UNIT – 3
ICT Skills
Class X
Q: What is Information and Communication Technology (ICT) skills?
A: ICT skills involve using digital tools and technologies to access, manage,
create, and share information effectively.
Q. What is the full form of BIOS and What is its use?
A. The full form of "BIOS" is Basic Input/Output System. It is a firmware or
software that is built into a computer's motherboard. BIOS provides the
necessary instructions for the computer to boot up and initialize hardware
components like the CPU, memory, and storage devices, before the
operating system takes over.
Q Write the shortcut keys for
a. UNDO
b. REDO
c. Select All
d. CUT
e. COPY
f. PASTE
g. PRINT
h. SAVE
Ans
A. CTRL + Z
B. CTRL + Y
C. CTRL + A
D. CTRL + X
E. CTRL + C
F. CTRL + V
G. CTRL + P
H. CTRL + S
Q: Give an example of hardware and software in ICT.
A: Hardware example: Computer monitor, Keyboard, RAM, Hard Disk etc
Software example: Microsoft Word, Antivirus Software.
Q: Why is it important to use strong and secure passwords?
A: Strong passwords protect personal information and prevent
unauthorized access to accounts.
Q: Write some basic tips for taking care of computers. Answer in short
Ans. Some basic tips for taking care of computers:
1. Keep it Clean: Regularly clean your computer's exterior and keyboard
to prevent dust buildup.
2. Install Updates: Keep your operating system, software, and antivirus
programs up to date.
3. Backup Data: Regularly back up important files to an external drive or
cloud storage.
4. Manage Storage: Keep your hard drive from filling up; delete
unnecessary files and programs.
5. Use Antivirus: Install reputable antivirus software and perform regular
scans.
6. Avoid Liquid Exposure: Keep liquids away from your computer to
prevent damage.
7. Proper Shutdown: Always shut down or restart your computer using
proper procedures.
8. Secure Wi-Fi: Use strong passwords and encryption to secure your
Wi-Fi network.
Q how will you prevent others from using computers?
A. Preventing others from using computers would generally involve
implementing security measures and access controls. Here are some steps
you could take to restrict access:
1. Password Protection: Set strong passwords for user accounts on the
computer. This would prevent unauthorized users from logging in.
2. User Accounts: Create separate user accounts for different users.
This allows you to control who can access the computer and what
level of access they have.
3. Screen Lock: Use a strong screen lock, like a password, PIN, or
fingerprint, to prevent unauthorized physical access to the computer.
4. Firewall and Security Software: Install firewall and security software
to protect against external threats and unauthorized access.
5. Network Security: Secure your network to prevent unauthorized
access to the computer from remote locations.
Q: How can you stay safe while browsing the internet?
A: Stay safe by using strong passwords, avoiding suspicious websites, and
not sharing personal information online.
Q: What is the difference between data and information in ICT?
A: Data refers to raw facts, while information is processed data that
provides meaning and context.
Q: Why is it essential to regularly back up your data?
A: Regular data backups prevent loss of important information in case of
hardware failure or data corruption.
Q: What is the purpose of a web browser?
A: A web browser is used to access and view websites and other online
content.
Q: Define a computer virus.
A: A computer virus is a malicious software program that can replicate itself
and spread to other computers, causing harm to data and software.
Q: What is the difference between RAM and ROM?
A: RAM (Random Access Memory) is volatile memory used for temporary
storage, while ROM (Read-Only Memory) contains permanent instructions
that the computer uses during startup.
Q: What is the role of an operating system?
A: An operating system manages computer hardware and software
resources, provides user interfaces, and controls system operations.
Q: Explain the concept of data backup.
A: Data backup involves creating copies of important files to prevent data
loss in case of hardware failures, accidental deletions, or other issues.
Q: Why is it important to follow ethical behaviour online?
A: Following ethical behaviour online ensures respect for others' rights,
privacy, and intellectual property, and helps maintain a positive digital
environment.