0% found this document useful (0 votes)
25 views4 pages

Grade: X Subject: Physical Activity Facilitator: Unit - 3 Ict Skills

The document outlines various types of operating systems including DOS, Unix, Solaris, Microsoft Windows, GNU-Linux, and mobile operating systems. It also covers topics related to file management, computer viruses, and cybersecurity measures, emphasizing the importance of regular maintenance and protective software. Additionally, it discusses online threats and safety measures to mitigate risks associated with cyber activities.

Uploaded by

syedadiquadri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views4 pages

Grade: X Subject: Physical Activity Facilitator: Unit - 3 Ict Skills

The document outlines various types of operating systems including DOS, Unix, Solaris, Microsoft Windows, GNU-Linux, and mobile operating systems. It also covers topics related to file management, computer viruses, and cybersecurity measures, emphasizing the importance of regular maintenance and protective software. Additionally, it discusses online threats and safety measures to mitigate risks associated with cyber activities.

Uploaded by

syedadiquadri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Grade: X

Subject: Physical Activity Facilitator


Unit -3 ICT SKILLS

Q.1 What are the types of operating system?


Ans. There are various types of operating systems. Some popular
operating systems are:
1. Disk operating system (dos)- Father of dos – Tim Patterson
Microsoft released it with an IBM pc as MS-DOS 1.0 in 1982.
2. Unix- it was originally developed in 1969 at AT&T bell labs.
Initially it was developed in assembly language by 1973 it was
recorded in c.
3. Solaris- It was originally Developed by sun microsystems and
was called as SunOS during 1993. At present it is known as
oracle Solaris after it is acquisition by oracle in January 2010.
4. Microsoft Windows- It was first introduced in 1985 and it have
different versions like:
Windows 3.0, Windows 3.1, Windows 95, Windows 98,
Windows NT, Windows 2000, Windows ME, Windows XP
Windows Vista, Windows Server 2008, Windows 7, Windows 8,
Windows 10.
5. GNU-Linux- Linux is a popular operating system that comes in
various distribution. Development of Linux operating System
Started in 1991.
6. Mobile operating system- Android, IOS, Windows mobile OS

Section A

A. 1. i 2. ii 3. i 4. iii 5. iii 6. i 7. iv 8. ii 9. i
10. i
B. 1. single-user 2. Memory management 3. hardware 4.
operating system
5. Basic Input/Output System
Section B
A. 1. iii, iv, v, ii, i
2. To create a new file, follow the given steps:
Step 1: Right click on the desktop and select New option.
Step 2: Click on the required file type and type the name of the
file that is to be created. Click on Folder; a folder named New
Folder will appear. Type the desired name for the folder.
Step 3: Press Enter key.
3. A computer file system is an electronic version of physical
file system where related information is stored in a single file or
folder.
4. Step 1: Right click on any file and select Properties. A dialog
box will appear and it will display the properties of the file.
Step 2: Click on the General tab to view the general properties of
the selected file(s)/folder(s)
like: type, location, size, date of creation, etc.
5. A boot sector virus gains complete control over the Master
Boot Record (MBR). MBR is the first sector of the computer
hard drive that stores the information about loading the operating
system into the main memory. Boot sector virus replaces the
location and information of the operating system in order to stop
it from getting loaded into the main memory, resulting into errors
during booting. Michelangelo, Poleboat, Stones and Antiexile are
some common examples of boot sector virus.
6. Trojan Horses are often used by hackers as they can enter into
the database of a computer system under the guise of some
entertaining package. The term ‘backdoor’ is often used for
trojan horse. The user interacts with the program and
simultaneously the infection takes place behind the interactive
interface. Once a trojan horse has infected a computer system, it
becomes easier for a hacker to access it remotely and perform
unethical operations and steal important information from the
infected computer.
7. As large amount of data is stored on the computer, it is
necessary to have regular maintenance.

8. • Installation of Antivirus and Firewall: There are antivirus


software which are used to safeguard or prevent the computer
from virus and clean the unwanted programs.
• Scanning and Cleaning of Hard Disk: If a user faces some
unusual symptoms while operating a computer, then it must be
scanned and cleaned as it may have been infected by a malware.
• Update the Antivirus: If some new virus has developed after
the installation of the loaded antivirus, then it may not be
recognized by the loaded antivirus and therefore, it may not
prevent that virus. In that case, the existing antivirus has to be
updated in order to install its latest virus signature and clean new
virus.
• Use passwords to login to your computer: Always use
passwords that are difficult to guess. This would prevent
unauthorized people from accessing your computer.
• Encrypt Data: This is usually done by banks and companies
where important customer information is shared and stored. They
can encrypt their entire hard disk using encrypting feature in
Windows (Bit locker) forcing users to use a decryption password
(or key) before starting the computer, thus preventing
unauthorized usage.
9. Spam refers to an unwanted and unsolicited message which is
received in the inbox of a person’s e-mail account or newsgroups.
The one who sends the spam is called a ‘spammer’. Generally,
spams are sent with an intention to advertise products and
services.
10. Some of the ways are:
i. Keeping software up-to-date
ii. Don’t click on suspicious links
iii. Use good antivirus software
iv. Use firewall
v. Do minimum downloads
vi. Use pop-up blockers
Some popular antiviruses are AVG, Norton, Quick Heal,
Kaspersky, McAfee, Avast, etc.
B. 1. Basic Input/Output System (BIOS)
2. AVG, Avast, Kaspersky
Previous Years’ Questions
1. Two online threats are cyberstalking and cyberbullying.
Measures to ensure safety from online threats:
i. Do not share passwords with anyone.
ii. Do not share personal photos with unknown people.
iii. Do not post derogatory comments against any community. 2.
(a)

3. (a) A firewall is a network system that establishes a barrier


between a trusted network and an untrusted network.
(b) Spam refers to unwanted and unsolicited messages in a user’s
inbox.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy