Computer Science, asked by hphp5440, 2 months ago

5.What are templates?
VI Answer the following questions:
1 Explain any two methods for copying data (3M)
2. How will you make modification in the cell contents using the edit mode? (3M)
3 Explain the working of Trojan horse? (3M)
4 What is a computer virus? Name its types. (3M)
S What do you understand by the term spyware. (3M)
6. What do you understand by hexadecimal number system (3M)
7. Briefly explain the octal number system (2M)
VIL Write any 10 keyboard shortcut keys. (10M)​

Answers

Answered by pritishah75
0

To create folder in the computer and

to copy data from the file in the data management.

Answered by jyotipilane
3

Answer:

5. The term template, when used in the context of word processing software, refers to a sample document that has already some details in place; those can (that is added/completed, removed or changed, differently from a fill-in-the-blank of the approach as in a form) either by hand or through an automated iterative process ...

1. a group of cells is by selecting the cell or cells to be moved or copied, then using the mouse to drag the selection box to a new location.

2. Click the cell that contains the data that you want to edit, and then click anywhere in the formula bar. This starts Edit mode and positions the cursor in the formula bar at the location that you clicked. Click the cell that contains the data that you want to edit, and then press F2.

3. A Trojan horse, or Trojan, is a type of malicious code or software that looks legitimate but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. A Trojan acts like a bona fide application or file to trick you.

4. A computer virus is one type of malware that inserts its virus code to multiply itself by altering the programs and applications. The computer gets infected through the replication of malicious code. The main types of computer virus are as follows: Boot Sector Virus. Direct Action Virus. Multipartite Virus. Polymorphic Virus.

5. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.

6. Hexadecimal Number System is one the type of Number Representation techniques, in which there value of base is 16. That means there are only 16 symbols or possible digit values, there are 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F. ... So, it is also a positional (or weighted) number system.

7. The octal numeral system, or oct for short, is the base-8 number system, and uses the digits 0 to 7. Octal numerals can be made from binary numerals by grouping consecutive binary digits into groups of three (starting from the right). For example, the binary representation for decimal 74 is 1001010.

8. i. Ctrl+C or Ctrl+Insert and Ctrl+X. Both Ctrl+C and Ctrl+Insert will copy highlighted text or a selected item. ...

ii. Ctrl+V or Shift+Insert. ...

iii.Ctrl+Z and Ctrl+Y. ..

iv.Ctrl+F and Ctrl+G. ...

v. Alt+Tab or Ctrl+Tab. ...

vi.Ctrl+Backspace and Ctrl+Left or Right arrow. ...

vii.Ctrl+S. ...

viii.Ctrl+Home or Ctrl+End.

ix.Ctrl+P

x.Shift+spacebar

Explanation:

Hey...here is ur answer with detailed information

Similar questions