Study Material (Qbank) - It-100%
Study Material (Qbank) - It-100%
A) Physiological
(B) psychological
(C) physical
(D) sociological
11. Our dress code is an example of communication.
(A)Verbal
(B)nonverbal
(C) written
(D)spoken
12. Communication strengthens & relationship is an organization.
(A)employer-father
(B)employer-employer
(C) mother-employer
(D)mother-child
13. communication includes tone of voice body language, facial expressions
etc.
(A)Nonverbal
(B)verbal
(C) letter
(D)notice
14. When there is similarity of background between the sender and the receives such as
age, language nationality, religion, gender then this is called context.
(A)social
(B)cultural
(C) physical
(D)dynamic
15. Letter, e-mail telephone are examples of
(A) message
(B)feedback
(C) channel
(D)encoding
16. Understanding different parts of speech forms the base of leaning grammar
(A)Five
(B)Eight
(C) Six
(D) Seven
17. It is of paramount importance that one need to construct a sentence in the day to day
affairs
(A)Wrong
(B)Correct
(C) Incorrect
(D)Night
18. A way be defined as the name of a person place or thing
(A)Verb
(B)Noun
(C) Pronoun
(D)Adverb
19. According to hoben “communication is the nituchange of thought or idea.
(A)Visual
(B)AudioVerbal
(C) Written
20. The person who transmits the message is called the or
(A)Sender
(B)Gives
(C) Taker
(D)Receiver
21. Proper nouns always begin with letters
(A)Running
(B)Capital
(C) Small
(D)Numerical
22. nouns require capitalization only if they start the sentence or are part of a
title
(A)Common
(B)Proper
(C) Abstract
(D)Collective
23. Once the message is encoded in a desired format it is transferred through a medium
called
A) Channel
(B) Medium
(C) Media
(D) Way
24. The nouns which cannot be felt, seen or heard are called
(A)Common
(B)Proper
(C) Abstract
(D)Collective
25. The information which is transferred to the receiver has to be interpreted this process is
called
(A)Encoding
(B)Decoding
(C) Opening
(D)Closing
26. All communication events have a .
(A)Resource
(B)Source
(C) Start
(D)End B
27. Personifications of strength and violence are considered as gender.
(A)masculine
(B)Feminine
(C) common
(D)Neuter
28. The message may be misinterpreted because of
(A)Barriers
(B)Distortions
(C) Distractions
(D)Noise
29. The environment in which the transmitter or receiver are should be
(A)Complex
(B)Competent
(C) Complete
(D) Compatible
30. A noun that dandies neither a male or a female is gender
(A)Masculine
(B)Feminine
(C) Common
(D) Neuter
31. Countries when referred to by names are also considered
(A)Masculine
(B)Feminine
(C) Common
(D)Neuter
32. The Christian sign of the is a gesture pertaining to religion and spirituality.
(A)Plus
(B)Minus
(C) Division
(D) Cross
33. In oral communication there is a possibility of immediate
(A)Reaction
(B)Response
(C) Refection
(D) Reset
34. In oral communication the speaker can observe the listener’s to what is being elated.
(A)Reaction
(B) Response
(C) Rejection
(D) Reset
35. White talking to friends you do not pay attention to the skills of Communication.
(A)Written
(B)Oral
(C) audio
(D)visual
36. In oral presentation outside your organisation you must first give the audience a
of your organization.
(A)Flash back
(B)Background
(C) Front view
(D)Forword view
(E) Particular
(F) Specified
37. The are used to present using overhead projectors.
(A)Acetate film transparent sheet
(B)Paper sheets
(C) Polythene sheet (D) Butter paper
38. Any word that adds more meaning to the noun is called an
(A)Adverb
(B)Verb
(C) Adjective
(D)Noun
39. A indicates the action done by the subject
(A)Verb
(B)Adverb
(C) Noun
(D)Pronoun
40. A is a word which connects words phrases , clauses or sentences
(A)Preposition
(B)Conjunction
(C) Interjection
(D)Verb
41. During presentation using an OHP. One can read information line by line using an
opaque sheet to cover the transparency with a view to minimize distraction. This
technology is called
(A)Positive disclosure (B) Zero disclosure C) Negative disclosure(D) Progressive disclosure
42. Another thing that you have to avoid is adding to OHP’s with a during a talk.
(A)Chalk
(B)Pencil
(C) Pen
(D)Marker
43. It is important to consider proper room where you are giving your presentation.
(A)Darkness
(B)lighting
(C) Lightning
(D)ventilation
44. Listening means learning through conversation
(A)Evaluative
(B)Appreciative
(C) Dialogic
(D)Empathetic
45. In Listening the difference between the sounds is identified
(A)Discriminative
(B)Comprehension
(C) Dialogic
(D)Empathetic
46. The is an exclamation mark
(A) ? (B) . (C) , (D) !
47. Evaluative listening is also called
(A)Therapeutic
(B)Evaluative
(C) Dialogic
(D)Impathetic
48. The is the action or description that occur in the sentence
(A)Predicate
(B)Subject
(C) Object
(D)Complement
49. The speech is also called as reported speech
(A)Direct
(B)Indirect
(C) Indefinite
(D)Definite
PART A - UNIT-1. Communication Skills : Subjective type
1. Explain the 7Cs of communication in short.
o Clear – to the clear message content should be delivered
o Coherent – words should make sense and relate to the main topic
Linguistic
Cultural
Interpersonal
o Physical Barrier
A gesture, posture, or body language could not reach the receiver makes
communication less effective.
o Linguistic Barrier
o Interpersonal Barrier
o Organization Barriers
o Cultural Barriers
The people coming from different cultures are unable to understand each
other’s customs.
Use visuals
Disadvantages of ICT
a. Traditional books and handwritten methods are at risk.
b. Managing courses online is difficult
c. Teachers require experience to handle ICT
d. Risk of cyber attacks and hacks
e. Misuse of technology
3. Difference between Hardware and Software?
Answer – A computer system consists of two main parts – Hardware and Software
a. Hardware – Hardware is a physical part of a computer system. We can feel and touch the
hardware devices. example – CPU, Mother Board, Hard Disk, Keyboard, Mouse, Printer etc.
b. Software – Software related to the programs which perform different types of tasks on the
computer system. Program is a collection of Instructions. It also helps the computer to perform
the specific task. Example – Open Office Base, Spreadsheet, Presentation etc.
4. What is BIOS?
Answer – BIOS stands for Basic Input/ Output System, It helps the computer system to identify
(Self-test) the paraperaphal devices which are connected to the computer system and helps
computers to load Operating System properly.
5. What are the different types of keys in Keyboard?
Answer –
a. Function keys – F1 to F12 are function keys in the keyboard, function keys are used for
specific purposes.
b. Control keys – SHIFT, CONTROL (CTRL),ALT, SPACEBAR, TAB AND CAPS LOCK are known as
a control key, these keys are used as per the demand.
c. Enter key – ENTER or RETURN keys are known as Enter key, depending on the brand of
computer that you are using.
d. Punctuation keys – It includes keys for punctuation marks, such as colon (:), semicolon (;),
question mark (?), single quotation marks (‘ ’), and double quotation marks (“ ”).
e. Navigation keys – END, HOME, PAGE DOWN, PAGE UP and Arrow keys are known as
navigation keys, these keys are used to move up, down, left or right in the document.
f. Command keys – BACKSPACE, INSERT (INS) and DELETE(DEL) are known as command keys.
INSERT key allows you to overwrite characters to the right side.
The DELETE command key and BACKSPACE key are used to remove typed text, character, or
any other objects from the right and left side of the cursor.
g. Windows key – Windows key is used to open the Start menu.
6. What is the purpose of Mouse?
Answer – The purpose of the mouse is –
a. Roll Over or Hover – Whenever we bring the mouse over the files, it shows the details of
the file.
b. Click or Double Click – Mouse allows you to select, open or delete files and folders from the
computer system.
c. Drag and Drop – Click on the file and drag and drop your file where you want.
7. What are files and folders in a computer system?
Answer –
a. File – File is a collection of information different types of files store different types of
information. Every file has a file name and extension that identifies the type of file.
b. Folder – Folder is a collection of files or a group of files.
8. How to maintain a computer system?
Answer – Some simple ways to take care of computer system are –
a. Keeping a Device Clean – Always keep a device clean, such as the keyboard, the screen, and
the mouse. Handle your gadget with care, keep it cool, and don’t overload your battery.
b. Prepare a Maintenance Schedule – Make a schedule for computer maintenance.
Daily Maintenance
a. Clean up your email inbox
b. Save Important attachments and save in folder
Weekly Maintenance
a. Clean your Keyboard, monitor, CPU and printer
b. Backup your data
Monthly Maintenance
a. Clean unused photographs
b. Clean up Download folder
c. Uninstall unused programs
d. Run full system virus scan
e. Run disk – cleaner software
Yearly / Annual Maintenance
a. Clean up social media accounts
b. Clean up e-mail contact list
c. Update your operating System
9. How to increase Computer performance?
Answer – We frequently install a large number of applications, which slows down the computer.
Always attempt to uninstall unnecessary applications, temporary files, and antivirus software
updates.
10. What is a Security Break?
Answer – Security break is leakage of information stored in a computer.
Your personal information can be lost or leaked in two ways –
We are not cautious when it comes to disclosing personal information via the internet. We share
our account information and passwords on unsafe websites.
A person gets unauthorized access to our computer. This can happen at work if we don’t log out
before leaving the computer.
11. What are the threats?
Answer – Threats are ways in which personal information from a computer can be released
without our knowledge.
a. Theft – Theft means stealing of information or hardware. These maybe of three types:
i. Physical – Where a person may steal your desktop computer or laptop.
ii. Identity – A hacker gets your personal information and uses it to impersonate you. The
hacker can use this fake identity to get access to your account information or engage in illegal
activity.
b. Software Piracy – This is stealing of software and includes using or distributing unlicensed
and unauthorized copies of a computer program or software.
i. Virus – Viruses are computer programmes that can corrupt data and software
applications, as well as steal data from computers. Worms and Trojan Horses are two major
forms of viruses.
ii. Worms – Worms are viruses that replicate and spread to all files on a computer once
they attack a computer. This makes it very difficult to remove them.
A Trojan Horse appears to be a useful software programme, but once it reaches a computer, it
begins to behave like a virus and destroys the data.
iii. Online Predator – Online predators are persons who use the internet to trap you into
unhealthy relationships. They could be older people appearing as your age who harass you into
doing unlawful things online.
iv. Internet Scams – You may occasionally receive highly appealing offers claiming that
you have won a large sum of money in a lottery and that you can claim your win by depositing a
specific amount of money. When you deposit money with a credit card or through online
banking, you not only lose the deposit money but your card / account information may be
misused later.
12. How can we protect our data?
Answer – To protect our data from theft and viruses we can take the following measures –
a. Use Strong password in your account – Make your passwords difficult to guess. When
creating a new password, attempt to use a combination of
Small Character
Capital Character
Special Character
Numbers
b. Install Antivirus and Firewall –Anti-virus software and a firewall protect your data from
virus and from hackers.
c. Encrypt your data – Keep your information in an encrypted format to keep it safe from
unauthorized users.
d. Open only secure site – Before visiting a website, make sure the address begins with
https://. A website that begins with https:// is a secure website.
2 Marks Questions
[1] What do you mean by entrepreneurship?
Ans. Entrepreneurship is the type of self-employment where one is running a business to
satisfy the needs of people and looking for ways to make the business better to make profits.
[2]Explain the qualities of an entrepreneur.
Ans. An entrepreneur has following queries:
1. Confident: Entrepreneurs are confident. They believe in themselves and their abilities.
2. New Ideas: They are always trying new ideas in their business.
3. Patient: They are patient. They listen their customer’s feedback and suggestions. They
never make any decision in hurry.
4. Creative: They are always creative. Creativity helps them to come up with new ideas for
their business.
5. Take responsibilities: They always take responsibilities for their actions.
6. Take decisions: They take decisions after thinking about them.
7. Do not give up: Whenever they face any difficulty they do not give up.
8. Work Hard: They work hard and fulfill customers need.
[3] Differentiate between wage employed and self-employed people.
Ans.
Wage Employed:
1. They work for a person or organization
2. They get paid for their work
3. He just do the work assigned to him
4. They never take any risks
Self Employed:
1. They start their own business
2. They try to satisfy the need of people
3. They always trying to make his/her business better by taking risks
4. They always trying new ideas
[4] How do entrepreneurs help in growing the area and society?
Ans. Entrepreneur run their business local market. The local people buy the product form
market. Customers can use their services from local market only. By this process of selling
and buying they help everyone involved in the selling buying process. Hence they earn money
from it and this way the area and society grows.
[5] What do entrepreneurs do when they run their businesses?
Ans. 1. They fulfill customer needs.
2. They use local material and people to make products at low cost.
3. They help society by working towards saving environment, give donations to build schools
and hospitals etc.
4. They create jobs in the local market.
5. When entrepreneurs becomes successful they share their wealth for better society and
quality life.
[6] What are the functions of entrepreneurs? Explain any two of them.
Ans. The functions of an entrepreneurs are as following:
1. Making Decisions: An entrepreneur makes decisions every day. It includes what to produce
or sell, how much and where to cell etc.
2. Managing the business: Making a successful plan and its execution is one of the important
functions of an entrepreneur. Managing starts from arrangement of raw material, hiring
people for work and tell people what to do and also ensures that the planning is being
followed or not.
3. Divide Income: The business money needs to be divided into different heads. An
entrepreneur spends money to buy material, pays rent of the building and salaries to the
people.
4. Taking risks: Risk is the chance of going something wrong. Sometimes fires, item loss and
theft can affect business. So an entrepreneur has to think about these all risks.
5. Create a new method, idea or product: An entrepreneur always trying new ideas and new
things.
[7] What are the myths/misconceptions of an entrepreneur?
Ans. The myths/misconceptions of an entrepreneur are as follows:
1. Every business idea needs to be unique or special.
2. A person needs lot of money to start a business.
3. A person having big business is an entrepreneur.
4. Entrepreneurs are born not made.
[8] Identify the misconceptions associated with the following statements:
1. Nayan started a small shop for stationery. But he doesn’t call himself an entrepreneur.
2. Rakesh has an idea to host a website to build various courses. He has very less money
to invest. So he has not started the website.
3. Milan has a mobile shop in the market where so many other mobile shops are already
there. He doesn’t call himself an entrepreneur.
4. Anil is coming from a middle-class family. He has an idea to start up a shopping mall in
his area. But he couldn’t start.
Ans.
1. Every business idea needs to be unique or special.
2. He needs lot of money to start a business.
3. A person is having big business is called an entrepreneur.
4. Entrepreneurs are born, not made.
[9] State the truth behind the misconceptions of entrepreneurs.
Ans.
1. Every business idea needs to be unique or special: In the market the business are common
but each entrepreneur working on customer demand and brought a new idea to fulfill the
demand of customer. So he/she take an idea from market and do something different in it.
2. A person needs lot of money to start a business: To start a business you need to invest
money but not lot of money. A person can start with a small scale and grow it gradually by
earning and makes his business bigger.
3. Only a person having a big business is an entrepreneur: No business is big or small. If a
person is running a business to fulfill a customer need, they are an entrepreneur.
4. Entrepreneurs are born, not made: Sometimes, we think only some people have the talent
for doing business. An entrepreneur is a person who does whatever it takes to make the
business successful. Being an entrepreneur any person starts with a way of thinking. he must
believe that anything is possible and it shall be achieved.
1. How many sustainable development goals are given by the United Nations?
(a) 18 (b) 17
(c) 15 (d) 20
2. Choose the option which defines sustainable development.
(a) Taking care of future generations
(b) Taking care of only ourselves
(c) Taking care of ourselves and the future generations
(d) Well-being of all
3. Which organisation has made the Sustainable Development Goals.
(a)United Nations (b) League of Nations
(c) UNICEF (d) World Health Organisation
4. Which of the following sources of energy is from a renewable source?
(a)Solar energy (b) Wood
(c) Coals (d) Petrol
5. Choose the option which is not a sustainable development goal according to
the United Nations.
(a) Clean Water and Sanitation (b) Gender Equality
(c) Population (d) Reduced Inequalities
are:
Clean Water and Sanitation: We must make efforts to make India free of open defecation
by building toilets and creating awareness towards sanitation. We must take measurable
steps by promoting awareness to keep water sources clean.
Affordable and Clean Energy: Using solar power i.e Power generated using the sun does
not cause pollution as it does not require burning of non-renewable fuels, such as coal. Use
of biogas is also an eco-friendly alternative to natural gas.
Decent Work and Economic Growth: We can
(a) study and find good jobs to take care of ourselves and our families.
(b) work hard and contribute to society.
(c) learn and develop skills so that we get added value in our community.
Reduced Inequalities: To reduce inequalities we can
1. Save energy by switching off lights and fans when not in use.
2. Use natural light as much as possible.
3. Use energy efficient lights (LED bulbs) and appliances.
Responsible Consumers and Producers: We can become responsible about our own
environment by
Ans.:
1. Rollno – int(4) – Primary Key
2. Sname – Varchar(20) – Not Null
3. Marks – Decimal(5,2) – default 0
4. Grade – Varchar(20)
Create table command:
create table examresult (rollno int(4) primary key,sname varchar(20) not null,marks
Decimal(5,2) default 0, grade varchar(20));
63. Aman is working in a multinational company. He wants to maintain records of
employees in the database and create a database to keep a track of all the records.
Help him to write the following commands:
i) Create a table emp with the following structure:
Field Data Type Constraint
designation varchar(20)
Salary decimal(7,2)
Doj date
Deptno int(2)
Gende
Teacher_ID Name Age Subject DOJ Salary
r
Computer
104 Alauddin Sayed 41 2008/04/02 52000 M
Science
Krunali Computer
106 37 2016/04/01 44000 F
Prajapati Science
69. Ayushi is learning OO Base. She wants to provide an interface to users that
allows them to view, enter and change data directly in database tables. Suggest the
database object fulfills her need.
Ans.: Forms
70. Write one feature of a base form.
Ans. : base forms provide a systematic way of storing information into database.
71. Vanshika is looking for ways to create a form provided by OO base. Write the
same for her.
Ans.: There are two ways to create a form in OO base.
1. Create form in design view 2. Using wizard to create a form
72. In which step does the form wizard allow you to select the field to display the
field on the form?
Ans.: The Field Selection step allows you to select the field to display the field on form.
73. Users can select specific fields or all fields for a form in the OO base. Which
buttons are present to do so?
Ans.: To select a specific fields for a form > button is present and to select all fields >> button
is present.
74. What is a subform?
Ans.: A subform is a special kind of form that allows to insert the contents of table or query
into separate form.
75. Write any two features of a report.
Ans.: 1. Report helps to display the data in a summarized manner.
2. It is used to generate overall work outcome in a clear form.
76. What is the significance of labelling fields in report wizard?
Ans.: Labelling fields step allows to redefined the label of fields in the reports or set the default
the name.
77. Which step of the report wizard allows to filter and display the fields according
to specific fields frequencies? Ans.: Grouping
78. Nitin wants to set the orientation of OO Base through the wizard. Which step
will help him to fulfill his task? Ans.: Choose Layout
79. Which types of reports can be generated through the wizard in OO Base?
Ans.: There are 2 kinds of reports: 1. Static 2. Dynamic
80. What are the uses of forms?
Ans.: Forms are used to display the records. Some forms can be used for data entry model.
Some forms used to modify the content directly from the table.
81. What are the steps involved in creating a form using a wizard?
Ans.: To create a form using wizard follow these steps:
1. Field Section 2. Set up a sub form 3. Arrange Controls
4. Set Data Entry 5. Apply Styles 6. Set Name
82. What are the options available under arrange controls?
Ans.: The arrange controls has following options:
1. Label Placement
2. Arrangement of Item on the main form as DataSheet, Columnar Labels Left, Columnar
Labels top, In Blocks – Labels Above 3. Arrangement of the subform
83. Distinguish between forms and reports.
Ans.:Forms provides an interface to users to view, add, modify in both table and queries.
Reports are presented forms used to present formatted summaries or lists of the data from
one or more tables or queries.
84. Manan is working on the form. He is going to create a form to add new records
only. Enlist all the options available for data entry in the form wizard. Write the
option which helps Manan to fulfill his need.[6] What are the styles available for
designing a form? Write any four tyles.
Ans.: There are various styles available in form wizard for designing a form. Few of them are:
1. Beige 2. Violet 3. Bright Blue 4. Dark
85. Priya wants to add a border on the form using the wizard. Help her by
suggesting the border options available for the form.
Ans.: There are three options for border in the form wizard:
a) No Border b) 3D Look c) Flat
86. What are the main steps required to create a report through the wizard in the
oo base?
Ans.: To create a report follow these steps:
1. Click on report section under database in OO Base database window.
2. Click on Use wizard to create report option under the tasks.
3. Follow the wizard steps as directed
4. Save the report
PART B.Unit 4. Web Application and Security
1. Computer ___________ refers to the user friendliness of a computer system for all,
regardless of their disability.
a. Shortcut Keys b. Accessibility c. Ctrl & Alt Key d. None of the above
2. What are the different type of impairments that impact computer usage?
a. Dyslexia b. Visual Impairment c. Hearing Impairment d. All of the above
3. Accessibility options are available in __________.
a. Setting b. Control Panel c. Desktop d. None of the above
4. ___________ is an accessibility feature to help computer users with physical
disabilities, but it is also used by others as a means to reduce repetitive strain.
a. Filter keys b. Toggle Keys c. Sticky Keys d. None of the above
5. _________ enables the user to hold and release a modifier key, like as Shift, Ctrl,
Alt, or the Windows key, and have it remain active until another key is pressed.
a. Filter keys b. Toggle Keys c. Sticky Keys d. None of the above
6. The __________accessibility function instructs the keyboard to ignore short or
repeated inputs, making typing simpler for those people who have hand tremors.
a. Filter keys b. Toggle Keys c. Sticky Keys d. None of the above
7. __________ is an accessibility feature for persons with vision impairment or
cognitive problems.
a. Filter keys b. Toggle Keys c. Sticky Keys d. None of the above
8. _________ is turned on, the computer emits sound cues when the locking keys such
as Caps lock, Num lock and Scroll lock are pressed.
a. Filter keys b. Toggle Keys c. Sticky Keys d. None of the above
9. ___________ is designed to help users with auditory impairments.
a. Filter keys b. Toggle Keys c. Sound Sentry d. None of the above
10. When the computer makes a sound, ________ produces visual effects such as a
blinking title bar or a flashing border.
a. Filter keys b. Toggle Keys c. Sound Sentry d. None of the above
11. ___________ directs applications that provide information through sound to also
give information visually, through written captions or informative icons.
a. Filter keys b. Show Sound c. Sound Sentry d. None of the above
12. ___________ is an accessibility feature to assist people with vision impairment.
You can change the text size and color, as well as the background color, to make it
easier to read.
a. High Contrast b. Show Sound c. Sound Sentry d. None of the above
13. _____________ is also an accessibility feature that assists people with vision
impairment by changing the blink rate and width of the cursor.
a. High Contrast b. Cursor Options c. Sound Sentry d. None of the
above
14. The ____________option uses the keyboard (especially numeric keypad) as a
pointing device instead of a mouse.
a. High Contrast b. Mouse key c. Sound Sentry d. None of the above
15. ____________ is an accessibility feature that assists people that have difficulty
using a keyboard or a mouse (or both). They can use special devices such as Sip,
Puff and Breath Switches to provide input to the computer through Serial Ports.
a. High Contrast b. Mouse key c. Serial Keys d. None of the
above
16. The option in Microsoft Windows XP used for helping users with physical
disabilities and to reduce repetitive strain is ____________________.
a. Toggle Key b. Sticky Key c. Tab Key d. None of the above
17. Sound Sentry is intended to assist users who have ____________ disabilities.
a. Auditory Impairments b. Cognitive Impairments c. Visual Impairments
d. Dexterity Impairments
18. The High Contrast feature in Microsoft Windows XP is designed to help persons
who have _______________ impairments.
a. Auditory Impairments b. Cognitive Impairments c. Visual Impairments d.
Dexterity Impairments
19. ___________________ is designed to assist people that have difficulty using a
keyboard or a mouse.
a. KeyboardKeys b. MouseKeys c. TabKeys d. GeneralKeys
20. A ______________ is a collection of computers and other hardware components
interconnected by communication channels that allow sharing of resources and
information.
a. Computer Network b. Computer Sharing c. Computer Receiving d. None of the
above
21. What are the examples of communication channels _________.
a. Cable Wire b. Satellites c. Both a) and b) d. None of the above
22. Example of computer networks architecture __________.
a. Peer – to – Peer architecture b. Client – Server architecture c. Both a) and b) d.
None of the above
23. Networks in which all computers have an equal status are called __________.
a. Peer – to – Peer Network b. Client – Server Network c. Both a) and b) d. None of
the above
24. Networks in which certain computers have special dedicated tasks, providing
services to other computers are called__________.
a. Peer – to – Peer Network b. Client – Server Network c. Both a) and b) d.
None of the above
25. The computer provides services called ___________.
a. Client b. Server c. Node d. None of the above
26. The computer uses the services which are provided from the server is called
__________.
a. Client b. Server c. Node d. None of the above
27. What are the major different types of network?
a. Local Area Network b. Wide Area Network c. Both a) and b) d. None of the
above
28. A ____________ is a network that connects computers and gadgets in a specific
geographic area, such as a house, school, computer laboratory, office building, or
group of buildings.
a. Local Area Network b. Wide Area Network c. Both a) and b) d.
None of the above
29. A ______________ network is one which covers a broad area across metropolitan
city, regional, or national boundaries.
a. Local Area Network b. Wide Area Network c. Both a) and b) d. None of the above
30. The ___________ is a global network of interconnected computer networks that
serve billions of people worldwide by utilizing the standard Internet protocol suite.
a. Internet b. Network c. Arpanet d. None of the above
31. WWW stands for ___________.
a. Web World Wide b. World Wide Web c. World Web Wide d. None of the above
32. WWW is also known as __________.
a. W2 b. W4 c. W3 d. W1
33. __________ is a network of interconnected hypertext documents that may be
accessed via the Internet.
a. World Wide Web b. W3 c. Both a) and b) d. None of the above
34. A ________ is a software program that is used to browse Web sites and serves as
a bridge between the user and the World Wide Web.
a. World Wide Web b. Web Server c. Web Browser d. None of the above
35. What are the advantages associated with networking?
a. Data & File Sharing b. Hardware Sharing c. Internet Sharing d. All of the above
36. _________ helps to share hardware components such as printers, scanners etc.
a. Computer Network b. Hardware Network c. Information Network d. None of the
above
37. ISP stands for ___________.
a. Internet Sharing Provider b. Internet Services Providerc. Internet Social Provider d.
All of the above
38. Example of Internet Service Provider in India ___________.
a. Bharat Sanchar Nigam Limited b. Airtel c. MTS d. All of the above
39. WiMAX stands for ____________.
a. WorldWide Interoperability for Microwave Access b. WorldWide Interoperability for
Micro Access
c. WorldWide Internet for Microwave Access d. None of the above
40. DSL stands for ____________.
a. Dynamic Subscriber Line b. Digital Subscriber Line
c. Digital Sub Line d. None of the above
41. ISDN stands for ___________.
a. Integrated Services Digital Network b. Internet Services Dynamic Network
c. Integrated Sub Digital Network d. Internet Sub Dynamic Network
42. Á __________ is a device that converts digital computer signals into analog signals
that can travel over phone lines.
a. Router b. Modem c. Bridge d. None of the above
43. Modem is also known as ___________.
a. MOdulator/ DEModulator b. Modular/DeModular c.
Modulate/DeModulate
d. None of the above
44. Give the example of a Wired internet connectivity channel?
a. DSL b. WiMax c. Wi-Fi c. All of the above
45. Give the example of a Wireless internet connectivity channel?
a. DSL b. Dial – Up c. WiMax d. None of the above
46. __________ Internet access is a form of Internet access that uses the facilities of
the public switched telephone network (PSTN) to establish a connection to an
Internet service provider
a. Dial – up b. 3G c. WiMax d. Wi-Fi
47. __________provide Internet access by transmitting digital data over wires of a
local telephone network.
a. Dial – Up b. Digital Subscriber Link (DSL) c. 3G d. WiMax
48. _________provides wireless communication and mobile broadband connection
across cities and countries.
a. WiMax b. Wi-Fi c. DSL d. None of the above
49. ___________ is a widely used technology that allows electronic devices as as
computers or mobile phones to transmit data wirelessly over a network, including
high-speed Internet connections.
a. WiMax b. Wi-Fi c. DSL d. None of the above
50. How can we transfer data on the internet?
a. Using Box Switching b. Using Packet Switching c. Using Public
Switching d. Using Web Switching
51. The acronym for LAN is _________________.
a. Large Area Network b. Last Area Network c. Local Area Network d. None of the
above
52. Three types of Wired Internet Connectivity are ___________ , _________ & ___________.
a. 3G, DSL, Dial-Up b. Cable Internet Access, DSL, Dial-Up c. WiMax, 3G, Wi-Fi d. WiMax,
DSL, Dial-up
53. Three types of Wireless Internet Connectivity are _________ , ___________ &
_________.
a. 3G, DSL, Dial-Up b. Cable Internet Access, DSL, Dial-Up c. WiMax, 3G, Wi-Fi d. WiMax,
DSL, Dial-up
54. __________is a form of communication over the Internet that offers an
instantaneous transmission of text-based messages from sender to receiver.
a. Instant Messaging b. Computer Software c. Hardware d. None of the above
55. Most instant messaging software include the option for performing________.
a. File transfer b. Audio chat c. Video calling d. All of the above
56. What are the key features of instant messaging ___________.
a. Text Message can be sent to one or more person b. Audio calling and conferencing c.
Video calling and conferencing
d. All of the above
57. Give some examples of application based instant messaging software?
a. Skype b. Yahoo! Messenger c. Rediff Bol d. All of the above
58. Give some examples of web based instant messaging software?
a. Meebo b. Yahoo! Messenger c. IMO d. All of the above
59. ______________ is a type of Internet communication software that allows the user
for instant transfer of text-based communications from sender to receiver.
a. Instant Messaging (IM) b. Service Messaging (SM) c. Fast
Messaging (FM) d. None of the above
60. ______ , _______ & ____& Web Camera are required for audio and video
conferencing.
a. Joystick, Computer, Video b. Text, Audio, Video c. Microphone,
Headphone, Speaker
d. Touch Screen, Speaker, Microphone
61. What are the general rules and etiquettes for chatting?
a. Messages should be short and to the point b. Always ask first if the other person has time to
converse. c. Typing your message in uppercase is extremely rude d. All of the above
62. A _________ is a discussion-style website that non-technical (or technical) people
use to create personal web sites.
a. Blog b. Website c. Social Media Site d. None of the above
63. ___________ are similar to an online personal diary and simple to use.
a. Blog b. Website c. Social Media Site d. None of the above
64. What are the popular blogs websites on the internet _________.
a. WordPress b. Blogger c. Blog d. All of the above
65. Give an example of offline blog editors _____________.
a. Qumana b. Windows Live Writer c. Blogdesk d. All of the above
66. ___________ deals with transfer of money over the internet.
a. Online transactions b. Offline transactions c. Both a) and b) d. None of the above
67. Which protocols are used to do the translation process securely?
a. Online Transfer process b. Online Transaction Process c. Both a) and b)
d. None of the above
68. In what situation online shopping is useful.
a. A customer does not have enough time to go shopping.
b. Visiting a store expenses more than purchasing a product online.
c. A product or service that is not available in the local market only available online
d. All of the above
69. Give some of the popular online transaction websites.
a. IRCTC b. Flipkart c. EBay d. All of the above
70. What are the different online threats _________.
a. Phishing b. Email Spoofing c. Chat Spoofing d. All of the
above
71. How can you reduce the risks over the internet?
a. Using Antivirus Software b. Fire walls c. Strong Password d. All of the
above
72. Which combination is required to create a strong password.
a. Combination of Alphanumeric b. Combination of Numbers c. Combination of
special characters
d. All of the above
73. Do not keep password names such as _______.
a. Favorite color b. Name of your friends & Relatives c. Don’t use mobile
number as password
d. All of the above
74. Give the name of the website which can generate strong passwords
automatically?
a. www.strongpasswordgenerator.com b. www.wikipedia.com c.
www.cbseacademic.nic.in
d. None of the above
75. __________ software helps to protect your data from unauthorized users.
a. W33 Software b. Encryption Software c. Unlock password Software d.
None of the above
76. How we can keep our username and password private.
a. Don’t tell username & password to others b. Don’t share username &
password in internet café
c. Always clear browser history & cookies after using d. All of the above
77. How can I make secure transactions on the internet?
a. Use Antivirus and Antispyware programs b. Your Firewall should be always ON
c. Open only that website which have a https:// d. All of the above
78. _________ are programs that are created on your local computer when you visit
websites.
a. Firewall b. Cookies c. History d. All of the above
79. __________ can be software or hardware that helps in the security of a computer
and a network.
a. Firewall b. Cookies c. History d. All of the above
80. Web browsers have ___________ designed to store passwords used in forms on
websites.
a. Cookies b. Built – in password management c. History d. None of
the above
81. What basic safety rules to follow at the workplace.
a. Fire Safety & Use of First aid b. Falls and slips c. Electrical Safety d. All of the above
82. Basic fire safety rules in an organization are __________.
a. Fire escape plans must be installed at proper levels b. Conduct regular drills &
Smoke alarms must be placed
c. Maintenance of safety equipment and No – smoking zone d. All of the above
83. Basic falls and slips safety rules in an organization are ___________.
a. Maintain a clean and clutter-free working area. b. Workplace should be ventilated and
receive light
c. Floors must be clean and dry d. All of the above
84. What are the different electrical safety rules?
a. Electrical equipment should be approved by a recognized organization
b. Worker should be trained to handle the electric equipment safely
c. Damaged and hazardous electrical equipment should be immediately replaced
d. All of the above
85. Basic rules of using first aid are ___________.
a. Injured person should calm not to panic b. Keep them warm if they are
under shock
c. In the case of a back/neck injury, do not move the victim. d. All of the above
86. What are the different types of accidents?
a. Accidents at workplace b. Industrial disease/illness c. Clinical Accident d. All of
the above
87. What protection should organizations take to handle accidents in the
workplace?
a. Safety measures must be placed to prevent workplace accidents b. Immediately call the
medical team for any injury
c. Pay attention to and follow emergency drills d. All of the above
88. What are the different types of hazards include _________.
a. Physical b. Chemical c. Biological d. All of the above
89. __________ is the process of emptying a place in case of an emergency, disaster.
a. Attention b. Evacuation c. Taking care d. None of the above
90. What evacuation emergency should be followed by every company.
a. Company should have a evacuation policy b. Organization must have a designated
assembly point for emergencies
c. Floor plans with evacuation routes should be pasted in every floor d. All of the
above
91. Give some examples of a healthy lifestyle.
a. Healthy eating habits b. Physical activities c. Stress Management d. All of
the above
92. An organization can face some __________ that could put the lives of the
employees in danger.
a. Issue b. Health Hazards c. Shortage d. None of the above
93. Hazards can be of different types depending on the ________ and the ______________
in which the employees work.
a. Industry, Environment b. Occupation, problem c. Both a) and b) d. None of the
above
94. Organizations must have a designated ______________ for emergencies.
a. Evacuation policy b. Assembly point for emergencies c. Buddy system
for special needs people d. All of the above
Subjective type Questions with answers:
1. What do you mean by computer accessibility? What is assistive technology?
Ans: Computer Accessibility is the user friendliness of computer system for all regardless of
their disability.
Assistive Technology is the combination of software and hardware that enables a person with
a disability or impairment to use a compute
2. Enlist the various impairments.
Ans.: The various impairments are as following:
1. Cognitive Impairments
2. Visual Impairments
3. Hearing Impairments
4. Motor or dexterity impairments
Refers 1 marks questions.
3. Give at least four examples of cognitive impairments and learning disabilities.
Ans.: The following are some cognitive impairments and learning disabilities:
1. Dyslexia
2. Attention deficit hyperactivity disorder (ADHD) 3. Autism 4. aphasia
4. Write at least two examples of each.
1. Visual Impairments 2. Hearing Impairments 3.3. Motor or dexterity impairments
Ans.:
1. Visual Impairments: Low-vision, complete or partial blindness, colour blindness
2. Hearing Impairments: Deafness, Partial Hearing Loss
3. Motor or Dexterity Impairments: Paralysis, repetitive strain
5. Avinash has activated the sticky keys. Now he wanted to check that its working
or not, write steps to be followed to see the effect of sticky keys.
Ans.: Avinash needs to follow these steps to see the effects of sticky keys:
1. Click on Start – Search Notepad.
2. Type at least 4 to 5 lines.
3. Place the cursor at the beginning.
4. Press CTRL key and any letter on keyboard.
Here he can notice that the entire text has been selected because it is similar as CTRL + A.
6. Leena wants to see the effect of filter keys while working on computers. Suggest
steps to help her.
Ans.: Leena can follow these steps to see the effects of filter keys:
1. Open notepad.
2. Type something.
3. Try to type some repeated characters or letters.
4. Notice the repeated characters are ignored.
7. Vanshika is working on a laptop. Where she notices whenever she is pressing
NUM lock or CAPS lock or SCROLL lock computer plays a beep. Which accessibility is
activated on her laptop? How it is activated?
Ans.: She may has activated toggle keys option from accessibility options. The steps are :
1. Open ease of access center.
2. Click on make the keyboard easier to use option.
3. Find the option turn on toggle keys under the option make it easier to type.
4. Cheek both option and click on Apply and OK.
8. Vijay is working as a hardware engineer in the company. The company has signed
an AMC contract for schools where children with special needs are studying. He is
instructed to prepare a computer lab with computers that help students having
auditory impairments. Suggest how he can prepare such computers which help the
students to use them easily?
Ans.: Vijay can enable the sound sentry option in all the computers which are used by the
students having auditory impairments. To do this he need follow these steps:
1. Open ease of access center.
2. Find and click on the option use text or visual alternatives for sounds.
3. Check the option Turn on visual notification for sounds and select appropriate option.
4. Check turn on text captions for spoken dialog also then click on Apply and OK button.
9. Vinod has enabled sound sentry in the computers. Where he checked a few
systems but till some of the systems are left. He instructed Laxmi to check the
sound sentry is working properly or not. How Laxmi can check this?
Ans.: Laxmi has to make an error to see the effect of sound sentry. The steps are:
1. Click on Start – Run.
2. Type anything in the run command which not relevant to any program. For example, word
instead of winword.
3. She can notice that the desktop will flash for a fraction of second along with visual error
sound code.
10. What is the significance of Show Sounds option?
Ans.: Show Sounds option instructs the applications that convey information by sound and also
provide information visually through text captions or informative icons. Windows 11 provides
this option along with sound sentry option in the control panel.
11. How to activate high contrast theme on computers?
Ans.: The steps are:
1. Open accessibility options window through control panel.
2. Find and click on the option make computer easier to use.
3. Click on the option choose high contrast theme under High Contrast.
4. Click on Apply and OK.
12. Define computer network.
Ans.: Computer network refers to collection of computers connected together for sharing
resources and information. They are interconnected through communication channels or
cables or satellite.
13. Nirav is learning network about networking architecture. Suggest the kind of
network architecture he is going to learn.
Ans.: There are two kinds of network architecture:
1. Peer to Peer(P2P)
2. Client-Server model
14. Identify me: A network in which all computers have equal status and each
terminal has an equally component CPU.
Ans.: P2P (Peer to Peer Network)
15. Define: i) Server and ii) Clients
Ans.:
Server: The server is the computer which performs dedicated tasks and provides services to
the other devices in the network.
Client:
Client: The client is the computer which use the services from servers.
16. Which type of network links across metropolitan, regional, or national
boundaries?
Ans.: WAN
17. Define: Internet
Ans.: Internet is a global system of interconnected computer networks that use the standard
internet protocol suite to serve billions of users worldwide. It is a network of networks that
consists of millions of private, academic, business, and government networks.
18. How internet is helpful for student?
Ans.: Internet is widely used by students, educational institutes, scientists, and professionals
to gather information for research and general information.
19. How the internet is used by businesses?
Ans.: Business uses the internet for handling large database and complex database such as a
financial database.
20. Write full form of WWW.
Ans. : WWW stands for World Wide Web.
21. What is a web browser?
Ans.: A web browser is a software that helps to view the web page that may contain text,
images, videos, and other multimedia information and navigate between them via hyperlinks.
22. Enlist a few ISP companies.
Ans.: BSNL, Airtel, Vodafone, Jio etc.
23.] What are the some parameters on which the internet connectivity is
dependent?
Ans.: The parameters depended on internet connectivity are:
1. Technology
2. Speed
3. Connection Type
24. Sumesh wants to use internet connectivity at his home. Which type of internet
connectivity is suitable for him?
Ans.: Sumesh can use DSL, Cable-Modem, Dialup, broadband wireless or wifi hotspot for
internet connectivity.
25. Jitesh has started a business in his area. He wants to start the internet in his
local office. Suggest the type of connectivity he can use?
Ans.: His business is considered as small business so he need to use DSL, Modem or
broadband internet connectivity.
26. Extract the following internet connectivity into wired or wireless
connectivity: Dial-up, Wi-Fi, WiMAX, DSL, Cabel Internet Access, 4G hotspot
Ans.: Wired: Dial-up, DSL, Cable Internet Access Wireless: Wi-Fi, WiMAX, 4G Hotspot
27. Write Full form of : DSL, PSTN, HSPDA, EDGE, WiMAX, WAP, WiFi
Ans.: DSL – Digital Subscriber Line
PSTN – Public Switched Telephone Network
HSPDA – High-Speed Downlink Packet Access
EDGE – Enhanced Data for Global Evolution
WiMAX – Wireless Interoperability for Microwave Access
WAP – Wireless Access Point
WiFi – Wireless Fidelity
28. Which internet connection is extremely slow out of Dial-up, DSL and Modem.
Ans.: Dial up connection
29, Which type of internet connection allows to use of telephone and data
transmission at same time simultaneously?
Ans.: DSL (Digital Subscriber Line)
30. What do you mean by a packet with respect to data transfer on the internet?
Ans.: Data or information sent over the computers in the network or internet is divided into
small units. These units are known as packets.
31. Distinguish between LAN and WAN.
Ans.:
LAN WAN
55. Nidhi has signed in her messenger. But she is confused to identify online
friends. Write how she knows who is online?
Ans.: an online used indicated online through a green dot in front of her display name. So she
can find the names appears with green dots they are online.
56. Rekha found 3 friends online when she signed in to her messenger profile. Now
she wants to chat with a friend. How she can start?
Ans.: Rekha has to select the username who is online. To select online user she has to double
click on the username and chat window appears then she can start typing a message.
57. Vedika has activated her chat account for the first time. She wants to know
some etiquette followed while chatting. Write the same for her.
Ans.: The etiquettes followed while chatting are as follows:
1. Message should be short and to the point.
2. She must introduce herself when the name doesn’t appear on the screen.
3. Always ask the person has time to chat first, however how important she think the
conversation, its not goes well if the person is busy.
4. She must know exactly what she want to say.
5. She shouldn’t type the message in Upper Case as it is considered as shouting and
aggressive.
6. She need to give people time to respond.
7. At the end she must end conversation properly.
58. Ravi is a class 10 student. He has some unique ideas in art and drawing skills.
He wants to share his idea with people. Suggest the best way to share his idea and
get a response from the audience.
Ans.: Ravi can start his blog and share his ideas where he will get response from the audience.
59. Mitesh is a class 10 student and learning the topic of creating and publishing
web pages – Blog. Where he read something like a discussion style site used by
non-techies for creating web pages as well as an online personal diary and simple
to use. What it is?
Ans.: Blog
60. Sohan is confused about how a blog is helpful for him? Give your opinion in
short for the same.
Ans.: Sohan can use the blog to convey his message about events, announcements, news,
reviews etc.
61. Saloni is confused about the basic requirements to start a blog. What does she
need to start a blog and how its managed?
Ans.: To start and manage a blog Saloni requires web browser and active internet connection
or offline blog editors.
62. Which software allows to create content without an internet connection and
later publish the content when an internet connection is available?
Ans.: Offline Blog Editor
63 Write any two popular free blog service websites.
Ans.:
1. www.wordpress.com
2. www.blogger.com
3. www.weebly.com
4. www.wix.com
5. www.blogsome.com
64. What do you mean by posting content?
Ans.: Once the blog is created, the contents should be submitted that blogger want others to
view. This process if called posting content.
65. Hetvi has created a blogpost. Now she wants to write an article on how she got
succeeded in her sports event. She has written something on top which focus on
keywords to attract the audience. What she has written over here on top of the
blogpost?
Ans.: The blogpost is written on the top of the blogpost and which focus on keywords to attract
the audience.
66. Shashwat has finished his article. Now he wants to make it live. Which button
helps him to do the same?
Ans.: Once the user finished the article writing of typing, she has to publish the content. So
here Shashwat has to click on Publish button.
67. Priyesh wants to start a new blog. He wants to create a blog account on
WordPress to help him by writing steps.
Ans.: To create a blog account on wordpress Priyesh has to follow these steps:
1. Open the browser and type www.wordpress.com in the address bar.
2. Find the button start your website and click on it.
3. Enter a valid email address in your email address field choose username and password or
select the option continue with Google or Continue with Apple.
4. Enter domain name you want for your blog.
5. Select any domain name from the given list and create a blog.
68. Charvi wants to post content on her WordPress website. Write steps to create a
new post.
Ans.: to create a post, follow the given steps:
1. Login with username and password in wordpress.
2. Click on Posts – Add New button.
3. Type the title in Add Title text box.
4. Now start typing for the content.
5. Click on Publish when you finished.
69 Damini is reading an article on a blog. She wants to give feedback through
comments on the blog. Help her how she can proceed with the same.
Ans.: The comment option is available towards the end of a blog. Look for the options like
leave a comment, leave a reply etc. and then follow these steps:
1. Type the comment text in enter your comment here box.
2. Enter email in Email(required) field.
3. Enter Name in Name(required) field.
4. Enter website URL in website field , if any.
5. If you want follow up by email then select the option notify me of follow up comments via
email and click on post comment option.
70. Expand: OLTP
Ans.: Online Transaction Process
71. Rakesh wants to know what are examples of online transactions with banking
services. Help him by writing your answer.
Ans.: Examples of online transactions with banking services are:
1. Deposit or withdraw money from ATM
2. Fund transfer using NEFT/RTGS
72. What are the benefits of online transactions?
Ans.: The benefits of online transactions are:
1. Fast transaction speed
2. Convenience
3. Low risk of theft
73. Hetal is going to place an order online on Flipkart. But she doesn’t know the
payment modes available on Flipkart. Help her by listing the various modes of
payment.
Ans.: Flipkart provides following options for payment:
1. Credit card
2. Debit card
3. Net Banking/ Internet Banking
4. Cash/Pay on Delivery
5. UPI
74. Rutvik is paying money from his phone through an app whenever he is doing
online shopping. Enlist some UPI based apps that provide online payment facilities.
75. Expand: CVV and IRCTC
Ans.: CVV: Code Verification Value
IRCTC: Indian Railway Catering and Tourism Corporation (IRCTC)
76. Name websites for online bus ticket booking and flight booking.
Ans.:
For bus ticket booking: Redbus – https://www.redbus.in/
For Flight Booking: Indigo – https://www.goindigo.in/
77. Define online transactions.
Ans.: Online transactions made every transaction very convenient and simplified the workflow
in many forms in a business. Online transactions deals with transfer of money over the
internet. It makes transaction handling very easy and convenient.
78. What is online shopping?
Ans.: Online shopping is a form of electronic commerce where customers can buy or sell goods
over the Internet. Customers need to have an active internet connection for viewing goods or
services offered by a seller; customers can pay online using a credit, debit card or by internet
banking.
79. What are the advantages of online shopping?
Ans.: In the following situations online shopping is useful:
1. A customer does not have sufficient time to visit stores.
2. Visiting a store is more expensive than purchasing a product online.
3. A product or service that is not available in the local market is available online.
80. Mention some popular online transactions websites.
Ans. The online transactions websites are:
1. IRCTC – Website for booking rail tickets
2. Flipkart – Website for online shopping
3. Ebay – Online shopping website
4. Redbus – Website for booking bus tickets
81 Write steps to book a railway ticket online using IRCTC.
OR
What are the steps required for railway ticket reservation?
Ans. To book online railway ticket follow these steps:
1. Login in IRCTC website or app.
2. Find the trains from source and destination. Enter the required details such as source,
destination, date of journey, and class of journey etc. and click on search.
3. Now the list of trains and classes are available select the desired train and availability.
4. Click on Book Now and Select the passengers.
5. Now it will ask to pay money, choose appropriate method for online payment.
6. When the transaction will be finalized you can see the status of tickets.
82. I am a branch of computer security specifically related to the internet, often
involving browser security but also network security.
Ans.: Internet Security
83. The internet represents an insecure channel for exchanging information leading
to a high risk of intrusion or fraud. What it is?
Ans.: Phishing
84. Mention a few online threats.
Ans.: Phishing, email spoofing, chat spoofing.
85. Sonu wants to reduce the risks by using best practices. Mention any two
practices.
Ans.: Sonu can use antivirus software, antispyware software, firewalls, strong passwords etc.
86. Sandeep wants to use a strong password. What is a strong password?
Ans.: A strong password is a combination of alphanumeric and special characters could be
used for creating a password that is not so easy to crack or guessed by other users.
87. Mention some passwords which are easy to remember but could not be kept as
they can be easily guessed by the hackers.
Ans.: The passwords are: favourite color, friends or relative names, bike number, mobile
numbers, or any combination of any of these.
88. Mention a website that generates a random strong password.
Ans.: www.strongpasswordgenerator.com
89. What firewall will do?
Ans.: Firewall analyze the network traffic and determine if the traffic should be allowed or not.
90. Mentions some online threats that may leave the computer insecure.
Ans.: The online threats that may leave the computer unsecure.
1. Malware
2. Phishing
3. Email Spoofing
4. Chat Spoofing
91 Mention some important points to be remembered for password security.
Ans.:
1. Use strong password (Combination of capital letters, small letters, numbers, symbols etc.)
2. Change the password frequently (at least 2 or 3 weeks)
3. Keep the password 12 to 14 characters long
4. Avoid password based on repetition, dictionary words, letter or number or sequence,
username, relative or pet names
5. Avoid using same password for multiple accounts
6. Avoid using something that the public or workmates know you strongly like or dislike
92. Write steps to generate a strong password using
www.strongpasswordgenerator.com.
Ans.: Follow these steps to generate strong password using
www.strongpasswordgenerator.com:
1. Open www.strongpasswordgenerator.com
2. Click on generate strong password.
3. Notice the password displayed under new password.
4. Always keep copies of personal data in additional media such as compact discs, pen drives.
5. Keep data away from unauthorized users.
93. How are antivirus and antispyware software useful?
Ans.: Antivirus and Antispyware programs also offer real-time protection monitoring your
computer for any changes by malware software. Keep your Antivirus and Antispyware
software always up to date, this can help in protecting your computer from recent threats.
94. Nobody should immediately respond to emails from unknown users. Why?
Ans.: This type of emails may be fake mail trying to gather information such as bank account
details, home address etc. Some mails could promise jobs or announce lottery results which in
turn could compromise the user. In some cases some email contains virus or scripts that are
dangerous could be attached to the mail never open the attachment from an unknown source.
95. What are cookies? How to clear browser cookies?
Ans.: Cookies are programs that are created on your local computer when you visit websites.
cookies are meant for storing data based on activity performed during earlier visits. Cookies
stores logon details, details of a shopping cart, visited pages in a website etc. They could be
also tracked by unauthorized users and possibly gain access to personal information.
To clear browser cookies follow these steps:
1. Open the browser and click on at the top right corner.
2. Click on more tools.
3. Click on clear browsing data.
4. At the top, choose a time range. To delete everything, select all time.
5. Next to “Cookies and other site data” and “Cached images files” check the boxes.
6. Click clear data.
96. Mention basic safety rules to follow at the workplace.
Ans.: Basic safety rules to follow at the workplace.
1. Fire safety 2. Falls and slips 3. Electrical Safety 4. Use of first aid
97. What are the falls and slips safety rules? Write them.
Ans.: Some falls and slips safety rules are as following:
1. Keep the moving area clean and clutter free.
2. Workplace must be proper ventilated receive light.
3. Wear non slippery footwear.
4. Floors must be clean and dry
5. Oil slips, dust must be immediately cleaned.
98. Amit is working in an electronics company as a senior engineer. He is called for
a seminar to explain safety rules for electrical equipment. What are these rules can
be, write them?
Ans. : The safety rules are as following:
1. Electrical equipment used should be approved by a recognized organization.
2. Workers should be trained to handle the electric equipment safety
3. Damaged and hazardous electrical equipment should be immediately replaced. All old and
workout and frayed switches and wires should be changed.
4. Heat emanating equipment should be kept away from the electrical equipment.
5. Take care that the outlets/circuits should bot be overloaded.
6. Switch off and unplug the electrical appliances before cleaning or relocating them.
99. Ms Reeta is working as a teacher. Now she is given the duty of first aid in-
charge. She wants to know about first aid and the rules for first aid. Suggest first
aid and its rules.
Ans.: First aid is the immediate assistance provided to the injured to save life and immunize
health loss till the proper medical aid/facility. Some rules of fire safety are :
1. Assure the injured to remain calm and not to panic
2. Keep them warm if they are under shock
3. Do not move the victim in case of back/neck injury
100. What do you mean by occupational hazard? Mention some examples.
Ans.: An occupational hazard is the illness one may acquire due to his occupation. For
example, like people working in a chemical factory may get affected due to presence of
certain chemicals. Some occupational hazards are: Physical hazard, chemical hazard,
biological hazard, behavioral hazard, radiological hazard, ergonomic hazard etc.
101. What do you mean by accident?
Ans.: Accident is an unplanned event that may happen if all of a sudden and may lead
unwanted or unprecedented results/outcomes.
In other words, it can be defined as an unfortunate incident that occurs unintentionally causing
hazardous result or injury or unwanted results.
102. Enlist some accident types.
Ans.: Some accident types are as following:
1. Accidents at workplace: Slips and fall accidents, fire
2. Industrial disease/illness 3. Road traffic accidents
4. Clinical Accidents 5. Sports related accidents
103. What are the common injuries suffered include?
Ans.: The common injuries suffered might include fracture, sprain, knee or elbow injury, wrist
or head injuries.
104. Mention some points to handle accidents carefully.
Ans. Accidents can handled properly by taking care of these points:
1. Every organizations must follow SOP for accident handling.
2. Safety measures must be placed to prevent workplace accidents
3. Immediately call the medical team for any injury
4. Always stay alert 5. Pay attention to and follow emergency drills
105. Any unexpected situation that needs immediate attention or action. Name
that.
Ans.: Emergency
106. Enlist some emergency situations.
Ans.: Some emergency situations are :
1. Threatens the employees, customers or the public
2. Disrupts or shuts down the operations
3. Causes physical or environmental damage
107. Enlist some kind of emergency.
Ans.: Some kinds of emergencies are :
1. Chemical pills 2. Extreme heat waves 3. Droughts 4. Pandemics
5. Terrorists attack 6. Fire 7. Floods 8. Thunderstorms
9. Leakage of some hazardous gas/chemical
108. Enlist some types of emergencies that require evacuation.
Ans.: Some types of emergencies that require evacuation:
1. Fire 2. Explosion 3. Floods 4. Earthquake 5. Hurricane 6.
Tornado
7. Toxic material release 8. Civil Disturbance 9. Workplace violence