Page 384 - Trackpad 402_Class-X_Final
P. 384
7. What is a unique payment gateway through which a person can transfer money to any other person account instantly with
his mobile called?
Ans. Unified Payments Interface (UPI)
8. What is a reference to a document or web page that the user can switch by clicking called?
Ans. Hyperlink
9. Explain the following terms with reference to wireless Internet connection:
a. MODEM (Modulator Demodulator) b. Digital Subscriber Line (DSL)
Ans. a. MODEM (Modulator Demodulator) is a device used to convert the digital signals into analog signals and vice versa. It is
mainly used to connect a telephone to a computer terminal.
b. It is a technology that is used to transmit digital data using telephone lines. It uses the existing telephone lines to
transmit high bandwidth data.
10. Write any two chatting etiquettes.
Ans. Following are the chatting etiquettes:
• Ask the other person, if he is available and have time to chat.
• Keep your messages short and precise. It is a better way to communicate especially in a professional environment.
11. What is hazard?
Ans. A hazard is a situation where there is a potential for harm, damage or any kind of loss of health or life.
12. Mention any four emergencies.
Ans. Some of the different types of emergencies are as follows:
• Chemical spills
• Extreme heat waves
• Droughts
• Pandemics
B. Long answer type questions:
1. List any 4 advantages associated with networking.
Ans. Advantages:
● Sharing devices such as printers saves money.
● Site (software ) licences are likely to be cheaper than buying several standalone licences.
● Files can easily be shared between users.
● Network users can communicate by email and instant messenger
2. Differentiate between wired and wireless access. Give one example for each type.
Ans. A wired setup uses physical cables to transfer data between different devices and computer systems. Wireless network
does not use wires for data or voice. Examples Wired: Dial-up, DSL or Cable Internet Access etc. Wireless: 3G or WiMAX
or Wi-Fi.
3. What precautions must be taken to improve online security?
Ans. Precautions:
● Antivirus and Antispyware programs offer real-time protection monitoring your computer for any changes by malware
software.
● Use strong passwords a combination of alphanumeric and special characters could be used for creating a password that
is not so easy to crack or guessed by other users.
● Secure transactions because information such as credit card details or personal information is sent over the network.
● Use encryption software to protect your data from unauthorized users.
4. Rohan’s grandfather was wondering how Rohan chatted on the web with his father posted in California. Elaborate the
steps involved while transferring data over the internet.
Ans. Steps followed while transferring data are as given:
The data is broken up into bits of same sized pieces called packets. A header is added to each packet explaining where
the data has come from, where it should end up and where it fits in with the rest of the packets. Each packet is sent from
computer to computer until it finds its destination. Each computer on the way decides where next to send the packet. All
packets may not take the same route. At the destination, the packets are examined. If any packets are missing or damaged,
384 Trackpad Information Technology-X

