Chapter 6
Chapter 6
Cyber Safety
Question 1
What name is given to a malicious program that comes in disguise of a useful program ?
1. Trojan Horse
2. Invisible Man
3. Stowaway
4. Uninvited guest
Answer
Trojan Horse
Reason — A trojan horse is a program that appears harmless, such as a text editor or a utility
program, but actually performs malicious functions such as deleting or damaging files.
Question 2
1. Date of birth
2. Online nickname
3. Gender
Answer
Reason — 'Date of birth', 'Online nickname' and 'Gender' is personal information. 'Largest peak in
your continent' is a public information.
Question 3
2. Firewall
3. Anti-virus software
4. Safety software
Answer
Anti-virus software
Question 4
3. a fault with the CPU which means that data is lost or damaged
Answer
Reason — Computer viruses are malicious codes/programs that cause damage to data and files on a
system.
Question 5
What is the most common way people's computers get infected by a virus ?
1. receive a fax
Answer
Reason — The most common way computers get infected by a virus is by running or opening an
infected disk or file.
Question 6
2. it stops people gaining unauthorised access to your computer via the internet
3. it inspects computer files and email attachments for viruses and removes or quarantines any
that it finds
Answer
it inspects computer files and email attachments for viruses and removes or quarantines any that it
finds
Reason — An anti-virus software inspects computer files and email attachments for viruses and
removes or quarantines any that it finds.
Question 7
2. Cyber Bullying
3. Cyber Stalking
Answer
Reason — Stealing computer hardware does not involve the use of electronic communication or
information systems. Thus, it is not a cyber crime.
Question 8
Answer
Reason — Firewall is a program that monitors all communications and traps all illicit packets. Thus, it
prevents unauthorised access to your computer via the Internet.
Assignment Questions
Question 1
2. A secure password should be one that you will easily remember and be a mixture of upper-
case and lower-case letters, numbers and characters
Answer
A secure password should be one that you will easily remember and be a mixture of upper-case and
lower-case letters, numbers and characters
Reason — A password that is a mixture of upper-case and lower-case letters, numbers and
characters becomes difficult to guess or crack.
Question 2
Answer
Question 3
3. Anti-virus software
Answer
Reason — Malware is a general term used to refer to viruses, worms, spyware, adware etc. Malware
infects our computer, making it behave in a way, which we do not approve of.
Question 4
1. When you visit the site, a message appears telling you it is secure
Answer
Reason — A safe site's URL starts with https:// and it means that the website is secure.
Question 5
When accessing a website, which icon can be seen in the address bar to indicate that the website is
secure ?
1. Arrow
2. padlock
3. shield
4. house
Answer
padlock
Reason — A padlock icon can be seen in the address bar to indicate that the website is secure.
Question 6
1. To detect viruses on a system and prevent them from attacking it and spreading
Answer
Reason — Firewall is a program that monitors all communications and traps all illicit packets. It helps
to prevent unauthorised connections coming in to and out of a network.
Question 7
Answer
Cyber Safety refers to the safe and responsible use of Internet so as to ensure safety and security of
personal information and not posing threat to anyone else's information.
Although Internet has made things easier but at the same time it has posed many security risks too,
if not used in a proper way. Thus, it is important to know about possible threats, challenges and risks
of working on Internet to ensure personal safety and information security. Hence, cyber safety
becomes very important to know and prevent possible threats to personal safety online.
Question 8
Answer
We can protect our identity on the Internet by using the following solutions:
ii. Proxy — It works by acting as a middleman between our computer and the website
we want to access.
iii. Virtual Private Network — It is a method used to protect our system from hackers
trying to access our sensitive information.
Question 9
Answer
1. IP Address — From our IP address, a website can determine our rough geographical
location.
2. Cookies and Tracking Scripts — They can identify and track our browsing activity across a
website.
3. HTTP Referrer — When a link to an outside website on a webpage is clicked, then the linked
website will get opened and internally our information will be provided to the linked
website.
4. Super Cookies — Super Cookies are persistent cookies that come back even after we delete
them.
5. User Agent — It tells websites our browser and operating system, providing another piece of
data that can be stored and used to target ads.
Question 10
What are cookies ? How are they used by websites to track you ?
Answer
Cookies are small text files on our computer storing small pieces of information related to our online
habits.
1. First party cookies — These store our own login id, passwords, auto fill information etc. for
some websites that we frequently visit. They can identify us and track our browsing activity
across a website.
2. Third party cookies — The websites store these cookies to know about our search history
and web browsing history so as to place advertisements as per our interests. Third party
cookies may result in many unwanted advertisements on our webpages.
Question 11
What is Private browsing ? Why is it considered a better way of browsing the Internet?
Answer
A type of browsing wherein browser opens in incognito mode or through proxy or VPN, and does not
store cookies about our online activity, is called Private browsing.
It is considered a better way of browsing the Internet as it allows the user to use the Internet
without revealing his/her search history and sharing data.
Question 12
Answer
Question 13
Answer
We should keep the following things in mind while choosing an effective password:
2. Don't use passwords that are based on personal information that can be easily accessed or
guessed.
3. Use a combination of capital and lowercase letters, numbers, and special characters.
4. Don't use words that can be found in any dictionary of any language.
Question 14
Answer
Confidentiality of information ensures that only authorized users get access to sensitive and
protected data.
1. Use firewall wherever possible to ensure only authentic users connect to the computer.
3. Browse privately whenever possible to avoid tracking by websites by not storing cookies.
4. Be careful while posting on Internet and avoid sharing personal information like address,
mobile number, bank details, etc on public Internet sites.
5. Ensure safe sites while entering crucial information by checking for https and padlock sign.
6. Carefully handle emails by not opening attachments from unknown senders and avoid
clicking on links contained in the email.
Question 15
Answer
A computer virus is a computer program that can infect other computer programs by modifying
them in such a way as to include a copy of itself.
Viruses can alter, corrupt and delete files, freeze the computer, flash unknown or unasked messages
or display unwanted graphics on the computer screen, play unwanted music and interfere with the
computer operation.
Question 16
Answer
An antivirus software is considered important because it scans our disk for viruses and removes
them, if any virus is found. Moreover, some antivirus software remains present in memory all the
time so that they can detect the viruses and counterattack them.
Question 17
Answer
1. Some viruses may delete or damage random documents or specific files that are crucial to
the operating system.
2. Viruses can run in the background, without being seen, and may cause the computer to run
extremely slow.
3. Some forms of viruses may infect the email program and spread themselves to the contacts
in the address book.
Question 18
What are Malware ? What type of damages can they cause to your computer ?
Answer
Malware is a general term used to refer to viruses, worms, spyware, adware etc. It is unwanted
software that someone else wants to run on our computer. Malware infects our computer, making it
behave in a way, which we do not approve of.
2. Viruses can run in the background, without being seen, and may cause our computer to run
extremely slow.
3. Some forms of viruses may infect the email program and spread themselves to the contacts
in the address book.
4. Spyware can monitor information about our computing habits which in the end can lead to
identity theft.
5. Some forms of spyware can also alter computer settings like our web browser home page
setting or the placement of our desktop icons.
6. Spyware can rob our PC or system speed and Internet access efficiency.
7. Adware tracks information about our data and computing habits to produce targeted
advertising, such as pop-up ads, on your computer screen.
8. When infected with adware, we will likely see frequent pop-up ads appear out of nowhere.
Question 19
Answer
A firewall secures the computer such that only authentic users can connect to it. The significance of
firewall lies in its ability to monitor, filter, and control incoming and outgoing network traffic based
on predefined security rules. This helps prevent unauthorized access, data breaches, and malicious
attacks, such as viruses, malware, and hacking attempts, from reaching the protected computer
system.
Question 20
Answer
Any criminal offence that is facilitated by, or involves the use of, electronic communications or
information systems, including any electronic device, computer, or the Internet is referred to as
Cyber crime.
1. The local police stations can be approached for filing complaints with the cyber crime cells
specially designated with the jurisdiction to register complaint.
2. Provisions have now been made for filing of 'E-FIR' in most of the states.
3. The Ministry of Home Affairs is also launching a website for registering crimes against
women and children online including cyber crimes.
Question 21
Cyber stalking refers to online stalking where someone uses Internet, chat rooms, social networking
sites, emails etc. to stalk his/her victim. Cyber stalker follows the victim online everywhere and
keeps posting/sending something which are
Chapter 5
Question 1
1. data transfer
2. data flow
3. data communication
4. data management
Answer
data communication
Reason — Transmission of computerised data from one location to another is called data
communication.
Question 2
When a group of computers is connected together in a small area without the help of some cables, it
is called
Answer
Reason — When a group of computers is connected together in a small area without the help of
some cables, it is called Local Area Network (LAN).
Question 3
Answer
Question 4
1. Data
2. Information
3. Multimedia
4. Internet
Answer
Multimedia
Reason — Interactive combination of text, graphics, images, audio, video etc. is known as
multimedia.
Question 5
1. LAN
2. MAN
3. WAN
Answer
WAN
Question 6
Answer
Question 7
Answer
Reason — A Wide Area Network (WAN) is a network across a city, country or even the world.
Question 8
Answer
Reason — Networks are useful because resources such as a printer, can be shared within a network.
Question 9
Storing and accessing data and programs over the internet is generally known as
1. Modern computing
2. Internet computing
3. Wireless computing
4. Cloud computing
Answer
Cloud computing
Reason — Storing and accessing data and programs over the internet is generally known as Cloud
computing.
Question 10
2. Satellite media
3. Guided media
4. Unguided media
Answer
Unguided media
Reason — The communication media used for wireless network is collectively called unguided
media.
Theoretical Questions
Question 1
Answer
Question 2
What is networking ?
Answer
Question 3
Answer
A communication channel refers to a physical or virtual pathway that allows data and information to
be transmitted between sender and receiver, facilitating communication in various forms.
Question 4
Answer
Question 5
Answer
Internet is a computer-based world wide information network. It is composed of a large number of
smaller interconnected networks.
1. Businesses use the Internet to provide access to complex databases, such as financial
databases.
3. Businesses and institutions use the Internet for voice and video conferencing and other
forms of communication that enable people to telecommute, or work from a distance.
4. The use of electronic mail (e-mail) over the Internet has greatly speeded communication
between companies among coworkers, and between other individuals.
5. Individuals use the Internet for communication, entertainment, finding information and to
buy and sell goods and services.
Question 6
A communication network which is used by large organisations over regional, national or global area
is called
1. LAN
2. WAN
3. MAN
4. VAN
Answer
WAN
Reason — WAN (Wide Area Network) spans a larger geographical area and connects multiple LANs
or other networks together. It can cover regional, national, or even global distances.
Question 7
(i) LAN
(ii) MAN
(iii) WAN
Answer
(i) LAN — LANs (Local Area Network) are small computer networks confined to a localised area like
an office, a building or a factory. They facilitate resource sharing among users, including data,
programs, printers, hard-disks, modems etc.
(ii) MAN — MANs (Metropolitan Area Network) are the networks spread over a city. For example,
cable TV networks that are spread over a city. The purpose of a MAN is also the sharing of hardware
and software resources among its users.
(iii) WAN — WANs (Wide Area Network) connect computers across countries, spanning large
distances. They can link LANs from different locations, acting as a unified network for efficient, cost-
effective and high speed information exchange.
Question 8
Answer
LAN stands for Local Area Network. WAN stands for Wide Area Network
LAN is spread over a small area of upto 1 km. WAN is spread over a very large area.
LAN usually costs less to set up. WAN costs higher to setup.
Question 9
Answer
Data — Data is raw, unprocessed facts and figures. For example, consider the digits — 4, 8, 12. These
are data.
Information — Information refers to processed data which is conveying some meaning as per
context. For example, 4 + 8 = 12 is information as it conveys a clear meaning.
Multimedia — Multimedia refers to usage of many types of media like text, photographs, graphics,
video and audio at the same time.
Question 10
Answer
WIFI — Wi-Fi refers to Wireless Fidelity, which lets us connect to the Internet without a direct line
from our PC to the ISP.
Question 11
What are guided and unguided media ?
Answer
Guided media — The communication media used for wired connection are called guided media. For
example, twisted pair cables, coaxial cables etc.
Unguided media — The communication media used for wireless connection are called unguided
media. For example, radio waves, microwaves, satellites etc.
Question 12
Answer
Cloud computing refers to storing and accessing data and programs over the Internet instead of the
computer's hard drive.
Question 13
Answer
A private cloud consists of computing resources used and Public cloud refers to a common cloud service
exclusively owned by one business or organization. made available to multiple subscribers.
Private clouds are often used by government agencies, Public cloud deployments are frequently used to
financial institutions, any other mid to large-size organizations provide web-based email, online office
with business-critical operations seeking enhanced control applications, storage, and testing and
over their environment. development environments.
Question 1
A company has brought laptop computers for training purposes and for information retrieval. These
computers will use the internet and have multimedia capabilities.
(a) State two advantages and one disadvantage of using the internet to search for information when
compared to using CD-ROMs or paper-based systems.
(b) The laptops are linked to the network using wireless connections. Give one advantage and one
disadvantage of using wireless connections.
Answer
(a) The advantages of using the internet for information retrieval compared to CD-ROMs or paper-
based systems are:
1. Vast Information — The internet offers a vast and constantly updated pool of information,
providing a wider range of resources than limited CD-ROMs or static paper-based systems.
2. Convenience and Speed — Internet access allows quick and convenient access to
information from anywhere, eliminating the need to carry physical media like CD-ROMs or
search through printed materials.
Disadvantage — Internet searching lacks the reliability and authenticity of CD-ROMs or printed
sources due to mixed accuracy, making verification harder.
(b) An advantage of using wireless connections is mobility. Wireless connections enable laptops to
connect from different locations within coverage area without cables.
A disadvantage of using wireless connections is that wireless connections can suffer from
interference and obstacles, causing potential connectivity problems and lower reliability than wired
connections.
Question 2
(a) Give two advantages of using the Internet rather than making a telephone call for this task.
(b) What type of file access would be needed to make a booking ? Give a reason for your choice.
Answer
(a) Two advantages of using the Internet rather than making a telephone call for this task are:
1. 24/7 Availability — Internet booking is available round the clock, allowing users to make
reservations at any time, whereas telephone calls are limited by business hours and
potential wait times.
(b) For making a booking through the Internet, the type of file access needed is "Read-Only File
Access." This allows users to view available flight options, seat layouts, and other booking-related
information without altering the underlying data. Users can read and interact with the data to make
informed decisions about their seat selections and travel plans.
Question 3
(a) Give three advantages to employers of allowing employees to work from home.
(b) Describe two advances in computer technology which have allowed working from home to
become possible.
Answer
(a) Three advantages to employers of allowing employees to work from home are:
1. Increased Productivity — Employees often experience fewer distractions and a more
comfortable work environment at home, leading to potential boosts in productivity and task
completion.
2. Cost Savings — Allowing remote work can lead to reduced overhead costs, including office
space, utilities, and amenities, contributing to cost savings for employers.
3. Wider Talent Pool — Employers can tap into a broader talent pool by hiring remote workers,
without being restricted by geographic location, potentially leading to the recruitment of
specialized or diverse skill sets.
(b) Two advances in computer technology enabling working from home are:
2. Cloud Computing and Collaboration Tools — Cloud computing centralizes data and
applications, eradicating the need for local servers. This lets remote workers access files and
tools online, aided by collaborative platforms like video conferencing, project management,
and document sharing, enabling teamwork and productivity despite physical separation.
Question 4
Mr. Singh has offices in three cities. He wants to connect his computers at various offices. He is
unable to decide whether he should go for three LANs for different offices or should also create a
WAN connecting these three LANs. Help him decide by suggesting what should he go for. Support
your answer with proper justification.
Answer
Considering Mr. Singh's situation, where he has offices in three cities, the need for centralized
resources, and the potential benefits of inter-office collaboration, it is advisable for him to create a
WAN connecting the three LANs. Creating a WAN will give him the following benefits:
1. Centralized Resources — A single WAN would allow centralized resources, such as servers
and databases, to be shared among all offices. This can improve efficiency and data
consistency.
3. Cost Efficiency — Sharing resources over a WAN can reduce the need for redundant
equipment, leading to potential cost savings.
Question 5
Mr. Shah wants to have an online storage that his company and employees can use and it should not
be shared by anyone else outside company. His business has offices in all major continents.
(a) What type of computing is such type of online storage and usage known as ?
(b) What type of communication media would be required by Mr. Shah's offices to communicate
among themselves ?
Answer
(b) To communicate among his offices located in different continents, Mr. Shah's company would
require a communication medium that offers global connectivity and reliability. Wide Area Network
would be most appropriate for his company as WANs can be implemented using dedicated lines and
secured by virtual private networks (VPNs) to ensure data privacy and security.
Chapter 3
Types of Software
Question 1
The programs designed to govern the computer hardware system are called the ............... .
Answer
The programs designed to govern the computer hardware system are called the System software.
Question 2
Software designed for a specific application such as pay calculations, processing of examination
result etc. are known as ............... .
Answer
Software designed for a specific application such as pay calculations, processing of examination
result etc. are known as Application software.
Question 3
Answer
Reason — In computer terminology, a compiler means a program which translates high level
language program to machine language
Question 4
1. command resources
2. be user friendly
3. provide utilities
Reason — The primary goal of an operating system is to make the computer system convenient to
use and secondary goal is to use computer hardware in an efficient manner.
Question 5
The operating system of a computer serves as a software interface between the user and
1. hardware
2. peripheral
3. memory
4. screen
Answer
hardware
Reason — The operating system of a computer serves as a software interface between the user and
hardware.
Question 6
Answer
Reason — An operating system is a set of programs that manage computer hardware resources,
provide services to software applications, and act as an intermediary between hardware and
software, ensuring proper execution and functioning of the computer.
Question 7
Operating System is
Answer
a collection of software routines
Reason — An operating system is a set of programs that manage computer hardware resources,
provide services to software applications, and act as an intermediary between hardware and
software, ensuring proper execution and functioning of the computer.
Question 8
Operating System
Answer
Reason — An Operating System is a program, which acts as an intermediary between a user and the
hardware by providing a layered, user-friendly interface.
Question 9
1. Impact printer
2. Console
3. Payroll package
4. OCR
Answer
Payroll package
Question 10
Which type of software is designed to perform specific personal, business, or scientific processing
tasks ?
1. System
2. Applications
3. GUI
4. Compiler
Answer
Applications
Reason — Application Software is the set of programs necessary to carry out operations for a
specified application.
Question 11
1. Compiler
2. Operating system
3. Application software
4. All of these
Answer
Operating system
Theoretical Questions
Question 1
Answer
Hardware Software
Hardware starts functioning once a software is Software is installed on the hardware to deliver its set of
loaded. instructions.
Question 2
Answer
2. Application Software — Application Software is the set of programs necessary to carry out
operations for a specified application. For example, word processing software, spreadsheet
software etc.
Question 3
Answer
2. Language processor — This program is responsible for converting an HLL code (High Level
Language Code) into machine understandable code. For example, compiler, interpreter.
Question 4
Answer
An operating system is a program which acts as an interface between a user and the hardware. For
example, Windows 11, Linux etc.
2. Controls hardware
3. Assigns Memory
4. Handles applications
5. Handles/Manages devices.
Question 5
Give examples of
(i) OS
Answer
Question 6
What is application software? What are the three categories of applications software ?
Answer
Application Software is the set of programs necessary to carry out operations for a specified
application.
Question 7
What is system software ? What role does it play in the functioning of the computer ?
Answer
System software refers to the programs that control internal computer operations and make best
use of the hardware. For example, operating system, language translators etc.
A system software is responsible for reading data from input devices, transmitting processed
information to the output devices, checking system components, converting data/instructions to
computer understandable form etc. Thus, it is responsible for the smooth functioning of the
computer system and efficient utilisation of computer resources.
Question 8
(iii) DBMS
Answer
(i) Word Processor — A word processor is an application program that allows entering, editing,
formatting and printing text. We can use a word processor to create almost any kind of document be
it a term paper, business letter, thesis work, memos, legal document, newsletter, reports and even a
book. For example, Microsoft Word, Wordperfect, etc.
(ii) Electronic Spreadsheet — An Electronic Spread-sheet is a program that accepts data in a tabular
form and allows users to manipulate / calculate / analyze data in the desired manner. Spreadsheets
also allow visualisation of data through graphs and charts. For example, Microsoft Excel, LibreOffice
Calc etc.
(iii) DBMS — A Database Management System or DBMS is a software application that enables users
to efficiently store, organize, manage, and retrieve data in a structured manner. It is like a big digital
filing cabinet where data is kept in neat tables and rows. A DBMS provides the necessary tools to
create and manipulate data in the database. For example, Microsoft Access, Oracle, etc.
(iv) Presentation Software — The software that can create professional looking visual aids is called
Presentation Graphic Software. Presentation graphics software provides predefined backgrounds
and sample page layouts to assist in the creation of computer-driven slide shows. For example,
Microsoft PowerPoint, Keynote etc.
Question 9
Answer
Utilities are those application programs that assist the computer by performing housekeeping
functions like backing up disk or scanning / cleaning viruses or arranging information etc.
Utilities bridge the gaps by helping to solve the problems and maximize our computer's potential.
Some important utilities are as follows:
1. Text Editor — This utility program is used for creating, editing text files.
2. Backup Utility — This utility program facilitates the backing-up of disk so that in case of any
damage or data-loss, this backed up data may be used.
3. Compression Utility — This utility program facilitates compression of files. Large files can be
compressed so that they take less storage area.
4. Disk Defragmentor — This program speeds up disk access by rearranging the files and free
space on our computer, so that files are stored in contiguous units and free space is
consolidated in one contiguous block.
5. Antivirus Software — This utility program ensures virus-free work environment. It scans our
disk for viruses and removes them, if any virus is found. Moreover, some antivirus software
remains present in memory all the time so that they can detect the viruses and
counterattack them.
Question 10
Answer
A computer virus is a computer program that can infect other computer programs by modifying
them in such a way as to include a copy of itself.
Viruses can alter, corrupt and delete files, freeze the computer, flash unknown or unasked messages
or display unwanted graphics on the computer screen, play unwanted music and interfere with the
computer operation.
Question 11
Answer
An antivirus software is considered important because it scans our disk for viruses and removes
them, if any virus is found. Moreover, some antivirus software remains present in memory all the
time so that they can detect the viruses and counterattack them.
Question 12
Answer
An application software pertains to one specific application. It allows users to perform specific tasks
in an easy and efficient way. System software cannot carry out the routine jobs performed by a user
which the application software can easily do.
Question 13
Answer
2. They bridge the gaps by helping to solve the problems and maximize our computer's
potential.
3. Utility softwares backup data, remove outdated files, recover accidentally deleted files, find
and arrange the needed information, do housekeeping functions, protect against viruses,
etc.
Question 14
Answer
The conversion of readable data into an unreadable form that cannot be understood by anyone
except authorized parties is termed as encryption.
The conversion of encrypted data into its readable original form using the correct key is termed as
decryption.
Question 15
Define ciphertext.
Answer
Ciphertext is a term used to refer to altered data (using an algorithm) so as to make the data
unintelligible to unauthorized users.
Question 16
Answer
A virus scanner scans our disk for viruses and removes them, if any virus is found. Moreover, some
antivirus software remains present in memory all the time so that they can detect the viruses and
counterattack them.
Question 17
How is a file management software useful ?
Answer
File Management Software is a program to organize and keep track of files. It lets us create a new
file, edit an existing file, and save a file. It even lets us manage files with the ability to group them
into folders. It maintains a hierarchical file system that uses directories/folders to organize files into
a tree structure.
Question 18
Answer
Bespoke software is a tailor-made software according to a user's requirements. This type of software
is developed to meet all the requirements specified by the user. Such a software is customized
according to the users' needs.
1. The company will get the exact software/system that they need.
3. The software will only have the features that they specifically need in their business.
1. It takes a long time to develop such a system, between a few months to years.
3. The company may need to employ a team of people such as business analysts,
programmers, testers etc.
4. There will be little in the way of user support and online help.
5. These cannot be directly installed at other user's workplace as the requirements may wary.
Question 1
Answer
The four tasks that are carried out by an operating system are:
4. Device Management — The operating system keeps track of all the devices, enables and
controls the input-output (I/O) devices attached to a computer system.
Question 2
● a dialogue box
● an icon
● the keyboard
(i) When a computer is turned on, the first program to run is ............... .
(ii) Software that designs the pamphlets, brochures etc is an example of ............... .
Answer
(i) When a computer is turned on, the first program to run is the operating system.
(ii) Software that designs the pamphlets, brochures etc. is an example of the applications software.
Question 3
(b) John wants to protect his computer from viruses. Which type of software can serve his purpose ?
Answer
(a) Memory Management — The operating system allocates memory to a program for execution and
de-allocates it when the program finishes executing.
Question 4
Answer
Software which helps to manage the computer system
Reason — An operating system is a set of programs that manage computer hardware resources,
provide services to software applications, and act as an intermediary between hardware and
software, ensuring proper execution and functioning of the computer.
Question 5
Name the Software that performs system tasks other than that of operating system.
Answer
Utility software.
Question 6
(a) Give one use for each of the following to help the company run these courses :
(b) A leaflet designed using word processing software to advertise a course is currently too big to fit
on a single printed page. What features of the word processing software could be used to alter the
design so that it does fit on one page ?
Answer
(i) Spreadsheet package — The company can use a spreadsheet package to manage and analyze data
related to course registrations, student progress, and assessment scores. It can create grade books,
attendance records, and financial projections for the courses.
(ii) Database package — With a database package, the company can organize and store information
about students, instructors, course content, and other relevant data. It can efficiently retrieve and
update records, track student progress, and generate reports.
(iii) Accounting package — An accounting package can help the company manage its financial
transactions, track revenue and expenses from the courses, handle invoicing, and create financial
reports for budgeting and analysis.
(iv) Word processing package — The company can use a word processing package to create and edit
course materials, such as lesson plans, training manuals, and promotional materials like brochures
and flyers.
(b) The following features of Word processing software can be used to adjust the design and fit the
leaflet on a single printed page:
1. Page Margins — Adjusting the margins can create more space on the page, allowing more
content to fit within the available area.
2. Font Size and Formatting — Reducing the font size or adjusting the text formatting (e.g., line
spacing, character spacing) can make the text more compact, freeing up space.
3. Paragraph and Text Alignment — Changing the alignment of paragraphs and text can
improve space utilization and overall layout.
4. Image Size and Placement — Resizing images and adjusting their placement can help
optimize the use of space on the leaflet.
Question 7
(a) Give the name of the operating system that you use at school or at home.
(b) Write down two tasks that your operating system performs.
(c) Where in the computer is the operating system normally stored when the power to the computer
is off ?
Answer
2. Device Management — The operating system keeps track of all the devices, enables and
controls the input-output (I/O) devices attached to a computer system.
(c) The operating system is normally stored on a secondary storage device such as a hard disk drive
(HDD) when the power to the computer is off.
Question 8
Answer
(iv) Carrying out complex calculations on two or more criteria — Spread sheet
Question 1
The part of a computer that allows the user to view information on a screen.
1. Mouse
2. RAM
3. CPU
4. Monitor
Answer
Monitor
Question 2
This part sends signals to other parts of the computer to tell them what to do.
1. CPU
2. Keyboard
3. Mouse
4. Hard disk
Answer
CPU
Reason — CPU (Central Processing Unit) sends signals to other parts of the computer to tell them
what to do.
Question 3
This memory is for short term storage and is lost when the computer is turned off.
1. ROM
2. CPU
3. Hard disk
4. RAM
Answer
RAM
Reason — RAM (Random Access Memory) is for short term storage and is lost when the computer is
turned off.
Question 4
This part allows the user to hear information from the computer.
1. Monitor
2. Software
3. Input
4. Speaker
Answer
Speaker
Reason — Speaker is an output device which allows the user to hear information from the
computer.
Question 5
1. Process
2. Hardware
3. Monitor
4. Software
Answer
Hardware
Reason — Hardware refers to all the parts of a computer that we can see and touch.
Question 6
This part stores data, programs, settings, and the operating system while the computer is off. While
it is on, it spins inside the computer reading and writing data.
1. CPU
2. ROM
3. RAM
4. Hard Disk
Answer
Hard Disk
Reason — Hard disk is the secondary storage device which stores data, programs, settings, and the
operating system while the computer is off. While it is on, it spins inside the computer reading and
writing data.
Question 7
There are two basic types of disk-drives ............... disk-drives and flash drives.
Answer
There are two basic types of disk-drives hard disk-drives and flash drives.
Question 8
Answer
Question 9
Answer
Question 10
Answer
Question 11
The CPU is made up of two smaller components: the ............... or ............... and the ...............
or ............... .
Answer
The CPU is made up of two smaller components: the ALU or Arithmetic and Logic Unit and
the CU or Control unit.
Question 12
Answer
Question 13
Answer
Question 14
Answer
Answer
Question 16
The most familiar output device for the microcomputer is the ............... .
Answer
The most familiar output device for the microcomputer is the monitor.
Question 17
The four functional components of a digital computer are: input device, ............... , ............... and
output device.
Answer
The four functional components of a digital computer are: input device, CPU (Central Processing
Unit) , Memory and output device.
Question 18
Answer
Question 19
Answer
Question 20
Answer
Calculations are made in computer with the help of its ALU (Arithmetic and Logic Unit).
Question 21
Answer
Question 22
Theoretical Questions
Question 1
1. byte
2. word
3. record
4. file
Answer
byte
Question 2
1. ROM
2. RAM
3. LSI
4. VLSI
Answer
ROM
Reason — ROM (Read Only Memory) is an example of non-volatile memory as the instructions
stored in it are retained even when the computer is switched off.
Question 3
1. byte
2. megabyte
3. gigabyte
Answer
Reason — Bytes, megabytes and gigabytes are all units of measurement used with computer
system.
Question 4
3. when the computer is turned off, data and instructions stored in primary storage are erased
Answer
Reason — All the given statements are true. Secondary storage retains data when the system is
turned off. Thus, it is non volatile.
Considering RAM as primary memory, we can say that RAM is volatile and when the computer is
turned off, data and instructions stored in primary storage are erased.
Question 5
Answer
Question 6
1. Tape
2. Disk
3. Printer
4. Bus
Answer
printer
Question 7
The secondary storage devices can only store data but they cannot perform ................. .
1. Arithmetic operations
2. Logic operations
3. Fetch operations
Answer
Reason — The secondary storage devices can only store data but they cannot perform arithmetic,
logic or fetch operations.
Question 8
2. Plotter
3. Joystick
4. ALU
Answer
ALU
Reason — ALU (Arithmetic and Logical Unit) is a part of CPU which performs arithmetical operations.
Speaker and plotter are output devices while joystick is an input device.
Question 9
Answer
Question 10
1. Megabyte
2. Gigabyte
3. Kilobyte
4. None of the above
Answer
Megabyte
Question 11
1. OCR
2. MICR
3. OMR
Answer
MICR
Reason — Large amounts of cheques are processed by using MICR (Magnetic Ink Character Reader).
Question 12
The concentric circles on the floppy disk are further divided into :
1. Tracks
2. Sectors
3. Cylinders
Answer
sectors
Reason — Each circular path on the surface of the floppy disk is called a track. Each track is divided
into smaller, pie-shaped sections called sectors.
Question 13
Which of the following storage devices can be used for storing large backup data ?
1. Floppy disks
2. Hard disk
3. Magnetic tapes
Answer
Hard disk
Reason — Hard disk can be used for storing large backup data.
Question 14
1. Heart
3. Primary memory
Answer
Reason — Control Unit (CU) is called the nerve centre or brain of a computer.
Question 15
Answer
Question 16
Answer
Reason — The four functional units of a computer are input devices, processing unit, storage, and
output devices.
Question 17
Answer
Reason — Hard drive, DVD-ROM, flash drive are examples of storage devices.
Question 18
2. This is the main circuit board that all other internal components are connected to.
Answer
Question 19
Answer
Question 20
1. Software
Answer
Question 21
1. Output on a monitor
2. Output on a printer
Answer
Question 22
What role do Input unit and Output unit play in a computer system ?
Answer
The input unit is responsible for accepting input i.e., data and instructions from the user. The output
unit is responsible for producing the output in user readable form.
Question 23
Answer
CPU is the brain of a computer system and it executes the programs in following manner :
1. When a program reaches into memory, the control unit (CU) of CPU reads the program
instructions one by one.
2. The CU then determines the type of instruction i.e., whether it is an arithmetic (calculations)
or logical (comparisons) or I/O (reading or writing) type of instruction.
3. For arithmetic or logical type of instructions, CU directs the ALU (Arithmetic and logic unit)
to carry out the instructions.
4. For input type of instruction, CU directs the Input unit to carry out the instruction and for
Output type of instruction, it directs the output unit to carry out the instruction.
Question 24
What role does the memory play in the functioning of a computer system ?
Answer
1. Internal memory (primary or main memory) — It is the built-in memory which the CPU uses
to hold data and instructions. The internal memory is temporary and has limited storage
capacity.
Question 25
Answer
Two popular input devices are:
1. Keyboard — Keyboard is a typewriter like device which is used to type in the letters, digits
and commands. It contains a matrix of switches (one switch per key). Each key, when
pressed, sends a digital code to the computer that determines which key has been pressed.
2. Mouse — The mouse is pointing device that points to a position on computer screen. Mouse
controls movement of pointer on screen. When a mouse moves on a flat surface, the cursor
on the screen also moves in the direction of mouse's movement. A mouse generally has two
or three buttons and it may or may not have a wheel.
Question 26
Answer
A pointing device is an input device used to interact with a computer by controlling the on-screen
pointer or cursor. It allows users to move the pointer across the screen and make selections or
perform actions by clicking buttons.
Question 27
Answer
A scanner is used for input when we want to convert physical documents or images into digital
format and store them on a computer or other electronic device. It allows us to create electronic
versions of physical documents, photographs, or artwork.
1. Hand-held Scanners — These are very small which can be held in a hand.
2. Flatbed Scanners — These are larger and more expensive scanners but they definitely create
higher quality images. These scanners have a flat surface on which the printed image to be
scanned, is placed.
3. Drum Scanners — These are medium-size scanners with a rolling drum. The sheet is fed
through the scanners so that the drum rolls over the entire sheet to be scanned.
Question 28
Answer
A light pen is a light-sensitive input device shaped like a pen, used to draw on the computer screen
or make menu selections. It works by detecting flashes of light emitted from the computer screen to
determine its position and interact with the display.
Question 29
A barcode reader is used to read bar codes which can be found on products in shops. The barcode
reader uses lasers to identify the position and thickness of the bars. These bar codes convey the
required information to the computer and make the billing smooth and efficient.
Question 30
Answer
The control unit is highly important in a computer system as it directs and coordinates all operations
of the CPU. When a program reaches into memory, the control unit (CU) of CPU reads the program
instructions one by one and executes the program as follows:
1. The Control Unit determines the type of instruction i.e., whether it is an arithmetic
(calculations) or logical (comparisons) or I/O (reading or writing) type of instruction.
2. For arithmetic or logical type of instructions, Control Unit directs the ALU (Arithmetic and
logic unit) to carry out the instructions.
3. For Input type of instruction, Control Unit directs the Input unit to carry out the instruction
and for Output type of instruction, it directs the output unit to carry out the instruction.
Thus, without the Control Unit, the CPU would not function effectively, impacting the overall
performance and functionality of the computer.
Question 31
Answer
1. Hard Disks — Hard disk memories store information on spinning circular platters coated
with magnetic material and stacked with space between them. Magnetic heads record tiny
magnetic spots on the rotating disk surface to store information.
2. Compact Disks (CDs) — Compact disks (CDs) are optical media with storage capacity up to
700 MB. They come in various forms, such as CDROM (CD-Read Only Memory), CD-R (CD-
Recordable), and CD-RW (CD-Rewritable), and are relatively inexpensive.
3. DVDs — DVD is an optical storage device resembling a compact disc but with approximately
15 times more storage capacity and 20 times faster data transfer than a CD-ROM. It can hold
up to 17 GB of data. DVDs come in various varieties: DVD-ROM (DVD-Read Only Memory),
DVD-R (DVD-Recordable), and DVD-RW (DVD-Rewritable).
4. Pen/Thumb Drives — It uses a memory technology called 'Flash'. Flash is a 'solid state'
memory i.e., it has no moving parts. It retains data even when the power is switched off.
5. Blu-Ray disc — Blu-ray is the successor to DVD. It is called Blu-ray because it uses a blue
laser to read from and write to the disc. It offers significantly higher data storage in the same
12-centimeter space, with common capacities of 25 GB and 50 GB.
6. Memory Stick — A memory stick is a removable memory card used to store information in
devices like digital cameras, smartphones, music players, and portable PlayStations.
Capacities range from 4 GBs to 128 GBs.
Question 32
There are two types of internal memory in computer system. Name and discuss them.
Answer
1. Read Only Memory (ROM) — In this memory, information once stored remains fixed i.e., it
cannot be changed. So, ROM can only be read and used. It cannot be changed or written
onto.
Generally, ROM contains a set of start-up instructions i.e., what to do when a computer is
turned on. The contents of ROM remain stored even if power is turned off.
2. Random Access Memory (RAM) — The internal memory that can be read from as well as
written to is called RAM i.e., Random Access Memory. The random access memory (RAM) is
volatile i.e., its contents are lost when power is turned off.
Question 33
Answer
S.
Internal memory External memory
No.
This memory is directly connected to and accessed This memory is not directly connected to and
1.
by a computer's CPU. accessed by a computer's CPU.
2. Volatile. Non-volatile.
Question 34
Answer
The auxiliary memory is required because of the following reasons:
1. Capacity — Main memory has limited capacity whereas auxiliary memory capacity is many
more times compared to main memory.
2. Permanent in nature — RAM is volatile and auxiliary memory is permanent. Data in main
memory is lost when the power goes off but in auxiliary memory, the data remains there
even after the power goes off.
Question 35
Answer
Hard disk is an external memory. Hard disk memories store information on spinning circular platters
coated with magnetic material and stacked with space between them. Magnetic heads record tiny
magnetic spots on the rotating disk surface to store information.
Question 36
Answer
DVD (Digital Versatile Disk) is an optical storage device resembling a compact disc but with
significantly greater capacity and faster data transfer. It can hold up to 17 GB of data. DVDs use a
laser to read and store digital data as pits and lands on a reflective disc coated with a thin metal
layer. These data patterns, representing 0s and 1s, are decoded to retrieve audio, video, or other
information.
Question 37
Answer
Magnetic tapes are used for long-term data storage and archival purposes in various industries.
Magnetic tapes store data sequentially on a thin, magnetized strip and are commonly employed for
backup storage, data retrieval, and offline data preservation. They offer cost-effective and reliable
storage solutions.
Question 1
1. floppy disk
2. spreadsheet
3. CD ROM
4. database
Answer
CD ROM
Reason — CD-ROMs have larger storage capacity compared to other storage media and they are
portable and can be easily accessed on various devices with CD-ROM drives.
Question 2
3. RAM is volatile
Answer
Reason — ROM (Read Only Memory) stores the instructions for starting up the computer.
Question 3
Part of the Central Processing Unit is the CPU. What does ALU stand for ?
Answer
Question 4
At the moment when an item is sold at the refreshment kiosk, the item code is keyed in using a
conventional keypad. During busy periods this method is too slow and queues develop. Recommend
a more suitable input device. Explain how this device works.
Answer
A concept keyboard is a more suitable option to key in items at a refreshment kiosk as it will be
faster.
Question 5
There are two types of memory, random access memory (RAM) and read only memory (ROM).
(i) Give one use for RAM
Answer
(i) RAM stores the required data and information during the processing phase.
(ii) ROM stores a set of start-up instructions that tell the computer what to do when it is powered
on.
RAM is a form of data storage that ROM is also a form of data storage that generally store
Definition can be accessed randomly at any hardwired instructions (instructions stored as form of
time, in any order by CPU. circuit) for the computer to start initially.
RAM allows the computer to read ROM stores the program required to initially boot the
Use
data quickly to run applications. computer or reboot the computer.
Operations
It allows reading and writing. It only allows reading.
supported
RAM is volatile i.e., its contents are It is non-volatile i.e., its contents are retained even wh
Volatility
lost when the device is powered off. the device is powered off.
Larger than ROM; can be up to some Smaller but large enough to hold basic instructions ; is
Size
Giga Bytes (GBs) up to some Mega Bytes (MBs)
Question 6
All workstations in the Betterview shops have TWO input devices and TWO output devices.
(a) Give the names of two input devices that must be part of a workstation.
(b) Give the names of two output devices that must be part of a workstation.
Answer
(a) Keyboard and Mouse.
Question 7
(b) Lorretta needs to produce a proof colour copy of the leaflet to show to her manager. Describe
two features of a printer which would be needed to produce the leaflet.
Answer
(a)
1. Loretta should use a colour scanner to store a photograph as a computer file by following
the given steps:
i. She should place the photograph on the scanner bed and use the scanning software
on the computer to initiate the scanning process.
ii. Choose the desired format and resolution for the scan.
iii. Save the scanned photograph to a specific folder on the computer's hard drive.
2. To load the stored photograph into one of the blank boxes on the leaflet, Loretta can use
desktop publishing software in the following manner:
i. Open the software and create a new project or open the existing leaflet design.
ii. Locate the blank box where the photograph should be inserted.
iii. Use the software's "insert image" or "import image" function to browse and select
the previously scanned photograph.
iv. Resize and position the photograph within the box as needed.
(b) Two features of the printer which would be needed to produce the leaflet are:
1. High-resolution printing — A high-resolution printer of minimum 300 DPI (dots per inch) is
essential to produce a proof colour copy with sharp images and text.
2. Color accuracy and calibration — To ensure the printed leaflet's colours match the digital
design, Loretta needs a printer with good color accuracy and calibration.
Question 8
Give two ways in which a CD-ROM disc is different from a floppy disc.
Answer
Two ways in which a CD-ROM disc is different from a floppy disc are:
1. Storage capacity — CD-ROMs can hold around 700 MB of data, while floppy discs typically
have a storage capacity ranging from 1.44 MB (3.5-inch) to 1.2 MB (5.25-inch).
2. Durability and reliability — Floppy discs are susceptible to physical damage, data corruption,
and magnetic interference. CD-ROMs, on the other hand, use optical technology, which
makes them more resistant to physical damage and offers better data integrity over time.
Question 9
A pupil is researching material for a school project. The pupil has a computer that has a CD-ROM
drive and access to the Internet.
(i) Give one advantage of using the Internet rather than a CD-ROM.
(ii) Give one advantage of using a CD-ROM rather than the Internet.
Answer
(i) An advantage of Internet is that it provides access to a wide range of resources, including articles,
research papers, multimedia content, and the latest news, allowing the pupil to access the most
current and relevant information for their school project.
(ii) One advantage of using a CD-ROM rather than the Internet is that it does not require an active
internet connection to access the information. CD-ROMs are self-contained and can be accessed
directly from the computer's CD-ROM drive, making them a reliable source of information even in
areas with limited or no internet access.
Question 10
A company is developing a piece of multimedia language software for use in a school. Give two
reasons why the company decides to issue the software on CD-ROM and not on floppy discs.
Answer
The company chooses CD-ROMs over floppy discs for the following reasons:
1. Larger storage capacity — Multimedia language software typically contains a large amount
of data, including audio, video, and interactive elements. CD-ROMs offer a significantly larger
storage capacity compared to floppy discs.
2. Better data transfer rate — CD-ROMs have a faster data transfer rate compared to floppy
discs. This means that the software can load and access data more quickly from a CD-ROM,
resulting in a smoother and more responsive user experience.
Question 11
A newspaper needs some pictures to insert onto the front page. Give three ways you can use
Information Technology to obtain the pictures in electronic form.
Answer
The pictures can be obtained in electronic form using Information Technology in the following ways:
1. Online Image Databases — They can access stock photo websites for a wide selection of
pictures.
2. Social Media & User-Generated Content — They can search for relevant images shared by
users on social media platforms like Twitter, Instagram, Facebook, etc. and use them with
proper permission and attribution.
3. Digital Cameras and Smartphones — They can capture original pictures using digital cameras
or smartphones.
Question 12
Give one reason why a digital camera is suitable for obtaining pictures for a multimedia
presentation.
Answer
Digital cameras capture high-resolution, digital images that look sharp, vibrant and engaging when
displayed on screens or projected onto larger surfaces.
Question 13
Give one reason why you would not edit a large movie file on a CD-ROM.
Answer
CD-ROMs are read only storage devices i.e., once data is written to the CD-ROM, it cannot be
modified, edited, or deleted. Hence, editing a large movie file directly on a CD-ROM is not possible as
it would restrict us from saving the changes made.
Question 14
Each piece of hardware in the table below is either an input, output or storage device. For each, put
a tick in the correct box. As an example, a keyboard is an input device so a tick is placed in the Input
column. Tick one box only for each device.
Keyboard ✓
CD-ROM drive
Digital Camera
Graphics digitiser
Laser Printer
Light pen
Monitor
OMR reader
RAM
Touch pad
Answer
Keyboard ✓
CD-ROM drive ✓
Digital Camera ✓
Graphics digitiser ✓
Laser Printer ✓
Light pen ✓
Monitor ✓
OMR reader ✓
RAM ✓
Touch pad ✓
Question 15
Some storage devices have volatile memory. Explain what is meant by the term volatile.
Answer
Volatile memory means that the contents of the memory are lost when power is turned off.
Question 16
A veterinary surgery is going to install a new computer system. The vets must choose suitable
hardware to use in their practice.
(a) Give three input devices that would be suitable for use in their practice.
(b) Give three output devices that would be suitable for use in their practice.
(c) Give two storage devices that would be suitable for use in their practice.
Answer
(a) Three suitable input devices for the veterinary surgery practice are:
1. Keyboard
2. Mouse
3. Barcode Scanner
(b) Three suitable output devices for the veterinary surgery practice are:
1. Monitor
2. Printer
3. Speakers
(c) Two suitable storage devices for the veterinary surgery practice are:
1. Hard disk
2. Pen drive
Chapter 1
Computer System
Question 1
1. Software
2. Hardware
3. Firmware
4. Liveware
Answer
Hardware
Reason — Hardware refers to the physical parts of the computer; the ones that we can touch e.g.,
keyboard, monitor etc.
Question 2
The programs or instructions that tell the computer what to do, are known as ............... .
1. Software
2. Hardware
3. Firmware
4. Liveware
Answer
Software
Reason — The programs or instructions that tell the computer what to do, are known as software.
Question 3
This part sends signals to other parts of the computer to tell them what to do.
1. CPU
2. Motherboard
3. Icon
4. Hard drive
Answer
CPU
Reason — Central Processing Unit sends signals to other parts of the computer to tell them what to
do.
Question 4
1. CPU
2. CD-ROM
3. Mouse
4. Scanner
Answer
CPU
Question 5
Computer ............... are the physical parts that make up a computer system. They are the parts that
you can see and ............... .
Answer
Computer hardware are the physical parts that make up a computer system. They are the parts that
you can see and touch.
Question 6
............... is used to provide instructions to the computer so that it can perform certain tasks.
Answer
Software is used to provide instructions to the computer so that it can perform certain tasks.
Question 7
Answer
Question 8
The ............... directs other components of the computer to perform the tasks specified in the
program instructions.
Answer
The Control Unit directs other components of the computer to perform the tasks specified in the
program instructions.
Question 9
Answer
Question 10
Answer
Question 11
Answer
Question 12
Answer
Question 13
Answer
Question 14
Answer
Theoretical Questions
Question 1
1. Performs fast
2. Performs mathematical calculations accurately
Answer
Reason — A computer has zero IQ. It cannot make decisions on its own.
Question 2
1. Hardware
2. Software
Answer
Reason — A computer is a combination of hardware and software, which transforms some data into
information.
Question 3
1. Information
2. Storage
3. Data
Answer
Data
Question 4
4. Plural of data
Answer
Question 5
Which of the following activities can a computer system perform with Airlines ?
Answer
Reason — A computer system can display arrival and departure times of flights, display important
messages and check seat availability and flight times.
Question 6
Answer
A computer is an electronic device that can perform a variety of operations according to a set of
instructions called program.
Computer is a useful device as it can be used in almost all the fields such as :
9. Military operations
Question 7
What are strengths and weaknesses of a computer system ?
Answer
1. Speed.
3. Accuracy.
4. Reliability.
5. Versatility.
2. IQ Zero.
3. No Heuristics.
Question 8
Answer
IPO cycle stands for Input-Process-Output cycle. In IPO cycle, some input is needed to accomplish a
task, a process is carried out on the input to obtain the output. A computer also follows the IPO cycle
as it takes an input, carries out a process upon it, and produces an output.
Question 9
Answer
1. Input Unit.
3. Storage Unit.
4. Output Unit.
Question 10
Answer
1. Embedded Computers — These computers are in the form of tiny chips embedded within
the circuitry of appliances such as televisions, washing machines, wrist watches, etc.
2. Programmable Computers — These computers can be used as notepads, scheduling
systems, address books etc. With cellular phones, these can connect to worldwide computer
networks to exchange information regardless of location.
3. Laptop Computers & Personal Computers — These computers are typically used in
businesses and at home to communicate on computer networks, for word processing to
track finances, to play games etc.
4. Workstations — These computers are similar to PCs but have more capabilities. These are
typically found in scientific, industrial and business environments that require high levels of
computational abilities.
5. Mainframes — These computers are even more capable than workstations and can be used
by multiple users.
6. Supercomputers — These computers are the most powerful computers that are used to
process complex and time-consuming calculations. They are used by the largest business
institutes/houses, scientific institutions and the defence.
Question 1
All computer systems can be split into three main components. These are shown in the following
diagram.
Complete the diagram below by adding the names of four different input devices and four different
output devices.
Answer
The completed diagram showing four different input & output devices is given below:
Question 2
The diagram shows the main components of a computer system. R could represent :
1. mouse or printer
2. printer or screen
4. screen or keyboard
Answer
printer or screen
Reason — The output unit uses devices like printer or screen to display output in user readable
form.
Question 3
Q represents the central processing unit which consists of :
Answer
Reason — The CPU consists of processor to process instructions given to the computer and main
storage to store those instructions and intermediate results during the processing phase.
Question 4
3. storing data
4. file management
Answer
storing data
Reason — CPU is responsible for processing the given instructions which consists of handling control
functions, performing arithmetical and logical operations and storing the data and instructions being
processed. File management is usually handled by the operating system of the computer.
Question 5
Draw a diagram to show how these components are connected in an ICT system :
1. Process
2. Input
3. Output
4. Backing Store
Answer
Below diagram shows an ICT system along with its different components:
Question 6
For the following situations advise which type of software you would use.
Typing a letter
Creating a graph
Creating a poster
Answer
Comparing which mobile phone tariff is the best for you Spreadsheet software
Question 7
Arrange the following statements into the advantages or disadvantages of the different computers.
(some of the statements can be used for more than one type of computer)
2. Can only use very limited software such as email or diary events
3. Portable
4. Light to carry
6. Around Rs.50000
1 24
Answer
Question 8
Imagine you have an older friend who is moving away to University soon. He wants to buy a new
computer to take with him - remembering of course that he must come home for every holiday.
Which type of computer would you suggest ? Explain fully your answer - why would you suggest that
type.
Answer
For my older friend who is moving away to university but will return home for every holiday, I would
suggest a laptop as the ideal type of computer for the following reasons: