You are on page 1of 6

Google Chrome

1. Define a Computer network?


7. What is Web Server?
A computer network is an  Web Server is a computer that
interconnected collection of stores web server software and a
autonomous computers and devices to website’s component files.
exchange information or share
resources. 8. What are uses of a Computer
2. What are different network Network?
architectures? i. Resource sharing : We can share
i. Peer to peer (P2P): Network in hardware devices, softwares as well as
which all computers have an equal data on a network.
status are called peer to peer networks. ii. Communication Medium : Network
Each computer can act as a server as can provide  communication between
well as a client. different computers attached to a
ii. Client-Server: In this network there network.
are specific Computers that share iii. Reduced Cost : Sharing of
data ,softwares and hardware resources resources helps in reducing hardware
(e.g. printers, modems etc.) called and software cost
servers. Other computers  that can iv. Centralized Control: We can
request for some services from server centrally control the computers
are called clients. attached to a network.
3. Explain different types of v. Central storage of data: We can
computer Networks ? save data of entire network on single
LAN WAN computer. It helps in removing
1. It stands for Local 1. It stands for Wide duplication of data as well as
Area Network Area Network maintaining integrity of data.
2. It is a network 9. How to get access to the
2. It is a network
across cities, Internet?
within a small area
countries and To get access to Internet we need
such as building.
continents. following:
3. Twisted pair cable 3. Optical fiber or ISP: ISP stands Internet Service
is preferably used for satellite are used for Provider. It is an organization which
communication. communication provides us access of Internet. For eg.
4. Example: 4. Example: Mobile BSNL, JIO,  etc.
Computer Lab phone network MODEM: MODEM stands for
4. What is Internet? Modulator/Demodulator. It is  a device
Internet stands for interconnected used to convert analog signal to digital
networks. It is interconnection of signal and vice versa. It is basically
computers all over the world. used to run internet on your
5. What is WWW? computer/device.
WWW stands for World Wide web. It is 10. What are types of Internet
a collection of protocols required for Connectivity?
transmitting documents on internet. Types of Internet Connectivity can be
6. What is a Web Browser? divided into two categories:
It is a software used to display web i. Wired Technology:
pages and web sites. Examples of  web Dial-up: It uses the telephone line to
browsers are connect to a internet connection using a
Microsoft Internet Explorer MODEM. User needs to dial a number to
Mozilla Firefox
get access to internet. They are very These packets are examined at
slow. destination. If any packet is missing or
DSL: DSL stands for Digital Subscriber damaged, a message is sent to source
Line. It  provides internet connectivity to resend the packet. This process
by transmitting data over using wires of continues until all packets are
local telephone network. We get wired completely received.
telephone and Data Transmission on These packets are then combined to
single telephone line. get original data.
Cable Internet Access:– It is 14. What is  Instant messaging?
broadband Internet service provided It is a form of communication over the
through existing cable TV networks. Internet in which users can send
ii. Wireless Technology:– messages to each other in real time.
3G 3G stands for 3rd generation of Most instant messaging softwares allow
Mobile communication.Its speed was text messages, audio chat, video calling
upto 2Mbps. It provided high speed as well as sharing of desktops
internet with support for sending and 15. List any five instant messaging
receiving large e-mails , Video softwares.
conferencing, 3D games and mobile TV. 1. Google Talk
High-Speed Downlink Packet Access 2. Yahoo! Messenger
(HSDPA) is a 3G protocol that allows 3. Skype
higher data transfer rate. 4. Windows Live Messenger
11. What is WI FI? 5. Rediff Bol
Wi Fi stands for Wireless Fidelity. It is 16. State any 03 rules and
the wireless networking technology that etiquettes to be followed while
uses radio waves to provide wireless chatting on the Internet.
high-speed Internet and network i. Messages should be short .
connections. 2. Always introduce yourself by name.
3. Always ask if the other person has
12. What is WiMax?
time to chat.
WiMax stands for Worldwide
4. In a business communication, you
Interoperability for Microwave Access.
should know exactly what you want to
It  represents fourth generation of
discuss.
wireless Internet. It allows users to
5. Don’t type messages in uppercase as
connect to the high speed wireless
it is considered rude.
Internet that can cover very large
6. Give people time to respond.
distance.
7. It’s important to properly end a
13. How is data transferred on a
conversation.
network?
17. What are the basic needs to use
The data is broken up into pieces of
instant messaging (chat) softwares.
same size called packets.
1. Instant messaging software must be
A header is added to each packet
installed on your computer or phone.
which contains information about 
2.You must have an account on that
source  as well as destination of data
software.
and its  location with respect to  other
3. You should have list of contacts that
packets.
are available for chat.
Each packet travels between multiple
4. If you don’t have any contacts, you
computers until it finds its destination.
can add contacts by sending an
All these packets may not take the
invitation to others whom you want to
same route.
communicate.
18 What is a blog. customers can buy or sell goods/things
Blog is a website where you can share over the Internet.
information related to a specific topic. Customers must have an active internet
19 Explain features of a blog. connection for viewing goods or
i. It is similar to an online personal services offered by a seller.
diary Customers can pay online using a
ii. It is simple to use. credit, debit card or by internet
iii. It can be used to convey messages banking.
about events, announcements, news, 26. How is Online shopping useful?
reviews etc. Customer can place orders anywhere
iv. We need an active internet anytime.
connection to make changes. Customer does not need to move out
20  List any 5 websites that provide to visit stores.
blog service. There are more choices available.
1.WordPress.com Products or services that is not
2.blogger.com available in the local market are
3.wix.com available online.
4.weebly.com 27. List any five websites that allow
5.blogsome.com online transactions.
21 Difference between web page 1.IRCTC: an online portal for booking
and website. flight and train tickets.
Web page is a document that supports 2.Flipkart: an online shopping portal for
hypertext. buying consumer products.
Website is a collection of interconnected 3.EBay: an online portal for buying and
web pages. selling goods.
22 Explain the purpose of an offline 4.Redbus, an online portal for booking
blog editor. bus tickets.
Offline blog editor is a tool that can be 5.Paytm, an online portal for recharge
used to create blogs without using and paying bills.
internet. We can create blogs offline on 28. List any three payment tools to
our computer and publish them use online transactions.
whenever internet connectivity is PayTM: It is very popular application
available. using which you can make payment for
23 List any five offline blog editors. goods,  services as well as international
1.Qumana transactions. It has helped many shops
2.Windows Live Writer to go online. It provides its wallet that
3.Blogdesk can be linked to your bank account.
4.MarsEdit ii. Google Pay: Google Pay is a mobile
5.BlogJet payment app that does not have a
6.Blogo wallet facility. It allows you to make
24 What is an online transaction? bank to bank transfers for free.
Online transaction is the method of iii.Bharat Interface for Money
transferring money through internet in (BHIM): It  is a payment app that lets
secure manner. you make simple, easy and quick
25 What is the purpose of online transactions using Unified Payments
transaction? Interface (UPI). You can make direct
Online transactions can be used for bank payments to anyone using their
online shopping. Online shopping is a UPI ID or scanning their QR with the
form of electronic commerce where
BHIM app. You can also request money Email Spoofing : It is the creation of
through the app from a UPI ID. email messages with a fake sender
29. What is Internet Security? address.
Internet security is a branch of Pharming: It is the process of
computer science that establishes rules redirecting traffic of a website to
and measures against attacks over the another website by using illegal
Internet. methods. 
30. How can we remain secure on Char Spoofing: This is also known as
internet? script spoofing. In this case, similar-
i. Use strong passwords: a looking characters can be used for
combination of alphanumeric and security attacks.
special characters should be used for 32. Write about basic safety rules
creating a password. to follow at workplace
ii Backup your data: Always keep a.Your personal safety is your
copies of personal data in CD or pen responsibility.
drive b.Dress properly (Cloths as well as
iii. Do not share personal shoes) .
information: Don’t share your c.Keep work area neat and tidy.
personal information like d.Follow the rules. 
name, age, address, school etc on e.Report workplace accidents.
unknown websites. f.Know and follow emergency
iv. Secure transactions: If you are procedures.
making online transactions you should g.Don’t operate tools or machinery that
be careful while entering credit card or you are not trained for.
debit card details h.Avoid drugs and alcohol at work.
v. Install antivirus : Computers must i.Take breaks appropriately.
have antivirus to save your computer 33. How can you provide fire safety
from virus and other threats data from at workplace?
your computer. a.Don’t overload electrical circuits.
vi. Do not respond to e-mails from b.Turn off electrical equipments at the
unknown users . end of day.
vii. Clear browser cookies c.All kind of rubbish must be cleared.
frequently: Cookies are text files d.Welding operations should be done in
created on your computer to monitor protected areas.
your activities on websites. e.Know the fire safety plan and
viii. Keep the operating system and evacuation
software applications upto date f.Ensure that hazardous materials are
ix. Install firewall: Firewall is properly stored and protected.
collection of software and hardware to g. Know how use fire extinguishers.
allow or block network traffic on a 34. What are common causes of
computer. falls and slips at workplace ?
x. Never install software from a.Wet or oily surfaces.
unknown sources b.Occasional spills.
31 Explain different kinds of online c.Weather hazards.
threats. d.Loose rugs or mats.
Phishing: It is a method of trying to e.Flooring or other walking surfaces
get personal information by using a that do not have same degree of
fake website. traction in all areas.
35. How can we avoid Falls and incorrectly, accidental deletion of data,
Slips? forgetting an appointment etc.
a.Cleaning of all spills immediately. 41.How can we handle accidents?
b.Marking of spills and wet areas. a.Take control of situation.
c.Mopping or sweeping debris from b.Provide First aid .
floors. c. Call for emergency services
d.Removing obstacles from walkways. ( Ambulance, Fire Brigade, Police)
e.Always closing file cabinet or drawers. d.Deny access to people who don’t need
f.Covering cables . to be on the scene.
g.Proper light in working area. e.Identify people and conditions at the
h.Replace fuse light bulbs and faulty scene. The people are witnesses to
switches. what happened. Tell someone to note
36. What are various Electrical down their names. If you’re alone, try
Safety Rules? to notice who’s there.
a.Avoid water while working with f.Preserve physical evidence. Evidence
electricity. should not be altered or removed.
b.Never use equipment with damaged g.Evaluate how bad the loss is, how bad
wires or plugs. it could have been, and whether
c.Always use insulated tools. additional investigation resources are
d. Always use rubber gloves and needed.
goggles. h.Owners and upper management must
e.Never try to repair electrical be immediately notified.
equipment. 42. What are different types of
f.N ever use an aluminum or steel Emergencies?
ladder. a.Fire or explosions
g.Turn off main switch if some electrical b.Medical emergencies
repair is there. c.Severe weather
37.What is First Aid? d.Earthquakes
It is the basic medical care to someone e.Major power failures
experiencing a sudden injury or illness. f.Hazardous material spills
38. What is an Accident? 43.How can we handle
An unpleasant event that happens emergencies?
unexpectedly and causes damage, a.Take a deep breath.
injury or death. b.Tell yourself you can handle the
39. What is Emergency? situation.
An emergency is a situation that may c.Protect yourself and the injured
be a risk to health, life, property, or person from fire, explosions or other
environment.  hazards.
40. Explain types of Accidents. d.Try to look at the situation as a
i.Physical: Physical accidents happen whole.
due to collisions, falls, touching What is the most serious problem and
something sharp or hot, accidentally what do you need to do first?
kicking the leg of a chair while walking, Treat the most life-threatening
accidentally tipping over a glass of problems like bleeding or shock first.
water, contacting electricity. If you think the person has a spinal
ii.Non-Physical: Non-physical injury, do not move him or her unless
accidents include unintentionally the danger is great.
revealing a secret , saying something Check for broken bones and other
injuries.
44 .What are hazards and sources 46.What do you mean by healthy
of hazards? living?
A hazard is something that can harm a.Eat healthy and nutritious food.
individuals Vegetarian food is considered better for
Sources of hazards are: healthy body . So your meal should
a.Biological.Biological hazards include have fruits, vegetables, whole grains
viruses, bacteria, insects, animals etc., and low-fat milk products in excess.
that can cause make you sick. b.Avoid junk food and cold drinks.
b.Chemical. These are substances that c.Avoid Tobacco and Alcohol.
can cause harm. They can cause skin d.Do exercise, Yoga or play some
irritation, respiratory system irritation, outdoor game on regular basis.Get
blindness etc. enough sleep.
c.Physical. Physical hazards are e.Adopt a hobby.
environmental factors that can harm a f.Make good friends and spend some
person without touching them, time with them.
including heights, noise, radiation and
pressure.
d.Safety. These hazards create unsafe
working conditions. For example,
exposed wires or a damaged carpet
e.Ergonomic. These hazards occur due
to physical factors that result in
musculoskeletal injuries. For example, a
poor workstation setup in an office,
poor posture and manual handling.
f.Psychosocial. Psychosocial hazards
cause adverse effect on an employee’s
mental health. For example
harassment, victimisation, stress and
violence.
45. Explain General Evacuation
Procedures.
a.Activate the fire alarm.
b.Call 112 immediately .
c.Exit the building using emergency
maps.
d.Take injured  individuals to a secure
area .
e.Ensure that everyone is out of the
building.
f.Do not use the elevator or lift.
g.Use a fire extinguisher if it is safe to
do so .
h.Report hazardous conditions.
i.Stay low if confronted with smoke.
Check closed doors for heat before
opening.
j.Stay away from the building until it is
safe to return.

You might also like