30 solutions available
Question 1Which of the following is not a cybercrime?Stealing personal data while working onlineRunning malware on websitesUnauthorised use of data...
Question 2Talking to other people who are using internet at the same time as you are, is called ................. .StalkingChattingNetworkingEmailing
Question 3Which one of the following is not used for wired transmission?Coaxial CablesMicrowavesOptical FiberTwisted Pair Cable
Question 4Which is the type of system that manages an employee's salary?Reservation SystemInventory Management SystemPayroll SystemAccounting System
Question 5Which technology can Jayu use to directly share a video from her mobile to her friend's mobile without using the internet?NetworkMobile...
Question 6Name the set of rules that is used for transmission of data over a network.LANWANProtocolTransmission Media
Question 7Which among the following image formats uses animation?JPGBMPPNGGIF
Question 8A word processor application will most likely be used:by an accounting department to perform calculationsby an author to type a novelby a...
Question 9Name the view that shows a thumbnail of each slide.NormalNotes viewSlide SorterSlide Show
Question 10Choose what constitutes a cell reference.A column name followed by a row numberA column number followed by a row nameA row number followed...
Question 11Assertion (A): Presentation graphics software provides options to include multimedia features in slides to enhance a presentation.Reason...
Question 12Assertion (A): Images can enhance the appearance of a document created using a word processing application and make it more...
Question 13What is an e-reservation system? What are the two benefits it offers?
Question 14(i)Write any two differences between RAM and ROM.
Question 14(ii)Write any two advantages of a computer network.
Question 15Write the difference between a compiler and an interpreter.
Question 16(i)Write the difference between a standard software and customised software.
Question 16(ii)What is chatting? State any two advantages of chatting.
Question 17State two symptoms of virus infection on a computer.
Question 18(i)Write the difference between a header and footer. Write the different elements that can be included in a header and footer.
Question 18(ii)Write the difference between a relative reference formula and an absolute reference formula in a spreadsheet.
Question 19Write in brief about confidentiality of information.
Question 20Give three methods by which you can safely use a social networking site.
Question 21(i)Sarita wants to create a test paper in the form of a worksheet for her students. The answers are to be written on the worksheet itself....
Question 21(ii)Karan has created a document in a word processor. Write the features to help him quickly achieve the following:Insert a page number at...
Question 22Shobha recently got a printer as a gift. She has connected the printer to her computer as well as to the power source. Everything seems to...
Question 23(i)Study the spreadsheet given below and write the solutions for the specifications that follow. You can write the answers for any four...
Question 23(ii)Study the Excel chart shown below and write the solutions for the specifications shown below it. You can write the solutions for any...
Question 24Case Study 1Neeta has to create a presentation for a project on sustainable development. She is not very familiar with digital...
Question 25Case Study 2Hari receives a call for verification of his bank account details. He receives a link and he fills up his account details in...