Unit 3 ICT Skills Class 10
Unit 3 ICT Skills Class 10
A. MCQ’S
Q1. Which of the following functions is not performed using a
mouse?
A) Turn on
B) Hover
C) Right-click
Answer (A)
Q2. What is the term used when you press and hold the left mouse
key and move the mouse around?
A) Highlighting
B) Dragging
C) Selecting
D) Moving
Answer (B)
Q3. Here are the steps that take place when starting a computer.
Rearrange the steps in the correct order.
(a) Desktop appears after login
(b) Login screen appears
(c) Power on Self-Test (POST) starts
(d) Operating system starts
(e) Welcome screen appears
Answer: c >> d >> >> e >> b >> a
● Power on Self-Test (POST) starts
● Operating system starts
● Welcome screen appears
● Login screen appears
● Desktop appears after login
Q4. Which of the following is a valid file extension for Notepad file?
A) .jpg
B) .doc
D) . txt
Answer (D)
Q5. Which one of the following shortcut keys is used to paste a file?
A) Ctrl + c
B) Ctrl + p
C) Ctrl + v
D) Ctrl + x
Answer (c)
A) Ctrl+x
B) Ctrl+c
C) Ctrl+z
D) Ctrl+y
Answer (B)
A) It can break.
C) It can overheat.
Answer (C)
Answer (C)
Answer (A)
Answer (D)
C) Use anti-virus
Answer (B)
A) Online predators
B) Worms
C) Trojan Horse
D) Anti-Virus
Answer (A)
A) Only letters
C) Name of a person
Answer (D)
B. Subjective questions
1. What is the function of the ENTER key?
Ans. The label on this key can be either ENTER or RETURN, depending
on the brand of the computer. The ENTER or the RETURN key is used to
move the cursor to the beginning of a new line. In some programs, it is
used to confirm the work which is being done.
Ans. In any school, each teacher has a separate cabinet where they
keep the files of different students or classes on separate shelves.
Similarly, information on a computer is stored in electronic files, which can
be put into separate folders. It is easier to manage the electronic files as
they can be simply copied, moved, renamed or even deleted.
4. What are the steps you will perform to save a text file in Ubuntu?
5) Click on Save.
(i) Keyboard: Clean a keyboard with a soft brush to remove crumbs and
dust particles.
(ii) Screen: Wipe the screen with a soft cloth to remove any finger marks.
(iii) Be careful with food and drinks: Avoid eating and keeping glasses of
water or cups of coffee near a computer.
(iv) Handle devices carefully: Handle and move your laptop carefully and
avoid dropping or banging it against a hard surface.
(v) Keep the computer cool: If a computer, laptop or mobile device gets
overheated, the internal parts can be damaged. The CPU has an internal
fan to keep it cool. We should make sure the fan is functioning. Avoid
leaving a device in the sun or in a closed car. We should be careful when
using a laptop while sitting in bed and make sure that the fan is not
covered.
(viii) Do not run too many programs at a time: When too many programs
are running at the same time, the computer can become slow and even
crash. If a program/app is not being used, it should be closed so that
other programs can work smoothly.
8. List the various ways you can use to protect your data.
Ans. The various ways to protect our data from theft and viruses are:
(a) Use passwords to log in to your computer: Use passwords that are
difficult to guess. Passwords are difficult to hack if they are a mix of small
(For example ‘a b c d’) and capital letters (For example, ‘H J E R’),
numbers (For example ‘8 7 6 5’) and special characters (For example, ’%
^ # $’). This would prevent unauthorized people from using your
computer.
(b) Install Anti-virus and Firewall: Anti-viruses and Firewalls monitor the
data coming in and out of a computer and prevent viruses from entering.
Antiviruses can also detect and clean viruses that may have entered a
computer.
(c) Encrypt Data: This is usually done by banks and companies in which
important customer information is stored. They can encrypt their entire
hard disk using the encryption feature in Windows (Bitlocker). This would
force users to use a decryption password (or key) before starting the
computer thus preventing unauthorized usage.
(d) Secure sites: Give details of your credit card or bank account only on
secure sites. See in the address bar of the browser. If the site address
starts with https://and a lock symbol, then it is safe to give your credit card
and bank details