Page 87 - Trackpad 402_Class-X_Final
P. 87
For example:
Project.doc is a MS Word file.
Project.ppt is a MS PowerPoint.
Project.xls is a MS Spreadsheet.
4. How will you prevent others from using your computer?
Ans. To prevent computers from being used by unauthorized persons it must be locked when the users are not working on it.
This will ensure that no unauthorised person can see or make changes to our information without taking our permission.
To make sure the computer is locked, the login-IDs and passwords must be created. A login ID and password is like a key
to the lock which allows the user to use the computer only if the entered login ID and password match with the computer
database. Once finished the work, the user must log out or sign out so that no one else can see the work.
21 st #Communication
C. Competency-based/Application-based questions: Century
Skills #Leadership & Responsibility
1. Harry has accidentally deleted some important files. He wants those files back. How can he retrieve those files?
Ans. Restore files from the Recycle bin.
2. Aradya is making a presentation on her computer and listening to her favourite songs at the same time, her boss has asked
her to check the mail. Which feature of an operating system has enabled Aradya to do many tasks at the same time on her
computer?
Ans. Multitasking
Unsolved
SECTION A (Objective Type Questions)
A. Choose the correct option.
1. Which of the following options is used to recall a file from recycle Bin?
a. Restore b. Recall
c. Refresh d. Renew
2. CUI refers to .
a. Character User Interface b. Common User Interface
c. Clever User Interface d. Create User Interface
3. Which of the following is used to move the contents towards up-down or left-right of a page?
a. Scroll Bar b. Status Bar
c. Restore d. None of these
4. Deleted files are stored in:
a. Recycle Bin b. Trash
c. Both a. and b. d. None of these
5. Which of the following refers to an unwanted and unsolicited message?
a. Spam b. MBR
c. Boot Sector Virus d. None of these
6. How can an antivirus protect your device?
a. It can protect it from overheating. b. It can increase its performance.
c. It can prevent data from getting corrupt. d. It can backup data.
7. To open temp folder, type in Run dialog box.
a. temp% b. %temp%
c. #temp# d. None of these
8. A computer virus can infect only .
a. Hardware b. Software
c. Both a. and b. d. None of these
ICT Skills-II 87

