Class 10 set book questions
what is a search engine?
A search engine is a software program that helps people find the information they are looking for online using keywords or phrases.
what is the business done through the internet called?
E-commerce
what is the law that govern the legal issues of cyberspace??
Cyber Law
Which is the smallest unit to represent information on quantum computing?
=A quantum bit or qubit is the smallest unit of data in quantum computing.
full form of
UTP = Unshielded Twisted Pair.
STP= Shielded Twisted Pair.
WAP= Wireless application protocol
FTP: File Transfer Protocol
MAN: Metropolitan Area Network.
ADSL: Asymmetric Digital Subscriber Line
TCP/IP: Transmission Control Protocol/Internet Protocol
B2B: Business to Business
ICT: Information and communications technology
LAN: Local area network
what is computer networking? write its advantages and disadvantages
Computer networking refers to interconnected computing devices that can exchange data and share resources with each other.
advantages of computer networking:
1) easy communication and speed
2) ability to share files, data and information
3) sharing hardware
4) sharing software
5) security
6) speed
disadvantages of computer networking
1) breakdown and possible loss of data and resources
2) expensive to build
3) bandwidth issues
what is computer ethics?
=Ethics is a set of moral principles that govern the behavior of an individual or group of people.
Computer ethics is the application of moral principles to the use of computers and the Internet.
what are the examples of computer ethics?
= they are:
1) Using original softwares
2) Not using computers to harm others
3) Not using others computer without owners permission
4) Not publishing person's data in public without thier permission
what is software security?write any four measures of software security.
=Software security is an idea implemented to protect software against malicious attack and other hacker risks so that the software continues to function correctly under such potential risks.
Four measures of software security are:
1) User identification and authentication like password, biometric technique etc.
2) Firewall
3) Cryptography
4) Antivirus software
5) Backup system
what is hardware security? write any four measures of hardware security.
=Hardware security is vulnerability protection that comes in the form of a physical device rather than software that's installed on the hardware of a computer system.
Four measures of hardware security are:
1) Regular computer maintenance
2) Using computer in dust free environment
3) Using computer in favourable room temperature
4) Using power protection devices like UPS, voltage regulator, Surge protector etc.
What is M-commerce? Write its two important services.
=M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as smartphones and tablets.
M-commerce is a form of e-commerce that enables users to access online shopping platforms without the use of a desktop computer.
The two important services of m-commerce are:
1) Finance and payment
2) Marketing
What is internet of things (IoT) ?
write any two importance of it.
=The Internet of things (IoT) describes physical objects (or groups of such objects) with sensors, processing ability, software, and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks
The two importance of IoT are:
1) Minimizes the human work and effort
2) Good for personal safety and security
write the name of any four search engines.
= They are:
1) Google
2) DuckDuckGo
3) Bing
4) Yahoo
5) Baidu
What Is Social Media?
The term social media refers to a computer-based technology that facilitates the sharing of ideas, thoughts, and information through virtual networks and communities.
write appropriate technical term for the following:
1) a system of copying data and information residing in computer into another location
Answer: Uploading
2) A company which provides services of internet
Answer: Internet service provider (ISP)
3) secret group of characters which helps to protect file from on authorised person
answer: password
4) A type of network in which every computer works as both client and server
Answer: Peer to peer network
5) A collective online communication channels dedicated to community based input interaction content sharing and collaboration
answer: Social media
write any four advantages and disadvantages of using social media.
= the advantages of social media are:
1) Technological literacy
2) Bringing people together
3) Opportunity to widen business
4) Breadth of knowledge
The disadvantages of social media are:
1) Distraction
2) Health problems
3) Illegal crime, virus attacks
4) Relationship problem
What is bandwidth?
=Bandwidth is a measurement indicating the maximum capacity of a wired or wireless communications link to transmit data over a network connection in a given amount of time.
What Is Cyberbullying?
Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person.
What Is Artificial Intelligence (AI)? What are the application of AI.
Artificial intelligence (AI) refers to the simulation of human intelligence in machines that are programmed to think like humans and mimic their actions.
The applications of AI are :
1) Data security
2) Health care
3) Manufacturing
4) Intelligent robot
5) Finance
difference between LAN , MAN & WAN
Ten Commandments of Computer ethics.
1. should not use a computer to harm other people.
2. should not interfere with other people's computer work.
3. should not snoop around in other people's files.
4. should not use a computer to steal.
5. should not use a computer to bear false witness.
6. should not use or copy software for which you have not paid.
7. should not use other people's computer resources without authorization.
8. should not appropriate other people's intellectual output.
9. should think about the social consequences of the program you write.
10. should use a computer in ways that show consideration and respect.
what is e-commerce? List any four e-commerce companies in nepal.
E-commerce (electronic commerce) is the buying and selling of goods and services, or the transmitting of funds or data, over an electronic network, primarily the internet.
Four E-commerce companies in nepal are:
1) Daraz
2) Okdam
3) Sastodeal
4) Gyapu
5) Foodmandu
6) Meroshopping
What Is Cloud Computing? What are the advantages and disadvantages of cloud computing?
Cloud computing is the delivery of different services through the Internet. These resources include tools and applications like data storage, servers, databases, networking, and software.
The advantages of cloud computing are:
1) Cost efficiency
2) High speed
3) Reliability
4) Mobility
The disadvantages of cloud computing are:
1) Downtime
2) Vulnerability to attack
3) Limited control and flexibility
4) Lower bandwidth
5 Lack of support team (like customer care service)
what are the uses of cloud computing?
The are:
1) Test and build application
2) Store, backup and recover data
3) Stream audio and video
4) Deliver software on demand
What is virtual reality(VR)? What are the Application areas of virtual reality
Virtual reality is the term used to describe a three-dimensional, computer generated environment which can be explored and interacted with by a person.
Virtual Reality (VR) is a computer-generated environment with scenes and objects that appear to be real, making the user feel they are immersed in their surroundings.
The applications areas of VR are:
1) Education
2) Health
3) Business
4) Military
5) Construction
What is Email?
A method of exchanging messages instantly from one system to another with the help of the internet is called an Email.
what is cyber law?
Cyber law is the part of the overall legal system that deals with the Internet, cyberspace, and their respective legal issues.It is referred to as the Law of the Internet
What is digital footprint?
Digital footprint is the information about a particular person that exists on the internet as a result of their online activity.
what is passive and active footprint?
A passive footprint is made when information is collected from the user without the person knowing this is happening.
An active digital footprint is where the user has deliberately shared information about themselves either by using social media sites or by using websites.
write any two tips to maintain digital reputation.
They are:
1)Stay professional and do not engage in online arguments
2) Make an apology when necessary
3) Do not share false and unofficial news to anyone
What is password policy?
A password policy is a set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly.
write any two important criteria for creating strong password./
CHARACTERISTICS OF STRONG PASSWORDS
They are:
1) At least 12 characters — the more characters, the better
2) A mixture of both uppercase and lowercase letters
3)A mixture of letters and numbers
Inclusion of at least one special character, e.g., ! @ # ? ]
what are the examples of weak passwords??
EXAMPLES OF WEAK PASSWORDS
1) Any word that can be found in a dictionary, in any language (e.g., airplane or aeroplano).
2) A dictionary word with some letters simply replaced by numbers (e.g., a1rplan3 or aer0plan0).
3) A repeated character or a series of characters (e.g., AAAAA or 12345).
4) A keyboard series of characters (e.g., qwerty or poiuy).
5) Personal information (e.g., birthdays, names of pets or friends, Social Security number, addresses).
Comments
Post a Comment