CLASS –X (2024-25) SUBJECT: INFORMATION TECHNOLOGY
Part – A (Employability Skills)
Unit – 3 ICT Skills
MCQ:
1. Which of the following functions is not performed using a mouse?
(a) Turn on (b) Hover (c) Right click (d) Drag and Drop
2. What is the term used when you press and hold the left mouse key and move the mouse around?
(a) Highlighting (b) Dragging (c) Selecting (d) Moving
3. Here are the steps that take place when starting a computer. Rearrange the steps in the correct order.
(a) Desktop appears after login (b) Login screen appears
(c) Power on Self-Test (POST) starts (d) Operating system starts (e) Welcome screen appears
Ans: c>>d>>e>>b>>a
4. Which one of the following shortcut keys is used to paste a file?
(a) Ctrl + c (b) Ctrl + p (c) Ctrl + v (d) Ctrl + x
5. Which of the following is a valid file extension for Notepad file?
(a) .jpg (b) .doc (c) .text (d) .txt
6. What keys do you use to copy something?
(a) Ctrl+x (b) Ctrl+c (c) Ctrl+z (d) Ctrl+y
7. What happens if you leave a device plugged in even after it is charged 100%?
(a) It can break. (b) It can stop functioning. (c) It can over-heat. (d) Data can get corrupt.
8. How can an anti-virus protect your device?
(a) It can protect it from over-heating. (b) It can increase its performance. (c) It can
prevent data from getting corrupt. (d) It can backup data.
9. Which option is not required to keep a device cool?
(a) Keep the device unplugged when in use. (b) Do not cover a laptop with a blanket.
(c) Make sure computer’s CPU fan is working. (d) Avoid leaving the device in the sun.
10. Which of the following is essential for maintaining keyboard?
(a) Turn the keyboard upside down and shake it to remove foreign material.
(b) Blow dust and other particles with help of a blower.
(c) Use a very dilute combination of soap and water applied with a non-abrasive cloth to remove stains from
the keycaps.
1
(d) All of the above.
11. What should you do to ensure secure online transactions?
(a) Lock your computer (b) Give credit card or bank details only on safe websites
(c) Use anti-virus (d) Do not use pirated software
12. Which of the following trap small children into inappropriate relations?
(a) Online predators (b) Worms (c) Trojan Horse (d) Anti-Virus
13. What should a strong password consist of?
(a) Only letters (b) Numbers and special characters
(c) Name of a person (d) Letters, numbers and special characters
14. ICT stands for
(a) Information and Communication Technology. (b) Internet and Communication Technology.
(c ) Information and Cooperative Technology. (d) Information and Communication Transmission
15. __________ help us to communicate, run our business and stay connected with our family and friends.
(a) ICT skills (b) Self Management Skills (c) Communication Skills (d) Green Skills
16. The physical parts that we can see and touch are called
(a) Hardware (b) Software (c) Firmware (d) Firewall
17. Mobile devices, such as smart phones and tablets are also with hardware and software.
(a) Power System (b) Computer System (c) Television (d) Electrical
18. Some of the operating systems are Apple iOS and Google Android
(a) Desktop (b) Mobile (c) Elective (d) Distributed
19. To start a computer, press the Power button on the
(a) Monitor (b) Power (c) CPU (d) UPS
20 The filename and filename extension are separated by a ________.
(a) Dollar ($) (b) Dot (.) (c) Underscore (-) (d) Hash (#)
Fill In the Blanks
20. A document created using Notepad will have the extension .txt.
21. A document created using Word Processor will have the extension .doc
22. A Spreadsheet created using Spreadsheet Software will have the extension .xls
23. An image file usually has an extension .jpg
24. A sound file usually has an extension .mp3
25. Backup means copying data from a computer onto another storage device to ensure that no data gets
lost or damaged.
2
26. The information that is stored on a computer is said to be in a digital form.
27.A folder is a location where a group of files can be stored.
28. SMS: Short Message Service
29. Shut Down allows the user to turn off the computer
30. All Programs Provides access to all the installed programs and applications.
31. Search Box allows the user to search a file or a folder or run executable files.
32. Control panel allows the user to change various settings.
33.Files and folders deleted by the user are stored in the Recycle Bin.
34. From Recycle Bin, you can retrieve files or folders deleted by mistake.
35. Computer virus, malware, and other harmful software can cause damage to the working of the
computer.
36. Anti-virus is installed in the computer, and is updated and run periodically, then any loss of data can be
prevented.
37. Disk defragmentation done at regular intervals helps the disc space to be used at an optimal level. 38.
Firewall typically establishes a barrier between a trusted internal network and untrusted external
network, such as the Internet
39. By Pressing Windows key in the keyboard we can open the Start menu
40. Short Cut Keys:
CTRL+Z — UNDO CTRL+A — SELECT ALL CTRL+C — COPY CTRL+P — PRINT
CTRL+Y — REDO CTRL+X — CUT CTRL+V — PASTE CTRL+S — SAVE
2 Marks:
1. Explain how Trojan Horse virus works.
Trojan Horse: A Trojan Horse disguises itself i.e., it appears to be a useful software program but once it
reaches a computer it starts behaving like a virus and destroying data
2. List the various ways you can use to protect your data.
To protect our data from theft and viruses we can take the following measures:
(a)Use passwords to login to your computer: Use passwords that are difficult to guess. Passwords are
difficult to hack if they are a mix of small (For example ‘a b c d’) and capital letters (For example, ‘H J E
R’), numbers (For example ‘8 7 6 5’) and special characters (For example, ’% ^ # $’). This would prevent
unauthorised people from using your computer.
(b) Install Anti-virus and Firewall: Anti-viruses and Firewall monitor the data coming in and out of
a computer and prevent and viruses from entering. Anti-viruses can also detect and clean viruses that may
have entered a computer.
3
(c)Encrypt Data: This is usually done by banks and companies in which important customer information is
stored. They can encrypt their entire hard disk using encrypting feature
(d) Secure sites: Give details of your credit card or bank account only on secure sites. See in the address bar
of the browser. If the site address starts with https://and a lock symbol, then it is safe to give your credit card
and bank details.
3. Explain how to clean a computer on a daily basis.
Cleaning a device, such as a computer or mobile means to keep the screen, keyboard and mouse clean. (i)
Keyboard: First we should not eat anything over a keyboard. Crumbs can damage the internal parts of a
keyboard. You can clean a keyboard with a soft brush to remove crumbs and dust particles.
(ii) Screen: You can wipe the screen with a soft cloth to remove any finger marks.
(iii) Be careful with food and drinks: Avoid eating and keeping glasses of water or cups of coffee
near a computer. Any liquid spilt over an electronic device can spoil it beyond repair.
4. How can you increase the performance of a computer?
If we have been using a computer for a long time we have a lot of unnecessary files and data, such as
temporary files and images. When they use too much hard-disk space, the performance of the computer goes
down. It is important that we keep cleaning by removing any extra files. We can use some disk cleaner
software, which help us clean up the unnecessary files.
5. How is a computer file system similar to our physical file system in a school?
In any school (or office), each teacher has a separate cabinet where they keep the files of different students
or classes on separate shelves. Similarly, information on a computer is stored in electronic files, which can
be put into separate folders. It is easier to manage the electronic files as they can be simply copied, moved,
renamed or even deleted.
6. What are the steps you will perform to save a text file in Ubuntu?
To save the file click Save. In the Save As dialog box, browse to the Desktop folder, type the name as and
click Save
7. What is the function of the ENTER key?
Enter key: The label on this key can be either ENTER or RETURN, depending on the brand of computer
that you are using. You use the ENTER or the RETURN key to move the cursor to the beginning of a new
line. In some programs, it is used to send commands and to confirm a task on a computer.
8. How will you prevent others from using your computer?
Just like we keep our cupboards locked at home we need to keep our computer locked when we are not
working on it. This will ensure that no unauthorised person can see or make changes to our information
without taking our permission. To make sure your computer is locked, you have login-IDs and passwords. A
login and password is like a key to the lock which allows you to use the computer. When you login to the
computer with your login-ID and password, the computer knows that you are an authorised person and
4
allows you to work on the applications in the computer. Once you finish working, you must log out or sign
out so that no one else can see your work.
9. Write a Short note on Operating System
An operating system is a software that serves as an interface between the user and the computer. Some of
the functions of Operating system are:
It manages all the devices of a computer and keeps track of the status of the device, whether it is
busy or not.
It also checks whether the device is functioning properly or not.
It also controls software resources of the computer.
It manages the computer memory and keeps track of which memory space is in use by which
program and which space is free.
It manages the structure of the files and directories on a computer system.
It keeps track of the amount of disk space used by a specific file.
It allows you to create, copy, move and delete files.
10. What are the basic functions performed when a computer Starts?
Basic Functions performed when a computer starts Just as we go about our morning routine without
anyone telling us what to do, a computer automatically runs a basic program called BIOS (Basic
Input/Output System) as soon as it is switched on or the power button is pushed on. The BIOS first does a
self-test. If the self-test shows that the system is fine, the BIOS will load the Operating System. This means
that the computer’s operating system, for example, Ubuntu, is now ready to take user inputs.
11. What is Login and Logout in a computer system?
Login and Logout Just like we keep our cupboards locked at home we need to keep our computer locked
when we are not working on it. This will ensure that no unauthorised person can see or make changes to our
information without taking our permission. To make sure your computer is locked, you have login-IDs and
passwords.
A login and password is like a key to the lock which allows you to use the computer. When you login to the
computer with your login-ID and password (as shown in Figure 3.5), the computer knows that you are an
authorised person and allows you to work on the applications in the computer. Once you finish working, you
must log out or sign out so that no one else can see your work.
12. What is meant by Shutting Down a Computer System?
Shutting Down a Computer You can shut down the computer in Ubuntu by clicking Systems button at the
top right and then click Shut Down . When you click Shut down, the Operating System will close all the
applications and turn off the computer.
13. Write a note on Keyboard
5
(a) Keys labelled from F1 to F12 are function keys. You use them to perform specific functions. Their
functions differ from program to program. The function of the F1 key in most programs is to get help on that
program. Some keyboards may have fewer function keys.
(a) Control keys: Keys, such as Control (CTRL), SHIFT, SPACEBAR, ALT, CAPS LOCK and TAB, are
special control keys that perform special functions depending on when and where they are used.
(b) Enter key: The label on this key can be either ENTER or RETURN, depending on the brand of computer
that you are using. You use the ENTER or the RETURN key to move the cursor to the beginning of a
new line. In some programs, it is used to send commands and to confirm a task on a computer.
(c) Punctuation keys: Punctuation keys include keys for punctuation marks, such as colon (:), semicolon (;),
question mark (?), single quotation marks (‘ ’), and double quotation marks (“ ”).
(d) Navigation keys: Keys, such as the arrow keys, HOME, END, PAGE UP, and PAGE DOWN are
navigation keys. These are used to move up and down, right and left in a document. The HOME and
END keys move the cursor to the left/right end of a line of text, respectively. The PAGE UP and PAGE
DOWN keys are used to move one page up and one page down, respectively.
(e) Command keys: Keys, such as INSERT (INS), DELETE (DEL), and BACKSPACE are command keys.
When the INSERT key is turned ON, it helps you overwrite characters to the right of the cursor. The
DELETE key and the BACKSPACE key are used to remove typed text, characters and other objects on the
right and left side of the cursor, respectively.
(f) Windows key: Pressing this key opens the Start menu
14. Explain the Actions performed using Mouse.
A mouse is a small device that you can use to move, select and open items on your computer screen. Let us
see some of the functions that can be performed using a mouse. Different application will behave
differently to the mouse actions. Here we use the File Explorer to see the effect of the mouse action.
Roll Over or Hover Some actions can be done by simply rolling over or hovering over an item. When you
bring the mouse over a file in File Explorer, it will show the details of that file Point and Click As you move
the mouse on your desk, a pointer moves correspondingly on your screen. The mouse allows you to select an
item on the screen.
When you click a particular file, it gets selected. Drag and Drop To move an item, you need to click it, and
then holding the mouse button down, move the item to a new location. After you move the item to the new
location, you release the mouse button. This is called drag and drop.
When you drag a file in File Explorer, you can pick it up from the present location and drop it in a new
location where you release the mouse .Double-click Double-clicking means to quickly click the left mouse
button twice. When we double click on a file, it will open the file.
15. How to create a Folder?
6
Creating a Folder (in Ubuntu) Folder is a location where a group of files can be stored. For example, we can
create a folder where all the files for all the students can be stored. Let us create a new folder in Ubuntu. •
To open file explorer in Ubuntu, click Files option on the left.
• To create a folder:
(a) Choose a location where the folder has to be created for example ‘Desktop’.
(b) Right-click and then choose the ‘New Folder’.
(c) Type the name of the folder as ‘Demo’.
16. Give Some Basic Tips for Taking Care of Devices
Here are some simple ways that you can follow to take care of your computer. Keeping a Device Clean
Cleaning a device, such as a computer or mobile means to keep the screen, keyboard and mouse clean.
Keyboard: First we should not eat anything over a keyboard. Crumbs can damage the internal parts of a
keyboard. You can clean a keyboard with a soft brush as shown in Figure 3.21 to remove crumbs and dust
particles.
Screen: You can wipe the screen with a soft cloth to remove any finger marks.
Be careful with food and drinks: Avoid eating and keeping glasses of water or cups of coffee near a
computer. Any liquid spilt over an electronic device can spoil it beyond repair.
Handle devices carefully: Handle and move your laptop carefully and avoid dropping or banging it against
a hard surface. Even a short fall can damage the screen or the hard disk and make the device useless. Using
a cover for your mobile and a padded case for moving your laptop as shown in Figure 3.23 protects the
device from damage.
Keep the computer cool: If a computer, laptop or mobile device gets overheated, the internal parts can be
damaged. The CPU has an internal fan to keep it cool. We should make sure the fan is functioning. You can
also use an external fan. Avoid leaving a device in the sun or in a closed car. We should be careful when
using a laptop while sitting in bed and make sure that the fan in not covered.
Do not overcharge your battery: Sometimes we keep a device plugged in for charging even after it is
fully charged. If we leave the device plugged in for a long time, it can overheat the battery. This reduces
the battery life. Always unplug the device once it is charged 100%.
Always plug in devices carefully: Any device being connected to a laptop or computer such as a USB
drive or headphones, should be done gently. It should not be forced into the port. If you find it difficult to
plug in a device, change the direction and try instead of trying to force it in.
Do not run too many programs at a time: When too many programs are running at the same time as the
computer can become slow and even crash. If a program/app is not being used, it should be closed so that
other programs can work smoothly.
17. Explain how to prepare a maintenance Schedule for the Computer System.
Prepare a Maintenance Schedule We need to prepare a plan or a schedule for maintenance to keep the
computer running in perfect condition for a long time. This can include:
(a)Daily Maintenance i. Clean up your e-mail inbox ii. Download e-mail attachments and save in proper
folders
(b) Weekly Maintenance i. Clean your keyboard ii. Clean your monitor iii. Dust CPU and printer iv.
Backup your data to an external drive
(c)Monthly Maintenance i. Transfer photographs to computer and delete from drive ii. Organise photos
into folders or albums iii. Clean up ‘Download’ folder iv. Uninstall unused programs and apps v. Run disk-
cleaner software vi. Run full system virus scan
(d) Yearly/Annual Maintenance
Clean up contacts list on social media accounts
Clean up e-mail contact list
7
Update your operating system
Check for expiry of anti-virus software and renew
18 Write a Short note on the following Topics:
(i) Backup Your Data (ii) Scanning and Cleaning Viruses
(iii) Increasing Computer Performance (iv) Removing SPAM from your Computer
Backup Your Data Backing up data means to save the information present on your computer on another
device, such as CD/DVD drives as shown in Figure 3.28 or hard disk. Data can recovered from here in case
the computer stops working completely. Computers can crash, humans can make mistakes and natural
disasters, such as floods can happen. So, it is important for companies, hospitals, banks, etc., to keep their
information safe — so that their business can continue to function smoothly and their customers do not face
problems.
Scanning and Cleaning Viruses Sometimes computer viruses can enter a computer from such attacks we
can install anti-virus software. This will prevent any viruses from entering and will also clean any viruses
that may enter our system before they affect the data.
Increasing Computer Performance If we have been using a computer for a long time we have a lot of
unnecessary files and data, such as temporary files and images. When they use too much hard-disk space,
the performance of the computer goes down. It is important that we keep cleaning by removing any extra
files.
We can use some disk cleaner software, which help us clean up the unnecessary files.
Removing SPAM from your Computer Sometimes we get mails from companies who are advertising a
product or trying to attract you to their website. Such mails are called SPAM. We should never respond to
SPAM and delete it on a regular basis it is possible to set filters in the settings to prevent SPAM from
entering our mail box. Most e-mail software have a SPAM folder and automatically put all such emails into
this folder.
19. Very often we hear about spam mails. Explain what spam mails are, and what should be done with such
mails.
Sometimes we get mails from companies who are advertising a product or trying to attract you to their
website. Such mails are called SPAM.
Ways to handle spam mails:
• Report the email as spam Block spam email addresses Use an email alias.
• Change your email privacy settings
• Unsubscribe from unwanted newsletter or mailing lists
• Keep your email address private Use a third- party spam filter
• Never respond to spam mails.
• Delete spam mails on a regular basis.
20. What are the two ways of losing the Personal Information?
Personal information can be lost or leaked in two ways:
1. We are not careful in giving out personal information over the Internet. For example, we share our
account details and password on unsecure sites.
8
2. A person gets unauthorised access to our computer. This can happen in the office if we leave are
computer without logging out. Computer security and privacy is about measures we can take to restrict
access to personal data stored in a computer.
21. Explain Computer threats
Threats to Computer Threats are the ways in which personal information can be leaked from a computer
without our knowing.
(a) Theft: Theft means stealing of information or hardware. These maybe of three types:
(b) Physical: Where a person may steal your desktop computer or laptop.
(c) Identity: Where a hacker steals your personal information and assumes your identity. Using this false
identity, the hacker can gain access to your account information or perform illegal activity.
(d) Software Piracy: This is stealing of software and includes using or distributing unlicensed and
unauthorised copies of a computer program or software
(e) Virus: Viruses are computer programs that can damage the data and software programs or steal the
information stored on a computer. Major types of viruses are Worms and Trojan Horse.
(f) Worms: These Worm virus themselves and spread to all files once they attack a computer. This makes it
very difficult to remove them.
(g) Trojan Horse: A Trojan Horse disguises itself i.e., it appears to be a useful software program but once it
reaches a computer it starts behaving like a virus and destroying data.
(h) Online Predator: Online predators are people who trap you into inappropriate relationships. They may
be older people posing to be your age, bullying you into doing illegal activities online and sometimes
face to face.
(i) Internet Scams: Sometimes you may receive very attractive offers saying you have won a huge money
in a lottery and that you can claim the prize by depositing a certain amount of money. When you deposit
the money using credit card or online banking, you not only lose the deposit money but your card /
account information may be misused later.
22. Write a note on Protecting Computer Data
To protect our data from theft and viruses we can take the following measures:
(a) Use passwords to login to your computer: Use passwords that are difficult to guess. Passwords are
difficult to hack if they are a mix of small (For example ‘a b c d’) and capital letters (For example, ‘H J E
R’), numbers (For example ‘8 7 6 5’) and special characters (For example, ’% ^ # $’). This would prevent
unauthorised people from using your computer.
(b) Install Anti-virus and Firewall: Anti-viruses and Firewall monitor the data coming in and out of a
computer and prevent and viruses from entering. Anti-viruses can also detect and clean viruses that may
have entered a computer.
(c) Encrypt Data: This is usually done by banks and companies in which important customer information
is stored. They can encrypt their entire hard disk using encrypting feature in Windows (Bitlocker). This
9
would force users to use a decryption password (or key) before starting the computer thus preventing
unauthorised usage.
(d) Secure sites: Give details of your credit card or bank account only on secure sites. See in the address
bar of the browser. If the site address starts with https://and a lock symbol, then it is safe to give your
credit card and bank details
23. What is the difference between moving and copying a folder?
When you copy a file or a folder, duplicate of the original file or folder is created at the new location, the
original remains as it is.
When you move a file or a folder, the original file or folder is moved to the new location.
10
CLASS – X (24-25) SUBJECT: INFORMATION TECHNOLOGY
Part – A (Employability Skills)
Unit – 4 Entrepreneurship skills
One Marks:
Textbook:
1. Entrepreneurship is being talked about a lot in the world today, and especially in India.
2. Wage employed people are people who work for a person or an organization and get paid for that work.
3. Self-employed people are those who start businesses to satisfy the needs of people.
4. A self-employed person who is always trying to make his/her business better by taking risks and trying new
ideas is an entrepreneur.
5. Entrepreneurs run their businesses in a market.
6. Entrepreneurs use the material and people available around them, to make products at low cost.
7. Entrepreneurs have a positive relationship with society.
8. Wealth means having enough money to live a comfortable life.
9. Quality is a way in which a person acts or behaves.
10. A myth, or a misconception, is a false belief or opinion about something.
11. The money used to start a business is called capital.
12. A career is a line of work that a person takes for life.
13. A self-employed person running a business to satisfy a need by trying new ideas is an entrepreneur.
14. Which of the following is not an essential quality to become a successful entrepreneur?
a) Confidence b) Creativity c) Patience d) Wealthy
Questions and Answers:
1. Who is an Entrepreneur?
A person who sets up a business or businesses, taking on financial risks in the hope of profit. An
entrepreneur is the person who sees a problem in the world and immediately focuses on creating the
solution. They’re the leaders who strike out on their own to improve society. Whether they’re creating jobs
or a new product, they constantly take action to ensure world progress.
2. What is Entrepreneurship?
The process of developing a business plan, launching and running a business using innovation to meet
customer needs and to make a profit is entrepreneurship.
3. Enlist various qualities of a successful entrepreneur.
They are confident. They believe in themselves and their abilities.
They keep trying new ideas in their business.
They are patient.
They are creative and think differently about business ideas.
They take responsibility for their actions.
They take decisions after thinking about them.
They work hard.
They do not give up when they face a difficulty.
4. What is Wage Employment and Self Employment?
1
Wage employed people are people who work for a person or an organization and get paid for that work. Self-
employed people are those who start businesses to satisfy the needs of people. A self-employed person who is
always trying to make his/her business better by taking risks and trying new ideas is an entrepreneur.
For example, a doctor who works for a hospital is a wage employed person. If the same doctor has their own
clinic, he or she is a self-employed person.
5. Where do these entrepreneurs run their business?
Entrepreneurs run their businesses in a market. The market has people who buy products and services and
people who sell them also. When people are buying and selling from each other, it is helpful for everyone
because everyone involved makes money. This is how entrepreneurs help in growing the area and society they
live in.
6. What do entrepreneurs do when they run their business?
Fulfil Customer Needs
Demand means a product or service that people want. Entrepreneurs find out what people want. Then, they
use their creativity to come up with a business idea that will meet that demand.
Use Local Materials
Entrepreneurs use the material and people available around them, to make products at low cost.
Help Society
Entrepreneurs have a positive relationship with society. They make profits through activities that benefit
society. Some entrepreneurs work towards saving the environment, some give money to build schools and
hospitals. This way, the people and area around them becomes better.
7. List the ways in which an entrepreneur affects a society.
Create Jobs
With the growth of a business, entrepreneurs look for more people to help them. They buy more material,
and from more people. The also hire more people to work for them. In this way, more people have jobs.
Sharing of Wealth
Wealth means having enough money to live a comfortable life. As entrepreneurs grow their business, the
people working for them and in related businesses also grow. Hey have more money to live a better quality
life.
Lower Price of Products
As more entrepreneurs sell the same product, the price of the product goes down. For example, when more
mobile phones were getting sold in India, the cost of the phone became lesser.
8. What do you think is the most important function of an entrepreneur? Write your answer giving suitable
examples.
2
9. Which qualities should an entrepreneur possess? An entrepreneur should be:
• Patient
• Positive
• Hardworking, never giving up and perseverance
• Have confidence
• Hard working
• Optimistic
• Independent
• Energetic
• Self-confident
• Perseverance
10. List any four characteristics of entrepreneurship.
• Ability to take up risks
• Believe in hard work and discipline
• Adaptable and flexible to achieve the goals of enhancing quality and customer satisfaction
• Knowledge of the product and services and their need or demand in the market
• Financial literacy and money management skills
• Effective planning and execution
11. What are the key Problems an Entrepreneur may face while running a business?
Idea: What should my business idea be? How do I know that this idea will work? Money:
How much money should be raised to start a business?
12. Write down Myths about Entrepreneurs.
Misconception 1
The misconception is that every business idea needs to be unique or special. Entrepreneur sees the customer
demand and brings a new idea into their business. A person can take an idea that is already there in the market
and do something different with it. Misconception 2
The misconception we have is that a person needs a lot of money to start a business. The money used to start a
business is called capital. However, every business does not need a lot of capital to start. In the activity, every
entrepreneur started with a different amount. Some have a lot of money, and some do not. Depending on how
much money they have or can borrow, they can start a business with that much money. Once they make more
money, they can put that into their business to make it bigger.
Misconception 3
A misconception we have is that only a person having a big business is an entrepreneur. For an entrepreneur.
no business is big or small. If a person is running a business to fulfil a customer’s need, he is an
entrepreneur. Most businesses start small. It becomes big with hard work and creativity. Misconception 4
A misconception we have is that entrepreneurs are born, not made. An entrepreneur is a person who does
whatever it takes to make the business successful. Being an entrepreneur starts with a way of thinking. They
must believe that anything is possible and it shall be achieved. It starts with thinking of an idea that they want
to work on, making it different.
13. What is the difference between a misconception and reality? Give an example.
Misconceptions are among the people because of the past experiences or no experiences, mislead their ideas
about an entrepreneur which is not true, and they couldn’t understand the meaning and importance of
entrepreneur.
3
Reality: People with their own idea and knowledge grabbed from their experiences and inner thoughts become
entrepreneur day to day and face different ups and downs. They become successful entrepreneur. Example.
Students making toys .and selling. In adhocbasis.
14. Define the term career and what are the 2 ways a person can earn a living?
A career is a line of work that a person takes for life.
There are two ways a person can earn a living.
• Self employment
• Wage employment
Ex: A doctor who works for a hospital is a wage employed person, where as if the same doctor has his own
clinic, he /she is a self-employed person.
15. List down the career processes a person undergoes when he/she becomes an entrepreneur.
This process is as follows:
ENTER
When an entrepreneur is starting, they are just entering the market to do business. For example, Sanjana is
starting a small grocery store in a locality.
SURVIVE
There are many entrepreneurs in the market. The entrepreneur has to remain in a competitive market. For
example, there are many other grocery stores in the area. Yet, Sanjana’s store survives the competition and does
well. She also expands the store to two more floors.
GROW
Once the business is stable, an entrepreneur thinks about expanding his or her business. For example, after five
years, Sanjana has opened a chain of four more grocery stores in the same city. In the next two years, she plans to
expand to tow other cities.
16. Write against the option, if the business idea is of
Self-employment or wage employment.
(a) Cooking in a restaurant – Wage employment
(b) Owning a clothing business- self employment
(c) Having a dosa selling stall – self employment
17. A person needs a lot of money to start a business. Do you agree with the statement? Justify your answer.
No, because “A person needs a lot of money to start a business” is only a misconception.
Every business does not need a lot of capital to start. We can start a business with less money. Once we make
more money, we can put that into our business to make it bigger.
4
5