Grade: X Subject: Physical Activity Facilitator: Unit - 3 Ict Skills
Grade: X Subject: Physical Activity Facilitator: Unit - 3 Ict Skills
Section A
A. 1. i 2. ii 3. i 4. iii 5. iii 6. i 7. iv 8. ii 9. i
10. i
B. 1. single-user 2. Memory management 3. hardware 4.
operating system
5. Basic Input/Output System
Section B
A. 1. iii, iv, v, ii, i
2. To create a new file, follow the given steps:
Step 1: Right click on the desktop and select New option.
Step 2: Click on the required file type and type the name of the
file that is to be created. Click on Folder; a folder named New
Folder will appear. Type the desired name for the folder.
Step 3: Press Enter key.
3. A computer file system is an electronic version of physical
file system where related information is stored in a single file or
folder.
4. Step 1: Right click on any file and select Properties. A dialog
box will appear and it will display the properties of the file.
Step 2: Click on the General tab to view the general properties of
the selected file(s)/folder(s)
like: type, location, size, date of creation, etc.
5. A boot sector virus gains complete control over the Master
Boot Record (MBR). MBR is the first sector of the computer
hard drive that stores the information about loading the operating
system into the main memory. Boot sector virus replaces the
location and information of the operating system in order to stop
it from getting loaded into the main memory, resulting into errors
during booting. Michelangelo, Poleboat, Stones and Antiexile are
some common examples of boot sector virus.
6. Trojan Horses are often used by hackers as they can enter into
the database of a computer system under the guise of some
entertaining package. The term ‘backdoor’ is often used for
trojan horse. The user interacts with the program and
simultaneously the infection takes place behind the interactive
interface. Once a trojan horse has infected a computer system, it
becomes easier for a hacker to access it remotely and perform
unethical operations and steal important information from the
infected computer.
7. As large amount of data is stored on the computer, it is
necessary to have regular maintenance.