Computer Science, asked by prakashwankhede31930, 4 months ago

QI. Fill in the blanks. 5 marks.

1. _____________the device used to enter data directly into the computer.

2. ______________applications are used for drawing, designing and for simulating and

testing the designs.

3. ____________ refers to management of or by oneself; taking of responsibility for one's

own behaviour and well-being.

4. The numeric keypad has ___ columns and ______ rows.

5. A touch typist knows the location on the keyboard through _______ memory.

QII. Short answers ( 1 mark each) 8 marks.

1. Name any 2 precautions are required to ensure that ICT use is safe?

2. Write two functions of primary memory.

3. Define :- BPO

4. Name the machines are used to give the digital impression of internal organs of the body

by using strong magnetic fields and radio waves.

5. Name the Factors that help in building self confidence. Mention them

6. Name the four main sub-sectors in the IT-BPM industry

7. State whether the statements given below are True or False:-

a. The keys ‘F’ and ‘J’ are known as guide keys.

b. Pressing the Home Key, moves the cursor to the first character in the document

8. Name the Factors that help in building self confidence.

Q III. Long answers. (3 marks each) 12marks

1. What is the difference between data and information??

2. List any 5 websites of the Indian government which provide IT enabled services to the

people.

3. Discuss the any 4 types of keys available on a computer keyboard.

4. Why the use of various typing software is common now-a-days? can anyone
solve this paper​

Answers

Answered by princesbeamarasigan
3

Answer:

Ql

1.Input device

2.GIC

3.Self management

4. 4 columns and 5 rows

5.Muscle memory

Answered by poornima0282
2

Answer:

i)

1) Input device

2) GIC

3) Self management

4) 4 columns and 5 rows

5) Muscle memory

ii)

1) Precautions required to use safe ICT are: 1. Install protective software : Install Antivirus which can help to reduce any damage to the data present in the computer and keep it updated.

2)Primary memory is computer memory that a processor or computer accesses first or directly. It allows a processor to access running execution applications and services that are temporarily stored in a specific memory location. Primary memory is also known as primary storage or main memory

3)Business process outsourcing (BPO) is a method of subcontracting various business-related operations to third-party vendors.

4)ECG machine is used to give the digital impression of internal organs of the body.

5)Childhood. Your childhood is one of the main contributing influences to your self-confidence. ...

Society. ...

Media. ...

Spirituality. ...

Friends and Family. ...

Relationships. ...

Work Environment. ...

Health.

Nov 23, 2018

6)There are four sub-sectors within the IT-BPM Industry, as shown below, get access to latest information on IT-BPM industry sectors.

IT Services. IT Services (ITS) sub-sector involves a range of engagement types that... ...

Business Process Managment. ...

Software Products. ...

Engineering Research and Development.

7) A) False

B)False

8)Factors that affect your self-confidence

Childhood. Your childhood is one of the main contributing influences to your self-confidence. ...

Society. The pressure of society is a main contributor of low self-confidence. ...

Media. ...

Spirituality. ...

Friends and Family. ...

Relationships. ...

Work Environment. ...

Health.

iii)

1) Main Differences Between Data and Information

Data is a collection of facts. Information is how you understand those facts in context. Data is unorganized, while information is structured or organized. ... Data generally includes the raw forms of numbers, statements, and characters.

2)The five Indian government websites that provide IT-enabled services are as follows:

The website for Adhaar card based facilities- uidai.gov.in.

The website related to password issues- passportindia.gov.in.

The website associated with Income tax filings- passportindia.gov.in.

The website of India post- indiapost.gov.in.

3) The keys on your keyboard can be divided into several groups based on function:

Typing (alphanumeric) keys. These keys include the same letter, number, punctuation, and symbol keys found on a traditional typewriter.

Control keys. ...

Function keys. ...

Navigation keys. ...

Numeric keypad.

4)Nowadays there are users of various typing software ,the main reason behind this is because of the situations where people are getting their confidential credentials stolen when they type anything on the keyboard because those keystrokes are recorded and afterward that is used for hacking

Similar questions