A1. B A2. B A3. C
B1. An operating system is the master control program of a computer system.
B2. The Recycle Bin stores all the files deleted by a user.
Slide 2
Lesson 3 page 40
A1. A A2. B
B1. To copy and move a file. (i) Select the file and cut it. (ii) Go to D drive and paste it.
B2. To create a file, (i) Right click with the mouse. (ii) In the pop up menu, use the New option and choose a suitable file type.
Slide 3
PAGE 52
A1. C A2. A A3. B
B1. A spyware installed on a computer to spy on our activity. It send this data to people willing to pay for it.
B2. Two types of threats are: Natural threats and Human threats.
B3. To protect computer: (i) Setting up users and passwords (ii) Using secure password (iii) Use of protective software (iv) Lock you computer
Slide 4
B4. All the physical components of a computer system are called hardware.
B5. A keylogger is a small piece of hardware that is manually attached to keyboard wiring plugged in the PC's CPU.
B6. Backup of the data refers to an additional copy of valuable data.
B7. An antivirus is a software which can scan, detect and remove a virus from a computing device.
B8. To scan your computer system: Right click on My PC icon and choose 'Scan'.
Slide 5
Page 53
A1. C A2. C A3. B A4. C A5. A
B1. She should connect to the Internet and use the Update option.
B2. He should use the Control Panel and User Settings option.
B3. The four antivirus programs are: McAfee , AVG, Kasperksy, Norton etc.
B4. An application software is a general purpose software like word, excel etc. A system software is an operating system software.
Slide 6
Page 53
C1. To delete a file: (i) Click on the file to select it. (ii) Press the Delete key.
C2. To turn on/off the firewall: (i) Use start button, control panel option. (ii) Use System and Security option. (iii) Click Windows firewall option to Turn it On/ Off.
C3. We can scan the file by (i) Right click on the file icon. (ii) Use scan option.
C4. UAC or User Account Control can help in preventing unauthorised changes to our computer. Control panel> User Accounts> User Accounts Control Settings.
Slide 7
page 53
D1. The different type of viruses are: Trojan Horse, Worm, Spyware etc.
D2. To protect our computer hardware. (i) Computer must be kept clean. (ii) Computer should be kept at moderate temperature (iii) All computer should be connected to surge protectors. (iv) Must be kept clear of static electricity. (v) Aware of key loggers.