Information
and Communication Technology
Multiple
choice questions.
1.
The
full form of Wi-Fi is …………
2.
Which
of the following is not the tool of information and communication technology?
3.
Which
of the following the statements are incorrect about the precaution to be taken
while using ATM?
ii)
The PIN should be changed from time to time
iii)
It is not necessary to change the PIN from time to time
iv)
ATM card and PIN should not be given to anyone
4.
What
is called the network connecting device?
5.
What
is called for the communication Program to search content on Internet through
World Wide Web ?
6.
Which
of the following statement is incorrect about Internet service provider?
ii)
ISP provides high speed Internet service.
iii)
ISP provides the service like fishing malware to its customer.
iv)
ISP provides web hosting services.
7.
Which
of the following is the benefit of social media?
8.
What
is called shutting down a website or computer network through unethical mean?
9.
What
is called the software program that makes copy from one computer to another
computer?
10. Which of the following is an
example of artificial intelligence?
11. Which of the following is a
social networking site?
12. Which of the following is a
search engine?
13. What is the fixed address of
website called?
Ans:
1(iii), 2(iv), 3(iii), 4(i), 5(iv), 6(iii), 7(i), 8(iii), 9(ii), 10(ii),
11(iv), 12(iv), 13(ii)
Give
very short answer to these questions.
1.
What
is the full form of ATM?
The
full form of ATM is Automated Teller Machine.
2.
Write
any one application of scanner.
Scanner
is used to convert hard copy into digital copy of a photo, text or graph.
3.
What
is the working principle of router?
A
router works on the principle of Internet Protocol(IP).
4.
What
is blogging?
Blogging
is the process of equipping a webpage with tools to facilitate the process of
writing, posting and sharing content on the Internet.
5.
What
is the name of first cyber law in Nepal?
The
name of first cyber law in Nepal is "The Electronic Transaction and
Digital Signature Act-Ordinance",
6.
What
is computer code of conduct?
A
computer code of conduct, also known as a code of ethics, is a set of
guidelines that outlines the ethical and professional standards expected of
individuals who use computers and technology.
7.
Write
any one application of artificial intelligence in astronomy.
Al
can be used for gaming purposes.
8.
What
do you mean by intellectual property?
The
definition of intellectual property rights is any and all rights associated
with intangible assets owned by a person or company and protected against use
without consent.
9.
What
is called the computer technology that creates artificial environment?
The
computer technology that creates artificial environment is virtual reality.
10. Give an example of cyber crime.
Cyber
bullying is an example of cyber crime.
11. Write an importance of internet.
Internet
is important to access information through various websites.
12. Write any one challenge of
artificial intelligence.
One
challenge of artificial intelligence is the displacement of jobs of many
sectors.
13. What is computer ethics?
Computer
ethics, is a set of guidelines that outlines the ethical and professional
standards expected of individuals who use computers and technology.
14. Write the full form of www and
URL.
The
full form of www is world wide web and URL is Universal Resource Locator.
15. Write the full form of ISP and VR.
The
full form of ISP is Internet Service Provider and VR is Virtual Reality.
16. Write the Full form of PIN and AI.
The
full form of PIN is Personal Identification Number and AI is artificial
intelligence
17. What is a photocopier machine?
A
photocopier machine is a machine that can create a copy of any printed or
written document.
18. What is a scanner?
Scanner
is an ICT tool that scans any document, image or graph into digital data.
19. What is a printer?
A
machine which can print image, text or graphs by receiving command from a
computer is called a printer.
20. What is a router?
A
router is an electronic device that connects computer and mobile to the
internet.
21. Define TV setup box.
The
information device that contains TV tuner input and displays out on the TV is
called TV setup box.
Short
answer type question.
1.
ICT
tools are used widely in modern society, why?
ICT
tools are widely used in modern society because it has simplified the ways of
communication. It has made communication easier in business, education, health,
government services, etc.
2.
Write
any two application of information and communication technology.
Application
of Information and Communication Technology are:
a)
ICT
has revolutionized the area of education. It has transformed the traditional
classroom into a more dynamic and learner centered classroom.
b)
ICT
has revolutionized online business. E-commerce and other online platforms
enable companies to sell their products and services globally.
3.
Write
the names of any two input devices of automated teller machine and mention
their functions.
The
names of any two input devices of automated teller machine and their functions
are given below:
a)
Card
reader: The card reader recognizes the data stored in the magnetic stripe
located at the back of the ATM card. Account details are retrieved by the card
reader and sent to the server.
b)
Keypad:
The keypad is a standard input device found in most ATMs. It is used to enter
the Personal Identification Number (PIN) to authenticate the user and access
their accounts.
4.
Write
any two health problems due to over use of social media on human health.
Two
health problems due to overuse of social media on human health are:
a)
People who use social media excessively are at risk of becoming victims of mental
illness.
b)
They often have problems like depression and insomnia.
c)
Blue light emitted from mobile or computer screens inhibits the production of
the hormone melatonin that controls body's "body clock". Melatonin
acts to make us feel sleepy. But when its production stops, we stay up late.
5.
Write
any two differences between hacking and phising.
Two
differences between hacking and phising are given below:
Hacking |
Phising |
1. Hacking is the process of gaining unauthorized
access to a computer system or network. |
Phishing is a type of social engineering
attack that involves tricking people into giving away their personal
information. |
2. Hackers can steal sensitive
information, install malware, and even take control of computer systems. |
Phishing attacks usually come in the
form of emails, text messages, or pop-up windows that appear to be from a
trusted source. |
6.
Write
two disadvantages of cloud computing.
1.
Cost-effectiveness: Cloud computing eliminates the need for businesses to
purchase and maintain their IT infrastructure, which can be very expensive.
2.
Accessibility: Cloud computing allows users to access their data and
applications from anywhere in the world, as long as they have an internet
connection.
7.
Write
any two differences between artificial intelligence and cloud computing.
Two
differences between artificial intelligence and cloud computing are:
Artificial
Intelligence |
Cloud
Computing |
It
is an intelligent machine which can mimic like human. |
It
delivers the on-demand computer resources like server, storage, etc. |
It
analyze the data and give result on the basis of input data. |
It
provide the resources to run various application including AI |
8.
How
can you use artificial intelligence in social media? Explain.
·
Social
Media sites such as Face book, Twitter contain billions of user profiles, which
need to be stored and managed in a very efficient way. AI can organize and
manage massive amounts of data.
·
AI
can analyze lots of data to identify the latest trends, hashtags, and
requirements of different users. It can be used to reform the content of the
different social media platforms.
·
It
can be used to write captions, headlines and even script for videos and
automatically create music for such videos.
9.
Write
any two hazardous tasks that can be done by robotics but unable to complete by
human.
Two
hazardous tasks that can be done by robotics but unable to complete by human
are:
·
Robots
are also used in security to monitor and patrol areas, detect and defuse
explosives and other dangerous devices, fire control, rescuing.
·
Specially
designed robots can withstand extreme conditions such as crushing pressure, freezing
temperatures, and perpetual darkness of the deep ocean and conduct vital
research.
10. Write any two differences between
printer and scanner.
Two
differences between printer and scanner are:
Printer |
Scanner |
1. It converts the digital data into
hard copy. |
It converts the text, graphic or images
on hard copy into digital data. |
2. Types of printers are: laser printer,
inkjet printer, Dot matrix printer |
Types of scanner are: photo/text
scanner, bar code scanner, optical character scanner. |
11. Make a list of various parts of a
photocopy machine.
Various
parts of photocopy machine are: top cover, toner or ink tank, paper tray, copy
button, adjustment button, display section, leaser beam, etc.
12. Write any two application of
virtual reality.
Two
application of virtual reality are:
a)
It
is used in military training. It develop mimic hazardous scenario for the
soldier.
b)
In
education, students can also be taken on virtual field trips such as museums,
solar system tours, and the artificial feeling of going back in time to
different eras.
13. Why is ATM connected to Internet?
ATM
is connected to the internet so that it can check the balance in our bank and
process the transaction.
14. We should not write PIN of debit
card on it or anywhere, why?
We
should not write PIN of debit card on it or anywhere because other people will
know it and can steal money from our account.
15. Why do banks install ATM in the
major city areas and hospitals?
Banks
install ATM in major city areas and hospitals so that we can access money
during emergency.
16. Air vents of scanner should not
be blocked. Give reason.
Air
vents of scanner should not be blocked otherwise the device will be overheated
and may catch a fire on the device.
17. The wireless router is installed
in homes. Why?
The
wireless router is installed in homes so that it will be easier to connect to
all smart phones and wireless devices.
Long
answer type question.
1.
How
do you use ATM? Write in detail.
The
ways of using ATM are as follows:
i.
We
need to insert our ATM or debit card into the card reader of ATM machine.
ii.
The
machine will ask us to enter our PIN.
iii.
We
have to enter our PIN through the input keyboard attached with the machine.
iv.
Then
we should select the account (saving or current).
v.
We
should select the fast cash or withdrawal on the monitor.
vi.
Then,
we should select the desire amount or input the amount we want to withdraw.
vii.
The
transaction will be processed.
viii.
We
should collect our debit card or ATM card.
ix.
Then
we should collect the cash from the dispenser of the machine. If we don't
collect the cash on time, the cash will be drawn back into the machine.
x.
We
will be asked whether we want the printed copy of our transaction.
xi.
We
can select the desired choice.
2.
Give
an example of search engine, blogging and cloud computing services; and present
your view about popularity
among the users. Present your argument about the statement that the use of
scientific intelligence in search engine has made it easier for searching work
in two points.
An
example of search engine is Google, blogging is Wordpress and cloud computing
service is Datahub.
search
engine is popular because it provides wide range of website and web pages to
search any topic or subject matter of interest. Blogging is popular because it
connects with websites. It is a platform for the promotion of business and
products of a company. cloud computing is popular because it provide larger
space than hard drive.
3.
Write
any four uses of router.
i.
A
router is used to connect hardware devices and other servers to a network at a remote
location.
ii.
It
exchanges data at a higher speed. So, it is used in both wired and wireless
communication.
iii.
Routers
are frequently used by internet service providers to transmit data in the form
of email, websites, voice, or video files from source to destination.
iv.
Wireless
routers can be used in a client-server format that permits sharing of the
Internet, video, data, voice, and hardware resources by configuring a Virtual
Private Network (VPN).
4.
Write
the names of different parts of website and their functions.
Different
parts of websites and their functions are:
i.
Webhosting: It allows individuals and
organizations to make their websites accessible on the internet.
ii.
Web
address: It is a
unique address that identifies a specific website on the internet.
iii.
Homepage: The home page defines the look
of the website and provides links for the user to browset he desired page of
the website.
iv.
Digital
Content: Digital
content placed on the webpage makes the website more effective and attractive.
v.
Navigation
Structure: It
helps users easily navigate and find the content they are looking for.
5.
Write
the ways of creating blog account.
The
ways of creating blog account are given below:
i.
Choose
a Platform:
There are many free and paid platforms available including WordPress, Blogger and
Squarespace.
ii.
Choose
a Domain name: A
domain name is the address of our blog.
iii.
Select
a Hosting provider:
A hosting provider is a service that stores your blog's content and makes it
available to users on the internet. There are many hosting providers available,
including Blogger.com, WordPress.com, Bluehost, and SiteGround etc.
iv.
Choose
a theme: A theme
is the design of our blog. Most platforms offer a variety of themes to choose
from, or we can purchase a custom theme from a designer.
v.
Start
writing: Once we
have our platform set up, we can write high-quality, engaging content that is
relevant to your audience.
vi.
Promote
our blog: To
attract readers, we need to promote our blog by sharing our post on social
media, participate in online communities related to your niche, and engage with
your readers to build a following.
6.
Write
any four disadvantages of social media.
Four
disadvantages of social media are:
a)
Health
problems: People who use social media excessively are at
risk of becoming victims of mental illness. They often have problems like
depression and insomnia.
b)
Fake
accounts: It is seen that by creating a fake account in
the name of a person with any name, sending friend requests to more and more
people and taking unauthorized advantage of it and spread spam and malware.
c)
Confidential
information leak:
The employees of any company use social media informally to publicize technical
information, so that the confidential information of the company gets out.
d)
Targeted
phishing attack: Targeted
phishing attacks are used to steal money or confidential information.
7.
Write
any four common forms of cyber crime.
Four
common form of cyber crime are:
a.
Identity
Theft: Identity
theft is the misuse of personal inforn1ation to gain unauthorized access to
financial services or steal financial assets.
b.
Cyber
Terrorism: Cyber
terrorism is a cybercrime committed against any person, group of persons or
government to cause serious harm or extort donations.
c.
Cyberbullying: Cyberbullying refers to electronic
media such as social media or using media to threaten, intimidate, harass, or
humiliate someone or any other form of mental torture.
d.
Hacking: Hacking or shutting down a
website or computer network through unethical meansis called hacking.
8.
Write
any four salient features of cyber act in Nepal.
a.
Hacking
or destroying any computer system knowingly without authority will be punished
with imprisonment up to three years or a fine of two lakh rupees or both.
b.
Access
to any computer system without authority will be punishable with imprisonment
up to three years or a fine of two lakh rupees or both.
c.
Knowingly
damaging data from computer systems will be punishable with imprisonment of up
to three years or a fine of two lakh rupees or both.
d.
Five
years imprisonment or one lakh for publishing illegal material through
electronic means.
e.
Computer
fraud is punishable with imprisonment for two years or a fine of one lakh
rupees or both
9.
How
is virtual reality used in education and sport sectors? Describe
Virtual
reality is widely used in education and sports sectors.
a.
VR
in the Education Sector: VR is used in the education sector for teaching and
learning activities. Using this technology, students can also be taken on
virtual field trips such as museums, solar system tours, and the artificial
feeling of going back in time to different eras.
b.
VR
in the Sports: Virtual reality technology can be used by coaches and players to
train effectively. Players can improve their performance each time by
repeatedly watching and experiencing specific game scenarios.
10. Write any four advantages of
cloud computing.
Four
advantages of cloud computing are:
a.
Cost-effectiveness: Cloud computing eliminates the
need for businesses to purchase and maintain their IT infrastructure, which can
be very expensive.
b.
Accessibility: Cloud computing allows users to
access their data and applications from anywhere in the world, as long as they
have an internet connection.
c.
Reliability: Cloud computing providers
typically have redundant systems and backup measures in place, which means that
businesses can be confident that their data will always be available.
d.
Security: Data in cloud computing is typically
more secure than on the hard drive or computer.
i) Write the names of A and B
The
name of A is printer and B is router
ii) Write each function of A and
B.
The
function of A is to print hardcopy output and the function of B is to send data
from one network to another.
iii)
Write the two types of B.
The
types of B (router) are: wired and wireless.
12. How do you use a photocopier?
i.
First,
we should start photocopier. It could be off or in sleep mode.
ii.
We
should feed the paper in the paper tray.
iii.
Open
the cover at the top of the photocopier.
iv.
We
need to put hard copy on the photocopier. The document must be placed facing
downwards.
v.
Then
we should close the cover.
vi.
We
should input the number of copies to be made.
vii.
We
can select the colour preference and paper size.
viii.
Finally
we should press the copy or start button.
13. How can you use a scanner? Write
the necessary steps.
i.
The
scanner should be connected to the computer.
ii.
The
scanner and computer should be turned on.
iii.
The
document needs to be scan should be kept in scanner. The document should be
kept facing downwards.
iv.
The
cover should be closed.
v.
A
powerful beam of light hits the document and creates a digital copy.
vi.
The
scanned document can be emailed or saved.
14. What is the unit of measurement
of printer speed? Write the necessary step of using a printer.
The
unit of printer speed is page per minute
i.
We
should ensure that the printer is connected and turned on.
ii.
We should make sure that the printer is
properly connected to the computer
iii.
We
should check that there is paper in the paper tray and that there is enough ink
or toner in the cartridges.
iv.
We
need Open the document or image to be printed
v.
We
should choose the print settings by Select the desired print settings, such as
the number of copies, orientation, paper size, and print quality.
vi.
Before
printing, preview the print to ensure that it looks as we intended.
vii.
Then, the document or image should be printed by
giving print command
viii.
The
printer will start printing the document or image based on the settings we
selected.
ix.
Once
the printing is completed, we should collect printout from the output tray.
15. How do you use or install a
router?
i.
We
should select a place to fix the router.
ii.
We
should plug into the power source.
iii.
The
optical fiber is connected to the router.
iv.
The
router gateway is arranged as given by ISPs.
v.
The
router is then connected to the gateway. We can do it by shutting down the
router, unplugging cables from LAN and then reconnect to WAN. Then we should
plug in the router and wait for few minutes.
vi.
We
can then connect the computer to the outgoing Ethernet cables or connect mobile
and laptops to the router.
vii. We should set the Wi-Fi user name and password.
viii. We can update firmware of router, change Wi-Fi password.
Post a Comment
Thank you for your comment