Page 99 - TP_IT_V1.0_C10_flipbpookl
P. 99
3. What is a file in computers? Give examples.
Ans. Any data in the computer is stored in the form of a file. That is why a file is said to be a collection of logically related data.
Every file has its own unique name which is made up of two parts separated by a period File name (A filename can consist
of letters, numbers, spaces, and characters) and extension that identifies the file type.
For example:
Project.doc is a Word file.
Project.ppt is a PowerPoint.
Project.xls is a Spreadsheet.
4. What precautions will you take to protect your computer from computer viruses?
Ans. You can protect your computer from virus by following the given precautions:
● Install and use anti-virus software.
● Keep anti-virus software updated so that it can scan and remove new viruses.
● Scan all the files that you download from the Internet.
● Do not open e-mails from an unknown person/sender.
● Don’t allow any untrustworthy person to use your system.
● Never use unknown pen drive/CD on your computer.
● Never click on the unknown windows that pop-up when you are surfing the Internet.
21 st #Communication
C. Competency-based/Application-based questions. Century
Skills #Leadership & Responsibility
1. Harry has accidentally deleted some important files. He wants those files back. Is he able to retrieve those files?
Ans. Yes, he can retrieve those files from the Recycle Bin.
2. While working on a project, Aradya's computer unexpectedly restarts multiple times. Upon closer inspection, she finds an
unusual number of files that she did not create. What could be the possible reason for this problem?
Ans. Her computer is infected with a computer virus.
Unsolved
SECTION A (Objective Type Questions)
A. Choose the correct option.
1. Which of the following refers to an unwanted and unsolicited message?
a. Spam b. MBR
c. Boot Sector Virus d. None of these
2. What is the term used when you press and hold the left mouse button and move the mouse around? [NCERT]
a. Highlighting b. Dragging
c. Selecting d. Moving
3. To open temp folder, type in Run dialog box.
a. temp% b. %temp%
c. #temp# d. $temp$
4. A firewall can be .
a. Software only b. Hardware only
c. Both a and b d. None of these
5. Which of the following is an antivirus?
a. Norton Antivirus b. Quick Heal
c. McAfee Virus Scan d. All of these
Information and Communication Technology Skills-II 97

