Page 80 - Data Science class 10
P. 80

6.  Why should regular disk defragmentation be done?                                  [CBSE Handbook]
          Ans.   Use disk cleanup and disk defragmentation utility programs on a regular basis to remove all unnecessary files and
              information that slows down the computer so that the efficiency of the computer increases.
            7.  Can computer viruses infect hardware?                                             [CBSE Handbook]
          Ans.  Computer virus is a malicious code that cannot damage the physical components of the computer directly.
            8.  What is the use of antivirus software? Name any two commonly used anti-virus software.   [CBSE Handbook]
          Ans.   Antivirus software is a program designed to prevent,detect and remove malicious programs from the computer. After
              you install the antivirus software runs automatically in the background to provide real-time protection against virus
              attacks. Example: McAfee Virus Scan, Norton AntiVirus
            9.  How are temporary files created on the computer?
          Ans.   Temporary files are created temporarily by programs that store information related to the file you are working on
              in your computer. It  increases the efficiency of  the software and also helps in recovering the data at the time of
              unexpected closing of the file due to power failure or system shut down.

        B.  Long answer type questions:
            1.  List a few important functions performed by an operating system.
          Ans.  Following are some important functions performed by an operating system:
               ●  It works as an interface between the user and the machine.
               ●   It works as a device manager. It keeps a track that all the devices are functioning properly and are available to the
                 user whenever needed.
               ●  It manages the software of the computer.
               ●   It manages the computer memory and keeps track of the memory in use and free so that it is available to the user
                 whenever needed.

            2.  Where is the taskbar located? What are its important components?
          Ans.   It is the thin strip present at the bottom of the screen. By default it is always visible at the bottom but we can choose
              the auto hide option in the taskbar settings which will disappears the task bar. But it will reappear only when the mouse
              cursor moves down to that area. It contains the following important components: Start Menu, Quick Launch Program
              Icons, Notification Area, System Clock.
            3.  What is a file in computers? Give examples.
          Ans.   Any data in the computer is stored in the form of a file. That is why a file is said to be a collection of logically related
              data. Every file has its own unique name which is made up of two parts separated by a period File name (A filename
              can consist of letters, numbers, spaces, and characters) and extension that identifies the file type. For example,
               Project.doc  æÆ  is a MS Word file.
               Project.ppt  æÆ  is a MS PowerPoint.
               Project.xls   æÆ  is a MS Spreadsheet.

            4.  How will you prevent others from using your computer?
          Ans.   To prevent computers from being used by unauthorised persons it must be locked when the users are not working
              on it. This will ensure that no unauthorised person can see or make changes to our information without taking
              our permission. To make sure the computer is locked, the login-IDs and passwords must be created. A login ID
              and password is like a key to the lock which allows the user to use the computer only if the entered login ID and
              password match with the computer database. Once finished the work, the user must log out or sign out so that
              no one else can see the work.
                                                                                                      Communication
        C.  Competency-based/Application-based questions:
            1.  Harry has accidentally deleted some important files. He wants those files back. How can he retrieve those files?

          Ans.  Restore files from the Recycle bin.




           78   Touchpad Data Science-X
   75   76   77   78   79   80   81   82   83   84   85