Define Information Technology (IT).
IT encompasses all the technologies used to create, collect, process, protect, and store information. It refers to hardware, software, and computer networks.
Differentiate between data and information with an example.
Data is a raw, unorganized fact (e.g., "Umbar, 1234, Xyz"). Information is processed data that is meaningful and useful (e.g., "Xyz, 1234, MG Road, Umbar").
List the five basic functions of a computer.
1. It accepts data or instructions (Input). 2. It stores data. 3. It processes data. 4. It gives results (Output). 5. It controls all operations inside the computer.
What is the function of the Control Unit (CU) in a CPU?
The Control Unit (CU) is the backbone of computers. It is responsible for coordinating tasks between all components (input, process, output) and controlling the flow of data and instructions within the CPU.
Differentiate between RAM and ROM.
RAM is volatile (loses data on power off) and is read/write memory. ROM is non-volatile (retains data) and is read-only memory.
Convert 2 Gigabytes into Megabytes.
1 GB = 1024 MB. Therefore, 2 GB = 2 * 1024 MB = 2048 MB.
Define software and distinguish between system software and application software.
Software is a set of instructions or programs that tell the computer what to do. System Software (e.g., OS) helps the computer function. Application Software (e.g., Word Processor) helps the user perform a specific task.
What is Open Source Software? Give one advantage.
Open Source Software is software whose source code is released publicly for anyone to use, copy, modify, and distribute. Advantage: It is often free of cost and has a large community for support and improvement.
What is an operating system? List any two functions.
An Operating System is a software that acts as an interface between the user and the computer hardware. Functions: 1. Booting the computer. 2. Managing memory and hardware resources.
Give two key differences between the Windows and Linux operating systems.
Windows is Closed Source and usually paid. Linux is Open Source and free. Windows is less secure and prone to viruses, while Linux is more secure and virus-free.
What is the use of the pwd and cd commands in Linux?
pwd: Prints the path of the current working directory. cd: Changes the current directory to a specified one.
Define a computer network. List its two advantages.
A computer network is a group of interconnected computers/devices to enable communication and resource sharing. Advantages: 1. Resource sharing (printers, files). 2. Enhanced communication.
Differentiate between LAN and WAN (any two points).
LAN covers a small geographical area (e.g., building) and has high speed, low cost. WAN covers a large geographical area (e.g., country) and has lower speed, high cost.
What is the Internet?
The Internet is a massive global network of networks, connecting millions of computers worldwide. It is the highway for information.
Explain the term 'protocol'. Give two examples.
A protocol is a set of rules that governs communication between computers on a network. Examples: HTTP, FTP, TCP/IP.
What are IT Enabled Services (ITES)? Give two examples.
ITES (IT Enabled Services) are services that exploit Information Technology to improve the efficiency of an organization. Examples: Call Centers, Medical Transcription, Data Centers.
List two career opportunities in the IT field and briefly describe one.
1. Web Designer, 2. Database Manager. Web Designer: Creates the layout, look, and feel of a website using languages like HTML and CSS.
What is Green Computing?
Green Computing is the study and practice of designing, manufacturing, using, and disposing of computers and their resources in an environmentally sustainable way.
Explain the concept of Cloud Computing in one sentence.
Cloud Computing is the delivery of computing services—including servers, storage, databases, networking, software—over the Internet ("the cloud").
What is the significance of the IT Act, 2000?
The IT Act, 2000 provides legal recognition for electronic transactions and e-commerce, and helps deal with cybercrimes.
Name any two input and two output devices.
Input Devices: Keyboard, Mouse. Output Devices: Monitor, Printer.
Why is the CPU called the brain of the computer?
The CPU is called the brain because it processes all instructions and calculations, controlling the other components of the computer.
What is the role of the ALU?
The ALU (Arithmetic and Logic Unit) performs all arithmetic calculations (addition, subtraction, etc.) and logical operations (comparisons).
Why is secondary memory required?
Secondary memory is required to store data and programs permanently, even when the computer is turned off, as primary memory (RAM) is volatile.
What is the difference between a compiler and an interpreter?
A compiler translates the entire source code into machine code at once, while an interpreter translates and executes the code line by line.
What is a web browser? Name any two popular web browsers.
A web browser is a software application used to access and view websites on the Internet. Examples: Google Chrome, Mozilla Firefox.
What is the function of a modem in a network?
A modem (Modulator-Demodulator) converts digital data from a computer into an analog signal for transmission over telephone lines and converts incoming analog signals back to digital data.
Define the term 'Digital Signature'.
A Digital Signature is an electronic, encrypted signature used to authenticate the identity of the sender and ensure that the original content of the message/document has not been altered.
What is plagiarism in the context of cyber ethics?
Plagiarism is the practice of presenting someone else's work or ideas as your own without their consent or proper acknowledgment.
What care should be taken by the user while doing online activities?
Use strong passwords, don't share personal information with strangers, verify website authenticity, avoid opening suspicious emails/attachments, and keep software updated.