Page 88 - AI Ver 1.0 Class 10
P. 88

●  There will be a change in the system file size
                     ●  An unusual increase in number of files
                  6.  Why should regular disk defragmentation be done?                                  [CBSE Handbook]
                Ans.   Use disk cleanup and disk defragmentation utility programs on a regular basis to remove all unnecessary files and
                    information that slows down the computer so that the efficiency of the computer increases.
                  7.  Can computer viruses infect hardware?                                             [CBSE Handbook]
                Ans.  Computer virus is a malicious code that cannot damage the physical components of the computer directly.

                  8.  What is the use of antivirus software? Name any two commonly used anti-virus software.   [CBSE Handbook]
                Ans.   Antivirus software is a program designed to prevent,detect and remove malicious programs from the computer. After
                    you install the antivirus software runs automatically in the background to provide real-time protection against virus
                    attacks. Example: McAfee Virus Scan, Norton AntiVirus
                  9.  How are temporary files created on the computer?
                Ans.   Temporary files are created temporarily by programs that store information related to the file you are working on
                    in your computer. It  increases the efficiency of  the software and also helps in recovering the data at the time of
                    unexpected closing of the file due to power failure or system shut down.

              B.  Long answer type questions:

                  1.  List a few important functions performed by an operating system.
                Ans.  Following are some important functions performed by an operating system:
                     ●  It works as an interface between the user and the machine.
                     ●   It works as a device manager. It keeps a track that all the devices are functioning properly and are available to the
                       user whenever needed.
                     ●  It manages the software of the computer.
                     ●   It manages the computer memory and keeps track of the memory in use and free so that it is available to the user
                       whenever needed.
                  2.  Where is the taskbar located? What are its important components?
                Ans.   It is the thin strip present at the bottom of the screen. By default it is always visible at the bottom but we can choose
                    the auto hide option in the taskbar settings which will disappears the task bar. But it will reappear only when the mouse
                    cursor moves down to that area. It contains the following important components: Start Menu, Quick Launch Program
                    Icons, Notification Area, System Clock.
                  3.  What is a file in computers? Give examples.
                Ans.   Any data in the computer is stored in the form of a file. That is why a file is said to be a collection of logically related
                    data. Every file has its own unique name which is made up of two parts separated by a period File name (A filename
                    can consist of letters, numbers, spaces, and characters) and extension that identifies the file type. For example:
                     Project.doc  æÆ  is a MS Word file.
                     Project.ppt  æÆ  is a MS PowerPoint.
                     Project.xls   æÆ  is a MS Spreadsheet.
                  4.  How will you prevent others from using your computer?
                Ans.   To prevent computers from being used by unauthorized persons it must be locked when the users are not working
                    on it. This will ensure that no unauthorised person can see or make changes to our information without taking
                    our permission. To make sure the computer is locked, the login-IDs and passwords must be created. A login ID
                    and password is like a key to the lock which allows the user to use the computer only if the entered login ID and
                    password match with the computer database. Once finished the work, the user must log out or sign out so that
                    no one else can see the work.
                                                                                                           Communication
              C.  Competency-based/Application-based questions:
                  1.  Harry has accidentally deleted some important files. He wants those files back. How can he retrieve those files?
                Ans.  Restore files from the Recycle bin.


                        86    Touchpad Artificial Intelligence-X
   83   84   85   86   87   88   89   90   91   92   93