What is Data and Information?
Concept: Data and Information
Give examples of data and information.
Concept: Data and Information
Tick the appropriate circle.
Concept: Definition of a Database
What is a database?
Concept: Definition of a Database
Explain functional units of a computer system.
Concept: Computer
Solve the following puzzles.
Fill the blocks
Across
2. The tag used to create table row.
4. Tag to create a form
Down
1. The attribute used to specify the path of a linked document.
3. The tag used to display horizontal ruled line.
Concept: Introduction to HTML5
Solve the puzzle by finding words with the help of hint given below.
p | z | c | b | e | p | e | s |
r | l | o | m | v | d | l | l |
s | k | n | s | a | r | s | t |
y | e | f | a | l | s | e | d |
w | q | i | s | n | a | n | g |
v | a | r | o | s | d | y | z |
i | l | m | e | n | c | x | i |
- Boolean value.
- Keyword used in conditional if statement.
- Built-In function in JavaScript
- Function to check given value is number or not
- Keyword used to declare variable
- Function used to evaluate given expression
Concept: Introduction to HTML5
Divide the following device into appropriate categories.
Barcode reader
Concept: Components of a Computer > Input Unit (Input Devices)
Divide the following device into appropriate categories.
Keyboard
Concept: Components of a Computer > Input Unit (Input Devices)
Divide the following device into appropriate categories.
Optical character reader
Concept: Components of a Computer > Input Unit (Input Devices)
The data entry operator wants to insert.
Underline the heading
Concept: HTML Text Formatting Element
Group the following.
Concept: HTML Text Formatting Element
Group the following.
Concept: HTML Text Formatting Element
Complete the following chart. Examples of unauthorized access
Concept: Cyber Crime Examples
Fill following boxes with appropriate cyber crime name
Copyright violation of software created originally by an individual.
Concept: Cyber Crime Examples
Fill following boxes with appropriate cyber crime name
Gaining access without the user’s permission.
Concept: Cyber Crime Examples
Fill following boxes with appropriate cyber crime name
Extracting confidential information by email.
Concept: Cyber Crime Examples
Read the following and answer the question.
Rahul lost his pen drive in his college computer lab. His classmate Madhav finds it .He carries it home to return it to him the next day. When Madhav opens it he finds his favourite game. He thinks of making a duplicate copy of the game software.
- Does Madhav think ethically?
- What do you think should Madhav do?
- If he makes a duplicate copy then which cyber crime will he commit?
Concept: Cyber Crime Examples
Explain three examples related to unauthorized access?
Concept: Cyber Crime Examples