Page 80 - Data Science class 10
P. 80
6. Why should regular disk defragmentation be done? [CBSE Handbook]
Ans. Use disk cleanup and disk defragmentation utility programs on a regular basis to remove all unnecessary files and
information that slows down the computer so that the efficiency of the computer increases.
7. Can computer viruses infect hardware? [CBSE Handbook]
Ans. Computer virus is a malicious code that cannot damage the physical components of the computer directly.
8. What is the use of antivirus software? Name any two commonly used anti-virus software. [CBSE Handbook]
Ans. Antivirus software is a program designed to prevent,detect and remove malicious programs from the computer. After
you install the antivirus software runs automatically in the background to provide real-time protection against virus
attacks. Example: McAfee Virus Scan, Norton AntiVirus
9. How are temporary files created on the computer?
Ans. Temporary files are created temporarily by programs that store information related to the file you are working on
in your computer. It increases the efficiency of the software and also helps in recovering the data at the time of
unexpected closing of the file due to power failure or system shut down.
B. Long answer type questions:
1. List a few important functions performed by an operating system.
Ans. Following are some important functions performed by an operating system:
● It works as an interface between the user and the machine.
● It works as a device manager. It keeps a track that all the devices are functioning properly and are available to the
user whenever needed.
● It manages the software of the computer.
● It manages the computer memory and keeps track of the memory in use and free so that it is available to the user
whenever needed.
2. Where is the taskbar located? What are its important components?
Ans. It is the thin strip present at the bottom of the screen. By default it is always visible at the bottom but we can choose
the auto hide option in the taskbar settings which will disappears the task bar. But it will reappear only when the mouse
cursor moves down to that area. It contains the following important components: Start Menu, Quick Launch Program
Icons, Notification Area, System Clock.
3. What is a file in computers? Give examples.
Ans. Any data in the computer is stored in the form of a file. That is why a file is said to be a collection of logically related
data. Every file has its own unique name which is made up of two parts separated by a period File name (A filename
can consist of letters, numbers, spaces, and characters) and extension that identifies the file type. For example,
Project.doc æÆ is a MS Word file.
Project.ppt æÆ is a MS PowerPoint.
Project.xls æÆ is a MS Spreadsheet.
4. How will you prevent others from using your computer?
Ans. To prevent computers from being used by unauthorised persons it must be locked when the users are not working
on it. This will ensure that no unauthorised person can see or make changes to our information without taking
our permission. To make sure the computer is locked, the login-IDs and passwords must be created. A login ID
and password is like a key to the lock which allows the user to use the computer only if the entered login ID and
password match with the computer database. Once finished the work, the user must log out or sign out so that
no one else can see the work.
Communication
C. Competency-based/Application-based questions:
1. Harry has accidentally deleted some important files. He wants those files back. How can he retrieve those files?
Ans. Restore files from the Recycle bin.
78 Touchpad Data Science-X

