Information and Communication Technology (Class 8)





 

Information and Communication Technology
Multiple choice questions.
1.      The full form of Wi-Fi is …………
i) wireless frequency               ii) wired fine cable       iii) Wireless fidelity     iv) Wireless finance
2.      Which of the following is not the tool of information and communication technology?
i) Newspaper                           ii) Projector                  iii) Television               iv) Microscope
3.      Which of the following the statements are incorrect about the precaution to be taken while using ATM?
i) ATM card and PIN should be kept safe       
ii) The PIN should be changed from time to time
iii) It is not necessary to change the PIN from time to time
iv) ATM card and PIN should not be given to anyone
4.      What is called the network connecting device?
i) router                                                ii) printer                      iii) scanner                   iv) card reader
5.      What is called for the communication Program to search content on Internet through World Wide Web ?
i) set-top box                           ii) Wi-Fi                       iii) Website                  iv) Search engine
6.      Which of the following statement is incorrect about Internet service provider?
i) ISP provides email address to its customers
ii) ISP provides high speed Internet service.
iii) ISP provides the service like fishing malware to its customer.
iv) ISP provides web hosting services.
7.      Which of the following is the benefit of social media?
i) Customer interaction                        ii) fake account                        iii) information leak     iv) Cyber bullying
8.      What is called shutting down a website or computer network through unethical mean?
i) Cyber terrorism                    ii) Cyber bullying         iii) Hacking                  iv) Identity theft
9.      What is called the software program that makes copy from one computer to another computer?
i) computer worm                    ii) phishing                   iii) Botnet                     iv) Spam
10.  Which of the following is an example of artificial intelligence?
i) Virtual reality                                   ii) Chatbot                    iii) Botnet                     iv) Computer worm
11.  Which of the following is a social networking site?
i) Facebook                              ii) twitter                      iii) instagram                iv) all of the above
12.  Which of the following is a search engine?
i) www.moecdc.gov.np                        ii) www.moeedu.np     iii) www.facebook.com           iv) www.google.com
13.  What is the fixed address of website called?
i) www                                     ii) URL                                    iii) webpage                 iv) Web browser

Ans: 1(iii), 2(iv), 3(iii), 4(i), 5(iv), 6(iii), 7(i), 8(iii), 9(ii), 10(ii), 11(iv), 12(iv), 13(ii)

Give very short answer to these questions.

1.      What is the full form of ATM?

The full form of ATM is Automated Teller Machine.

2.      Write any one application of scanner.

Scanner is used to convert hard copy into digital copy of a photo, text or graph.

3.      What is the working principle of router?

A router works on the principle of Internet Protocol(IP).

4.      What is blogging?

Blogging is the process of equipping a webpage with tools to facilitate the process of writing, posting and sharing content on the Internet.

5.      What is the name of first cyber law in Nepal?

The name of first cyber law in Nepal is "The Electronic Transaction and Digital Signature Act-Ordinance",

6.      What is computer code of conduct?

A computer code of conduct, also known as a code of ethics, is a set of guidelines that outlines the ethical and professional standards expected of individuals who use computers and technology.

7.      Write any one application of artificial intelligence in astronomy.

Al can be used for gaming purposes.

8.      What do you mean by intellectual property?

The definition of intellectual property rights is any and all rights associated with intangible assets owned by a person or company and protected against use without consent. 

9.      What is called the computer technology that creates artificial environment?

The computer technology that creates artificial environment is virtual reality.

10.  Give an example of cyber crime.

Cyber bullying is an example of cyber crime.

11.  Write an importance of internet.

Internet is important to access information through various websites.

12.  Write any one challenge of artificial intelligence.

One challenge of artificial intelligence is the displacement of jobs of many sectors.

13.  What is computer ethics?

Computer ethics, is a set of guidelines that outlines the ethical and professional standards expected of individuals who use computers and technology.

14.  Write the full form of www and URL.

The full form of www is world wide web and URL is Universal Resource Locator.

15.  Write the full form of ISP and VR.

The full form of ISP is Internet Service Provider and VR is Virtual Reality.

16.  Write the Full form of PIN and AI.

The full form of PIN is Personal Identification Number and AI is artificial intelligence

17.  What is a photocopier machine?

A photocopier machine is a machine that can create a copy of any printed or written document.

18.  What is a scanner?

Scanner is an ICT tool that scans any document, image or graph into digital data.

19.  What is a printer?

A machine which can print image, text or graphs by receiving command from a computer is called a printer.

20.  What is a router?

A router is an electronic device that connects computer and mobile to the internet.

21.  Define TV setup box.

The information device that contains TV tuner input and displays out on the TV is called TV setup box.

Short answer type question.

1.      ICT tools are used widely in modern society, why?

ICT tools are widely used in modern society because it has simplified the ways of communication. It has made communication easier in business, education, health, government services, etc.

2.      Write any two application of information and communication technology.

Application of Information and Communication Technology are:

a)      ICT has revolutionized the area of education. It has transformed the traditional classroom into a more dynamic and learner centered classroom.

b)      ICT has revolutionized online business. E-commerce and other online platforms enable companies to sell their products and services globally.

3.      Write the names of any two input devices of automated teller machine and mention their functions.

The names of any two input devices of automated teller machine and their functions are given below:

a)      Card reader: The card reader recognizes the data stored in the magnetic stripe located at the back of the ATM card. Account details are retrieved by the card reader and sent to the server.

b)      Keypad: The keypad is a standard input device found in most ATMs. It is used to enter the Personal Identification Number (PIN) to authenticate the user and access their accounts.

4.      Write any two health problems due to over use of social media on human health.

Two health problems due to overuse of social media on human health are:

a) People who use social media excessively are at risk of becoming victims of mental illness.

b) They often have problems like depression and insomnia.

c) Blue light emitted from mobile or computer screens inhibits the production of the hormone melatonin that controls body's "body clock". Melatonin acts to make us feel sleepy. But when its production stops, we stay up late.

5.      Write any two differences between hacking and phising.

Two differences between hacking and phising are given below:

Hacking

Phising

1. Hacking is the process of gaining unauthorized access to a computer system or network.

Phishing is a type of social engineering attack that involves tricking people into giving away their personal information.

2. Hackers can steal sensitive information, install malware, and even take control of computer systems.

Phishing attacks usually come in the form of emails, text messages, or pop-up windows that appear to be from a trusted source.

6.      Write two disadvantages of cloud computing.

1. Cost-effectiveness: Cloud computing eliminates the need for businesses to purchase and maintain their IT infrastructure, which can be very expensive.

2. Accessibility: Cloud computing allows users to access their data and applications from anywhere in the world, as long as they have an internet connection.

7.      Write any two differences between artificial intelligence and cloud computing.

Two differences between artificial intelligence and cloud computing are:

Artificial Intelligence

Cloud Computing

It is an intelligent machine which can mimic like human.

It delivers the on-demand computer resources like server, storage, etc.

It analyze the data and give result on the basis of input data.

It provide the resources to run various application including AI

 

8.      How can you use artificial intelligence in social media? Explain.

·         Social Media sites such as Face book, Twitter contain billions of user profiles, which need to be stored and managed in a very efficient way. AI can organize and manage massive amounts of data. 

·         AI can analyze lots of data to identify the latest trends, hashtags, and requirements of different users. It can be used to reform the content of the different social media platforms.

·         It can be used to write captions, headlines and even script for videos and automatically create music for such videos.

9.      Write any two hazardous tasks that can be done by robotics but unable to complete by human.

Two hazardous tasks that can be done by robotics but unable to complete by human are:

·         Robots are also used in security to monitor and patrol areas, detect and defuse explosives and other dangerous devices, fire control, rescuing.

·         Specially designed robots can withstand extreme conditions  such as crushing pressure, freezing temperatures, and perpetual darkness of the deep ocean and conduct vital research.

10.  Write any two differences between printer and scanner.

Two differences between printer and scanner are:

Printer

Scanner

1. It converts the digital data into hard copy.

It converts the text, graphic or images on hard copy into digital data.

2. Types of printers are: laser printer, inkjet printer, Dot matrix printer

Types of scanner are: photo/text scanner, bar code scanner, optical character scanner.

 

11.  Make a list of various parts of a photocopy machine.

Various parts of photocopy machine are: top cover, toner or ink tank, paper tray, copy button, adjustment button, display section, leaser beam, etc.

12.  Write any two application of virtual reality.

Two application of virtual reality are:

a)      It is used in military training. It develop mimic hazardous scenario for the soldier.

b)      In education, students can also be taken on virtual field trips such as museums, solar system tours, and the artificial feeling of going back in time to different eras.

13.  Why is ATM connected to Internet?

ATM is connected to the internet so that it can check the balance in our bank and process the transaction.

14.  We should not write PIN of debit card on it or anywhere, why?

We should not write PIN of debit card on it or anywhere because other people will know it and can steal money from our account.

15.  Why do banks install ATM in the major city areas and hospitals?

Banks install ATM in major city areas and hospitals so that we can access money during emergency.

16.  Air vents of scanner should not be blocked. Give reason.

Air vents of scanner should not be blocked otherwise the device will be overheated and may catch a fire on the device.

17.  The wireless router is installed in homes. Why?

The wireless router is installed in homes so that it will be easier to connect to all smart phones and wireless devices.

Long answer type question.

1.      How do you use ATM? Write in detail.

The ways of using ATM are as follows:

i.                    We need to insert our ATM or debit card into the card reader of ATM machine.

ii.                  The machine will ask us to enter our PIN.

iii.                We have to enter our PIN through the input keyboard attached with the machine.

iv.                Then we should select the account (saving or current).

v.                  We should select the fast cash or withdrawal on the monitor.

vi.                Then, we should select the desire amount or input the amount we want to withdraw.

vii.              The transaction will be processed.

viii.            We should collect our debit card or ATM card.

ix.                Then we should collect the cash from the dispenser of the machine. If we don't collect the cash on time, the cash will be drawn back into the machine.

x.                  We will be asked whether we want the printed copy of our transaction.

xi.                We can select the desired choice.

2.      Give an example of search engine, blogging and cloud computing services; and present your view about popularity among the users. Present your argument about the statement that the use of scientific intelligence in search engine has made it easier for searching work in two points.

An example of search engine is Google, blogging is Wordpress and cloud computing service is Datahub.

search engine is popular because it provides wide range of website and web pages to search any topic or subject matter of interest. Blogging is popular because it connects with websites. It is a platform for the promotion of business and products of a company. cloud computing is popular because it provide larger space than hard drive.

3.      Write any four uses of router.

i.                    A router is used to connect hardware devices and other servers to a network at a remote location.

ii.                  It exchanges data at a higher speed. So, it is used in both wired and wireless communication.

iii.                Routers are frequently used by internet service providers to transmit data in the form of email, websites, voice, or video files from source to destination.

iv.                Wireless routers can be used in a client-server format that permits sharing of the Internet, video, data, voice, and hardware resources by configuring a Virtual Private Network (VPN).

4.      Write the names of different parts of website and their functions.

Different parts of websites and their functions are:

i.                     Webhosting: It allows individuals and organizations to make their websites accessible on the internet.

ii.                  Web address: It is a unique address that identifies a specific website on the internet.

iii.                Homepage: The home page defines the look of the website and provides links for the user to browset he desired page of the website.

iv.                Digital Content: Digital content placed on the webpage makes the website more effective and attractive.

v.                  Navigation Structure: It helps users easily navigate and find the content they are looking for.

5.      Write the ways of creating blog account.

The ways of creating blog account are given below:

i.                    Choose a Platform: There are many free and paid platforms available including WordPress, Blogger and Squarespace.

ii.                  Choose a Domain name: A domain name is the address of our blog.

iii.                Select a Hosting provider: A hosting provider is a service that stores your blog's content and makes it available to users on the internet. There are many hosting providers available, including Blogger.com, WordPress.com, Bluehost, and SiteGround etc.

iv.                Choose a theme: A theme is the design of our blog. Most platforms offer a variety of themes to choose from, or we can purchase a custom theme from a designer.

v.                  Start writing: Once we have our platform set up, we can write high-quality, engaging content that is relevant to your audience.

vi.                Promote our blog: To attract readers, we need to promote our blog by sharing our post on social media, participate in online communities related to your niche, and engage with your readers to build a following.

6.      Write any four disadvantages of social media.

Four disadvantages of social media are:

a)      Health problems:  People who use social media excessively are at risk of becoming victims of mental illness. They often have problems like depression and insomnia.

b)      Fake accounts:  It is seen that by creating a fake account in the name of a person with any name, sending friend requests to more and more people and taking unauthorized advantage of it and spread spam and malware.

c)      Confidential information leak: The employees of any company use social media informally to publicize technical information, so that the confidential information of the company gets out.

d)      Targeted phishing attack: Targeted phishing attacks are used to steal money or confidential information.

7.      Write any four common forms of cyber crime.

Four common form of cyber crime are:

a.       Identity Theft: Identity theft is the misuse of personal inforn1ation to gain unauthorized access to financial services or steal financial assets.

b.      Cyber Terrorism: Cyber terrorism is a cybercrime committed against any person, group of persons or government to cause serious harm or extort donations.

c.       Cyberbullying: Cyberbullying refers to electronic media such as social media or using media to threaten, intimidate, harass, or humiliate someone or any other form of mental torture.

d.      Hacking: Hacking or shutting down a website or computer network through unethical meansis called hacking.

8.      Write any four salient features of cyber act in Nepal.

a.       Hacking or destroying any computer system knowingly without authority will be punished with imprisonment up to three years or a fine of two lakh rupees or both.

b.      Access to any computer system without authority will be punishable with imprisonment up to three years or a fine of two lakh rupees or both.

c.       Knowingly damaging data from computer systems will be punishable with imprisonment of up to three years or a fine of two lakh rupees or both.

d.      Five years imprisonment or one lakh for publishing illegal material through electronic means.

e.       Computer fraud is punishable with imprisonment for two years or a fine of one lakh rupees or both

9.      How is virtual reality used in education and sport sectors? Describe

Virtual reality is widely used in education and sports sectors.

a.       VR in the Education Sector: VR is used in the education sector for teaching and learning activities. Using this technology, students can also be taken on virtual field trips such as museums, solar system tours, and the artificial feeling of going back in time to different eras.

b.      VR in the Sports: Virtual reality technology can be used by coaches and players to train effectively. Players can improve their performance each time by repeatedly watching and experiencing specific game scenarios.

10.  Write any four advantages of cloud computing.

Four advantages of cloud computing are:

a.       Cost-effectiveness: Cloud computing eliminates the need for businesses to purchase and maintain their IT infrastructure, which can be very expensive.

b.      Accessibility: Cloud computing allows users to access their data and applications from anywhere in the world, as long as they have an internet connection.

c.       Reliability: Cloud computing providers typically have redundant systems and backup measures in place, which means that businesses can be confident that their data will always be available.

d.      Security: Data in cloud computing is typically more secure than on the hard drive or computer.

i) Write the names of A and B 


The name of A is printer and B is router


ii) Write each function of A and B.

The function of A is to print hardcopy output and the function of B is to send data from one network to another.

iii) Write the two types of B.

The types of B (router) are: wired and wireless.                                             

12.  How do you use a photocopier?

i.                    First, we should start photocopier. It could be off or in sleep mode.

ii.                  We should feed the paper in the paper tray.

iii.                Open the cover at the top of the photocopier.

iv.                We need to put hard copy on the photocopier. The document must be placed facing downwards.

v.                  Then we should close the cover.

vi.                We should input the number of copies to be made.

vii.              We can select the colour preference and paper size.

viii.            Finally we should press the copy or start button.

13.  How can you use a scanner? Write the necessary steps.

i.                    The scanner should be connected to the computer.

ii.                  The scanner and computer should be turned on.

iii.                The document needs to be scan should be kept in scanner. The document should be kept facing downwards.

iv.                The cover should be closed.

v.                  A powerful beam of light hits the document and creates a digital copy.

vi.                The scanned document can be emailed or saved.

14.  What is the unit of measurement of printer speed? Write the necessary step of using a printer.

The unit of printer speed is page per minute

i.                     We should ensure that the printer is connected and turned on.

ii.                    We should make sure that the printer is properly connected to the computer

iii.                  We should check that there is paper in the paper tray and that there is enough ink or toner in the cartridges.

iv.                 We need Open the document or image to be printed

v.                   We should choose the print settings by Select the desired print settings, such as the number of copies, orientation, paper size, and print quality.

vi.                 Before printing, preview the print to ensure that it looks as we intended.

vii.                Then,  the document or image should be printed by giving print command  

viii.              The printer will start printing the document or image based on the settings we selected.

ix.                 Once the printing is completed, we should collect printout from the output tray.

15.  How do you use or install a router?

i.                    We should select a place to fix the router. 

ii.                  We should plug into the power source.

iii.                The optical fiber is connected to the router.

iv.                The router gateway is arranged as given by ISPs.

v.                  The router is then connected to the gateway. We can do it by shutting down the router, unplugging cables from LAN and then reconnect to WAN. Then we should plug in the router and wait for few minutes.

vi.                We can then connect the computer to the outgoing Ethernet cables or connect mobile and laptops to the router.

vii.              We should set the Wi-Fi user name and password. 

viii.     We can update firmware of router, change Wi-Fi password.



Post a Comment

Thank you for your comment

Previous Post Next Post