0% found this document useful (0 votes)
12 views11 pages

Must To Do Questions SST

The document provides a comprehensive guide on various topics related to IT, including steps for applying styles in word processors, benefits of Fill Format Mode, and the importance of tracking changes in documents. It also covers database concepts such as primary and foreign keys, data validation, and the differences between hierarchical and network models. Additionally, it discusses spreadsheet functionalities like What-If Analysis, scenarios, and the use of macros, along with workplace safety measures.

Uploaded by

abhishek721575
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views11 pages

Must To Do Questions SST

The document provides a comprehensive guide on various topics related to IT, including steps for applying styles in word processors, benefits of Fill Format Mode, and the importance of tracking changes in documents. It also covers database concepts such as primary and foreign keys, data validation, and the differences between hierarchical and network models. Additionally, it discusses spreadsheet functionalities like What-If Analysis, scenarios, and the use of macros, along with workplace safety measures.

Uploaded by

abhishek721575
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

CLASS – X

SUBJECT – IT (402)
MUST DO QUESTIONS

1. Write the steps to apply a style to a paragraph in Writer.


To apply a style to a paragraph in a word processor (like LibreOffice Writer or Microsoft Word), follow
these steps:
1. Place the cursor in the paragraph you want to apply a style to, or select the entire paragraph.
2. Open the Styles panel (usually on the right side of the screen, or through the F11 shortcut).
3. In the Styles panel, choose the style you want to apply (e.g., Heading 1, Normal, Title).
4. Click on the desired style, and it will be applied to the selected paragraph.

2. Explain the benefits of using Fill Format Mode in digital documentation.


Fill Format Mode allows you to apply formatting from one part of a document to another quickly. Here
are the benefits:
1. Efficiency: You can quickly copy the formatting from one section and apply it to multiple other
areas.
2. Consistency: Ensures uniformity in formatting across the document without manually reapplying
settings.
3. Convenience: Helps in maintaining consistency when formatting large sections of text, tables, or
other document elements.
4. Error Prevention: Reduces mistakes from manually applying inconsistent formatting.

3. How does updating a style affect the elements in a document where that style has been applied?
When a style is updated, all elements where that style has been applied will automatically reflect the
changes. For example:
• If you update the Heading 1 style (e.g., changing font size or color), every paragraph with that
style will update accordingly.
• This ensures consistency throughout the document, and you don’t have to manually edit each
element.

4. Define the following with respect to images in a document:


• a. Text wrapping
• b. Alignment
• c. Anchoring
• d. Arrangement
a. Text Wrapping: Refers to how text flows around an image. Common options include wrapping text
closely around the image, aligning it to one side (left or right), or allowing the text to flow above and
below the image without touching it.
b. Alignment: Refers to the positioning of an image relative to the surrounding text. This can include left,
center, or right alignment.
c. Anchoring: Refers to how an image is attached to the text. You can anchor an image to a specific
paragraph or to a page, meaning it will move with the text or remain fixed.
d. Arrangement: Refers to the layering of images relative to other objects, like text or other images. It
can include options like bringing an image to the front or sending it to the back.

5. Write four characteristics of a good table of contents.


1. Clear Structure: It should clearly list the main sections and subsections of the document with
proper hierarchical indentation.
2. Page Numbers: Should include page numbers for easy navigation.
3. Accurate: Must reflect the exact section headings and their corresponding page numbers.
4. Consistent Formatting: Should use a consistent style and formatting (font, size, indentation) for
readability and clarity.
6. State the need of using Track changes in a document?
Tracking changes is essential for reviewing and collaborating on a document, especially in a professional
setting. The key reasons include:
• Collaboration: Allows multiple users to make edits while keeping a record of who made each
change.
• Revision History: Helps in tracking edits and reverting changes if necessary.
• Feedback and Approval: Reviewers can suggest edits, and authors can accept or reject changes
based on feedback.
• Transparency: Ensures all changes are visible and transparent to everyone involved in the
document's creation or review.

7. What is accepting and rejecting changes in a document?


• Accepting changes means that the author approves of the suggested modification, and it becomes
part of the document.
• Rejecting changes means that the author chooses to discard a suggested modification, leaving the
document unchanged at that point. These actions help in finalizing documents by determining
which edits are included and which are excluded.

8. How do you resolve conflicts in a shared spreadsheet?


Conflicts in a shared spreadsheet typically occur when two users edit the same cell or range
simultaneously. To resolve conflicts:
1. Review Changes: Identify the conflicting changes and determine which version is correct.
2. Communicate: If necessary, reach out to the other user to confirm which change should be kept.
3. Use Version History: Many spreadsheet tools (like Google Sheets or Excel) allow you to view
the document’s version history to track changes and restore previous versions if needed.
4. Lock Cells: If conflicts are frequent, locking certain cells to prevent others from editing them can
help reduce the likelihood of conflicts.

9. Explain how consolidating data in a spreadsheet can improve decision-making.


Answer:
Consolidating data in a spreadsheet means combining information from multiple sources into one
central location. This improves decision-making by:
• Providing a comprehensive view: Decision-makers can analyze all relevant data in one place,
leading to more informed choices.
• Identifying trends: By consolidating, it becomes easier to spot trends or patterns across different
data sets.
• Enhancing accuracy: Combining data from multiple sources reduces errors that could arise from
analyzing separate datasets.
• Saving time: Instead of manually reviewing separate sheets, consolidation allows quick access to
the overall data, speeding up the decision-making process.

10. Describe a real-life scenario where What-If Analysis tools could be beneficial.
Answer:
In a business scenario, a company could use What-If Analysis tools to forecast the impact of changing
variables on their profits. For example:
• A retail manager may use What-If Analysis to predict how different price changes (e.g.,
increasing or decreasing the price of a product) could affect total revenue. By adjusting the
variables like cost, demand, or sales volume, the manager can evaluate different pricing strategies
and their potential outcomes before making a final decision.
11. Niharika is preparing spreadsheet notes for her Term Exam. Help her to write a short note
on the following:
a. Scenarios
Answer:
A Scenario in a spreadsheet is a set of different values that can be substituted into a model to see how
those values impact the results. It allows Niharika to create multiple versions of the same model (e.g.,
best-case, worst-case, or most likely scenarios) and compare the outcomes to make informed
decisions.
b. Goal Seek
Answer:
Goal Seek is a tool in spreadsheets that helps Niharika find the input value required to achieve a
specific output. For example, if she wants to know what price she needs to sell a product at in order to
make a certain amount of profit, Goal Seek will calculate the input value for her.
c. Multiple operations
Answer:
Multiple operations in a spreadsheet refer to performing more than one calculation or function
simultaneously in a cell or across multiple cells. For example, Niharika might want to perform
operations like addition, subtraction, multiplication, or division on various data sets in a single step.
d. Subtotal
Answer:
The Subtotal function in a spreadsheet is used to summarize data in a list or database by performing
calculations such as sums, averages, counts, and more. Niharika can use this function to group data by
categories and automatically calculate totals or averages for each group.

12. Sharing a spreadsheet is useful. Why?


Answer:
Sharing a spreadsheet is useful because:
• Collaboration: Multiple users can work on the document at the same time, making teamwork
more efficient.
• Real-time updates: Changes made by one person are instantly visible to all collaborators,
reducing delays.
• Feedback and review: Others can easily add comments or suggestions, improving the
document's accuracy and effectiveness.
• Access control: Users can be given different levels of access (view or edit), allowing for secure
sharing and collaboration.

13. Describe the different types of hyperlinks.


Answer:
There are several types of hyperlinks:
• Web hyperlinks: Links that point to a webpage or website (e.g., https://www.example.com).
• Email hyperlinks: Links that open the default email client with a pre-filled email address (e.g.,
mailto:someone@example.com).
• Internal hyperlinks: Links that point to a different location within the same document (e.g., a
link to a specific cell in a spreadsheet).
• External file hyperlinks: Links that open a file stored on your computer or a shared network
(e.g., a link to a PDF or Word document).

14. Discuss the benefits and potential drawbacks of using Macros in a spreadsheet.
Answer:
Benefits:
• Automation: Macros can automate repetitive tasks, saving time and effort.
• Consistency: Ensures that tasks are performed in the same way every time, reducing human error.
• Efficiency: Complex operations that would take a lot of manual effort can be completed with a
single click.
Potential Drawbacks:
• Security risks: Macros can carry malware or malicious code, so they need to be handled with
care.
• Complexity: Creating and editing macros may require programming knowledge, making it less
user-friendly for beginners.
• Compatibility: Macros may not work properly across different versions of spreadsheet software
or on other users’ systems, potentially causing compatibility issues.

15. Explain what is a primary key and a foreign key. Also explain their roles in a database.
Answer:
• Primary Key:
A primary key is a unique identifier for each record in a database table. It ensures that each
record can be uniquely identified and prevents duplication within the table. A primary key cannot
have a NULL value.
Role: The primary key ensures the uniqueness and integrity of data in the table, providing a
reliable way to refer to individual records.
• Foreign Key:
A foreign key is a field in one table that links to the primary key in another table. It establishes a
relationship between two tables. The foreign key can have duplicate values and can also be NULL
(depending on the database design).
Role: The foreign key enforces referential integrity by ensuring that the relationship between
tables remains consistent, meaning that a record in the child table can only reference an existing
record in the parent table.

16. Describe the differences between a hierarchical model and a network model in database
management.
Answer:
• Hierarchical Model:
The hierarchical model organizes data in a tree-like structure, where each parent node can have
multiple child nodes, but each child node has only one parent. This model is best suited for
representing data with a clear, hierarchical relationship (e.g., organizational charts).
Characteristics:
o Data is arranged in a single root with sub-levels.
o Navigation is simple and follows parent-child relationships.
o It is difficult to model complex relationships.
• Network Model:
The network model allows more complex relationships by permitting multiple parent nodes for
each child node. This model uses a graph structure where nodes (data) can have multiple
relationships (edges) to other nodes.
Characteristics:
o Data is arranged in a graph format with multiple relationships.
o Supports many-to-many relationships.
o More flexible and allows complex relationships to be represented.
Key Differences:
• Relationship Type: The hierarchical model supports only one-to-many relationships, while the
network model supports many-to-many relationships.
• Structure: The hierarchical model uses a tree structure, while the network model uses a graph
with interconnected nodes.

17. Why is data validation important in a DBMS, and how does it help maintain data integrity?
Answer:
Importance of Data Validation:
Data validation is a process of ensuring that the data entered into the database is accurate, complete, and
in the correct format. It is important in a DBMS because:
• It prevents incorrect or inconsistent data from being entered into the database.
• It ensures that only data that meets the required conditions or rules is stored, reducing errors in
data processing and analysis.
How Data Validation Helps Maintain Data Integrity:
• Prevents Invalid Data: By setting rules (like data type restrictions, ranges, or patterns),
validation ensures that only valid data is entered. For example, ensuring that an age field contains
only numeric values between 0 and 120.
• Ensures Consistency: Validation rules can ensure that related fields in different tables (via
foreign keys) remain consistent. For example, a valid order can only be placed for an existing
customer.
• Improves Accuracy: Validation helps reduce human errors, ensuring that the data stored is
accurate and reliable.
• Promotes Referential Integrity: By using validation techniques such as foreign key constraints,
it ensures that a record cannot reference a non-existing record in another table.

18. Why is it important to maintain a clean and hygienic environment in the workplace?
Answer: Maintaining a clean and hygienic environment in the workplace is important
because it helps prevent the spread of diseases, ensures employee well-being, and enhances
productivity.

19. Describe how the hierarchy of control measures can be applied to minimize risks in the
workplace.
Answer: The hierarchy of control measures can be applied by first attempting to eliminate
the hazard, then using engineering controls to isolate it, and finally minimizing risks by using
personal protective equipment and regular monitoring.

20. What steps can be taken to ensure electrical safety in the workplace?

Answer: Steps to ensure electrical safety in the workplace include avoiding water near
electrical equipment, using surge protectors, ensuring circuits are not overloaded, and
conducting regular inspections of wiring and equipment.

21. What do you mean by Hyperlinks in Spreadsheets? Give the two different types of Hyperlinks that
can be used in Spreadsheets.
Ans: Document Hyperlink in a spreadsheet is defined as a reference to any location, webpage or a
document that we can access by clicking the Link Using these links you can combine text as well as
other spreadsheet objects such as charts, sheets, images etc. There are two types of hyperlinks-
Relative hyperlink and absolute hyperlink.

22. List Numeric and Alphanumeric Datatypes in LibreOffice Base. Ans: Numeric datatypes in
LibreOffice Base are: Tinylnt, Smalllnt, Integer, Biglnt, Decimal, Real, Float, Double and Boolean.
Alphanumeric Data Types in OpenOffice Base are: Char, Varchar, Varcharjgnorecase and
Longvarchar

23. Mention any two operations that can be performed using Macros in a spreadsheet. Ans: The
templates are used to create documents In spreadsheets, Macros are used to perform different
types of operations. Such as: • Formatting settings to be applied repeatedly in the cell range of a
worksheet. • Sorting data in a table. • Applying any Mathematical functions/ formulas in a table.

24. Your friend owns a chemist shop, he needs to keep records of the medicines with their id’s, date
of purchase, expiry date, price, etc. in a database program. But he does not have any
knowledge about the database. Explain to him the following to get a better understanding of
the DBMS concepts.

(a) What is DBMS? Explain in brief.


(b) Name any two database programs which can be used to create a table and store the data as
per the requirement.
(c) Which field can be set as a Primary Key?
(d) Is it possible to make more than one field as a primary key in your table? (Yes/No). Justify
your answer.
Ans: (a) A database management system is a software package with computer programs that
controLs the creation, maintenance, and use of a database. Itallows organizations to
conveniently develop databases for various applications. (b) Two databases are: (i) Microsoft
Access (ii) MySQL (iii) OpcnOffice Base (c) Id field will be suitable for Primary Key. (d) Yes. we
can make more than one column as a primary key in a table and it is known as Composite
Primary Key.

25. Define the following: (a) Sorting (with respect to DBMS) (b) Referential Integrity (c) Many-to-
Many Relationship(with respect to DBMS) (d) Foreign key

Ans: (a) Sorting Data Sorting means to arrange the data in either ascending order of descending order.
Select the eolumn(s) then click on sort buttons. The data will be displayed accordingly. (b) Referential
Integrity Referential integrity is used to maintain accuracy and consistency of data in a relationship. In
Base, data can be linked between two or more tables with the help of primary key and foreign key
constraints. Referential integrity helps to avoid: • Adding records to a related table if there is no
associated record available in the primary key table. • Changing values in a primary if any dependent
records are present in associated table(s). • Deleting records from a primary key table if there are any
matching related records available in associated table(s). (c) Many to Many Relationship: In this
relationship, no table has the primary key column. It signifies that atl the columns of primary key table
are associated with all the columns of associated table. Example: In the given tables EMP and DEPT,
there is no primary key. (d) Foreign key (FK): identifies a column or set of columns in one (referencing)
table that refers to a column or set of columns in another (referenced) tabid. The “one* side of a relation
is always the parent, andprovides the PK atributes to be copied. The *many” side of a relation is aLways
the child, into which the FK attributes are copied.

26. What is referential integrity? Explain with an example.

Ans: Referential integrity refers to the relationship between two tables in a database. It means that there
must be a valid reference from a row in one table to another table. It ensures that all data in a database
remains consistent and up to date. It helps to prevent incorrect records from being added, deleted, or
modified. Lets us consider an example of database with two tables, Customer and Orders. The Customer
table consists of fields CustID and CustName. Another table Order consists of fields OrderID, CustID and
OrderDate. The referential integrity states that the Customer ID (CustID) in the Order table must match a
valid CustID in the Customer table.

27. What do you understand by relationships in DBMS? How many types of relationships are there?
Ans: In a DBMS relationships are defined links that associate two tables through a common
field. A relationship joins the two tables virtually forming one large table. There are three types
of relationships: • One-to-one • One-to-many • Many-to-many

28. Differentiate between Absolute and Relative hyperlinks.

Absolute hyperlink defines the path to reach a document starting from the topmost folder.

Relative hyperlink defines the path of o document with respect to active location.

29. What are the two ways to create reference to link sheets of another workbook? Explain any one
of them. Ans: The two ways to link sheets are: 1. By mouse 2. By keyboard To create reference by
keyboard one has to type complete address of the linked sheet. The reference consists of three parts:
path or filename, sheet name and cell. General format of reference is: = ‘file:///Path &File
Name’#$SheetName.cell name.

30. Discuss the advantages of a template. Ans: Templates are useful for the following reasons: •
Templates simplify the process of document creation. • Templates can ease our workload and also
increase efficiency. • Templates increase the attention of the audience. • They also help in saving time
and money. • Templates improve clarity and ensures that all documents have the same layout.

31. In a finance company five users are working on the same shared document. Three of them are
working on common overlapping data. What happens when they try to save the document?

Ans: The overlapping documents means that there are changes in common cells done by multiple users.
This gives rise to conflicts. If you try to save a document with conflicting changes, the spreadsheet will
show you a Resolve Conflicts dialog box. It allows you to resolve the conflict by deciding which version
of changes you want to keep. After resolving all the conflicts you can save your document with
decided changes.

32. Garima is a Mathematics teacher and she uses Spreadsheet to maintain the mark lists of her
classes. She teaches five different sections and for each section she has a separate sheet. She has to
perform similar functions in all the sheets. To save her time she wants to create a macro. (a) Write
steps to create a macro. Ans: Steps to create a macro are as follows: 1. Click Tools → Macros →
Record Macro. 2. Start recording of actions in a macro and display Record Macro toolbar with one
icon on it to Stop Recording. 3. Now start performing the actions you want to include in a macro. 4.
Click Stop Recording button after completing the actions. 5. Now type the name of the macro in the
Macro Name box and click on Save. (b) Write steps to run a macro. Ans: Steps to run a macro are as
follows: 1. Open the worksheet in which you want to run a macro. 2. Click Tools → Macros → Run
Macro 3. Select the name of the macro from the list of macros and click on Run button. (c) Write any
two advantages of macro. Ans: Advantages of macros are as follows:

• It automates the keystrokes and tasks that are done repeatedly. • It reduces the time spent on
repetitive computing tasks.

33. You want to add a link to a table in HTML namely sales.html How would you do it in Calc?

Ans: To add a link to an HTML table perform the following steps: • Open the sheet where you want to
add a link. • Click the command Insert → Link to External Data. • Browse and select the file to be
linked i.e. sales.html.

34. What is the text wrap? Mention the types of wrap settings available in Word processors.

Ans: A wrap setting is a feature of word processor that determines the relation between the text and
the graphic in a document. It is also known as text wrapping. A word processor offers different types
of text wrapping options. You can place the text around the graphic or an image in a way you want,
using any one out of the given options.

35. In a school the records of students are stored in a database that consists of two tables. The first
table stores personal details of students which are recognized by roll number. Every student has a
unique roll number. This roll number field is linked with another table which stores marks of
students. Answer the following with explanation in support of your answer. (a) What type of field is
the rolL number in the first table? Ans: The roll umber field holds a unique roll number for every
student so it is a primary key field of the table. A primary key is a unique value that identifies a row
in a table. (b) What is the term used to describe it in the second table? Ans: It is called a foreign key.
When two tables are related by a common field and it is declared as primary in one table then in
another table it is known as foreign key. It identifies a column or set of columns in one (referencing)
table that refers to a column or set of columns in another (referenced) table. (c) What is composite
primary key? Ans: The primary key that consists of a combination of two or more fields or attributes
is known as composite key. (d) Define alternate key. Ans: The field or a group of fields that have
unique value for each record but is not selected as a primary key is called alternate key. There can
be only one primary key in a table.
36. Suhana is creating a brochure for a school fair. She added picture in the brochure which contains
some unwanted part. (a) What can be done to remove that part from the picture? Ans: She can use
Crop feature of word processor to remove that unwanted part from the image. (b) There are few
drawing objects on that brochure on which she wants to perform some common actions. How can
she do it easily and quickly? Ans: The drawing objects can be combined together by grouping. This
feature will treat all the separate objects as one and whatever functions are performed will be
applied on all of them. (c) How can she keep the image between the text? Ans: Text Wrap feature can
be used to keep the image between the text. The text is placed around the image. (d) Is it possible to
keep the image in the background of the text? How? Ans: Yes the image can be placed in the
background of the text by applying the Color Mode as Watermark on it. The other way to make the
image appear as watermark is by giving the image transparent effect by changing the Transparency
value.

37. Shweta is working in a renowned company that provides Network Solutions. The company has a
worksheet that contains data of its valuable customers. This worksheet is available to all the
employees that works for customer support. (a) Why the sharing of worksheet is required?
Ans: The Sharing of worksheet is required when multiple users wants to work on same set of data. The
users can view, edit or review the changes made in the shared worksheet. (b) Shweta has changed a
value in the worksheet. Who else can see the changes? Ans: All the users who are authorised to work
on shared worksheet can see the changes made in worksheet. They can also review and make
comments on the changes done by any user. (c) List the features that are disabled in sharing mode.
Ans: Following features are not available in sharing mode: (i) Edit > Compare Document (ii) Edit >
Sheet > Move/Copy & Delete (iii) Insert > Cells Shift Cells Down & Shift Cells Right Tools > Protect
Document (iv) Data > Define Range (v) Data > Sort (vi) Data > Subtotals (d) How is document opened
in sharing mode? Ans: The document in shared mode is opened in the same way as any other
document. To open a shared document click on File →Open

Employability Skills

38. What is the significance of self-awareness in achieving our goals?


Ans: Self-awareness refers to knowing about one’s self in terms of strengths, weaknesses, abilities, likes,
dislikes, attitude etc. knowing about one’s self is essential to understand one’s own goals and areas of
improvements regarding their weaknesses in achieving them. It helps in managing the challenges and
opportunities and strengthening their attitude and abilities which increases confidence and finally helps
you in making right decision.

39. What does ‘R’ mean in SMART goals?

Ans: SMART is an acronym in which ‘R’ stands for Realistic. It means that your goal should be
something that you want to achieve and can work towards it. The goal should be appropriate for
what you are trying to accomplish. An unrealistic goal is hard to achieve. Example of an unrealistic
goal would be building a muscular body in just 15 days. Example of realistic goal would be – work
out regularly and eat healthy to build a muscular body in next 4 to 6 months.

40. “Stress is like a gateway that provides a heap of diseases.” Explain.

Ans: Stress is a part of everyday life. It can be helpful in some situations e.g., it motivates you to finish
the assignment on time. But when experienced in excess or for a long period of time, stress has
the opposite effect. It can harm our emotional and physical health, and limit our ability to
function well. The stress may cause diseases like heart problems, depression, sleeplessness,
hypertension, ulcer, etc.

41. Name the Stress causal agents. Ans: The Stress causal agents are: • Mental: Mental stress may
occur due to conflicts, frustration, internal or social pressure etc. • Physical: Physical stress occurs
due to overexertion, some kind of illness or failure to get enough sleep • Social Socialstress is
caused due to external factors such as disturbed relationships, conflicts with others, death or
illness in family etc. • Financial: Financial stress occurs due to money problems.

42. What are the advantages of the ability to Work Independently? Ans: The advantages of the ability
to Work Independently: • Ensures greater learning. • Individuals feel more empowered and
responsible. • It provides flexibility to choose and define working hours and working mechanisms.
• Failure and success of the task assigned are accounted by individuals. • Individuals become
assets to organizations, groups and nations at large, vi. It ensures creativity and satisfaction
amongst individuals.

43. How do entrepreneurs help in creating more entrepreneurs?

Ans: Entrepreneurs come up with new ideas, concepts, and innovations and work on them for the
benefit of themselves and society. A successful entrepreneur becomes a role model for the
society and youngsters. Inspite of experiencing ups and downs, he develops his own solutions to
overcome his company’s flaws. This guides his employees and followers towards the development
of their start-ups under his supervision. As a result of their experiences and guidance, youth are
coming up with fresh ideas and solutions. Thus, successful entrepreneur mentors and produces
new entrepreneurs.

44. Explain the term self reliance. Ans: Self-reliance refers to the ability of a person to do things
independently and make decisions by themselves by not taking help from others. A self-reliant
person is also emotionally and intellectually independent.

Suhas is ready with his startup plan of pearl farming. He has a big vision regarding his business but
does not have enough money to give it a start. Help him by suggesting the financing options for
his startup. Ans: There are majorly three different ways to finance a startup. These are as follows:
• Equity Financing: It means raising funds for startup against equity. The financer becomes co-
owner of the startup with some percentage of share. • Debt Financing: It means the funds are
raised through debts from different financial institutes. E.g. loan from bank. • Government grant
and Support: If the owner is ready with maximum funds then he can go for grants and loans
available through different government schemes. E.g. Startup India.

45. Discuss any two misconceptions and their realities about entrepreneurship. Ans: 1. Myth: The
only requirement for entrepreneurship is a good idea. Reality: Only idea is not important Other
factors like planning, leadership, talent communication etc. also plays an important role for
successful entrepreneurship. 2. Myth: To start a business lot of money is required. Reality: A
certain amount of money, depending upon the .business, is required to initiate it. Later a person
can borrow money from family or bank. There are many financing options for startups.
46. Explain the relationship between self regulation and goal setting. Ans: Self-regulation is the ability
to control one’s behavior, emotions, and thoughts to achieve some goals. Goal setting is the
process of planning and taking active steps to achieve the desired outcome which is only possible
through self regulation.

47. Shri has been facing problems with his PC for the last few months. Every time he goes to the
technician, he suggests that he should maintain his PC properly. What are the tasks that are
carried out for computer maintenance? Ans: Computer maintenance refers to the tasks
performed to keep the computer in a good working state. These tasks include: • Physical cleaning:
All the dust and trash should be removed as these heat up the computer. • Internal Cleaning: It
refers to the cleaning of temporary files, viruses, malicious software etc. to keep the applications
and programs virus free. • Keeping backups and Update Software: This results in increased
efficiency of applications and programs.
48. Write any four roles of Entrepreneurs. Ans: Roles of an entrepreneur are defined as follows: •
Coordinating role: An entrepreneur coordinates various functions of the business involving
selection of best possible factors. • Innovator’s role: As an innovator, an entrepreneur brings new
products or services to the market. • Risk assumption role: This role of an entrepreneur benefits
in economic growth. The profit earned is put back in business. • Capital formation role:
Entrepreneurs enable the formation of capital by mobilizing the wealth for the purpose of
carrying business and increasing the capital of the company and developing of assets.

49. What do you mean by Disk Defragmentation? Ans: When data is written on disk and there is no
contiguous space on the disk to store the file, it is stored in fragments. Disk defragmentation is a
process of consolidating files stored in fragments on a disk. This process removes all unnecessary
information that slows down the computer. It should be done at regular intervals which helps the
disc space to be used at an optimal level.

50. What is the use of File Explorer in windows?

Ans: The files that you create using different types of applications are stored at default or specified
locations of your storage unit. Similarly, you can create folders to store your files in them. To
perform various operations on these files and folders you require a File Explorer. So, a File
Explorer is an application which is used to browse folders and files stored in the computer. It
allows the user to perform operations like copying, moving, deleting and renaming these files and
folders.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy