Fill in the blanks with suitable word (s) : (5 Marks)
(a) Booting is loading _____________ into the RAM of computer.
(b) _____________is an artificial environment that is created with software and presented to the user in such a way that the user accepts it as a real environment.
(c) The instruction must be fetched from main memory, and then executed by the CPU. This cycle is called _____________cycle.
(d) A _____________ is a type of network spread over large distances such as countries and continents.
(e) A Computer on the Internet that hosts data that can be accessed by web browsers is known as ____________.
(f) _____________ Program detects a virus and eliminates it from the computer.
(g) A ____________ is a secret word or string of characters that is used for authentication of a person.
(h) A domain name ending with ______________ denotes a commercial website.
(i) A ____________ is an electronic device that receives a signal and retransmits it at a higher power level.
(j) _____________. Bat file automatically executes and it holds and runs other programs that are listed in the file.
Answer the following questions very briefly : (8 Marks)
(a) Who is a Hacker?
(b) Write the purpose of Internet Service Provider.
(c) How does a server play a key role in a computer network?
(d) Write one use of Computers in meteorological department.
(e) How can Internet be used for Job search?
(f) Write MS-DOS command to delete all files with primary names starting with 'R' and with extension 'cpp' .
(g) Write MS - DOS command to copy a file try. Dat, stored in root directory, into the "Data" directory present , in root
(h) What is a Digital signature?Answer the following questions : (12 Marks)
(a) How does Authorization help in Data security?
(b) What is a web browser?
(c) Explain in brief the Internet tool used to access someone else's computer remotely.
(d) List any three security threats to data in a computer system.
(e) How is encryption and decryption significant when carrying out any sensitive transaction?
(f) Name one utility software used to check and repair file systems and bad clusters on disk.
(g) Write MS-DOS command to clear all search - path settings and direct operating system to search only in the current directory.
(h) Distinguish between RD (rmdir) and CD (chdir) commands of MS-DOS. Answer the following questions : (20 Marks)
(a) List two advantages of networking computers.
(b) Which part of the computer is called its brain? Name its two main components.
(c) Write the importance of Config.sys file.
(d) How is an email address different from a web address? Explain in brief with the help of an example of each.
(e) Explain "Information Mining" with the help of an example.
(f) Convert binary number111101 into its decimal equivalent.
(g) Convert 76 decimal into its binary equivalent.
(h) (1) Name two cables connected to a printer.
(2) Ms. Simran has bought a new Inkjet printer. She has connected it to Her computer with the help of a USB cable and has switched the printer on. Now, when she is giving the Print command and the printer is not printing. What else is MS. Simran required to do?
(i) E - Commerce stores need to set up risk that may be involved atmosphere".
Explain in brief any one risk that may be involved in such a set-up.
(j) List 2 applications of computers in the Health care industry.