Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Solution

COMP

Class 09 - Computer Applications (165)


1. Read the text carefully and answer the questions:
Storage Unit (Memory Unit)
The function of the storage unit is to store information. The data and instructions that are entered into the computer system
through input units have to be stored inside the computer before the actual processing starts. Similarly, the results produced by
computer after processing must be kept somewhere before they are passed onto the output unit for display. Moreover, the
intermediate results produced by the computer must also be preserved. The storage unit or the primary/main memory of the
computer provides support for these storage functions. The main memory is a fast memory. It stores programs along with the data.
The main memory is directly accessed by the CPU. To sum up, the storage unit performs the following functions:
It stores the data and the program (set of instructions).
It holds the intermediate results of processing.
It stores the final results of processing before they are passed onto the output unit.
The memory of the computer can be thought of as cells where each cell may be defined as a device which can store a symbol
selected from a set of symbols. Each of these cells is further broken down into smaller parts called bits. A bit means a binary digit,
i.e. either 0 or 1. A group of 8 bits is called a byte and a group of 4 bits is called a nibble. One byte is the smallest unit that can
represent a data item or a character.
(i) (c) Store information
Explanation: Storage unit is used to store data in the computer system. Storage unit can be primary memory(RAM,
ROM) and secondary memory(CD, DVD, pen drive, etc).
hu
(ii) (d) Option (d)
Explanation: The Primary storage unit is used for four activities - Input/output operations; Manipulation of text and
calculation operations; Logic/comparison operations; Storage and retrieval operations. Data is fed into an input
s
storage area; Intermediate processing results are held in working storage area; Final processing results are held in
an

output storage area, and a program storage area contains the processing instructions.
(iii) (d) Option (c)
Pr

Explanation: A group of four bits is called nibble whereas a group of 8 bits is known as byte.
(iv) (d) RAM, ROM
Explanation: RAM chip provides volatile storage, but as long as it is supplied with power, it needs no special
regenerator circuits to retain the stored data.
Read Only Memory, i.e, ROM chip retains the stored data when the power supply is cut.
(v) (d) CPU
Explanation: CPU is fixed on the motherboard which is placed inside the system cabinet. All the devices of
computer are connected to the motherboard directly or indirectly.
2. Read the text carefully and answer the questions:
Spyware
Spyware is a type of malware (or "malicious software") that collects and shares information about a computer or network without
the user's consent. It can be installed as a hidden component of genuine software packages or via traditional malware vectors such
as deceptive ads, websites, email, instant messages, as well as direct file-sharing connections. Unlike other types of malware,
spyware is heavily used not only by criminal organizations, but also by unscrupulous advertisers and companies who use spyware
to collect market data from users without their consent. Regardless of its source, spyware runs hidden from the user and is often
difficult to detect, but can lead to symptoms such as degraded system performance and a high frequency of unwanted behaviour
(pop-ups, rerouted browser homepage, search results, etc.).
Spyware is also notable for its networking capabilities. Using an infected system to find information is of little value if the
spyware can't deliver that information back to the attacker. As a result, spyware employs a variety of techniques to communicate
back to an attacker in a way that will not cause suspicion or generate attention from network security teams.
(i) (d) Malware
Explanation: Malware (or 'malicious software') is a program or files that are developed for the purpose of doing

1/6
harm.
Worms seek to infect and replicate without targeting and infecting specific files already present on a computer.
(ii) (d) Genuine
Explanation: Genuine
(iii) (a) Spyware
Explanation: Spyware
(iv) (d) User
Explanation: Spyware tracks websites visited by a user and uses this information to build a profile. Some spyware
can even collect personal information forms filled out online.
(v) (c) Attacker
Explanation: Spyware is anything that takes up residence on a computer, usually uninvited, that can report on the
activities and preferences of the computer's users or disclose information about data stored on a computer.
3.
(b) All of these
Explanation: All of these
4.
(d) Disk fragmentation
Explanation: Disk defragmenters detects computer files and disjoints fragments, and move the fragments together to increase
efficiency.
5. (a) CU
Explanation: CU is used to coordinate the input and the output devices of a computer system.
6.
hu
(c) Windows
Explanation: Windows
s
7. (a) 256 colors
an

Explanation: 8-bit color graphics are a method of storing image information in a computer's memory or in an image file, so
that each pixel is represented by 8-bits. The maximum number of colors that can be displayed at any one time is 256 or 28.
Pr

8.
(b) None of these
Explanation: CRT is a type of monitor. CRT means Cathode Ray Tub. The CRT has a display screen of 25 lines of 80
characters each; it is used in most desktop monitors. Some CRT screens are monochrome (one color) while others produce
many colors.
9.
(d) Block special file
Explanation: Special files are of two types as Character special file and Block special file.
10.
(d) Program virus
Explanation: Program virus
11.
(c) All of these
Explanation: All of these
12. (a) All of these
Explanation: All of these
13.
(d) Application software
Explanation: Application software
14.
(b) Hang
Explanation: Hang refers to the condition in which your computer or software stops working.

2/6
15.
(b) Spam
Explanation: Spam
16.
(b) Both A and R are true but R is not the correct explanation of A.
Explanation: Both A and R are true but R is not the correct explanation of A.
17.
(b) Both A and R are true but R is not the correct explanation of A.
Explanation: The operating system is responsible for the following activities in connection with file management:
Allocating and deallocating memory space as needed.
Creating and deleting files.
Creating and deleting directories to organise files.
Supporting primitives for manipulating files and directories.
Mapping files onto secondary storage.
Backing up files on stable (non-volatile) storage media.

18.
(c) A is true but R is false.
Explanation: A DVD (Digital Versatile Disk) is made up of several layers of plastic, totalling about 1.2 millimeters thick.
Each writable layer of a DVD has many tracks of data.
19.
(c) A is true but R is false.
Explanation: A is true but R is false.
hu
20.
(d) A is false but R is true.
s
Explanation: A Braille embosser is a printer, necessarily an impact printer, that renders text as Braille. Utilizing special
an

translation software, a print document can be embossed with relative ease, making Braille production much more efficient and
cost-effective.
21. (a) Both A and R are true and R is the correct explanation of A.
Pr

Explanation: Both A and R are true and R is the correct explanation of A.


22.
(b) Both A and R are true but R is not the correct explanation of A.
Explanation: Both A and R are true but R is not the correct explanation of A.
23. (a) Both A and R are true and R is the correct explanation of A.
Explanation: Both A and R are true and R is the correct explanation of A.
24.
(d) A is false but R is true.
Explanation: A is false but R is true.
25.
(c) A is true but R is false.
Explanation: A is true but R is false.
26.
(b) Both A and R are true but R is not the correct explanation of A.
Explanation: Both A and R are true but R is not the correct explanation of A.
27.
(d) A is false but R is true.
Explanation: A is false but R is true.
28. Fill in the blanks:
(i) 1. Software
(ii) 1. GUI

3/6
(iii) 1. short range
(iv) 1. Kernel
(v) 1. Jarkko Oikarinen
(vi) 1. Cyber crime
(vii) 1. e-commerce
(viii)1. Worm
(ix) 1. Passwords
(x) 1. Worm
29.
(b) Option (d)
Explanation: All of these
30. (a) Option (a)
Explanation: Secondary memory is the slowest and cheapest form of memory. It cannot be processed directly by the CPU and
it must be first copied into RAM.
31. (a) It cannot travel on its own
Explanation: Worm is self-replicating software and thus, it can travel on its own.
32. An optical disc is an electronic data storage medium that can be written to and read using a low-powered laser beam. They can
store data up to 6 to 7 gigabytes.
Some types of optical discs are:
i. CD
ii. DVD u
33. The twisted pair cable are of two types:
sh
i. Unshielded Twisted Pair (UTP) cable.
ii. Shielded Twisted Pair (STP) cable.
34. Computer software is a collection of programs, procedures and related data that provide the instructions for telling a computer
an

what to do and how to do.


35. A plotter is an output device that is used to create layouts, diagrams and banners.
36. i. PAN: It stands for Personal Area Network. It is a computer network used for communication among computer and different
Pr

technological devices close to it. Technologies such as Bluetooth and infrared communication form a wireless PAN around the
device.
ii. WiMAX: It stands for Worldwide Interoperability for Microwave Access. It is a wireless transmission of data using a variety
of transmission modes.
37. The bottom line of any window is called Status bar in which an application can display various kinds of status information such as
current window’s state, background tasks (such as printing, scanning etc.) or other contextual information (such as selection, etc.).
38. BOSS is an acronym for Bharat Operating System Solutions. It is a GNU/Linux distribution developed by C-DAC, Chennai in
order to benefit the usage of Free/Open source software in India. It has enhanced desktop environment integrated with Indian
language support and other software.
This software package has been described as "India's own PC operating system". The software has also been endorsed by
Government of India for adoption and implementation to the national scale.
39. Files are the collection of information. In fact, almost all type of information is stored into the files. There are many types of files
stored in different formats including operating system files, program files and your personal files. Different types of files contain
different types of information.
40. Android is a mobile operating system developed by Google, based on the Linux Kernel and designed primarily for touch screen
mobile and tablets. Android's user interface is mainly based on direct manipulation, using touch gestures that loosely correspond
to real-world actions, such as swapping, tapping and pinching to manipulate on-screen objects, along with a virtual keyboard for
text input.
41. It is a computerised system used to store and retrieve information and conduct transactions related to air travel, hotels, car rental
or other activities. Reservation system is an application software which is commonly seen at railway reservation offices, this
software helps the concerned department to automatically check the availability of the seats or berths of any train and on any
particular date with an incomparable speed. Today, number of Websites like www.yatra.com, www.makemytrip.com, provide
online booking for tourists.

4/6
42. It is also known as Secondary Storage or Auxiliary Memory. It is slower and cheaper form of memory, which is a permanent
storage device. CPU does not access the secondary memory directly. The contents in it must be first copied into the RAM to get
processed. Secondary memory is non-volatile in nature, i.e. the information does not get erased even when power gets switched
OFF and data will not be destructed until and unless the user erases it.
Secondary memory devices include
Magnetic disks Optical discs Solid State

Floppy Disk Drive CD Pen/Flash Drive

Hard Disk Drive DVD Memory Stick

Magnetic Tape Blu-ray Disc


43. Windows 7 is a GUI based operating system developed by Microsoft. It has amazing features that have made it a popular choice to
be used at homes, offices, educational institutes and various other places. It has a user-friendly interface that is very convenient to
use and even a person who is not well versed with computers can learn and use it easily. The user need not type commands like in
the CUI operating system.
Features of Windows 7: Following are some of the distinct features of Windows 7 that have made it the most popular and
commonly used operating system.
i. User-friendly GUI Interface and Multi-tasking: Windows 7 has a user-friendly GUI interface that allows you to work with
a pointing device, like a mouse. It even allows you to open and work with more than one application program at a time.
ii. Aero Shake Feature: Windows 7 supports Aero Shake feature that enables you to click a window pane and shake your mouse
to minimise all other open windows. You can shake the pane again to restore the windows to their original sizes.
iii. Aero Themes and Aero Background: Windows 7 allows you to use new themes or choose a slideshow of your favourite
photographs to make your PC reflect your personal taste.
hu
iv. Home Media Streaming: Windows 7 enables you to use your PC as a hub to store and share the music, videos, photos, and
even support TV functions or stream it to support other devices using the Play To option.
v. Homegroup: The Homegroup is a feature in Windows 7 that enables you to easily connect to two or more PCs running on
s
Windows 7, on your home network, for the purpose of sharing. You can share pictures, music, videos, documents and printers
an

with other people in your homegroup.


vi. Internet and Digital TV: You can watch Internet TV or turn your PC into a digital video recorder by using the support in
Windows Media Centre for many new broadcast TV tuners.
Pr

vii. Jump Lists: The Jump Lists feature allows you to quickly access your favourite, recent and frequently used files.
44. In this, the original work is edited, reframed and reproduced. It is very common in the education field.
45. e-commerce: Buying and selling of goods on the internet
Two preventive measures for secure online transaction are:
i. Never share OTP with anyone.
ii. Before making an online payment, ensure that connection is secure (HTTPS).
46. The gap between technical knowledge of the people who have access to computers and internet and those who do not have that
access.
47. ‘E-learning’ is the term used to explain the scenario where the teaching-learning process happens online using the Internet and
communication technology. In it, technology is used to enable people to learn anytime and anywhere. It can include training, the
delivery of just-in-time information and guidance from experts.
48. Two precautions that she should take to prevent online fraud are as follows:
i. Do not share user id and password with anyone.
ii. Avoid doing transactions from cyber cafe and other public places.
49. Anonymous browsers allow users to view websites without revealing any personal information like their IP address.
50. While selecting passwords the following points are to be remembered:
i. The longer the password, the harder it is to crack. Consider a 12-character password or longer.
ii. Avoid names, places, and dictionary words.
iii. Mix it up. Use variations on capitalisation, spelling, numbers and punctuation.
iv. You may also use a specialised Password Manager package; as ultimately the number of passwords that you need to remember
will grow.
51. Digital divide refers to the differing amount of information between those who have access to ICT and those who don't have
access.

5/6
Reasons:
i. Due to the unequal distribution of wealth, poverty is higher in rural areas.
ii. Less literacy rate in rural India.
52. Digital unite refers to a society where everyone would be skilled and equipped to take advantages of various ICT services.
Everyone would be able to access the Internet, even in rural and remote areas. People will be educated enough to utilise
technology.
The gap between the digital divide and the digital unite must be covered, so that maximum benefits can be taken from the
technologies.
i. For making this possible, both the people and the governments should work together. People should use such tools to educate
themselves and not feel hesitant about learning and using new technologies.
ii. Governments should work on providing basic education and basic infrastructure for using such technologies to all the people
so that maximum people can get the benefits of technology.
53. There are various ways from being stalked on social media
Hide your contacts: You should hide your contacts because a stalker may try to reach out to a friend of yours in order to
get close to you.
Use security features: Keep your computer free from threats or breaches in security by installing safety software and a
firewall.
Disable geotagging: It can be dangerous because a stalker can know where you are. So geotagging should be disable.
Make your profile private: Always make your profile private, to protect yourself from a stalker. Set your settings to only
share information.
Delete an old account: You should delete your old account that are inactive.
54. Recent advances in information technology threaten privacy and have reduced the amount of control over personal data and open
up the possibility of a range of negative consequences as a result of access to personal data. A variety of information on
u
individuals is kept in databases. These databases house information, such as social security numbers, credit card numbers, medical
sh
histories, family histories and many more. Practically, every organisation has a database full of information on everyone they do
business with. The concern with this is whether or not they should be collecting this information, what they will do with it, how
secure it is, how accurate it is and to whom it can be sold. Personal data is increasingly made available in online databases, which
an

can be accessed by search engines. The question that concerns is: should personal information like we discussed, be so readily
available to the public? The availability of personal information shows no signs of slowing. In fact, courts and government
agencies at all levels are increasingly making public records available online. Some find it troubling given the sensitive
Pr

information contained in the available documents. For instance, someone filing for bankruptcy must disclose their social security
number, their bank and credit card numbers, account balances and even childrens names and ages.
One of the fastest-growing crimes has been identity theft. Identity theft is the stealing of another person’s social security number,
credit card number, or other personal information for the purpose of paying bills, using the personal information to do illegal
activities using other person’s identity. In some cases, thieves even withdraw cash directly from the victim’s bank account. Since,
many private organisations and governments keep information about individuals in accessible databases, there is an endless
opportunity for thieves to retrieve it and misuse the information.

6/6

You might also like