Step 5 — Similarly, we can change the right margin as well as top and bottom margins.

  2. Using the Page Setup dialog box —
    Step 1 — Select the Page Layout tab.
    Step 2 — Click the Margins button in the Page Setup group. A drop-down list of options appears. The ‘Normal’ option is selected by default.
    Step 3 — Select the desired predefined margin from the drop-down list.
    Step 4 — We can also select the Custom Margins option from the drop-down list to specify our own margin settings. The Page Setup dialog box will appear.
    Step 5 — On the Margins tab, click the increment or decrement buttons next to the Top, Bottom, Left, and Right fields to increase or decrease the margin settings respectively.
    Step 6 — In ‘Apply to’ box, choose any option and click on OK.

Question 2

What do you understand by text alignment? How many ways are there to align the text?

Answer

Text alignment refers to the positioning of text between the margins of a page. There are two categories of text alignment :

  1. Horizontal Text Alignment — Aligning the text with respect to left and right margins is called Horizontal text alignment. There are four types of horizontal text alignments —

    1. Align Text Left — This is the default alignment of text in a document. The text is aligned along the left margin while leaving a little space towards the right margin.
    2. Align Text Right — The text is aligned along the right margin while leaving a little space towards the left margin. This alignment is mostly used to put dates on letterheads.
    3. Center — The text is aligned centrally between the left and the right margin. It is mostly used for titles.
    4. Justify — The text is aligned evenly between the left and the right margin.
  2. Vertical Text Alignment — It aligns the text with respect to the top and bottom margins of a page.

Question 3

What are Header and Footer? How will you insert them in a document?

Answer

Header and Footer are those little identifiers that run across the top and bottom of the document, respectively. They include information like page numbers, date, title of a book/chapters, author’s name and slide show theme, etc.

To insert header and footer in our document, we follow the given steps:

Step 1 — The Header and Footer buttons are found in the Header & Footer group on the Insert tab. Click on the Header button.

Step 2 — Select the Edit Header option from the drop-down menu. An additional tab with the name Design appears on the Ribbon.

Step 3 — On top of the page, we find the Header box, which is separated from the rest of the page with a dotted line.

Step 4 — Click in the Header box then type the text one wants on the left side.

Step 5 — Press the Tab key twice. The insertion point will jump to the right side. Click on Date & Time button in the Insert group on the Design tab.

Step 6 — Choose the suitable date and time format in the Date and Time dialog box and click on OK. The date/time now appears in the document accordingly.

Step 7 — Click the Footer button on the Insert tab and select the Edit Footer option. The Footer box will appear at the bottom of the page. We will observe that the insertion point appears on the left side of the Footer box.

Step 8 — Press the Tab key once, the insertion point will jump to the center of the page.

Step 9 — Click the Page Number button in the Header & Footer group on the Design tab and choose the Bottom of Page option from the drop-down list.

Step 10 — We can also select the Format Page Numbers option from the drop-down list. Select the required format from the Page Number Format dialog box. Click on OK.

Step 11 — Click on the Close Header and Footer button on the Design tab to close the Header & Footer tools.

The Header and Footer will be inserted in the document.

Question 4

Define Indentation. How will you set-up Left and Right Indent in a paragraph?

Answer

The distance between the text boundaries and the page margins is called Indent. The process of setting indents is known as Indentation.

We can follow the given steps to set-up Left and Right Indent in a paragraph —

Step 1 — Click on the Page Layout tab.

Step 2 — Select the text that we would like to indent.

Step 3 — In the Paragraph group, define the Left and Right Indents in their respective text boxes.

Question 5

How can we use Horizontal Ruler bar to change the indents of a document?

Answer

Indent Markers are present on the Horizontal ruler. We can use Horizontal Ruler bar to change the indents of a document by following the given steps :

Step 1 — Place the insertion point anywhere in the paragraph.

Step 2 — Adjust the first line indent by dragging the First Line Indent marker on the ruler.

Step 3 — To adjust the hanging indent, drag the Hanging Indent marker.

Step 4 — To move both markers at the same time, drag the Left Indent. This will indent all lines in the paragraph.

Question 6

Which option is used to increase the spacing between two selected words?

Answer

Font size option can be used to increase the spacing between two selected words. It can be achieved by following the below steps:

Step 1 — Select the space character between the two words.

Step 2 — Increase the font size of just the space character setting it to some value higher than the font size of the two words.

Step 2 — Observe the increased spacing between the two selected words.

Question 7

How to insert page number on every page of a document?

Answer

We can insert page number on every page of a document by using Footer feature of MS Word. There are two ways to add page numbers to a document:

  1. Click the Page Number button in the Header & Footer group on the Design tab and choose the Bottom of Page option from the drop-down list.
  2. Select the Format Page Numbers option from the drop-down list. Select the required format from the Page Number Format dialog box. Click on OK.

Question 8

What is Tab Selector? Explain all the options available in it.

Answer

The Tab Selector is present above the vertical ruler on the left. It is used to define tab text position on the ruler bar that are used to indent a paragraph or a line.

The tab options are as follows:

  1. First Line Indent — It inserts the indent marker in the ruler and indents the first line of the text in a paragraph away from the left margin.
  2. Hanging Indent — It inserts the hanging indent marker and indents all lines other than the first line.
  3. Left Tab — It moves text to the right as we type.
  4. Center Tab — It centers text according to the tab.
  5. Right Tab — It moves text to the left as we type.
  6. Decimal Tab — It vertically aligns the decimal numbers using the decimal point.
  7. Bar Tab — It draws a vertical dotted line on the document.

Application Based Questions

Question 1

Mrs. Vibha, computer teacher, has asked Akhil to change the alignment of a paragraph without using the Paragraph dialog box. How will he complete his assignment?

Answer

Akhil can use the alignment buttons present in the Paragraph group on the Home tab. He can select the paragraph and click on the desired alignment button.

Question 2

Sanjiv has written a three pages essay on “Army”. The teacher wants the Page number, Author’s name and Date on every page. What approach will he follow?

Answer

Sanjiv can insert header and footer in his document by using the Header and Footer buttons, found in the Header & Footer group on the Insert tab.

He can follow the given steps:

Step 1 — Click on the Header button in the Header & Footer group on the Insert tab.

Step 2 — Select the Edit Header option from the drop-down menu. An additional tab with the name Design appears on the Ribbon.

Step 3 — On top of the page, we find the Header box, which is separated from the rest of the page with a dotted line.

Step 4 — Click in the Header box then type the author’s name on the left side.

Step 5 — Press the Tab key twice. The insertion point will jump to the right side. Click on Date & Time button in the Insert group on the Design tab.

Step 6 — Choose the date format in the Date and Time dialog box and click on OK. The date now appears in the document accordingly.

Step 7 — Click the Footer button on the Insert tab and select the Edit Footer option. The Footer box will appear at the bottom of the page. We will observe that the insertion point appears on the left side of the Footer box.

Step 8 — Press the Tab key once, the insertion point will jump to the center of the page.

Step 9 — Click the Page Number button in the Header & Footer group on the Design tab and choose the Bottom of Page option from the drop-down list.

Step 10 — Click on the Close Header and Footer button on the Design tab to close the Header & Footer tools.

The Header and Footer will be inserted in the document showing author’s name, date and page number.

Question 3

Teacher has asked Juhi to write an informal letter to her friend and mention the type of text alignment used in every line. Help her to complete the assignment.

Answer

The completed letter with text alignment to every lined labelled is given below:

Teacher has asked Juhi to write an informal letter to her friend and mention the type of text alignment used in every line. Help her to complete the assignment. Computer Applications Code 165 Kips Cyber Beans Solutions Class 9 CBSE.

Question 4

Ricky has learnt to change the indents using the Indents & Spacing tab of Paragraph dialog box. The teacher wants him to do the same task using the Indent markers present on the Horizontal Ruler bar. Help him to finish his assignment.

Answer

The below diagram shows the different indent markers on the Horizontal ruler bar:

Ricky has learnt to change the indents using the Indents & Spacing tab of Paragraph dialog box. The teacher wants him to do the same task using the Indent markers present on the Horizontal Ruler bar. Help him to finish his assignment. Computer Applications Code 165 Kips Cyber Beans Solutions Class 9 CBSE.

Ricky can change the desired indent markers by simply dragging them.

Question 5

Kabir has written four paragraphs of text. The teacher wants him to use a different color scheme and alignment for each paragraph. How will he do that?

Answer

To change the color scheme for first paragraph, Kabir can follow the steps given below:

Step 1 — Select paragraph 1.

Step 2 — Click on the Font color option available in the Font group on the Home tab. A drop down box will appear.

Step 3 — Select the desired colour (say blue) from the drop-down list.

To change the alignment for first paragraph, Kabir can follow the steps given below:

Step 1 — Select paragraph 1.

Step 2 — Click on the Align Left button available on the Paragraph group on the Home tab.

The color and alignment of Paragraph 1 will be changed.

In the same way, the other paragraphs can also be formatted by selecting different colors for different paragraphs. The other paragraphs can have different alignments such as Justified, Center or Right Align using the respective options.

CHAPTER – 10: Microsoft Word 2010-III 

 

Multiple Choice Questions

Question 1

To maintain the height and width ratio of a shape, which key needs to be held down while dragging the shape?

  1. Shift Key
  2. Ctrl Key
  3. Alt Key
  4. None of these

Answer

Shift Key

Reason — To maintain the height and width ratio of a shape, Shift key needs to be held down while dragging the shape

Question 2

Which tab contains the Table button?

  1. Review
  2. Insert
  3. View
  4. None of these

Answer

Insert

Reason — The Insert tab contains the Table button.

Question 3

Which option is supported by Microsoft Word?

  1. Convert Text to Table
  2. Convert Table to Text
  3. Both 1 and 2
  4. None of these

Answer

Both 1 and 2

Reason — Microsoft Word supports both the options :

  1. Convert Text to Table
  2. Convert Table to Text

Question 4

Which of these format is an image file extension?

  1. GIF
  2. JPG
  3. BMP
  4. All of these

Answer

All of these

Reason — GIF, JPG and BMP are the most common types of image file formats.

Question 5

Which key combination starts a new line without a bullet in the list?

  1. Shift + Enter
  2. Shift + C
  3. Enter + Alt
  4. None of these

Answer

Shift + Enter

Reason — Shift + Enter key combination starts a new line without a bullet in the list.

Question 6

Which tab contains the New Comment button?

  1. View
  2. Insert
  3. Review
  4. None of these

Answer

Review

Reason — The Review tab contains the New Comment button.

Question 7

Which of the following graphic illustrations we can add in the Word document?

  1. Image Files
  2. Drawings
  3. Scanned Files
  4. All of these

Answer

All of these

Reason — We can add image files, drawings and scanned files as graphic illustrations in the Word document.

Question 8

…………… group contains a list of pre-designed formats for tables.

  1. Table Styles
  2. Table Style options
  3. Draw Borders
  4. None of these

Answer

Table Styles

Reason — Table Styles group contains a list of pre-designed formats for tables.

Question 9

Which button in the Review tab is used to move to the next comment box?

  1. Previous Comment
  2. Next Comment
  3. New Comment
  4. None of these

Answer

Next Comment

Reason — Next Comment button in the Review tab is used to move to the next comment box.

State True or False

Question 1

You cannot have a list within another list in Word.

Answer

False

Reason — We can have a list within another list in Word. A Multilevel List option is used to create a list within a bulleted or numbered list.

Question 2

Bullets and Numbering options are available on the Page Layout tab.

Answer

False

Reason — Bullets and Numbering options are available in the Paragraph group on the Home tab.

Question 3

The Tab key moves the cursor to the previous cell in a table.

Answer

False

Reason — The Tab key moves the cursor to the next adjoining cell in a table.

Question 4

A table is an organized arrangement of text in the form of rows and columns.

Answer

True

Reason — A table is an organized arrangement of text in the form of rows and columns.

Question 5

You cannot insert a table in a Word document.

Answer

False

Reason — You can insert a table in a Word document by using the Table button in the Tables group on the Insert tab.

Question 6

The correct order of commands to track changes in the Word document is Review tab > Track Changes.

Answer

True

Reason — The correct order of commands to track changes in the Word document is Review tab > Track Changes.

Question 7

You cannot resize the drawing objects in the Word documents.

Answer

False

Reason — We can resize the drawing objects in the Word documents.

Question 8

Table Styles group contains a list of pre-designed formats for tables.

Answer

True

Reason — Table Styles group contains a list of pre-designed formats for tables.

Question 9

A list is a number of connected items or names written or printed consecutively one below the other.

Answer

True

Reason — A list is a number of connected items or names written or printed consecutively one below the other.

Theory Questions

Question 1

Explain the process of inserting images from the ClipArt.

Answer

To insert images from the ClipArt, we follow the steps given below:

Step 1 — On the Insert tab, in the Illustrations group, click on the Clip Art option. The clipart options appear in the task pane on the right.

Step 2 — Enter keywords in the ‘Search for:’ field that are related to the image we wish to insert, or type in the file name of the clip art.

Step 3 — Click the down arrow in the ‘Result should be:’ field and deselect any type of images we do not wish to see.

Step 4 — Click on Go button. In the displayed list of results, select the clip art to insert it in a document or click the drop-down arrow next to an image in the task pane and select Insert, Copy, or any other options from the list.

The ClipArt image will be inserted.

Question 2

What is the use of Multilevel list? Explain the method to create a Multilevel list.

Answer

A Multilevel List option is used to create a list within a bulleted or numbered list.

We can create a multilevel list by following the steps given below:

Step 1 — Click on the drop down arrow next to the Multilevel list option available in the Paragraph group on the Home tab. A drop down menu will appear.

Step 2 — Select ‘Define New Multilevel List’ option from the drop down menu. The Define New Multilevel List window appears.

Step 3 — Select level 1. Specify the Font and Number style for level 1 from the respective drop down lists. Set the position for level 1 list.

Step 4 — Select level 2. Repeat step 3 and format level 2 of the multilevel list. Similarly, the other levels of the multilevel list can be formatted.

Step 5 — Once the required number of levels are formatted, click OK.

Step 6 — Begin typing the first level of the list on the document. Press Enter key to come to the next line.

Step 7 — Press Tab key to switch to the next level of the list and continue typing the list.

Step 8 — Repeat Step 7 for switching to other levels of the list.

Step 9 — To return to the previous level of the list, press Shift + Tab key combination.

Step 10 — Repeat steps 7 to 9 as required.

The multilevel list will be created.

Question 3

Explain the method of adding 2 rows and 1 column in an existing table.

Answer

We can follow the given steps to add 2 rows and 1 column in an existing table :

Step 1 — Click anywhere in the row/column, adjacent to which we want to add the new rows and a column.

Step 2 — The Table Tools tab appears on the ribbon. Click on the Layout tab under it.

Step 3 — In the Rows & Columns group, click on the Insert Left or Insert Right button to insert a column next to the adjoining cell.

Step 4 — Click on Insert Above or Insert Below button twice to insert two rows above or below the adjoining cell.

Question 4

How will you rotate the text in a Table cell?

Answer

We can follow the given steps to rotate the text in a Table cell :

Step 1 — Select the text in the cell that we want to reposition.

Step 2 — Click on the Layout tab in the Table Tools contextual tab.

Step 3 — Select the Text Direction option in the Alignment group. Keep on clicking the Text Direction button until the text faces the desired direction.

Question 5

What are bullets? Write the steps to add bullets to a list.

Answer

A bullet is a small graphic symbol that marks an item in a list.

The steps to add bullets to a list are as follows:

Step 1 — Click on the Bullets icon on the Home tab in the Paragraph group.

Step 2 — Select the desired bullet style from the drop-down menu. It will appear in the document.

Step 3 — Enter the text and press the Enter key in the end.

Step 4 — A new bullet will appear in the next line.

Question 6

Explain the method of merging cells of a table.

Answer

We can follow the given steps to merge cells of a table :

Step 1 — Select the cells that we want to merge.

Step 2 — Click on the Layout tab.

Step 3 — Select the Merge Cells button in the Merge group or right-click on the selected cells, select the Merge Cells option from the Shortcut menu.

Step 4 — The data gets combined in one cell and the cells are merged.

Question 7

Explain the method of adding comments to a word document.

Answer

We can follow the given steps to add comments to a word document :

Step 1 — Select or click on the text we want to comment.

Step 2 — Click on the Review tab.

Step 3 — Select the text on which we want to add a comment.

Step 4 — In the Comments group, click on the New Comment button.

Step 5 — A text space will be available on the right side to insert the comment. Type in the comment and leave it as it is.

Step 6 — We can format the comment in the comment box with Bold, Italics, & Underline to highlight the important comments.

Question 8

How can you record the changes made to an original document?

Answer

We can record the changes made to an original document by using ‘Track Changes’ feature. To enable Track Changes feature, we follow the given steps:

Step 1 — Open the document to be revised.

Step 2 — Select the Review tab, click on the Track Changes button in the Tracking group.

Step 3 — Make the changes by inserting, deleting, moving text, or by adding graphics.

Track Changes feature shows all the changes that we have made with a red underline. In the Review tab, we will find the Accept and Reject options in the Changes group. These buttons allow us either to accept or reject the changes.

Question 9

Explain the method of splitting cells of a table.

Answer

We can follow the given steps to split cells of a table:

Step 1 — Select the cells that we want to split.

Step 2 — Click on the Layout tab. Select the Split Cells button in the Merge group.

Step 3 — We will get the Split Cells dialog box. Enter the number of rows and columns into which we want to split the selected cells. Click on OK.

Step 4 — The cells will be split as per the instructions.

Application Based Questions

Question 1

Draw five different shapes overlapping each other. Using the different types of Graphic arrangements, arrange these figures in all possible combinations.

Answer

The five different shapes overlapping each other are shown below:

Draw five different shapes overlapping each other. Using the different types of Graphic arrangements, arrange these figures in all possible combinations. Computer Applications Code 165 Kips Cyber Beans Solutions Class 9 CBSE.

Question 2

Swati has a puppy named Ricky. Since she keeps on forgetting his daily diet, so she wants to prepare a weekly diet calendar for him. She does not know how to organize it. Suggest her a feature of the MS Word using which she can design the calendar in an organized manner.

Answer

Swati can use the Table feature of MS Word to design a weekly diet calender for Ricky. She can follow the given steps to add a table in MS Word:

Step 1 — Click on the Insert tab and select the Table button in the Tables group.

Step 2 — Drag the mouse pointer over the grid and cover the number of rows and columns wanted in the table.

Step 3 — The table will be inserted on the working area.

Question 3

Raghav has designed a table of chemical formulae of various substances. He wants to add some more chemical formulae in the same table. Suggest him how could he do the modifications.

Answer

Raghav can add some more chemical formulae in the same table by adding more rows and columns as per his need. He can follow the given steps to add more rows and columns to his table:

Step 1 — Click anywhere in the row/column, adjacent to which we want to add the new row/column.

Step 2 — The Table Tools tab appears on the ribbon. Click on the Layout tab under it.

Step 3 — In the Rows & Columns group, click on the Insert Left or Insert Right button to insert a column next to the adjoining cell.

Step 4 — Click on Insert Above or Insert Below button to insert a row above or below the adjoining cell.

Once the required cells are added to the table, Raghav can add some more chemical formulae in the same table.

 

CHAPTER – 11: MICROSOFT POWERPOINT 2010 – I

 

Multiple Choice Questions

 

Question 1

Which area is used to edit and design slides?

  1. Slides Pane
  2. Ribbon
  3. Notes Pane
  4. Title Bar

Answer

Slides Pane

Reason — Slides Pane is the blank area in the middle of the window where we can edit and design the slides.

Question 2

Which key combination is used to create a new presentation?

  1. Ctrl + S
  2. Ctrl + O
  3. Ctrl + N
  4. Ctrl + C

Answer

Ctrl + N

Reason — Ctrl + N key combination is used to create a new presentation.

Question 3

In which group you get the options to format the shapes that you insert into your presentation?

  1. Paragraph
  2. Drawing
  3. Slides
  4. Clipboard

Answer

Drawing

Reason — The options to format the shapes that we insert into our presentation are found in Drawing group.

Question 4

In which groups you get the paragraph formatting options?

  1. Clipboard
  2. Font
  3. Paragraph
  4. Slides

Answer

Paragraph

Reason — The paragraph formatting options are present in the Paragraph group.

Question 5

In how many ways can you create a new presentation?

  1. One
  2. Two
  3. Three
  4. Four

Answer

Three

Reason — A new presentation can be created in the following three ways:

  1. Using the New option from the File menu
  2. Clicking on the New icon present on the Quick Access Toolbar or pressing the Ctrl + N key combination
  3. Using Sample Templates under Available Templates and Themes section.

Question 6

What do we call the inbuilt design files for creating a presentation?

  1. Slide Design
  2. Built-in Templates
  3. Sample Design
  4. Slide Layout

Answer

Built-in Templates

Reason — Built-in templates are the set of pre-designed formats that give us an initial foundation to build a presentation.

Question 7

Which key combination is used to open an existing presentation?

  1. Ctrl + S
  2. Ctrl + O
  3. Ctrl + N
  4. Ctrl + C

Answer

Ctrl + O

Reason — Ctrl + O key combination is used to open an existing presentation.

Question 8

Which view is used to write and design a presentation?

  1. Normal
  2. Notes
  3. Slide Sorter
  4. Slide Show

Answer

Normal

Reason — Normal view is the main editing view, which is used to write and design a presentation. In Normal View, we can add text, graphics, sound, animation, and other effects as well.

Question 9

Which key is used to quit a Slide Show?

  1. Esc
  2. Enter
  3. Shift
  4. Tab

Answer

Esc

Reason — Esc (Escape) key is used to quit a Slide Show.

Question 10

In which tab is the Text group found?

  1. Insert
  2. Home
  3. Design
  4. Transitions

Answer

Insert

Reason — The Text group is found in the Insert tab.

Question 11

From which tab can you get to the Notes page option

  1. Design
  2. Home
  3. View
  4. Insert

Answer

View

Reason — We can get to the Notes page option from the View tab.

Question 12

A handout is a slide in the form of …………….. .

  1. A piece of paper
  2. Slide on screen
  3. A mobile app
  4. None of these

Answer

A piece of paper

Reason — A handout is a slide in the form of a piece of paper.

Question 13

By default we work using …………….. .

  1. Presentation View
  2. Slide Sorter View
  3. Reading View
  4. Normal View

Answer

Normal View

Reason — By default we work using Normal View to write and design a presentation.

Question 14

Presentations can be enhanced with …………… .

  1. Clipart
  2. Animations
  3. Special Effects
  4. All of these

Answer

All of these

Reason — Presentations can be enhanced with clipart, animations and special effects.

Question 15

The Zoom Level is present in …………… .

  1. Slides Pane
  2. Status Bar
  3. Title Bar
  4. Slides Tab

Answer

Status Bar

Reason — The Zoom Level is present on the right side of the Status Bar.

Give one word answer

Question 1

What type of Application software creates multimedia presentations in the form of slide shows?

Answer

Presentation Software

Question 2

To which suite does the ‘PowerPoint’ software belong?

Answer

Microsoft Office

Question 3

When a presentation window opens, what name is displayed on the Title bar?

Answer

Presentation1

Question 4

Name the component of the PowerPoint window which displays the name of the current presentation.

Answer

Title Bar

Question 5

Which component of the PowerPoint window shows a thumbnail version of each slide shown in the slides pane?

Answer

Slides tab

Question 6

Which icon adds a new slide to the Presentation?

Answer

New Slide icon

Question 7

Which area in a slide is used to specify the notes and reading aids for your slide show?

Answer

Notes Area

Question 8

Write the key combination which is used to save a presentation.

Answer

Ctrl + S

Question 9

What is the default view of Microsoft PowerPoint window?

Answer

Normal View

Question 10

Which view displays a miniature view of all the slides in a presentation?

Answer

Slide Sorter View

Theory Questions

Question 1

Define Presentation software.

Answer

A presentation software is an application software which is used to create multimedia presentations in the form of slide shows. For example, Microsoft PowerPoint.

Question 2

What do you mean by the term ‘Slide’?

Answer

A slide is a digital or an electronic page of a presentation.

Question 3

What is the difference between File tab and Ribbon?

Answer

File tabRibbon
File tab launches the Microsoft Office Backstage View. This view allows us to create a new presentation, open an existing presentation, save, print, send, or close the presentation.Ribbon displays several tabs, such as File, Home, Insert, Design, Transitions, Animations, Slide Show, Review, View, and Acrobat. Each tab contains commands arranged into different groups.

Question 4

List all the basic elements of a slide. Explain any three.

Answer

The basic elements of a slide are:

  1. Background — It is the base of a slide on which various elements like title, images, charts, etc. can be added. The background of a slide can be modified at any point of time.
  2. Title — It is the heading of a slide which is used to guide the audience about the content of the slide.
  3. Body Text — It contains the main content of the slide, generally formatted as a bulleted or numbered list.
  4. Footer
  5. Date and Time
  6. Slide number

Question 5

What is the function of Layout? Name any two different Slide Layout options.

Answer

Slide Layout defines the basic structure of a slide and arranges our slide content. It provides us with different ways to position our text, images, and other graphic options.

Two different Slide Layout options are:

  1. Title Slide
  2. Title and Content Slide

Question 6

Which are the three options? Which option appears in case you have not saved the changes before closing a presentation?

Answer

The three options which appear in case we have not saved the changes before closing a presentation are:

  1. Save — The presentation is saved and then closed.
  2. Don’t Save — The presentation is closed and all the modifications since the last save are lost.
  3. Cancel — Nothing happens and we return to the presentation.

Question 7

Describe the steps of saving a presentation.

Answer

The steps of saving a presentation are as follows:

Step 1 — Click on the Save option on the Quick Access Toolbar or click on the File tab>Save option. The Save As dialog box appears.

Step 2 — Specify the name in the File name text box. Click on the Save button.

Step 3 — The presentation will be saved with the given name with an extension .pptx.

Question 8

Write the steps for removing a password from a presentation.

Answer

The steps for removing a password from a presentation are as follows :

Step 1 — Click on the File tab and select the Save option. The Save As dialog box appears.

Step 2 — Click on the drop-down arrow of the Tools tab and select the General Options.

Step 3 — The General Options dialog box appears. Delete the password in the ‘Password to open’ and ‘Password to modify’ text box.

Step 4 — Click on OK and Save button.

Question 9

Explain Quick Access Toolbar.

Answer

Quick Access Toolbar is a customizable toolbar, which contains commands that we may want to use quite often. By default, this toolbar is located on the Title bar but we can place it below the Ribbon also. We can add more commands to this toolbar. Right-click on any command on the Ribbon and click on Add to Quick Access Toolbar.

Question 10

Explain the different ways of viewing a Slide Show.

Answer

The three different ways of viewing a Slide Show are as follows:

  1. Click on the Slide Show button present on the Status bar.
  2. Click on the Slide Show tab and select the ‘From Beginning option’.
  3. We can also use the ‘F5’ key to view the Slide Show.

Long Answer Type Questions

Question 1

What do you know about PowerPoint Software? Explain its features.

Answer

Microsoft PowerPoint is a presentation software in the Microsoft Office suite, enabling the creation of dynamic slides with animations, narration, images, and videos. It offers tools, templates, and layouts for professional multimedia presentations.

Some features of MS PowerPoint are as follows:

  1. Slides — PowerPoint presentations are organized into individual slides, each representing a single page or screen in the presentation.
  2. Text Formatting — Users can format text on slides, adjusting font types, sizes, colors, and styles. Paragraph formatting options are also available.
  3. Slide Layouts — Different slide layouts allow users to choose how content is arranged on each slide. Common layouts include title slides, content slides, and combination slides.
  4. Themes — Themes provide a consistent and professionally designed look for the entire presentation. Users can choose from a variety of built-in themes or create custom themes.
  5. Graphics and Multimedia — PowerPoint supports the insertion of images, shapes, charts, SmartArt graphics, and multimedia elements such as audio and video.
  6. Transitions — Users can apply transition effects between slides to create smooth and visually appealing animations when moving from one slide to the next.
  7. Animations — Animation effects can be applied to individual elements on a slide, allowing for more dynamic and engaging presentations.
  8. Speaker Notes — Presenters can add speaker notes to each slide, providing additional information for the presenter during the actual presentation.
  9. Slide Show Mode — PowerPoint offers a dedicated Slide Show mode for presenting the slides to an audience.
  10. Integration with Other Office Apps — Data from other office apps like Word, Excel, etc. can be easily imported into Powerpoint.

Question 2

What are the points that should be kept in mind while designing an effective presentation?

Answer

The points that should be kept in mind while designing an effective presentation are as follows:

  1. Keep it simple — Always try to keep the presentation simple by using charts which are easy to understand and graphics that reflect what we are saying. The thumb rule for making a good presentation is to ensure that there are not more than five words in each line and not more than five lines in each slide.
  2. Minimize facts and figures in slides — We should avoid to include too many figures and numbers.
  3. Use vibrant colours — A striking colour contrast between words, graphics, and the background can be very effective in conveying both, message and emotions.
  4. Import images, graphics and videos — Do not limit the presentation to the collection of cliparts, etc. provided in PowerPoint. Import images, graphics, and videos for a better visual appeal and variety.
  5. Use humour in your presentation — Humour helps to convey a message efficiently and loosen up the crowd.
  6. Edit ruthlessly — After creating PowerPoint slides, put yourself in the audience’s shoes and critically review the presentation. Modify or remove anything unappealing, distracting, or confusing.

Question 3

What is the use of presentation software? What are the most popular presentation softwares?

Answer

Presentation software is an application software, which is used to create multimedia presentations in the form of slide shows. A presentation is a collection of slides arranged in a sequential manner to convey, persuade, motivate, entertain or to provide information. A slide can be defined as a digital or an electronic page of a presentation. A slide show is a sequential display of slides, which is shown to the audience with an objective of providing information and exchanging ideas/views on a particular topic.

The presentation can be projected on a big screen by attaching the computer to a multimedia projector. A presentation can be made more interesting and effective by adding text, diagrams, scanned images, cliparts, sounds, videos, designs, and special animation effects.

The most popular presentation softwares are:

  1. Microsoft PowerPoint
  2. Google Slides (Part of Google Docs)
  3. Adobe Connect
  4. OpenOffice Impress

Question 4

What are the different formatting options present in Powerpoint 2010?

Answer

The different formatting options present in Powerpoint 2010 are as follows:

  1. Adding Text Box to a Slide — We can add more text by inserting text boxes in our slide. Text boxes provide flexibility in placing and formatting text on slide.
  2. Font Formatting — We can change the font type, size, color, and style of our text. We can also apply shadow effect to our text.
  3. Paragraph Formatting — The Paragraph group contains the paragraph formatting options such as text alignment, indents, spacing, bulleted lists, etc.
  4. Bullet Points and Numbering — We can make ordered or unordered lists and use bullets or numbering to distinguish list items.
  5. Slide Layouts — Slide layouts provide us with different ways to position our text, images, and other graphic options.
  6. Themes — Templates give us an initial foundation to build a presentation which contains various themes, theme colours, effects, background styles, and layouts to make our presentation attractive.
  7. Background Styles — Various pre-defined background styles are available for the user to choose from on which various elements like title, images, charts etc. can be added.
  8. Shapes and SmartArt — Many ready-made shapes like flowcharts, arrows, circles, and rectangles can be inserted from the Shapes. Text can be converted into Smart Art Graphics by using the Convert to SmartArt Drawing group option.
  9. Images and Clip Art — Various images and cliparts can be inserted on the slides. We can import images, graphics and videos also.
  10. Headers and Footers — We can add header and footer to display any information which appears on every slide such as the date, slide number etc.
  11. Format Painter — This option can be used to copy formatting from one object and apply it to another.

Question 5

Discuss the different slide views available in PowerPoint 2010.

Answer

The different slide views available in PowerPoint 2010 are as follows:

  1. Normal View — It is the main editing view, which is used to write and design a presentation. In Normal View, we can add text, graphics, sound, animation, and other effects as well. In this view, we can also have a large view of an individual slide, notes pane at the bottom, an outline of the slide text (Outline tab), and slides displayed as thumbnails (Slides tab), all at the same time.
  2. Slide Sorter View — It displays a miniature view of all the slides in a presentation arranged in horizontal rows. This view is useful in making changes to several slides in one go. In Slide Sorter View, we can change the order of slides, copy or delete the slides, add transitions, animation effects, and set the timings for the slide show.
  3. Slide Show View — It shows all the slides of a presentation starting either from the first slide or the current slide one after another. One slide occupies the entire screen in this view. In this full screen view, we can see how our graphics, timings, movies, animated elements, and transition effects will look in the actual show.
  4. Notes Page — The Notes Page option is available on the View tab. It displays the notes page for the selected slide, where we can write additional information for the current slide. These notes are not visible when the presentation is shown. These notes help the speaker to remember the important points while presenting.
  5. Reading View — Reading View is similar to Slide Show View. The slide is shown in a full screen mode. In the Reading View, Title bar and Status bar get displayed on the screen. This view is not only useful to quickly navigate during the slide show, but also provides an easy access to the windows task bar to switch to other opened programs or windows.

Question 6

How will you save a presentation by using the password protection?

Answer

We can follow the given steps to save a presentation by using the password protection:

Step 1 — Click on the File tab and select the Save option from the drop-down menu.

Step 2 — The Save As dialog box appears.

Step 3 — Click on the drop-down arrow of the Tools tab and select the General Options.

Step 4 — The General Options dialog box will appear, displaying the two fields:’Password to open’ and ‘Password to modify’.

Step 5 — Type the desired password in the Password to open text box. Click on OK.

Step 6 — The Confirm Password dialog box appears. Re-enter the password in order to confirm the password. Then, click on OK.

Step 7 — If the password matches, the presentation is saved with a password protection. If the passwords do not match, we receive the prompt message to enter the password again.

Application Based Questions

Question 1

The computer teacher has given an image of the PowerPoint window to your friend Prateek and asked him to label all its components. The teacher has found some errors and has asked you to correct them. Finish this task by correcting the labelling:

The computer teacher has given an image of the PowerPoint window to your friend Prateek and asked him to label all its components. The teacher has found some errors and has asked you to correct them. Finish this task by correcting the labelling. Computer Applications Code 165 Kips Cyber Beans Solutions Class 9 CBSE.

Answer

Corrected labelling is given below:

Given LabelCorrected Label
Title BarCorrect
Dialog box launcherQuick Access Toolbar
GroupTab
RibbonCorrect
TabGroup
Quick Access ToolbarDialog box launcher
Status barSlide Thumbnail
Slides TabStatus bar
Slides PaneNotes pane
Notes paneSlides Pane
PlaceholderCorrect
View buttonCorrect
Zoom toolZoom Slider

Question 2

Your teacher has asked you to match the given slide layouts with their names:

Your teacher has asked you to match the given slide layouts with their names. Computer Applications Code 165 Kips Cyber Beans Solutions Class 9 CBSE.

Answer

AB
1.Title slide
2.Comparison slide
3.Title and Content slide
4.Content with Caption slide
5.Blank slide

Question 3

Rohit has got an assignment on different views of slide. He has created sample images to illustrate the topic but forgot to name them. Complete his assignment by naming the different views:

Rohit has got an assignment on different views of slide. He has created sample images to illustrate the topic but forgot to name them. Complete his assignment by naming the different views. Computer Applications Code 165 Kips Cyber Beans Solutions Class 9 CBSE.

Answer

1 → Notes Page View

2 → Slide Sorter View

3 → Slide Show View

4 → Slide Show View

5 → Normal View

 

CHAPTER – 12: MICROSOFT POWERPOINT 2010 – II

 

 

Multiple Choice Questions

 

Question 1

Which key is used to select a group of contiguous slides from a presentation?

  1. Shift
  2. Ctrl
  3. Alt
  4. Esc

Answer

Shift

Reason — Shift key is used to select a group of contiguous slides from a presentation.

Question 2

Which view contains the thumbnails view of all slides in a presentation?

  1. Normal
  2. Notes Page
  3. Slide Sorter
  4. Slide Show

Answer

Slide Sorter

Reason — Slide Sorter view contains the thumbnails view of all slides in a presentation.

Question 3

What is that piece of text, image or logo called, which is printed at the bottom of every slide in a presentation?

  1. Header
  2. Title
  3. Footer
  4. Subtitle

Answer

Footer

Reason — Footer is that piece of text, image or logo, which is printed at the bottom of every slide in a presentation.

Question 4

Which option allows you to apply a gradient, texture or picture to your object?

  1. Fill effects
  2. Shapes
  3. Header
  4. Animation

Answer

Fill effects

Reason — Fill effects option allows us to apply a gradient, texture or picture to our object.

Question 5

Which key is used while grouping multiple shapes in PowerPoint?

  1. Shift
  2. Esc
  3. Alt
  4. Enter

Answer

Shift

Reason — Shift key is used while grouping multiple shapes in PowerPoint.

Question 6

Which effects are applied to an individual element on a single slide?

  1. Transition
  2. Animation
  3. Formatting
  4. Slide Design

Answer

Animation

Reason — Animation effects are applied to an individual element on a single slide.

Question 7

Which option under the Add Animation button in the Animations tab is used to display how the object is leaving the screen?

  1. Exit
  2. Entrance
  3. Motion Paths
  4. Emphasis

Answer

Exit

Reason — Exit option under the Add Animation button in the Animations tab is used to display how the object is leaving the screen.

Question 8

Which feature do you use to set a varying time for slides to be displayed before changing to the next slide?

  1. Rehearse Timings
  2. Duration
  3. Speed
  4. Mode

Answer

Rehearse Timings

Reason — Rehearse Timings feature is used to set a varying time for slides to be displayed before changing to the next slide.

Question 9

In which group of Home tab, the New Slide button is present?

  1. Font
  2. Clipboard
  3. Editing
  4. Slides

Answer

Slides

Reason — The New Slide button is present in Slides group of Home tab.

Question 10

On which tab, is the Layout button located?

  1. Slide Show
  2. View
  3. Home
  4. Insert

Answer

Home

Reason — The Layout button is located on the Home tab.

Question 11

On which tab, do you find the Header & Footer option?

  1. View
  2. Insert
  3. Format
  4. Both 1 and 2

Answer

Insert

Reason — The Header & Footer option is found on the Insert tab.

Give one-word answer

Question 1

Which view is used to work with a group of slides?

Answer

Slide Sorter View

Question 2

Which key is used to select non-contiguous slides after selecting the first slide from a group?

Answer

Ctrl key

Question 3

Which key is used to delete a slide?

Answer

Del key

Question 4

Which tool is used to add text boxes to a slide?

Answer

Text box

Question 5

What is that piece of text, image, or logo called, which is printed at the top of every slide in a presentation?

Answer

Header

Question 6

Which drawing feature helps in drawing different shapes in PowerPoint?

Answer

Shapes

Question 7

What is the file extension assigned to the recorded sound in PowerPoint?

Answer

.wav

Question 8

What effects take place when one slide gives way to the next one in the presentation?

Answer

Slide Transitions

Question 9

In which view, do we apply animation effects on slides?

Answer

Normal View

Question 10

Which option in the Animation pane is used to change the order of animation effects?

Answer

Re-Order

Theory Questions

Question 1

Explain Slide Sorter view. Describe the steps to move a group of slides in this view.

Answer

Slide Sorter View contains the thumbnail view of all the slides in a presentation. We can use this view to work either with a group of slides or with a single slide.

We can follow the given steps to move a group of slides in this view:

Step 1 — Click on the slide that we want to move. A thick yellow border appears around it.

Step 2 — To select non-contiguous slides, click on the first slide and while pressing the Ctrl key, select the other desired slides one by one.

Step 3 — To select contiguous slides, click on the first slide and while pressing the Shift key, select the last slide in the group. This selects all the slides which come between the first and the last.

Step 4 — Drag the selected slides to the required place.

The selected slides will be moved to the required location.

Question 2

Define the term Header.

Answer

Header is a little identifier that runs across the top of the slide. Whenever we need to repeat certain text or graphics on each slide, we can use Headers. They include information like page numbers, date, book or chapter titles, author name, slide show theme, etc.

Question 3

Describe the steps to group Shapes in a slide.

Answer

The steps to group Shapes in a slide are as follows:

Step 1 — Draw all the shapes that are to be grouped.

Step 2 — Click on the Home tab in the Editing group and click on the Select button.

Step 3 — Choose the Select Objects option from the drop-down list.

Step 4 — Hold down the left mouse button to draw a box over the shapes. All the shapes in this box will be selected or press and hold Shift or Ctrl key while selecting the objects.

Step 5 — Right-click on the selected shapes that are to be grouped. A Shortcut menu appears.

Step 6 — Select the Group option. We will find three options i.e., Group, Ungroup, and Regroup. Click on the Group option.

The selected objects will be grouped together.

Question 4

What do you mean by Slide Transition? Explain the steps to apply transition effect on a single slide.

Answer

A slide transition is the visual motion when one slide changes to the next during a presentation, like Wipe Down, Wipe Left, Wheel Clockwise, etc. These effects make our slide show lively and add dynamic flair to it.

The steps to apply transition effect on a single slide are as follows:

Step 1 — Select the slide on which we want to apply a transition. Click on the Transitions tab.

Step 2 — The ‘Transition to This Slide’ group appears on the Ribbon.

Step 3 — Click on the ‘More’ drop-down arrow to display all the transition effects. Click on any transition effect from the displayed choices. The current slide will display a preview of the selected effect.

Step 4 — Now select the ‘Effect Options’ button to select an effect for the chosen transition.

Step 5 — Click on the drop-down arrow of the Sound option in the Timing group and select any sound effect. Click on the Preview button present at the extreme left on the Ribbon. Observe its effect.

Step 6 — Specify the transition timing by entering the number of seconds or minutes in the ‘Duration’ box in the Timing group.

Step 7 — We can set our presentation to advance on its own and display each slide for a specific amount of time. To do so, uncheck the box next to the ‘On Mouse Click’, click on the ‘After’ checkbox and enter the amount of time for which we want to display the slide.

The effects will be applied on the current slide.

Question 5

Describe the role of Animation in PowerPoint.

Answer

Animations make a presentation lively and impressive. They enable step-by-step content presentation with emphasis on key points allowing timing control and contribute to a polished, professional presentation.

Question 6

Explain the concept of ‘Rehearse Timings’.

Answer

Rehearse Timings feature helps us in finding out the time we would need to present a slide show. This option makes sure that our presentation fits within the certain time frame. We can set a varying time for slides to be displayed before changing to the next slide.

It works in the following way:

  1. Practice Run — When we choose the ‘Rehearse Timings’ option, PowerPoint starts a practice run of our presentation. As we advance through the slides, a timer records the time spent on each.
  2. Timing Adjustment — After completing the practice run, PowerPoint provides the option to review and adjust the timing for each slide. This feature is especially useful for ensuring that our presentation fits within a designated time frame.
  3. Automatic Slide Advancement — The timings we set during the rehearsal will be used to automatically advance the slides during the actual presentation. This ensures a smooth and well-timed delivery.
  4. Speaker Notes — ‘Rehearse Timings’ also allows us to add or edit speaker notes for each slide, helping us remember key points or cues during the presentation.

Application Based Questions

Question 1

Your Computer teacher has shown you four slides which are depicting different slide formatting layouts. Identify these layouts and label the images.

Your Computer teacher has shown you four slides which are depicting different slide formatting layouts. Identify these layouts and label the images. Computer Applications Code 165 Kips Cyber Beans Solutions Class 9 CBSE.
Your Computer teacher has shown you four slides which are depicting different slide formatting layouts. Identify these layouts and label the images. Computer Applications Code 165 Kips Cyber Beans Solutions Class 9 CBSE.
Your Computer teacher has shown you four slides which are depicting different slide formatting layouts. Identify these layouts and label the images. Computer Applications Code 165 Kips Cyber Beans Solutions Class 9 CBSE.
Your Computer teacher has shown you four slides which are depicting different slide formatting layouts. Identify these layouts and label the images. Computer Applications Code 165 Kips Cyber Beans Solutions Class 9 CBSE.

Answer

The labelled images of the layouts are given below:

Your Computer teacher has shown you four slides which are depicting different slide formatting layouts. Identify these layouts and label the images. NCERT Class 10 Science CBSE Solutions.
Your Computer teacher has shown you four slides which are depicting different slide formatting layouts. Identify these layouts and label the images. NCERT Class 10 Science CBSE Solutions.
Your Computer teacher has shown you four slides which are depicting different slide formatting layouts. Identify these layouts and label the images. NCERT Class 10 Science CBSE Solutions.
Your Computer teacher has shown you four slides which are depicting different slide formatting layouts. Identify these layouts and label the images. NCERT Class 10 Science CBSE Solutions.

Question 2

Rohan has downloaded a presentation from the Internet, but he is not satisfied with the slides. He wants to copy and delete a few slides from the existing presentation. What steps should he follow to accomplish this task?

Answer

Rohan can follow the given steps to copy and delete slides:

Step 1 — Right-click on the slide that he wishes to copy.

Step 2 — Select the Copy option from the Context menu or select the Home tab and click on the Copy button in the Clipboard group or press the Ctrl + C key combination.

Step 3 — Right-click on the place where he wants to paste the slide and select the Paste Option from the Context menu or choose the Paste button on the Home tab in the Clipboard group or press Ctrl + V. The slide gets copied to the new location.

Step 4 — To delete a slide, right-click on the slide and select the Delete Slide option from the Context menu or press Del key.

Rohan can repeat the above steps to copy and delete slides as required.

Question 3

Your teacher has given you an assignment to create a presentation with all the slides having different themes. Using which method you can apply the desired effects.

Answer

I can follow the given steps to create a presentation with all the slides having different themes:

Step 1 — Insert a blank slide in a presentation.

Step 2 — Click on Design tab.

Step 3 — From the Theme group, click on any theme that suits the purpose of the slide.

Step 4 — The theme will be applied on the slide.

The above steps can be repeated multiple times to add new slides (having different themes) to a presentation.

Question 4

Your teacher has asked Simran to write a paragraph on ‘Personality Development’ on a blank slide. She has guided that Simran cannot apply any slide layout that has text boxes. Suggest her another method of adding text to the slide.

Answer

Simran can add a text box to the slide by following the given steps:

Step 1 — Select the blank slide in the presentation.

Step 2 — Click on Text Box icon present in the Text group on the Insert tab.

Step 3 — Click on the slide and drag the mouse to create a text box of any size. Release the mouse button once the desired text box size is achieved.

Step 4 — A cursor appears inside the text box that indicates to enter the text.

Simran can type the paragraph in the entered text box.

Question 5

Sonal has created a presentation on ‘Computer Technology’. She has forgotten the steps to add a slide number in the Footer area. Describe the required steps so that she can complete her presentation.

Answer

Sonal can add a slide number in the Footer area by following the given steps:

Step 1 — Click on the Insert tab > Text group and select ‘Header & Footer’.

Step 2 — The Header and Footer dialog box appears. By default the Slide tab is selected.

Step 3 — Click on the Slide number checkbox to include it in the slide.

Step 4 — Click Apply to All.

The slide number will be added to the slides.

 

CHAPTER – 13: MICROSOFT EXCEL 2010 – I

 

Multiple Choice Questions

 

Question 1

Which software lets you perform calculations and manipulate the numeric data?

  1. MS Excel
  2. MS Word
  3. MS PowerPoint
  4. All of these

Answer

MS Excel

Reason — MS Excel lets us perform calculations and manipulate the numeric data.

Question 2

Name the element which is identified by a unique row number and column number.

  1. Cell
  2. Column
  3. Row
  4. None of these

Answer

Cell

Reason — Cell is the element which is identified by a unique row number and column number.

Question 3

What do we call a group of contiguous cells which form the shape of a rectangle?

  1. Cell
  2. Spreadsheet
  3. Range
  4. SheetTab

Answer

Range

Reason — Range is a group of contiguous cells which form the shape of a rectangle.

Question 4

Which symbol separates the address of the starting cell address from the ending cell address in a range?

  1. Semicolon
  2. Colon
  3. Full Stop
  4. None of these

Answer

Colon

Reason — Colon symbol separates the address of the starting cell address from the ending cell address in a range.

Question 5

Which of the following component lies at the top of the document window in MS Excel?

  1. Task Bar
  2. Status Bar
  3. Formula Bar
  4. Title Bar

Answer

Title Bar

Reason — Title Bar lies at the top of the document window in MS Excel.

Question 6

What name do we give to the current cell which has a cell boundary around it?

  1. Passive Cell
  2. Active Cell
  3. Current Cell
  4. New Cell

Answer

Active Cell

Reason — Active Cell is the current cell which has a cell boundary around it.

Question 7

Which is the last valid column header in MS Excel?

  1. XFD
  2. AJ
  3. AZ
  4. AJM

Answer

XFD

Reason — XFD is the last valid column header in MS Excel.

Question 8

What is the default name of a workbook in MS Excel?

  1. Book1
  2. Sheet1
  3. Untitled1
  4. All of these

Answer

Book1

Reason — The default name of a workbook in MS Excel is Book1.

Question 9

Which shortcut key combination is used to save a workbook in MS Excel?

  1. Ctrl + X
  2. Ctrl + Z
  3. Ctrl + C
  4. Ctrl + S

Answer

Ctrl + S

Reason — Ctrl + S key combination is used to save a workbook in MS Excel.

Question 10

Which pair of brackets are used to denote a negative value in MS Excel?

  1. Parenthesis
  2. Curly Brackets
  3. Square Brackets
  4. All of these

Answer

Parenthesis

Reason — A pair of parenthesis are used to denote a negative values in MS Excel.

Question 11

What is the default alignment for numbers in MS Excel?

  1. Left
  2. Right
  3. Center
  4. None of these

Answer

Right

Reason — The default alignment for numbers in MS Excel is right.

Question 12

Name the expression which includes numbers, cell addresses, operators, and parenthesis.

  1. Symbol
  2. Equation
  3. Formula
  4. None of these

Answer

Formula

Reason — Formula is the expression which includes numbers, cell addresses, operators, and parenthesis.

Question 13

Which symbol marks the beginning of a formula?

  1. Equal (=)
  2. Plus (+)
  3. Asterik (*)
  4. Division (/)

Answer

Equal (=)

Reason — The symbol Equal (=) marks the beginning of a formula.

Question 14

Which data entry is neither a number nor a formula?

  1. Date
  2. Character
  3. Text
  4. None of these

Answer

Text

Reason — Text is neither a number nor a formula.

Question 15

By default, how many worksheets does an excel workbook display?

  1. 1
  2. 2
  3. 3
  4. 4

Answer

3

Reason — An excel workbook displays 3 worksheets.

Question 16

What separates time elements in Excel?

  1. Colons
  2. Hyphen
  3. Slash
  4. Equal to

Answer

Colons

Reason — Colons separate time elements in Excel.

State True or False

Question 1

If we type the apostrophe symbol before a number, Excel assumes it as a text entry.

Answer

True

Reason — If we type the apostrophe symbol before a number, Excel assumes it as a text entry.

Question 2

The date entries in Excel are separated by the colon symbol.

Answer

False

Reason — In Excel, the colon symbol (:) is used to create a range of cells. Date entries in Excel are typically recognized using date formats, such as “mm/dd/yyyy” or “dd-mm-yyyy”.

Question 3

The F3 function key is used to edit the contents of the active cell.

Answer

False

Reason — The F2 function key is used to edit the contents of the active cell. Pressing F2 key places the cursor at the end of the cell contents.

Question 4

The Clear All option clears all the contents from the selected range of cell.

Answer

True

Reason — The Clear All option clears all the contents from the selected range of cell.

Question 5

The shortcut key combination to cut a specific range of cells is Ctrl + X.

Answer

True

Reason — The shortcut key combination to cut a specific range of cells is Ctrl + X.

Question 6

The name given to a range of cells is added in the drop-down list of the Name Box.

Answer

True

Reason — The name given to a range of cells is added in the drop-down list of the Name Box.

Question 7

The small black square present in the lower right corner of the active cell is called the Cell Handle.

Answer

True

Reason — The small black square present in the lower right corner of the active cell is called the Cell Handle.

Question 8

The Insert dialog box has four different options to choose from.

Answer

True

Reason — The Insert dialog box has four options to choose from which are as follows:

  1. Shift cells right
  2. Shift cells down
  3. Entire row
  4. Entire column

Question 9

The number of blank cells inserted in a worksheet will be same as the number of cells selected initially.

Answer

True

Reason — The number of blank cells inserted in a worksheet will be same as the number of cells selected initially.

Question 10

An expression which includes cell addresses, numbers, operators, and parenthesis is called a Chemical Equation.

Answer

False

Reason — An expression which includes cell addresses, numbers, operators, and parenthesis is called a Formula.

Question 11

Formulas always begin with the ‘=’ symbol followed by cell references and operators.

Answer

True

Reason — Formulas always begin with the ‘=’ symbol followed by cell references and operators.

Question 12

We use the Compound Formulas when we need more than one operator.

Answer

True

Reason — We use the Compound Formulas when we need more than one operator.

Question 13

The other name of cell reference in MS Excel is cell address.

Answer

True

Reason — The other name of cell reference in MS Excel is cell address.

Question 14

Alphanumeric data cannot be entered in a worksheet.

Answer

False

Reason — Numeric, alphanumeric, non-numeric, or formula can be entered in an Excel worksheet. Alphanumeric data refers to text data.

 

 

 

Theory Questions

 

Question 1

What are functions? Explain the different parts of functions.

Answer

Functions are pre-designed formulas to perform simple and complex calculations.

Functions are made up of two parts:

  1. Arguments — Arguments are input values to functions. Arguments can be numbers, text, logical values like True or False, range of cell reference, or formulas that are enclosed within parenthesis.
  2. Structure — The Structure of a function defines its basic skeleton, which forms the base of writing general syntax of functions. The structure begins with the equal sign(=), function name and then followed by the list of arguments separated by a comma within the parenthesis.

The syntax of writing a function is as follows:

= FUNCTION NAME (argument1, argument2, argument3… )

Question 2

Can we find the average of more than one range of cells? If yes, what will be the structure of such a function?

Answer

Yes, we can find the average of more than one range of cells by using the AVERAGE function.

The structure of the AVERAGE function used is as follows:

= AVERAGE (Range1 , Range2, …)

For example, to find out the average of range B2 : D2 and B3 : D3, we will write the formula as follows:

= AVERAGE (B2 : D2 , B3 : D3)

Question 3

What is the significance of COUNT() function? What type of data entries does the COUNT() function recognize?

Answer

The COUNT() function counts the number of numeric entries, formula, and date entries in a given range of cells. It is particularly useful for quickly determining the count of numerical entries in a dataset.

The COUNT() function is significant for statistical analysis and data validation. It helps us understand the size of a dataset, especially when dealing with numerical values.

The COUNT() function recognizes and counts cells that contain numerical values, including integers, decimals, and dates that Excel recognizes as numerical values. It excludes non-numeric entries such as text, errors, and blank cells.

Question 4

Which logical values are recognized by most of the functions? What are the corresponding numeric values of those logical values?

Answer

In Excel, logical values are represented by the TRUE and FALSE values. These logical values are widely recognized by most functions for conditional testing and logical operations. The corresponding numeric values are:

TRUE — corresponds to the numeric value 1.

FALSE — corresponds to the numeric value 0.

When we use TRUE or FALSE in a numeric context, Excel automatically treats them as 1 and 0, respectively.

Question 5

Suggest the Excel functions which can be used for the following:

(a) To calculate the average marks obtained by a student in SA1 assuming that his/her marks of individual subjects are given.

(b) To find the highest marks of Hindi in your class, if marks of all students are given.

(c) To calculate the quarterly sales of a sales executive, if the sales data of all months are given.

(d) To find out the minimum quoted tender rates submitted by various companies to the Govt. of India.

Answer

(a) = AVERAGE ()

(b) = MAX ()

(c) = SUM ()

(d) = MIN ()

Application Based Questions

Question 1

An assignment was given to Sanjiv and Vibha by their teacher. They were shown the screen shot given below and were asked to answer the following questions:

(i) What happens when the formula = B2 + C2 is entered in D2?

(ii) What happens when the formula of D2 is copied over to D6?

(iii) What will happen if we modify the formula in the cell D6 to = $B6+$C6?

(iv) What happens when we copy the formula of D6 to D3?

(v) If we delete the value of C3, what will be the new value of D3?

An assignment was given to Sanjiv and Vibha by their teacher. They were shown the screen shot given below and were asked to answer the following questions. (i) What happens when the formula = B2 + C2 is entered in D2? (ii) What happens when the formula of D2 is copied over to D6? (iii) What will happen if we modify the formula in the cell D6. (iv) What happens when we copy the formula of D6 to D3? (v) If we delete the value of C3, what will be the new value of D3? Computer Applications Code 165 Kips Cyber Beans Solutions Class 9 CBSE.

Answer

(i) D2 will display the sum of the values in cells B2 and C2.

D2 = B2 + C2
D2 = 130 + 2300
D2 = 2430

(ii) When the formula in D2 is copied over to D6, the relative references in the formula (B2 and C2) will adjust based on the relative position. So, the formula will be modified as = B6 + C6. Thus, D6 will display the sum of the values in cells B6 and C6.

D6 = B6 + C6
D6 = 295 + 3040
D6 = 3335

(iii) The dollar signs ($) indicate absolute references, meaning that the column (B and C) will remain fixed when the formula is copied or filled to other cells horizontally. The row (6) will still adjust based on the relative position.

(iv) When the formula in D6 is copied to D3, The absolute references (B and C) will remain fixed and only row (6) will adjust according to the relative position.

Thus, the formula in D3 will be =$B3+$C3, reflecting the change in the row number while keeping the column references fixed.

D3 = $B3+$C3
D3 = 490 + 2190
D3 = 2680

(v) If the value of C3 is deleted, the new value of D3 will be the sum of the remaining values in B3 and C3 (now treated as 0).

D3 = $B3+$C3
D3 = 490 + 0
D3 = 490

Question 2

Mayur could not complete the assignment given by his teacher which is shown below. Help him to fill the blank cells marked with yellow colour.

Mayur could not complete the assignment given by his teacher which is shown below. Help him to fill the blank cells marked with yellow colour. Computer Applications Code 165 Kips Cyber Beans Solutions Class 9 CBSE.

Answer

Mayur can use formulas to calculate the values of the blank cells. Let us assume that “R. No.” has the cell reference A1 and write the formulas accordingly.

  1. To calculate Total, he can write the formula = C2 + D2 in cell E2. This formula will calculate the sum of cells C2 and D2 in cell E2. The formula can be copied in range E3 : E6 to fill the Total column.

  2. To calculate Percentage, he can write the formula = (E2 / 100) * 100 in cell F2. This formula will calculate the percentage of marks in cell F2. The formula can be copied in range F3 : F6 to fill the Percentage column.

  3. To fill the Remarks column, Mayur can write the formula = IF (F2 >= 40, "Pass", "Fail") in cell G2. This formula will return “Pass” if the percentage is greater than or equal to 40, else return “Fail”. The formula can be copied in range G3 : G6 to fill the Remarks column.

Question 3

The class teacher asked Ravi to observe the following worksheet carefully, and answer the questions based on it:

The class teacher asked Ravi to observe the following worksheet carefully, and answer the questions based on it. Computer Applications Code 165 Kips Cyber Beans Solutions Class 9 CBSE.

(i) Identify the nature of formula in the cell E9.

(ii) Copy the formula applied in cell E9 to all the cells from E5 to E11.

(iii) Find the maximum and the minimum value among the cells E5 to E11.

(iv) Calculate the average of both Oral and Written marks.

Answer

(i) The formula in E9 is = AVERAGE (C9 : D9). It calculates the average of the marks in cells C9 and D9. It uses the AVERAGE() function.

(ii) When the formula is copied to cells from E5 to E11, the cell references adjust themselves relatively as follows:

E5 = AVERAGE (C5 : D5)

E6 = AVERAGE (C6 : D6)

E7 = AVERAGE (C7 : D7) and so on.

(iii) The maximum value can be calculated by using the formula =MAX(E5:E11). The maximum value is 93.

The minimum value can be calculated by using the formula =MIN(E5:E11). The minimum value is 66.5.

(iv) Ravi can use the formula =AVERAGE(C5:C11) in the cell C12 to calculate the average of Oral marks.

He can use the formula =AVERAGE(D5:D11) in the cell D12 to calculate the average of Written marks.

The class teacher asked Ravi to observe the following worksheet carefully, and answer the questions based on it. Computer Applications Code 165 Kips Cyber Beans Solutions Class 9 CBSE.

Question 4

Sahil has been given the hard copy of the following worksheet by his teacher.

Sahil has been given the hard copy of the following worksheet by his teacher. Computer Applications Code 165 Kips Cyber Beans Solutions Class 9 CBSE.

His teacher has asked him to:

(i) Calculate the total percentage of each student.

(ii) Find the Grade of each student by keeping a simple rule in view, i.e., students scoring below 90% must get B+ while those above this baseline must be given an A+.

(iii) Also find the Maximum marks and calculate the average Marks of both Practical and Theory.

Answer

(i) Sahil can calculate the Total Percentage of Veena by using the formula =(C3+D3)/20*100 in cell E3. Then, he can copy the formula in cell range E4 : E7 to calculate the Total Percentage of all students.

(ii) Sahil can calculate the Grade of Veena by using the formula =IF(E3<90, "B+", "A+") in cell F3. Then, he can copy the formula in cell range F4 : F7 to calculate the Grade of all students.

(iii) To find the maximum marks in Practical, Sahil can use the formula =MAX(C3:C7) in cell C10.

To find the maximum marks in Theory, Sahil can use the formula =MAX(D3:D7) in cell D11.

To find the average marks of Practical, he can use the formula =AVERAGE (C3:C7) in cell E10.

To find the average marks of Theory, he can use the formula =AVERAGE (D3:D7) in cell F11.

Sahil has been given the hard copy of the following worksheet by his teacher. Computer Applications Code 165 Kips Cyber Beans Solutions Class 9 CBSE.
 

CHAPTER – 14: MICROSOFT EXCEL 2010 – II

 

Multiple Choice Questions

Question 1

What is the default format for expressing numbers in Excel?

  1. General
  2. Percent
  3. -1234
  4. User-defined

Answer

General

Reason — General is the default format for expressing numbers in Excel.

Question 2

Which tab is used to set the horizontal and vertical alignment for data in cells?

  1. Number
  2. Font
  3. Alignment
  4. Background

Answer

Alignment

Reason — Alignment tab is used to set the horizontal and vertical alignment for data in cells.

Question 3

Which feature in Excel is used to rotate text through a specified angle?

  1. Text Orientation
  2. Text Alignment
  3. Text Indent
  4. Text Formatting

Answer

Text Orientation

Reason — Text Orientation feature in Excel is used to rotate text through a specified angle.

Question 4

Which term is used to define a graphical representation of data in a worksheet?

  1. Text
  2. Table
  3. Cells
  4. Chart

Answer

Chart

Reason — Chart is used to define a graphical representation of data in a worksheet.

Question 5

What type of chart is used to emphasize the magnitude of change over time?

  1. Pie
  2. Area
  3. Bar
  4. Scatter

Answer

Area

Reason — Area chart is used to emphasize the magnitude of change over time.

Question 6

…………… chart is designed specifically for plotting data values related to stocks and shares.

  1. Pie
  2. Area
  3. Bar
  4. Stock

Answer

Stock

Reason — Stock chart is designed specifically for plotting data values related to stocks and shares.

Question 7

In which group of the Home tab is the Format option available?

  1. Clipboard
  2. Cells
  3. Font
  4. Number

Answer

Cells

Reason — The Format option is available in the Cells group of the Home tab.

Question 8

Name the type of chart which displays data in the form of a circle.

  1. Pie
  2. Area
  3. Bar
  4. Scatter

Answer

Pie

Reason — Pie chart displays data in the form of a circle.

Question 9

What is the name for the horizontal axis of a chart?

  1. Y-axis
  2. Legend
  3. Value axis
  4. Category axis

Answer

Category axis

Reason — The horizontal axis of a chart is called Category axis.

Question 10

Which component in Excel helps in depicting colors, patterns or symbols assigned to data series?

  1. Font
  2. Legend
  3. Data Range
  4. Chart Area

Answer

Legend

Reason — Legend component helps in depicting colors, patterns or symbols assigned to data series.

Question 11

Which type of chart is used for representing huge amount of data?

  1. Pie
  2. Line
  3. Bar
  4. Scatter

Answer

Line

Reason — Line chart is used for representing huge amount of data.

Question 12

What is the other name for XY chart?

  1. Pie
  2. Area
  3. Bar
  4. Scatter

Answer

Scatter

Reason — Scatter is the other name for XY chart.

Question 13

When a chart is placed inside a worksheet along with its source data, it is called ……………. .

  1. Chart Wall
  2. Embedded Chart
  3. Chart Sheet
  4. Chart Area

Answer

Embedded Chart

Reason — When a chart is placed inside a worksheet along with its source data, it is called Embedded Chart.

Question 14

Name the item that forms the heading of a chart.

  1. Legend
  2. Subtitle
  3. Value axis
  4. Chart Title

Answer

Chart Title

Reason — Chart Title forms the heading of a chart.

Question 15

The first Pie chart was seen in William Playfair’s book of ‘Statistical Breviary’ in …………… .

  1. 1908
  2. 1802
  3. 1805
  4. 1801

Answer

1801

Reason — The first Pie chart was seen in William Playfair’s book of ‘Statistical Breviary’ in 1801.

Question 16

Name the type of chart which does not have grid lines.

  1. Line
  2. Bar
  3. Pie
  4. Column

Answer

Pie

Reason — Pie chart does not have grid lines.

Question 17

…………… is called the total area of the chart.

  1. Data Area
  2. Plot Area
  3. Chart Area
  4. None of these

Answer

Chart Area

Reason — Chart Area is the total area of the chart.

Question 18

In MS Excel, Charts group is available on the …………… tab.

  1. Home
  2. Data
  3. Insert
  4. Formulas

Answer

Insert

Reason — In MS Excel, Charts group is available on the Insert tab.

Question 19

The axis that represents the values or units of the source data is called …………… .

  1. Category Axis
  2. Axis
  3. Value Axis
  4. None of these

Answer

Value Axis

Reason — The axis that represents the values or units of the source data is called Value Axis.

Question 20

Which type of chart looks similar to a spider net?

  1. Pie
  2. Bar
  3. Column
  4. Radar

Answer

Radar

Reason — Radar chart looks similar to a spider net.

State True or False

Question 1

You can change the font size of text within a cell.

Answer

True

Reason — We can change the font size of text within a cell.

Question 2

Text cannot be aligned within a cell.

Answer

False

Reason — Text can be aligned within a cell both horizontally and vertically.

Question 3

The default format for expressing numbers in Excel is general.

Answer

True

Reason — The default format for expressing numbers in Excel is general.

Question 4

The number of decimal places to be displayed can be increased or decreased in Excel.

Answer

True

Reason — The number of decimal places to be displayed can be increased or decreased from the Number Format box in the Number group on the Home tab.

Question 5

The Alignment tab is used to set only the horizontal alignment for data in cells.

Answer

False

Reason — The Alignment tab is used to set both the horizontal alignment as well as vertical alignment of data in cells.

Question 6

Justified option aligns data in cell to the left and to the right borders.

Answer

True

Reason — Justified option aligns data in cell to the left and to the right borders.

Question 7

Text Orientation is used to rotate text through a specified angle.

Answer

True

Reason — Text Orientation is used to rotate text through a specified angle.

Question 8

We cannot change the font color of data within the cells.

Answer

False

Reason — We can change the font color of data within the cells from the Font Color option present in the Font group of Home tab.

Question 9

A chart is a textual representation of data in a worksheet.

Answer

False

Reason — A chart is a graphical representation of data in a worksheet.

Question 10

Area chart displays data in the form of long rectangular rods also called bars.

Answer

False

Reason — Area chart emphasizes the magnitude of change over time. By showing the sum of the plotted values, an Area chart displays the relationship of parts to the whole.

Question 11

Line chart is in the form of lines and is used to illustrate trends in data at equal intervals.

Answer

True

Reason — Line chart is in the form of lines and is used to illustrate trends in data at equal intervals.

Question 12

Scatter chart is the default chart type in Excel.

Answer

False

Reason — Column chart is the default chart type in Excel.

Question 13

Stock chart has been designed specifically for plotting data related to stocks and shares.

Answer

True

Reason — Stock chart has been designed specifically for plotting data related to stocks and shares.

Question 14

Page Preview is used to check the overall content and formatting of a worksheet.

Answer

True

Reason — Page Preview is used to check the overall content and formatting of a worksheet.

Question 15

The shortcut key to preview the worksheet is Ctrl + F2.

Answer

True

Reason — The shortcut key to preview the worksheet is Ctrl + F2.

Question 16

There are only two types of charts in Excel.

Answer

False

Reason — There are eleven types of charts commonly used in Excel.

Question 17

MS Excel does not have option to preview the worksheet before sending it to print.

Answer

False

Reason — Ctrl + F2 key combination can be used to show the print preview of the worksheet.

Question 18

A Pie chart compares pieces of data using horizontal stacks.

Answer

False

Reason — A pie chart displays data in the form of a circle that is divided into a series of segments. It shows the proportional size of individual items that makes up a data series to the sum of items.

Question 19

Chart represents only pictorial information.

Answer

False

Reason — A chart is a graphical representation of data in a worksheet. It helps to provide a better understanding of large quantities of data. Charts make it easier to draw comparison and see growth, relationship among the values and trends in data.

Question 20

The Doughnut chart displays data in the form of bars.

Answer

False

Reason — The Doughnut chart displays data as sections of a circle. It can have more than one data series, which attempts to add another dimension to the Pie chart.

Theory Questions

Question 1

What do you understand by text orientation?

Answer

Text Orientation is used to rotate text through a specified angle. Text can be oriented in both up and down directions by specifying the angle in degrees.

Question 2

Which formatting effects can you apply using the Home tab? Explain a few.

Answer

Home tab provides us access to many groups which can be used to apply various formatting effects. Some of the formatting effects are as follows:

  1. Formatting Numbers — Numbers in Excel can be presented in different formats. By default, numbers are expressed in General format. The other formats for numbers are number, currency, accounting, date, time, percentage, fraction etc.
  2. Change Font — MS Excel offers Font option in the Font group to change the font of text.
  3. Change Font Size — MS Excel offers Size option in the Font group to change the font size of text.
  4. Font Style — MS Excel offers three font styles — Bold, Italics and Underline to emphasize the text.
  5. Cell Alignment — We can change the cell alignment in both ways i.e horizontally as well as vertically from the Alignment group of the Home tab.
  6. Text Alignment — It is used to align the text vertically and horizontally. Vertical alignment has the options — top, middle and bottom. Horizontal alignment has the options — left, center and right.

Question 3

Define the term chart. Name any two types of charts.

Answer

A chart is a graphical representation of data in a worksheet. It helps to provide a better understanding of large quantities of data.

Two types of charts are:

  1. Bar chart
  2. Pie chart

Question 4

Differentiate between Category Axis and Value Axis.

Answer

Category AxisValue Axis
Category axis or X-axis is the horizontal axis of a chart.Value axis or Y-axis is the vertical axis used to plot the values.
It is located at the bottom of the chart.It is located at the left side of the chart.

Question 5

Name the option which is used to see the output before printing. How is it used in Excel?

Answer

Print Preview option is used to see the output before printing.

To view the print preview of the spreadsheet, we follow the steps given below:

Step 1 — Click on the File tab and select the Print option.

Step 2 — A preview of worksheet automatically appears on the right side of the ‘Print’ pane.

Step 3 — If the worksheet contains more than one page, then click on the Next Page or Previous Page arrow buttons present at the bottom of the Preview window.

Step 4 — To exit Print Preview, simply press the Esc key

Question 6

What is a Scatter chart?

Answer

Scatter chart either shows the relationships in several data series or plots two groups of numbers as one series of XY co-ordinates. This chart shows uneven intervals or cluster of data and is commonly used for displaying scientific data.

X axis is usually assigned to an independent variable, the variable whose value is controlled or set by the experimenter. The Y variable then becomes the dependant variable. Its each value depends upon the corresponding value of variable X.

Question 7

Define Embedded Chart.

Answer

Excel offers the features to create an Embedded chart in a worksheet. It is displayed along with source data and other information present in a worksheet. An embedded chart is saved with the corresponding worksheet when a workbook is saved.

Question 8

What is the difference between Radar chart and Stock chart?

Answer

Radar chartStock chart
Radar chart looks similar to a spider net. It displays data values plotted as points which are connected by lines to form a grid.Stock chart is a type of column graph, which has been designed specifically for plotting data values related to stocks and shares or fluctuation of daily or annual temperature.
It is useful for comparing data that is not time dependent, but shows different circumstances such as variables in a scientific experiment or direction.The data required for these charts consists of specific data series like opening price, closing price, and high and low prices.
The poles of the Radar chart are equivalent to the Y-axis of other charts.In this type of chart, the X-axis represents a time series.

Question 9

Explain the different components of a chart.

Answer

The different components of a chart are as follows:

  1. Chart Area — Chart area includes all the area and objects in the chart.
  2. Category Axis — Category axis or X-axis is the horizontal axis of a chart.
  3. Value Axis — Value axis or Y-axis is the vertical axis used to plot the values. It is located at the left side.
  4. Data Series — Data series are the bars, slices or other elements that show the data values. If there are multiple data series in the chart, each will have a different colour or style.
  5. Category Name — Category names are the labels, which are displayed on the X and Y­ axis.
  6. Plot Area — Plot area is a window within the Chart area. It contains the actual chart itself and includes plotted data, data series, category, and value axis.
  7. Legend — It depicts the colours, patterns, or symbols assigned to the data series. It helps to differentiate the data.
  8. Chart Title — It describes the aim and contents of the chart.
  9. Gridlines — These can either be horizontal or vertical lines depending on the selected chart type. They extend across the plot area of the chart. Gridlines make it easier to read and understand the values.

Question 10

What is Pie chart? Describe its features.

Answer

Pie chart displays data in the form of a circle that is divided into a series of segments.

The features of a Pie chart are as follows:

  1. It shows the proportional size of individual items that makes up a data series to the sum of items.
  2. It always shows only one data series and is useful when we want to emphasize on a significant element.
  3. This chart works best with smaller number of values.

Question 11

Explain the process of printing a complete workbook.

Answer

We follow the given steps to print a complete workbook:

Step 1 — Click the File tab and select Print to access the Print pane.

Step 2 — Select the option Print Entire Workbook from the print range drop-down menu in the Settings section.

Step 3 — Change the page orientation either Portrait or Landscape from the Orientation drop-down list.

Step 4 — Choose the printer from the Printer drop-down list.

Step 5 — Enter the number of copies in the Copies spin box.

Step 6 — After selecting all the required options, click on the Print button.

The entire workbook will be printed.

Question 12

Describe the text formatting features of MS Excel and how are these useful.

Answer

MS Excel offers various formatting features to improve the appearance of text. You can change the text alignment, font, color, size, style, etc. through the formatting effects available in MS Excel. The text formatting features are as follows:

  1. Font Styles and Sizes — Excel allows users to customize text with various font styles and sizes, facilitating emphasis on specific information.
  2. Bold, Italics, and Underline — Users can apply these formatting options to highlight or differentiate data, making it visually appealing and easier to read.
  3. Text Alignment — Excel provides options for aligning text within cells, such as left, right, center, or justified, improving the overall presentation of data.
  4. Cell Merging and Wrapping — Merging cells creates custom layouts, while text wrapping ensures that lengthy text fits within a cell, preventing overflow and maintaining a tidy appearance.
  5. Text Orientation — This feature is used to rotate the text through a specified angle. Tilting text at an angle can enhance the visibility of data labels and can contribute to the overall aesthetics of the spreadsheet.

 

 

Application Based Questions

Question 1

A chart displaying the subject wise attendance of four students and its source data have been given to you. Answer the following questions based on them:

A chart displaying the subject wise attendance of four students and its source data have been given to you. Answer the following questions based on them. Computer Applications Code 165 Kips Cyber Beans Solutions Class 9 CBSE.
A chart displaying the subject wise attendance of four students and its source data have been given to you. Answer the following questions based on them. Computer Applications Code 165 Kips Cyber Beans Solutions Class 9 CBSE.

(i) Identify the Type of chart.

(ii) What is the title of the chart?

(iii) List the cell references of the three cell ranges used to produce this chart.

(iv) Suggest a suitable label for both category axis and value axis.

Answer

(i) The given chart is a type of stacked bar chart.

(ii) The title of the chart is ‘Student Attendance Record’.

(iii) The cell references of the three cell ranges used to produce this chart are:

  1. B2 : B5
  2. C2 : C5
  3. D2 : D5

(iv) A suitable label for Category Axis can be ‘Student Name’.

A suitable label for Value Axis can be ‘Number of Days’.

Question 2

A table containing descriptions of different types of charts is given below. Names of some charts are given below within the bracket. Fill them in front of their respective descriptions and complete the assignment.

[Stock, Area, Bar, Pie, Line, and Radar]

NameDescription
 It displays data in the form of long rectangular rods also called bars.
 This chart displays data in the form of a circle.
 It emphasizes the magnitude i.e., the volume of change over time.
 It is designed specifically for plotting data values related to stocks and shares.
 It is in the form of lines and is used to illustrate trends in data at equal intervals.
 It is a type of chart that resembles a spider net.

Answer

NameDescription
BarIt displays data in the form of long rectangular rods also called bars.
PieThis chart displays data in the form of a circle.
AreaIt emphasizes the magnitude i.e., the volume of change over time.
StockIt is designed specifically for plotting data values related-to stocks and shares.
LineIt is in the form of lines and is used to illustrate trends in data at equal intervals.
RadarIt is a type of chart that resembles a spider net.

 

Question 3

A 3D line chart on Employee Payroll System is given below. Apply the following formatting effects to the chart:

A 3D line chart on Employee Payroll System is given below. Apply the following formatting effects to the chart. Computer Applications Code 165 Kips Cyber Beans Solutions Class 9 CBSE.
A 3D line chart on Employee Payroll System is given below. Apply the following formatting effects to the chart. Computer Applications Code 165 Kips Cyber Beans Solutions Class 9 CBSE.

(i) Change the Chart Title to ‘Employee Salary and Bonus’.

(ii) Change the title of X axis to ‘Names’ and Y axis to ‘Amount’.

(iii) Change the Font of Chart Title to ‘Tahoma’, Font size as 16, Font style as Bold and Font color as blue.

(iv) Change the scale for Y axis and display the values between 100 to 8500.

Answer

(i) We can follow the given steps to change the chart title:

Step 1 — Double-click on the chart title.

Step 2 — A textbox appears around the title.

Step 3 — Delete the previous title and type ‘Employee Salary and Bonus’ in the text box.

Step 4 — Click outside the chart area and the Chart Title will be changed.

(ii) We can follow the given steps to change the title of X axis:

Step 1 — Double-click on the title of X axis.

Step 2 — A textbox appears around the title.

Step 3 — Delete the previous title and type ‘Names’ in the text box.

Step 4 — Click outside the chart area and the title of X axis will be changed.

Similarly, the title of Y-axis can be changed by clicking on the title of Y axis and replacing the previous title with ‘Amount’ in the text box.

(iii) We can follow the given steps to format the Chart Title:

Step 1 — Click on the chart title and select it.

Step 2 — Go to the ‘Home’ tab on the Excel ribbon.

Step 3 — Use the Font options to change the font to ‘Tahoma’, size to 16, style to Bold, and color to blue.

(iv) We can follow the given steps to change the scale for Y axis and display the values between 100 to 8500:

Step 1 — Click on the chart to select it.

Step 2 — Point the mouse at Y-axis. Right-click on it and select the Format Axis option from the Shortcut menu.

Step 3 — The Format Axis dialog box will open. The Axis Options tab is selected by default. Click on the Fixed radio button for Minimum field and enter 100 in the text box.

Step 4 — Similarly, enter 8500 in the text box of the Maximum field. Click on Close button. The scale on the chart changes accordingly.

A 3D line chart on Employee Payroll System is given below. Apply the following formatting effects to the chart. Computer Applications Code 165 Kips Cyber Beans Solutions Class 9 CBSE.

Question 4

An Area chart depicting the trends in Bills over different months is shown along with its source data. Apply the formatting effects given below to the Area chart then print this chart along with the worksheet data.

An Area chart depicting the trends in Bills over different months is shown along with its source data. Apply the formatting effects given below to the Area chart then print this chart along with the worksheet data. Computer Applications Code 165 Kips Cyber Beans Solutions Class 9 CBSE.
An Area chart depicting the trends in Bills over different months is shown along with its source data. Apply the formatting effects given below to the Area chart then print this chart along with the worksheet data. Computer Applications Code 165 Kips Cyber Beans Solutions Class 9 CBSE.

(i) Apply a border to the Chart area and also apply a background color of your choice.

(ii) Using the Gradient Fill option, set the background for the Plot area as ‘Moss’.

(iii) Apply a border to the Legend and position it at the bottom of the chart.

Answer

(i) We can follow the given steps to apply a border to the chart area:

Step 1 — Right-click on the Plot area and select the Format Plot Area option. The Format Plot Area dialog box appears.

Step 2 — Select ‘Border Styles’, ‘Border Color’, ‘Shadow’, etc.

Step 3 — By default, the Fill tab is selected. Select the Solid fill option in the right pane.

Step 4 — Click on the Color button and select the desired colour from the drop­ down menu.

Step 5 — Click on Close button.

We can follow the given steps to apply a background color of our choice:

Step 1 — Click on the chart to select it.

Step 2 — Right-click and choose “Format Chart Area.”

Step 3 — In the Format Chart Area pane, choose ‘Fill & Line.’

Step 4 — Click on ‘Fill’ and choose the background color.

(ii) We can follow the given steps to set the background for the Plot area as ‘Moss’:

Step 1 — Click on the plot area of the chart.

Step 2 — Right-click and choose “Format Plot Area.”

Step 3 — In the Format Plot Area pane, go to the Fill options.

Step 4 — Choose ‘Gradient Fill’ and set the gradient colors, selecting ‘Moss’ as one of the colors.

(iii) We can follow the given steps to apply a border to the Legend and position it at the bottom of the chart:

Step 1 — Click on the legend to select it.

Step 2 — Right-click and choose “Format Legend.”

Step 3 — In the Format Legend pane, go to the Border Color option and choose a border color. Adjust the Border Styles and Weight as needed.

Step 4 — To position the legend at the bottom, right-click and choose ‘Legend Options’.

Step 5 — Click on Bottom in the Position option.

An Area chart depicting the trends in Bills over different months is shown along with its source data. Apply the formatting effects given below to the Area chart then print this chart along with the worksheet data. Computer Applications Code 165 Kips Cyber Beans Solutions Class 9 CBSE.

Answers of Ratna Sagar Book

Chapter 1: An Introduction to Computer System
Chapter 2: Exploring Computer Components Loding...
Chapter 3: Exploring Computer Software Loding...
Chapter 4: Operating Systems
Chapter 5: Communication Technologies and Multimedia
Chapter 6: Cyber Safety
Chapter 7: Word Processing Tool — OpenOffice Writer
Chapter 8: Spreadsheet Tool — OpenOffice Calc
Chapter 9: Presentation Tool — OpenOffice Impress
error: Content is protected !!