Class 10 all question answer from set book for second term

 what is a search engine?


A search engine is a software program that helps people find the information they are looking for online using keywords or phrases.



what is the business done through the internet called?


E-commerce




what is the law that govern the legal issues of cyberspace??


Cyber Law




Which is the smallest unit to represent information on quantum computing?


=A quantum bit or qubit is the smallest unit of data in quantum computing.



full form of 


UTP = Unshielded Twisted Pair. 


STP= Shielded Twisted Pair.


WAP= Wireless application protocol


FTP: File Transfer Protocol


MAN: Metropolitan Area Network.


ADSL: Asymmetric Digital Subscriber Line


TCP/IP: Transmission Control Protocol/Internet Protocol


B2B: Business to Business


ICT: Information and communications technology


LAN: Local area network





what is computer networking? write its advantages and disadvantages


Computer networking refers to interconnected computing devices that can exchange data and share resources with each other.



advantages of computer networking:


1) easy communication and speed

2) ability to share files, data and information

3) sharing hardware

4) sharing software

5) security

6) speed



disadvantages of computer networking


1) breakdown and possible loss of data and resources


2) expensive to build


3) bandwidth issues




what is computer ethics? 


=Ethics is a set of moral principles that govern the behavior of an individual or group of people.

 Computer ethics is the application of moral principles to the use of computers and the Internet.



what are the examples of computer ethics?

= they are:

1) Using original softwares

2) Not using computers to harm others

3) Not using others computer without owners permission

4) Not publishing person's data in public without thier permission





what is software security?write any four measures of software security.


=Software security is an idea implemented to protect software against malicious attack and other hacker risks so that the software continues to function correctly under such potential risks.


Four measures of software security are:

1) User identification and authentication like password, biometric technique etc.

2) Firewall

3) Cryptography

4) Antivirus software

5) Backup system




what is hardware security? write any four measures of hardware security.


=Hardware security is vulnerability protection that comes in the form of a physical device rather than software that's installed on the hardware of a computer system.


Four measures of hardware security are:

1) Regular computer maintenance

2) Using computer in dust free environment

3) Using computer in favourable room temperature

4) Using power protection devices like UPS, voltage regulator, Surge protector etc.




What is M-commerce? Write its two important services.


=M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as smartphones and tablets. 


M-commerce is a form of e-commerce that enables users to access online shopping platforms without the use of a desktop computer.


The two important services of m-commerce are:

1) Finance and payment

2) Marketing




What is internet of things (IoT) ?

write any two importance of it.


=The Internet of things (IoT) describes physical objects (or groups of such objects) with sensors, processing ability, software, and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks


The two importance of IoT are:

1) Minimizes the human work and effort

2) Good for personal safety and security



write the name of any four search engines.


= They are:

1) Google

2) DuckDuckGo

3) Bing 

4) Yahoo

5) Baidu





What Is Social Media?

The term social media refers to a computer-based technology that facilitates the sharing of ideas, thoughts, and information through virtual networks and communities. 




write appropriate technical term for the following:


1) a system of copying data and information residing in computer into another location


Answer: Uploading



2) A company which provides services of internet


Answer: Internet service provider (ISP)


3)  secret group of characters which helps to protect file from on authorised person

 answer: password


4) A type of network in which every computer works as both client and server


Answer: Peer to peer network


5) A collective online communication channels dedicated to community based input interaction content sharing and collaboration


answer: Social media







write any four advantages and disadvantages of using social media.


= the advantages of social media are:

1) Technological literacy

2) Bringing people together

3) Opportunity to widen business

4) Breadth of knowledge


The disadvantages of social media are:

1) Distraction

2) Health problems

3) Illegal crime, virus attacks

4) Relationship problem




What is bandwidth?


=Bandwidth is a measurement indicating the maximum capacity of a wired or wireless communications link to transmit data over a network connection in a given amount of time.




What Is Cyberbullying?


Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person.





What Is Artificial Intelligence (AI)? What are the application of AI.


Artificial intelligence (AI) refers to the simulation of human intelligence in machines that are programmed to think like humans and mimic their actions.


The applications of AI are :

1) Data security

2) Health care

3) Manufacturing

4) Intelligent robot

5) Finance



Ten Commandments of Computer ethics.


1. should not use a computer to harm other people.


2. should not interfere with other people's computer work.


3. should not snoop around in other people's files.


4. should not use a computer to steal.


5. should not use a computer to bear false witness. 


6. should not use or copy software for which you have not paid.


7. should not use other people's computer resources without authorization.


8. should not appropriate other people's intellectual output.


9. should think about the social consequences of the program you write.


10. should use a computer in ways that show consideration and respect.







what is e-commerce? List any four e-commerce companies in nepal.


E-commerce (electronic commerce) is the buying and selling of goods and services, or the transmitting of funds or data, over an electronic network, primarily the internet.


Four E-commerce companies in nepal are:


1) Daraz

2) Okdam

3) Sastodeal

4) Gyapu

5) Foodmandu

6) Meroshopping





What Is Cloud Computing? What are the advantages and disadvantages of cloud computing?


Cloud computing is the delivery of different services through the Internet. These resources include tools and applications like data storage, servers, databases, networking, and software.


The advantages of cloud computing are:

1) Cost efficiency

2) High speed

3) Reliability

4) Mobility 



The disadvantages of cloud computing are:


1) Downtime

2) Vulnerability to attack

3) Limited control and flexibility

4) Lower bandwidth

5 Lack of support team (like customer care service)



what are the uses of cloud computing?


The are: 

1) Test and build application

2) Store, backup and recover data

3) Stream audio and video

4) Deliver software on demand





What is virtual reality(VR)? What are the Application areas of virtual reality


Virtual reality is the term used to describe a three-dimensional, computer generated environment which can be explored and interacted with by a person.


Virtual Reality (VR) is a computer-generated environment with scenes and objects that appear to be real, making the user feel they are immersed in their surroundings.


The applications areas of VR are:

1) Education

2) Health

3) Business

4) Military

5) Construction




What is Email?


A method of exchanging messages instantly from one system to another with the help of the internet is called an Email.



what is cyber law?

Cyber law is the part of the overall legal system that deals with the Internet, cyberspace, and their respective legal issues.It is referred to as the Law of the Internet




What is digital footprint?


Digital footprint is the information about a particular person that exists on the internet as a result of their online activity.


what is  passive and active footprint?


A passive footprint is made when information is collected from the user without the person knowing this is happening.


 An active digital footprint is where the user has deliberately shared information about themselves either by using social media sites or by using websites.





Write any two tips to maintain digital reputation.

They are:

1)Stay professional and do not engage in online arguments

2) Make an apology when necessary

3) Do not share false and unofficial news to anyone




What is password policy? 


A password policy is a set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly.




write any two important criteria for creating strong password  / CHARACTERISTICS OF STRONG PASSWORDS


They are:


1) At least 12 characters — the more characters, the better


2) A mixture of both uppercase and lowercase letters


3)A mixture of letters and numbers 

Inclusion of at least one special character, e.g., ! @ # ? ]








What are the examples of weak passwords??


EXAMPLES OF WEAK PASSWORDS


1) Any word that can be found in a dictionary, in any language (e.g., airplane or aeroplano).


2) A dictionary word with some letters simply replaced by numbers (e.g., a1rplan3 or aer0plan0).


3) A repeated character or a series of characters (e.g., AAAAA or 12345).


4) A keyboard series of characters (e.g., qwerty or poiuy).


5) Personal information (e.g., birthdays, names of pets or friends, Social Security number, addresses).




Advantages of e-commerce are:


1)Faster buying process.

2)Store and product listing creation.

3) Cost reduction.

4) Affordable advertising and marketing.

5) Flexibility for customers.

6) No reach limitations.

7) Product and price comparison.




Which protocol is used by WWW to establish client and server interaction??

= HTTP protocol



What Is Biometric Verification?

Biometric verification is a way to identify individuals based on their unique characteristics or body measurements – for example, their face, fingerprints or voice. 




In which data transmission mode data travel only in One Direction that is to send or receive only?

= Simplex mode



A file storage and synchronisation service developed by Google is called?

= Google drive



A set of moral principles or code of conducts that regulate use of computers.

= Computer Ethics




The process of identifying an individual usually based on a username and password

=Authentication



Full form of:


G2G= Government to government


IoT= Internet of Things


VOIP=Voice over Internet Protocol


ISP= Internet service provider


GPS=Global Positioning System


Kbps= Kilobits per second


Mbps= Megabits per second


B2B= Business to Business


POP= Post office protocol


VIRUS =Vital Information Resources Under Seize


UPS= Uninterruptible Power Supply


IRC= Internet Relay Chat



What Does Communication Media Mean?


=Communication media refers to the means of delivering and receiving data or information. In telecommunication, these means are transmission and storage tools or channels for data storage and transmission.




difference between bounded/guided media and unbounded/unguided media






What is backup? Why backup is vital to computer security system?

=A backup is a copy of important data that is stored on an alternative location, so it can be recovered if deleted or it becomes corrupted.

Backups protect against human errors, hardware failure, virus attacks, power failure, and natural disasters. Backups can help save time and money if these failures occur.



Define information and communication technology.

Information and communication technology (ICT) is defined as a diverse set of technological tools and resources used to transmit, store, create, share or exchange information.



What are online payments? Write the different forms of e-payment in Nepal

Online payments are payments that are initiated over the internet for goods or services purchased either online or offline.

The different forms of e-payment in nepal are:

1) Esewa

2) IME pay

3) Khalti

4) Prabhu money transfer



when was cyber Law established in Nepal?

In 2061 BS   (2004 AD)



An internet tool that helps to upload/download the file.

Answer: Internet download manager (IDM)



A service of internet that allows user to talk in real time.

= IRC (Internet relay chat)




what is network topology? write different types of network topology.


A Network Topology is the arrangement with which computer systems or network devices are connected to each other.

Types of network topology are bus topology, ring topology, star Topology Mesh topology etc.





What Is Digital Citizenship?


Digital citizenship refers to the responsible use of technology by anyone who uses computers, the Internet, and digital devices to engage with society on any level. 




The 9 elements of Digital Citizenship are:


1) Digital access. 

2) Digital commerce. ...

3) Digital communication. ...

Digital literacy. ...

Digital etiquette. ...

Digital law. ...

Digital rights and responsibilities. ...

Digital health and wellness.

9) Digital security



What is computer security?

Computer security basically is the protection of computer systems and information from harm, theft, and unauthorized use.

 It is the process of preventing and detecting unauthorized use of your computer system.




What is E commerce?

E-commerce (electronic commerce) is the buying and selling of goods and services, or the transmitting of funds or data, over an electronic network, primarily the internet.



The following are the different types of e-commerce platforms:

1)Business-to-Business (B2B)

2)Business-to-Consumer (B2C)

3)Consumer-to-Consumer (C2C)



What is e-governance ? How does it help to the citizens?

Electronic governance or e-governance can be defined as the usage of Information and Communication Technology (ICT) by the government to provide and facilitate government services, exchange of information, communication transactions and integration of various standalone systems and services.


It help citizens by following points:

1) Reduces Costs of Running a Government.

2) Easy and Quick Implementation






Advantages of e-Governance


1) Improves delivery and efficiency of government services


2)Improved government interactions with business and industry


3) Citizen empowerment through access to information


4)More efficient government management


5) Less corruption in the administration


6) Greater convenience to citizens and businesses


7) Cost reductions and revenue growth


8) Reduces paperwork  in the administrative process 



List any six network connectivity devices

= They are:

Hub.

Switch.

Router.

Bridge.

Gateway.

Modem.

Repeater.




which software is used to remove virus from computer system?

=Antivirus software




what are the modes of electronic payments?


They are:

Credit cards

Debit cards

E-wallet

Netbanking

Mobile banking





what is search engine?

A search engine is a software program that helps people find the information they are looking for online using keywords or phrases.






What Is Cloud Computing? List any four services of cloud computing.

Cloud computing is the delivery of different services through the Internet. These resources include tools and applications like data storage, servers, databases, networking, and software.

The four services of cloud computing are:

1) Test and build application

2) Store, backup and recover data

3) Stream audio and video

4) Deliver software on demand





List any four opportunities and threats in social media.

The opportunities of social media are:

1) Knowledge sharing

2) Social networking

3) Business networking

4) Community building



The threats of social media are:

1) Cyber attacks

2) Fake news

3) Social engineering

4) Impersonation




What's a Peer-to-Peer (P2P) Network?

A peer-to-peer network is one in which two or more PCs share files and access to devices such as printers without requiring a separate server computer or server software.




What are  Client-Server Networks?

Client-server networks are computer networks that use a dedicated computer (server) to store data, manage/provide resources and control user access.




Difference between peer to peer network and client server network architecture.





What is Intellectual Property? Give some examples of intellectual properties.


Intellectual property (IP) refers to creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names and images used in commerce.


Examples of intellectual properties are:

Copyright, patents, trademarks, trade secrets, industrial designs etc.






Define bus topology.


Bus topology is a specific kind of network topology in which all of the various devices in the network are connected to a single cable or line. 





Define ring topology.


A ring topology is a network configuration where device connections create a circular data path. Each networked device is connected to two others, like points on a circle.




Define  Star Topology.


Star topology is a network topology in which each network component is physically connected to a central node such as a router, hub or switch.





Which is the most common type of E-commerce?

= Business to customer (B2C)



What is called a group of computers that can share resources?

= Network


A program that destroys the other program

= computer virus



 


What Is Electronic Commerce (E-commerce)? mention its any four features


Electronic commerce (e-commerce) refers to companies and individuals that buy and sell goods and services over the Internet.


Four features of Electronic commerce are:

1) Large customer reach

2) Promotional and discount code tool

3) Rich in content and information

4) Personalization




What are the examples of cloud computing?

They are:

1) Google cloud

2) Microsoft 365

3) Adobe creative cloud



What is communication media?


=Communication media is a medium or channel through which a message or information can be transmitted from a sender to the receiver.



Guided media examples:

phone lines, twisted pair cables, coaxial cables, optical fibers(fibre optics cable)  etc


Unguided media examples:

Radio waves, microwaves, infrared, Bluetooth etc.





Difference between Radio waves, microwave and infrared.






Difference between active and passive attack.




Difference between encryption and decryption




What is encryption?


Encryption is a way of scrambling data so that only authorized parties can understand the information.




What Does Decryption Mean?


Decryption is the process of transforming data that has been rendered unreadable through encryption back to its unencrypted form.





What is ciphertext?


Ciphertext is encrypted text transformed from plaintext using an encryption algorithm.





What is the Internet?


= A global system of interconnected computers, using a standardised Internet Protocol suite for communication and sharing information is called the Internet.





What is the World Wide Web?


 World Wide Web or ‘www’ is a collection of webpages which can easily be published on the Internet and read by millions of its users.




What is an IP address?


=The Internet Protocol address is a numerical identification code assigned for any device connected to a network. It acts as an identification interface for Internet users.



What is a Web Browser?


= A web browser is a software application for accessing the information on the World Wide Web. The commonly used web browsers include Google Chrome, Internet Explorer, Mozilla Firefox, etc.




What are Internet  Protocols?


Protocols are a set of rules that help in governing the way in which any particular body or technology works.





Pros of internet:


1) Easy access to information

2) Platform for online education

3) Job Hunting

4) Visual and graphical representation of things

5) Reduces the parameters of distance



Cons of internet


1) Dependency

2) Cyber crimes

3) Distraction

4) Bullying and trolls




Write the preventing measures to protect computer from computer virus.


They are:

1) Keep your software up to date. ...

2) Don't click on links within emails. ...

3) Use free antivirus software. ...

4) Back up your computer. ...

5) Use a strong password. ...

6) Use a firewall. ...

7) Don't use cracked/pirated softwares




What is hardware security?


Hardware security is vulnerability protection that comes in the form of a physical device rather than software that's installed on the hardware of a computer system.



What is a centralized network?


A centralized network architecture is built around a single server that handles all the major processing.


Centralized computing is a type of computing architecture where all or most of the processing/computing is performed on a central server.





What are client-server networks?


Client-server networks are computer networks that use a dedicated computer (server) to store data, manage/provide resources and control user access.



















Comments