0% found this document useful (0 votes)
10 views5 pages

Notes

Uploaded by

hometabapple
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views5 pages

Notes

Uploaded by

hometabapple
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

● Q.1)What are Computer Hardware and Software ?

Ans:- A computer system consists of two main parts- the hardware and the software. The
physical parts that we can see and touch are called hardware. It is the machinery of a
computer. These are the keyboard, monitor, CPU, etc.

There is another important part i.e., the software. Though we cannot see it, it makes the
hardware work the way we want.

Example * The monitor is a physical device or the hardware. When we start a program, for
example, a game, it is displayed on the monitor. This is done by the software which displays
text, images and videos on the monitor.

● Q.2) Which basic function performed when a computer is started?


● Ans- A computer automatically runs a basic program called BIOS (Basic
Input/Output System) as soon as it is switched on or the power button is pushed on…
● .The BIOS first does a self-test. If the self-test shows that the system is fine, the
BIOS will load the Operating System. This means that the computer's operating
system, for example, Ubuntu, is now ready to take user inputs.

● Q.3)What is the keyboard and how many functions keys are there in keyboard?

Ans :- A keyboard is an input device used to type text, numbers and commands into the
computer.
Function key

Control keys: Keys, such as Control (CTRL), SHIFT, SPACEBAR, ALT, CAPS LOCK and
TAB

,Enter key: The label on this key can be either ENTER or RETURN.

Punctuation keys: Punctuation keys include keys for punctuation marks, such as colon (:),
semicolon (;), question mark (?), single quotation marks (' '), and double quotation marks ("
").

Navigation keys: Keys, such as the arrow keys, ( HOME, END, PAGE UP, and PAGE
DOWN.

Command keys: Keys, such as INSERT (INS), DELETE (DEL), and BACKSPACE are
command keys.

Windows key: Pressing this key opens the Start menu.






● Q.4) Define mouse and its function?
● Ans :- A mouse as shown in Figure 3.8 is a small device that you can use to move,
select and open items on your computer screen.
● Function of mouse:-

● :
● Roll over or hover
● Point and Click
● Drag and drop
● Double- click

● Q.4) What do you understand by files and folders?
● Ans :- All information stored in a computer is kept in files. Different types of files
store different types of information. Each file is given a file name and has a file name
extension that identifies the file type.
● A folder is a location where a group of files can be stored.
● Examples:-

● .doc -(Microsoft Word Document)

● .txt- (Text File)

● .ppt- PowerPoint Presentation

● .gif- Graphical Interchange Format File

● .PDF- Stands for Portable Document Format,)

● .html-(Hypertext Markup Language File)

● .Jpg:- Joint Photographic Experts Group.

● .mp3:- MPGE Audio Layer

(i) Keyboard: First we should not eat anything over a keyboard.


ii) ) Screen: You can wipe the screen with a soft cloth to remove any finger marks)

iii) ) Be careful with food and drinks: Avoid eating and keeping glasses of water or cups of

coffee near a computer .

iv) Handle devices carefully:

v) Keep the computer cool: If a computer, laptop or mobile device gets overheated, the

internal parts can be damaged .

(vi) Do not overcharge your battery:, it can overheat the battery,the battery life. Always

unplug the device once it is charged 100%.

(vii) Always plug in devices carefully:-

viii) Do not run too many programs at a time

Q .6) What are the threats to computer?

Ans :- (a) Theft:

*Physical: Where a person may steal your desktop computer or laptop.

* Identity:: Where a hacker steals your personal information. and assumes your identity.

* Software priacy: This is stealing of software.

*Virus :- Viruses are computer programs that can damage the data and software.

*Worms :- These are the viruses that replicate themselves and spread to all files once they

attack a computer.this makes it very difficult to remove them .

*Trojan Horse :- A Trojan Horse disguises itself i.e. it appears to be a useful software

program but once it reaches a computer it starts behaving like a virus and destroying data.

*Online predator:- Online predators are people who trap you into inappropriate

relationships. They may be older people posing to be your age, bullying you into doing illegal

activities online and sometimes face to face.

Internet Scams: Sometimes you may receive very attractive offers saying you have
won a huge money in a lottery and that you can claim the prize by depositing a
certain amount of money. When you deposit the money using credit card or online
banking, you not only lose the deposit money but your card / account information
may be misused later.
Q.7) How to protect your Data ?

Ans:-a) Use passwords to login to your computer: Use passwords that are difficult to

guess.

B)Install Anti-virus and Firewall:Anti-viruses can also detect and clean

viruses that may have entered a computer.

c) Encrypt Data:

This is usually done by banks and companies. in which important customer information is

stored.

This would force users to use a decryption password (or key) before starting the computer

thus preventing unauthorised usage.

d) Secure sites: Give details of your credit card or bank account only on secure sites.

You might also like