Tuesday, June 11, 2013

Std 7 - Chapter 1 - Introduction To Computers

Chapter - 1
Introduction to Computers
1.
What is the relationship between computer hardware and software?

Both Hardware and Software together make a computer system functional.
2.
What do you do when the computer stops responding?

Close the applications if possible.  Press Ctrl+Alt+Del key combination.  Choose Start Task Manager, Click and select the application which is not responding, Click on the End Task button to terminate the problem.
3.
What is a plotter?

Plotter is used for making a large paper drawing such as construction maps or engineering drawings.
4.
Define field and record.

A field is a collection of bytes that contain data bout an item. Eg: name of a student.
A record is a collection of inter-related fields. Eg: a student’s record may contain name, age, and class.
5.
Define the terms Hardware and Software.

Hardware is the physical component of a computer system.  E.g. CPU, RAM, Monitor Software are the instructions or commands that make the hardware components operational. E.g. Operating System, Application Software
6.
What is data hierarchy?

Data Hierarchy refers to the systematic organization of data, often in a hierarchical form. Data organization involves fields, records, files and so on.
7.
What is a bit?

A bit is the short form of Binary Digit.  A computer system represents data using the digits 0 and 1.  A bit is represented by an electronic circuit that is either OFF or ON.
8.
Write short notes on Application Software and System Software.

Application Software: Application Software consists of programs that are designed to do specific tasks, such as payroll, inventory, word processing, spread sheets etc.
System Software: It performs the basic functions and controls the various resources of a computer system.  The Operating System is an example of System Software.  E.g. Windows 7, Linux etc.
9.
Explain the computer memory and its types.

The storage device of a computer system is known as computer memory.  There are two types of computer memory:
1)      Primary Memory: is often called the working memory or the main memory of a computer system.  RAM and ROM are the two major types of primary memory.
a.      RAM: Random Access Memory:- It is capable of sending and receiving data at a very high speed.  RAM is volatile in nature means when the computer switched off data stored in RAM is lost.
b.      ROM: Read Only Memory:- it holds instructions put by the manufacturer to operate the computer.  It is permanent memory.
2)      Secondary Memory: is used to store data for a long time.  It is permanent in nature.  Data stored in secondary memory are not lost when the computer is switched off.  It is also called non-volatile memory.  E.g. Hard Disk, Pen drive etc.
10.
Explain the types of printers.

There are mainly three types of printers:
Dot Matrix Printer: This printer contains movable print head with pins that strike the ribbon placing a dot on the paper with hundreds of dots forming images or text.  These printers are less expensive but are very noisy.
Inkjet Printer: This printer forms letters and images on the paper by spraying small streams of quick-drying ink.
Laser Printer: This printer uses laser technology to print images on the paper.  This gives the best quality output and is the most expensive.

Additional Questions
1.
What do you mean by Troubleshooting?

Detecting the problem in a computer system when it is not working properly is called troubleshooting.
2.
What do you mean by ‘Computer is Hung’?

While working on our computer and our system suddenly stops responding to your commands.  This situation is known as ‘Computer is Hung’.
3.
What is a Database?

A database is a collection of all the files in an organization.  E.g. files of students, teachers and other staff members of in a school make the school database.
4.
Explain the various types of scanners.

This input device scans images from photographs, posters, magazine’s directly into the computer.
Flatbed Scanner: This scanner has a flat plane of glass where the item being scanned is placed.  It works like a photocopy machine.
Handheld Scanner: This scanner is dragged over the object that needs to be scanned.  It is mostly used in shopping stores.


Sunday, June 9, 2013

IT Club Entrance Examination 2013

IT Club Entrance Examination for 2013-14 commenced on 12-06-2013.  Those who given name for the examination be in touch with me for the exact time and date.  Mostly the exams will be after school hours.  That is 2:45 pm to 3:30 pm.

All the best for the examination


Wednesday, June 5, 2013

Std - 8 - Chapter - 1

1.
What is a computer network?

A computer network is a collection of computers and peripheral devices connected by communication links.
2.
What is a workstation?

Workstation is a computer that is connected to a network.
3.
What are the basic types of topologies?

Star, Ring and Bus are the basic types of topologies.
4.
Write full forms of the following

a)      LAN – Local Area Network
b)      WAN – Wide Area Network
c)      MAN – Metropolitan Area Network
d)      PAN – Personal Area Network
e)      CAN – Campus Area Network
f)       NIC – Network Interface Card
g)      TCP/IP – Transmission Control Protocol / Internet Protocol
h)      HTTP – Hyper Text Transfer Protocol
5.
What is a Node?

A node is a computer or any other devices on a network that communicates with other devices.
6.
What is a topology?

The art of connecting different computers in a network is known as topology.
7.
Describe a network and networking in your own words?

A network is a group of devices connected with one another.  Networking refers to the inter-connection of various devices to share their resources.
8.
Differentiate between LAN and WAN.

LAN (Local Area Network) is a computer network covering a small geographic area, like a home, office, schools, or group of buildings.
WAN (Wide Area Network) is a computer network that covers a broad area (e.g., any network whose communications links cross metropolitan, regional, or national boundaries over a long distance.

High Speed
Low Speed

Network in an organization can be a LAN
Internet is a good example of a WAN
9.
Write short note on the hardware parts required to establish a network.

Network hardware includes the physical components that are used to create a network.
Cables: Cables are the wires that connect computers and resources on a network.
Connectors: A connector is a device that joins two computers or networks together.
NIC: Network Interface Card is a device that joins a cable to a computer.
10.
Write Three benefits of a network.

Ease of Access: Storing information on one or two central computers makes it easy for people to work with and manage their files.
Work From Home: The network has dedicated computers that allow people to connect to the company’s network at home using a modem.
Share Resources: Computers connected to a network can share equipments and devices including printers and hard drives.
11.
Write advantages and disadvantages of the following:

a)      Ring Topology
Advantages:
The ring works well where there is no central-site computer system.
It is more reliable than a star network.

Disadvantages:
Requires more complicated control software.
Failure of one node results into the failure of the entire network.
b)      Star Topology
Advantages:
Star topology has minimal line cost.
If any of the local computers fails, the remaining portion of the network is unaffected.
Disadvantages:
The system crucially depends on the central switch.
If it fails, the entire network goes down.
c)      Bus Topology
Advantages:
It is quite easy to set up.
Failure of one node does not affect the rest of the network.
Disadvantages:
It offers limited flexibility for change.
A signal on the bust must be strong enough to reach the receiver.


Additional Questions
1.
What is a File Server?

A file server is a computer connected to the network, which serves or distributes files to the network users.
2.
Explain Wi-Fi?

Wi-Fi (Wireless Fidelity) technology is the wireless computer network that allows users to connect to the Internet without wires or cables.
3.
What is an Enterprise Network?

When a single company owns and controls a wide area network, it is often called as an Enterprise Network.
4.
What is HTTP?

Hyper Text Transfer Protocol (HTTP) is a set of rules for transferring files (text, graphic images, sound, video, and other multimedia files) on the World Wide Web.
5.
What do you mean by a network protocol?

A network protocol defines rules for communication between network devices.  E.g.: HTTP, FTP, TCP/IP


Monday, February 4, 2013

Std - 8 - Chapter 8

1.
What do you mean by privacy?

Privacy is unethical to infringe in the privacy of other people without the consent of the person.
2.
Define the term ethics.

Ethics and beliefs are rules.  These rules state what is right and what is wrong.
3.
Name the different forms of piracy.

End-User Piracy, Internet Piracy, Pre-Installed Software Piracy, Counterfeiting, Online Auction Piracy are the various forms of piracy.
4.
What are the limitations of pirated software?

·         No warranty protection
·         Contain viruses
5.
What does a copyright symbol indicate?

Copyright means All Rights Reserved.  This symbol shows the sole property of the owner.  It is unlawful and unethical to use them without the permission of the owner.
6.
Explain the importance of ethics.

·         Satisfying Basic Human Needs
·         Creating Credibility
·         Uniting People and Leadership
·         Improving Decision Making
·         Long Term Gains
·         Securing the Society
7.
What are intellectual property rights?

The rights related to literary or artistic work, inventions, discoveries, etc. are called Intellectual Property Rights.
8.
What is software piracy?

Software piracy is the illegal reproduction and distribution of software applications.
9.
Explain software breaches in computer.

Hardware breaches: can be both intentional and accidental.  Cables, modems, phone lines are often vulnerable to security breaches.
Software breaches: include computer viruses, password cracking.
Network breaches: are used to transmit data and information, they may be trapped by unethical people to access information about a company.
Natural disasters: like hurricanes, earthquakes, floods are security breaches.
Computer security controls are established and implemented to reduce security breaches.
10.
What is the difference between hacker and cracker?

A hacker is a person who breaks into a computer system to get illegal access to the information stored there.  Hacker may not cause any harm to the system or organization.
A cracker is a person who breaks into a computer system just like a hacker, with the intention to steal passwords, files or programs for unauthorized use.  They may sell the information to some other people for money.
11.
What do you mean by referencing?

If some material is downloaded, we must acknowledge the author sincerely.  This is called referencing.

for extra reading:  http://www.managementstudyguide.com/importance-of-ethics.htm

Std - 8 - Chapter 7


1.
What is the importance of ethics in e-commerce?

There are many aspects of ethics that can affect electronic commerce systems, but perhaps the most notable and worrying to both consumers and developers is that of trust.
2.
What are newsgroups?

The places on Internet where you can exchange your views and ideas on different subjects with other people are called Newsgroups.
3.
List some e-commerce websites.

amazon.com, ebay.com, electricpages.in, indiatimes.com, bookselleronline.com, fabmart.com
4.
Mention some websites which provide online news facility.

ndtv.com, Hindustantimes.com, kidnews.com, mathrubhumi.com, malayalamanorama.com etc.
5.
What do you mean by Business to Consumer e-commerce?

Business to Consumer refers to a company which establishes website for its products and services.
6.
What do you mean by Business to Business e-commerce?

Business to Business refers to a company selling or buying products or services from/to other companies.
7.
Explain the term Social Networking.

Social Networking websites function like an online community of Internet users.  They provide a virtual community in which the members with common interests in hobbies, religion, or politics may communicate with each other.  Facebook, Orkut, and LinkedIn are some examples of Social Networking.
8.
Explain the term Blog.

A blog is a type of website, usually maintained by an individual.  It contains regular entries of commentary, descriptions of events, or other material such as graphics or videos.  Blog also, means “to maintain or add contents to a blog”.
9.
What is video conferencing? Where is it used?

Video conferencing provides face to face conversation with different people who are at different locations.  This is widely used in big companies, TV Shows, chatting etc.
10.
Write the steps to buy a product online.

a)      Open any e-commerce site.
b)      Enter the product name in search box and press enter key.
c)       Double click the product you are interested from the list.
d)      Click on “Add to Cart”
e)      Click on “Proceed to checkout”
f)       Enter the email address and password then provide your shipping address.
g)      Select the payment options and enter your card’s details.
11.
What do you mean by term e-commerce? Write some advantages of e-commerce.

E-commerce means buying and selling any product online using internet technologies. 
Advantages:
a)      You do not need to go to showrooms or shops.
b)      You do not need to carry cash from home to shop with a fear of losing it.
c)       There are no geographical or time barriers.
d)      Even small companies can go global.
e)      You can save time, money and effort.

Std 7 - Chapter - 7 More on Internet

Chapter - 7 More on Internet 1. What is World Wide Web? The World Wide Web (abbreviated as WWW...