Work
Work
Answer: entrepreneurship setting up a new business. The ability to the develop organized and
run business. The most important example of entrepreneurship is the starting of new business.
Internet -based entrepreneurship is a business owner who conduct his business on the
internet .The interpreter shut up website to sell their goods and customer buy products.
Advantage imitating
Disadvantage imitating
Traditional business offer its products and services to its local customer.
Explain the process of starting a new business a new business for an intrapreneurship?
Entrepreneurship setting up a new business. The ability to the develop organized and run
business. The most important example of entrepreneurship is the starting of new business.
Chapter 5
Define cybercrime?
Cybercrime, also called computer crime, the use of a computer as an instrument to further
illegal ends, such as committing fraud, trafficking in child pornography and intellectual
property, stealing identities, or violating privacy.
What is the importance of ICT security?
Information and communication technology (ICT) security measures are necessary to
protect confidential information from unauthorized use, modification, loss or release. The
three key elements of an effective ICT security system include: Monitoring and controlling
access to confidential information.
What is meant by information privacy?
Data privacy, also called information privacy, is the aspect of information technology (IT)
that deals with the ability an organization or individual has to determine what data in a
computer system can be shared with third parties.
Describe why computer user should follow morel guideline of computer
ethics?
Computer ethics essentially protect individuals online from predation: they prevent the
breach of privacy, identify theft, and unlawful use of proprietary software, among other
events.
Why do you think cyber ethics are more important now a days?
Computer ethics essentially protect individuals online from predation: they prevent the
breach of privacy, identify theft, and unlawful use of proprietary software, among other
events.
Chapter No. 4
Conditional statements begin with "If" to introduce the hypothesis. The hypothesis is the part
that sets up the condition leading to a conclusion. The conclusion begins with "then," like this.
Example:
If the triangle is isosceles, then only two of its sides are equal in length
Chapter 2
Operating system is an interface between the computer user and the components of the computer. It
performs the basic tasks like:
File:
The main function of a computer is to manage data and information. The stored data and
information on computer are called files. A file can be a text, a photo, a music track, and video etc.
Folder:
A folder is a way to organize files on the storage device. A folder can also contain other folders,
called Sub-folders.
1) Navigate to and right-click the program that you wish to create a shortcut for.
2) Click Open File Location
3) The file location window will appear. Right-Click the program icon.
4) Click Create Shortcut.
5) The Shortcut pop-up will appear, asking.
6) If you wish to place the shortcut on the desktop. Click Yes.
7) Your shortcut will be added to the desktop.
1) Double Click the Recycle bin icon on desktop. You can see deleted items in the Recycle bin.
2) Right clicking on the file, menu will appear. Select the Restore option to restore an item to its
original location.
Software which is developed to help the user to perform specific task is called Application Software.
Various kinds of Application software are:
1) Entertainment Software
2) Productivity Software
3) Education and Reference Software
Write down the step to create a folder?
To create a folder, you should follow the Steps of creating the file then
Step 3: You can drag the file to the folder by clicking on file and holding it with the help of mouse.
Lots of art tools: a marker, calligraphy pen, oil brush, watercolor brush, pencil, eraser, crayon,
pixel pen, spray can, and fill tool
The Crop Tool is used to create a new Canvas Size and delete unwanted details of an object.
Chapter 1
Define ICT?
Information and Communication Technology, is defined as a “diverse set of technological tools and
resources that are used to create, store, manage and communicate information.”
We use ICT devices in every aspect of our life. We can find them almost everywhere, at schools, homes,
hospitals, workplace etc.
Data is a collection of raw facts and figure. I.e. it consist of text, image, sound etc.
Information: Processed data is called information. Information is get through output devices.
Different ICT devices are used for production and control in the industrial sector. One of the example is
robots which are widely used in manufacturing, assembling and packing, transport, earth and space
exploration, surgery, research etc.
Application Software helps the user to perform a specific task. For example, a word processing software
used to prepare documents and gaming software used to entertain.
System Software controls and manages the computer hardware. It enables the application software to
run e.g., operating system, device drivers, etc.
Input Devices are used to enter data and instructions into the computer. Some commonly used input
devices are keyboard, mouse, microphone and scanner.
Output Devices are used to show the results of data processing. Some commonly used output devices
are display screen, printer and speaker.