0% found this document useful (0 votes)
22 views

Work

Uploaded by

rockpunjabi42
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views

Work

Uploaded by

rockpunjabi42
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Chapter No.

What is meant by entrepreneurship?

Answer: entrepreneurship setting up a new business. The ability to the develop organized and
run business. The most important example of entrepreneurship is the starting of new business.

Explain why internet-based entrepreneurship provide rapid opportunity to grow as


compare to home base entrepreneurship?

Internet -based entrepreneurship is a business owner who conduct his business on the
internet .The interpreter shut up website to sell their goods and customer buy products.

Homebased business is a small business which is which is operated from home.

List down two advantage and two disadvantage of imitating entrepreneurship?

Advantage imitating

1. easy to refine business idea

2. Can compare the performance with original idea

Disadvantage imitating

1. They have to do a lot of work.

2. The may face disappointment and rejection.

Differentiate between traditional entrepreneurship and digital entrepreneurship?

Traditional business offer its products and services to its local customer.

Digital entrepreneurship is a process of developing ab business in which products and services


are sold an online.

Explain the process of starting a new business a new business for an intrapreneurship?

Entrepreneurship setting up a new business. The ability to the develop organized and run
business. The most important example of entrepreneurship is the starting of new business.
Chapter 5

Define cybercrime?
Cybercrime, also called computer crime, the use of a computer as an instrument to further
illegal ends, such as committing fraud, trafficking in child pornography and intellectual
property, stealing identities, or violating privacy.
What is the importance of ICT security?
Information and communication technology (ICT) security measures are necessary to
protect confidential information from unauthorized use, modification, loss or release. The
three key elements of an effective ICT security system include: Monitoring and controlling
access to confidential information.
What is meant by information privacy?
Data privacy, also called information privacy, is the aspect of information technology (IT)
that deals with the ability an organization or individual has to determine what data in a
computer system can be shared with third parties.
Describe why computer user should follow morel guideline of computer
ethics?
Computer ethics essentially protect individuals online from predation: they prevent the
breach of privacy, identify theft, and unlawful use of proprietary software, among other
events.
Why do you think cyber ethics are more important now a days?
Computer ethics essentially protect individuals online from predation: they prevent the
breach of privacy, identify theft, and unlawful use of proprietary software, among other
events.
Chapter No. 4

What is programming language? List few programming language?

A programming language is a computer language that is used by programmers to communicate


with computers. PHP, JAVA, PASCAL

How do you create are loop in Scratch?

Using a code block you can create a loop in Scratch.

List down the compliments of scratch interface?

Components of the scratch screen or the scratch program are as follows:

Block palette, script area, stage, sprite list, tools, etc.


Chapter No.3
Write down the algorithm to solve the following problems?
Making a cup of tea
 Put the teabag in a cup.
 Fill the kettle with water.
 Boil the water in the kettle.
 Pour some of the boiled water into the cup.
 Add milk to the cup.
 Add sugar to the cup.
 Stir the tea.
 Drink the tea.
Going to school
Reach_School_Algorithm
a) Wake up
b) Get ready
c) Take lunch box
d) Take bus
e) Get off the bus
f) Reach school or college
Find the area of rectangle:
Input height
Input width
Area= height* width
Print area
Differentiate between potential solution and an ideal solution?
There might be many ways to solve a problem. Analyze problems from more than one
perspective and identify all possible solutions that can help to solve that problem.
An ideal solution is a mixture in which the molecules of different species are distinguishable,
however, unlike the ideal gas, the molecules in ideal solution exert forces on one another.

Development your own conditional statements?

Conditional statements begin with "If" to introduce the hypothesis. The hypothesis is the part
that sets up the condition leading to a conclusion. The conclusion begins with "then," like this.

Example:

If the triangle is isosceles, then only two of its sides are equal in length

Write two examples of repetition from the real world?


 Time after time.
 Heart to heart.
 Boys will be boys.
Interpret conditional statement and repetition in the following situation
Situation: Ali wakes up at 7 o'clock, gets ready for school and leaves at 8 o'clock for
school. He comes back at 2 o'clock to take some rest and perform other activities. At
4 o'clock He goes to the playground for an hour. However during the rainy days he
cannot go to you playing.
 Repetition
 7 o'clock
 8 o'clock
 2 o'clock
 4 o clock
 Conditional statement
 He goes to the playground for an Hour. However, during the rainy days I cannot go to
the playground.

Chapter 2

Define Operating System. List different examples of Operating System?

Operating system is an interface between the computer user and the components of the computer. It
performs the basic tasks like:

 Coordinates among computer’s hardware and software.


 Provides security against unauthorized use.
 Loads programs into the computer’s memory for use.
 Manages the way information is stored on and retrieved from storage devices.
Example of different Operating System are Microsoft windows, MS Dos, MacOS, Linux Ubuntu
etc.

What is utility Program? Give two examples?


Utility Program perform specific tasks related to the management of computer functions, resources or
files. Examples of Utility Program are managing files, protecting password, memory management, virus
protection, system clean up, backup utility program etc.

Differentiate between a file and folder?

File:

The main function of a computer is to manage data and information. The stored data and
information on computer are called files. A file can be a text, a photo, a music track, and video etc.

Folder:

A folder is a way to organize files on the storage device. A folder can also contain other folders,
called Sub-folders.

Write down steps to create a shortcut of Microsoft Word application on Desktop?

a) Creating a shortcut of a file or folder to desktop

1) Right click on the file or folder.


2) A pop-up menu will appear.
3) Select option Send to which will further open extension menu.
4) Select the option Desktop (Create shortcut).
5) A shortcut will appear on the Desktop

B) Creating a shortcut of a program by start menu on desktop

1) Navigate to and right-click the program that you wish to create a shortcut for.
2) Click Open File Location
3) The file location window will appear. Right-Click the program icon.
4) Click Create Shortcut.
5) The Shortcut pop-up will appear, asking.
6) If you wish to place the shortcut on the desktop. Click Yes.
7) Your shortcut will be added to the desktop.

Write down the steps to restore a deleted file?

1) Double Click the Recycle bin icon on desktop. You can see deleted items in the Recycle bin.
2) Right clicking on the file, menu will appear. Select the Restore option to restore an item to its
original location.

Define application software and list three types of application software?

Software which is developed to help the user to perform specific task is called Application Software.
Various kinds of Application software are:

1) Entertainment Software
2) Productivity Software
3) Education and Reference Software
Write down the step to create a folder?

To create a folder, you should follow the Steps of creating the file then

Step 1: Select the option of the folder to create the folder.

Step 2: Enter the name of newly created folder.

Step 3: You can drag the file to the folder by clicking on file and holding it with the help of mouse.

List any 5 brushes tools available in Paint 3D?

Lots of art tools: a marker, calligraphy pen, oil brush, watercolor brush, pencil, eraser, crayon,
pixel pen, spray can, and fill tool

Write down the purpose of crop tool?

The Crop Tool is used to create a new Canvas Size and delete unwanted details of an object.

Chapter 1

Define ICT?

Information and Communication Technology, is defined as a “diverse set of technological tools and
resources that are used to create, store, manage and communicate information.”

We use ICT devices in every aspect of our life. We can find them almost everywhere, at schools, homes,
hospitals, workplace etc.

Differentiate Between data and information with example?

Data is a collection of raw facts and figure. I.e. it consist of text, image, sound etc.

Information: Processed data is called information. Information is get through output devices.

Write down ICT applications in industries?

Different ICT devices are used for production and control in the industrial sector. One of the example is
robots which are widely used in manufacturing, assembling and packing, transport, earth and space
exploration, surgery, research etc.

Compare system Software and Application Software with example?

Application Software helps the user to perform a specific task. For example, a word processing software
used to prepare documents and gaming software used to entertain.

System Software controls and manages the computer hardware. It enables the application software to
run e.g., operating system, device drivers, etc.

Differentiate between input and output devices?

Input Devices are used to enter data and instructions into the computer. Some commonly used input
devices are keyboard, mouse, microphone and scanner.
Output Devices are used to show the results of data processing. Some commonly used output devices
are display screen, printer and speaker.

You might also like