Class 10 ( Chapter Wise Questions)

Unit 1.1: Networking and Telecommunication

  1. What is a computer network? How is it useful?
    A computer network is a system that connects multiple computers and other devices to share resources, information, and data. It is useful for:
    • Sharing files, printers, and other hardware.
    • Enabling communication via emails, chats, and video calls.
    • Supporting collaboration through shared applications.
    • Providing centralized data storage and management.
  2. List any four advantages of a Computer Network.
    • Resource Sharing: Devices like printers and scanners can be shared across the network.
    • File Sharing: Files can be shared among connected computers.
    • Communication: Facilitates communication via emails and instant messaging.
    • Cost Efficiency: Reduces costs by sharing resources.
  3. Mention differences between client/server architecture and peer-to-peer architecture of the network.
    • Client/Server Architecture:
      • Centralized control with a dedicated server.
      • Suitable for large networks.
      • Higher cost of setup.
    • Peer-to-Peer Architecture:
      • No dedicated server; all computers are equal.
      • Suitable for small networks.
      • Low cost of setup.
  4. List out three disadvantages of a computer network.
    • Security Risks: Data is vulnerable to unauthorized access.
    • Maintenance Cost: Requires regular updates and maintenance.
    • Dependency: If the network fails, all connected systems are affected.
  5. Define bandwidth. How is it measured?
    Bandwidth is the maximum amount of data transmitted over a network in a given amount of time. It is measured in bits per second (bps), such as Mbps (megabits per second) or Gbps (gigabits per second).
  6. Differentiate between LAN and WAN.
    • LAN (Local Area Network):
      • Covers a small geographical area, like a home or office.
      • High speed and low cost.
    • WAN (Wide Area Network):
      • Covers a large geographical area, like cities or countries.
      • Lower speed and higher cost.
  7. "Internet is called network of network." Justify in your own language.
    The Internet is referred to as a "network of networks" because it connects millions of private, public, academic, business, and government networks worldwide, enabling seamless communication and data exchange.
  8. Explain protocol with its examples.
    A protocol is a set of rules governing communication between devices in a network. Examples:
    • HTTP: For accessing websites.
    • FTP: For file transfers.
    • TCP/IP: For reliable data transmission.
  9. What are three models of Network? Write about client/server model of Network.
    • Peer-to-Peer Model: All computers are equal.
    • Client/Server Model: Centralized control through a server.
    • Hybrid Model: Combines client/server and peer-to-peer features.
      In the client/server model, the server provides services like file sharing and database management, while clients request these services.
  10. What is network topology? Write about star topology with a suitable diagram.
    Network topology refers to the arrangement of nodes in a network.
    • Star Topology: All devices are connected to a central hub.
      • Advantages: Easy to install, manage, and troubleshoot.
      • Disadvantages: If the central hub fails, the entire network is affected.
  11. Draw and briefly explain about client-server network.
    A client-server network consists of a central server providing resources and services to multiple client computers. Clients send requests, and the server responds. It ensures efficient resource management.
  12. What is communication media? Differentiate between bounded and unbounded media.
    Communication media is the medium through which data is transmitted in a network.
    • Bounded Media: Physical media like twisted-pair cables and fiber optics.
    • Unbounded Media: Wireless media like radio waves and microwaves.
  13. Give reasons that "Computer network reduces the cost of operation."
    • Shared resources reduce the need for multiple devices.
    • Centralized management minimizes operational costs.
    • Communication via the network reduces travel expenses.

Unit 1.2: Ethical and Social Issues in ICT

  1. Define Information and Communication Technology.
    Information and Communication Technology (ICT) refers to technologies that provide access to information and facilitate communication. It includes tools like computers, the internet, mobile devices, and software applications used for storing, retrieving, and sharing information.
  2. What is computer ethics? Write any two of them.
    Computer ethics refers to moral principles that guide the use of computers and information systems responsibly.
    • Avoiding Harm: Do not use technology to harm others.
    • Respecting Privacy: Do not access or share others’ private information without permission.
  3. Why is ethics important in information technology?
    Ethics in IT ensures responsible use of technology, prevents misuse, and protects users' privacy and security. It fosters trust and avoids legal or social conflicts.
  4. Write any four commandments of computer ethics.
    • Do not use a computer to harm others.
    • Do not interfere with others’ computer work.
    • Do not use a computer to steal.
    • Do not use or copy software for which you have not paid.
  5. What is hacking?
    Hacking is the unauthorized access or manipulation of a computer system, network, or data.
  6. What is the purpose of hacking?
    • To exploit vulnerabilities for malicious purposes.
    • To test security systems ethically (ethical hacking).
    • To steal or alter sensitive information.
  7. Define digital citizenship.
    Digital citizenship refers to responsible and ethical behavior when using digital technologies, including respecting others, protecting privacy, and following rules.
  8. What is a digital footprint?
    A digital footprint is the trail of data a person leaves online through activities like social media posts, emails, or browsing history.
  9. Write some of the examples of digital footprint.
    • Social media posts and comments.
    • Search engine queries.
    • Online shopping history.
    • Shared photos or videos.
  10. Define cyberbullying with any four examples.
    Cyberbullying is the use of digital platforms to harass, threaten, or harm others.
    Examples:
    • Sending abusive messages or emails.
    • Spreading rumors online.
    • Posting humiliating photos or videos.
    • Impersonating someone to harm their reputation.
  11. Share your thoughts about cyberbullying.
    Cyberbullying can severely impact victims emotionally and mentally. It is important to raise awareness, educate people about responsible online behavior, and implement strict laws to prevent it.
  12. Briefly explain cyber law.
    Cyber law refers to laws and regulations that govern the use of the internet and digital platforms, ensuring security and ethical behavior online.
  13. What is cybercrime?
    Cybercrime involves illegal activities carried out using computers or the internet, such as hacking, identity theft, and online fraud.
  14. Define IT Policy 2072 in short.
    IT Policy 2072 of Nepal outlines strategies for the development and regulation of information technology in the country, focusing on digital literacy, infrastructure, and cybersecurity.
  15. What is Electronic Transaction Act?
    The Electronic Transaction Act regulates electronic transactions, digital signatures, and data security, ensuring safe and legal online activities.
  16. Write any four opportunities and threats in social media.
    • Opportunities:
      • Enhances connectivity and communication.
      • Facilitates marketing and branding.
      • Provides a platform for learning and sharing ideas.
      • Promotes social awareness.
    • Threats:
      • Cyberbullying and harassment.
      • Privacy invasion and identity theft.
      • Spread of misinformation.
      • Addiction and reduced productivity.

Unit 1.3: Computer Security

  1. What is computer security?
    Computer security refers to protecting computer systems and data from unauthorized access, damage, or theft. It ensures confidentiality, integrity, and availability of information.
  2. Define hardware security.
    Hardware security involves safeguarding physical devices like computers, servers, and networks from theft, damage, or unauthorized access.
  3. What is data and information security?
    Data and information security protect sensitive information from unauthorized access, modification, or deletion. It includes measures like encryption, passwords, and firewalls.
  4. List some points about how we can protect our data.
    • Use strong passwords and update them regularly.
    • Install and update antivirus software.
    • Avoid opening suspicious emails or links.
    • Backup data regularly.
    • Use firewalls for network protection.
  5. What is a backup? Why is backup vital to a computer security system?
    A backup is a copy of data stored separately to recover in case of data loss or corruption. Backups are vital for restoring important data after hardware failure, malware attacks, or accidental deletion.
  6. Write down any six possible threats to computer security.
    • Viruses and malware
    • Phishing attacks
    • Ransomware
    • Unauthorized access
    • Data breaches
    • Denial-of-Service (DoS) attacks
  7. What is a password? Why is a password used in a computer?
    A password is a string of characters used to authenticate access to a computer or system. It protects against unauthorized access and ensures data privacy.
  8. Define Encryption and Decryption.
    • Encryption: Converting plain text into coded data to protect it from unauthorized access.
    • Decryption: Converting the coded data back into its original form.
  9. What are the security threats? Explain any two in brief.
    • Phishing: Fraudulent attempts to steal sensitive information via emails or fake websites.
    • Malware: Malicious software designed to harm or exploit computer systems.
  10. What are malicious codes?
    Malicious codes are harmful programs like viruses, worms, and Trojans designed to damage systems or steal data.
  11. Define antivirus software with four examples.
    Antivirus software detects and removes malicious codes. Examples:
    • Norton Antivirus
    • McAfee
    • Kaspersky
    • Avast
  12. Define Firewall with examples.
    A firewall is a network security system that monitors and controls incoming and outgoing traffic. Examples:
    • Windows Defender Firewall
    • ZoneAlarm
    • Cisco ASA
  13. What is biometric verification?
    Biometric verification uses unique biological traits like fingerprints or facial recognition for authentication.
  14. Write down any four preventive measures of computer hardware security.
    • Use locks and security cables for devices.
    • Install CCTV for monitoring.
    • Maintain a controlled access area.
    • Use surge protectors to prevent power damage.
  15. Point out any four computer software security measures.
    • Install antivirus and update it regularly.
    • Use secure software with regular updates.
    • Implement strong authentication methods.
    • Avoid downloading software from untrusted sources.
  16. What is software security? Write any four measures of hardware security.
    Software security protects applications from vulnerabilities and threats.
    Measures of hardware security:
    • Physical locks
    • Surveillance systems
    • Biometrics
    • Power protection systems
  17. What is a power protection device? Write its role in computer security.
    A power protection device safeguards electronic devices from power surges, outages, and fluctuations. It ensures uninterrupted operation and prevents data loss.
  18. Why is it important to protect the computer system from dust?
    Dust can clog fans and vents, causing overheating and hardware damage. Regular cleaning ensures optimal performance and longevity.

Unit 1.4: E-Commerce

  1. Define E-Commerce.
    E-Commerce refers to the buying and selling of goods and services online through websites or mobile applications.
  2. What is the business done through the internet?
    Business done through the internet involves online transactions like buying products, booking tickets, or using financial services.
  3. Mention the benefits and limitations of E-Commerce.
    • Benefits:
      • Convenient shopping from anywhere.
      • Cost-effective marketing.
      • Wide reach and availability.
    • Limitations:
      • Security and privacy concerns.
      • Limited access in rural areas.
      • Lack of personal interaction.
  4. Explain the different types of E-Commerce.
    • B2B (Business to Business): Transactions between businesses.
    • B2C (Business to Consumer): Businesses sell directly to customers.
    • C2C (Consumer to Consumer): Consumers trade with each other.
    • G2C (Government to Citizen): Government provides services to citizens online.
  5. What is M-Commerce? Give some examples.
    M-Commerce refers to mobile commerce, where transactions are conducted using mobile devices. Examples:
    • Mobile banking
    • Online food delivery apps
    • E-wallets like PayPal and eSewa
  6. What is Online Payment? Write the different forms of e-payment in Nepal.
    Online payment is a digital method for transferring money during transactions. Forms in Nepal include:
    • eSewa
    • Khalti
    • ConnectIPS
    • FonePay

Unit 1.5: Contemporary Technology

  1. What is the most futuristic technology?
    Futuristic technologies include Artificial Intelligence (AI), Quantum Computing, and Internet of Things (IoT), which revolutionize industries through automation, smart devices, and advanced computing.
  2. What are the advantages of cloud computing?
    • Cost Efficiency: Reduces IT infrastructure costs.
    • Scalability: Resources can be scaled up or down easily.
    • Accessibility: Data is accessible from anywhere.
    • Data Security: Ensures data backups and disaster recovery.
  3. What are the types of cloud computing services?
    • IaaS (Infrastructure as a Service): Provides virtualized computing resources.
    • PaaS (Platform as a Service): Offers platforms for application development.
    • SaaS (Software as a Service): Delivers software applications over the internet.
  4. List some areas where AI can help us and how?
    • Healthcare: AI assists in diagnosis and personalized medicine.
    • Education: Enables adaptive learning platforms.
    • Transportation: Powers self-driving cars.
    • Finance: Detects fraud and automates transactions.
  5. How is AI software different from other software?
    AI software mimics human intelligence and can learn and adapt over time, unlike traditional software that operates on fixed instructions.
  6. How can the public get benefited from e-governance services?
    • Simplifies access to government services.
    • Reduces bureaucratic delays.
    • Provides transparency and accountability.
    • Enhances citizen participation.
  7. Provide some examples of e-governance services that exist in Nepal.
    • Online tax filing (Inland Revenue Department).
    • Online driving license applications.
    • Digital payment for public utilities.
    • Citizen ID registration portals.
  8. What is IoT? Write any two importance of it.
    The Internet of Things (IoT) refers to interconnected devices that collect and exchange data.
    Importance:
    • Enhances automation and efficiency in industries.
    • Improves daily life through smart homes and healthcare devices.
  9. Give some examples of IoT devices and their applications.
    • Smart Thermostats: Automated temperature control.
    • Wearable Health Trackers: Monitor vital health data.
    • Smart Agriculture Sensors: Optimize irrigation and farming.
  10. How do you think IoT devices can help in our day-to-day life?
    IoT devices make life easier by automating tasks, improving security, and providing real-time monitoring of appliances, health, and resources.

Unit 1.6: Number System

  1. What is the number system?
    A number system is a mathematical system for representing numbers. Examples include decimal, binary, octal, and hexadecimal systems.
  2. Define base or radix of the number system.
    The base or radix is the total number of unique digits, including zero, used in a number system.
    • Decimal: Base 10
    • Binary: Base 2
  3. What is hexadecimal number system?
    The hexadecimal number system uses base 16, represented by digits 0-9 and letters A-F.
  4. What is computer word?
    A computer word is a fixed-sized group of bits processed as a unit by the CPU. Common word sizes are 16-bit, 32-bit, or 64-bit.
  5. Write different types of number systems.
    • Binary (Base 2)
    • Octal (Base 8)
    • Decimal (Base 10)
    • Hexadecimal (Base 16)
  6. How many bytes are there in 2GB?
    2GB = 2×1024×1024×10242 \times 1024 \times 1024 \times 1024 bytes = 2,147,483,648 bytes.

Unit 2.1: Database Management System

  1. What is database? Give some examples of database.
    A database is an organized collection of data that allows easy access, management, and updating.
    Examples:
    • Student Records Database
    • Library Management System
    • Inventory Database
  2. Differentiate between data and information.
    • Data: Raw facts and figures without context (e.g., "50, 75").
    • Information: Processed data with meaning (e.g., "The average score is 75").
  3. What is DBMS? Name any four DBMS software.
    A Database Management System (DBMS) is software that allows users to create, manage, and interact with databases.
    Examples:
    • MySQL
    • Oracle
    • Microsoft Access
    • PostgreSQL
  4. What are the components of database?
    • Data: The actual data stored.
    • Hardware: Physical devices used for storage and processing.
    • Software: DBMS software managing the database.
    • Users: People interacting with the database.
    • Procedures: Guidelines for using the database.
  5. List any four features of MS-Access.
    • User-friendly interface for database management.
    • Allows designing forms and reports.
    • Provides query tools for data retrieval.
    • Supports relationships between tables.
  6. What is a database? Give any two examples.
    (See Question 1 above.)
  7. What is a database object? List any four database objects.
    Database objects are elements within a database used to store and manipulate data.
    Examples:
    • Tables
    • Queries
    • Forms
    • Reports
  8. What does data type mean? Name any four data types in MS-Access.
    Data type defines the kind of data a field can hold.
    Examples:
    • Text
    • Number
    • Date/Time
    • Currency
  9. Which data type is used to store numeric characters or special symbols in MS-Access?
    The Text data type is used to store numeric characters or special symbols.
  10. What is a primary key? Why is it important to specify?
    A primary key is a unique identifier for each record in a table. It ensures that no duplicate records exist and facilitates relationships between tables.
  11. List any four advantages of a primary key.
    • Ensures unique identification of records.
    • Prevents duplication of data.
    • Enables faster search and retrieval.
    • Facilitates table relationships.
  12. What are field properties? Name any four of them.
    Field properties define the characteristics of a field in a table.
    Examples:
    • Field Size
    • Format
    • Input Mask
    • Default Value
  13. Define indexing. Mention its importance.
    Indexing is a technique used to speed up data retrieval in a database.
    Importance:
    • Enhances search performance.
    • Optimizes query execution.
  14. What is query? List the different types of query.
    A query is a request to retrieve specific information from a database.
    Types of Query:
    • Select Query
    • Action Query (Update, Delete)
    • Parameter Query
    • Crosstab Query
  15. What is the importance of Query in database?
    Queries help retrieve, update, or manipulate data efficiently, enabling users to extract meaningful information.
  16. Differentiate between Select query and Action query.
    • Select Query: Retrieves data from tables.
    • Action Query: Modifies data in the database (e.g., Insert, Update).
  17. List the cases in which update query can be used.
    • Updating salary records.
    • Modifying contact details.
    • Changing student grades.
  18. Explain the method of inserting new record into a table using query.
    • Open the query design view.
    • Use an "Append Query" or "INSERT INTO" statement.
    • Specify the table and values to insert.
  19. What is the report?
    A report is a formatted way to present data from a database for analysis and decision-making.
  20. What types of work is done in MS-Access using Form and query object?
    • Forms: Entering and editing data.
    • Queries: Retrieving and modifying data.
  21. Mention the importance of creating report in database.
    Reports summarize and display data in an organized format, making it easier to analyze and share insights.
  22. List any two major differences between forms and reports.
    • Forms: Used for data entry and modification.
    • Reports: Used for data presentation.
    • Forms: Interactive.
    • Reports: Static.

Unit 3.1: Programming in QBASIC

  1. What is Modular Programming?
    Modular programming is a technique where a program is divided into smaller, independent modules or sub-programs, each handling a specific functionality. This makes programs easier to debug, maintain, and reuse.
  2. What is Procedure? Mention its types.
    A procedure is a block of code designed to perform a specific task.
    Types of Procedures:
    • Sub-Procedure: Does not return a value.
    • Function-Procedure: Returns a value.
  3. Write the difference between sub-procedure and function-procedure.
    • Sub-Procedure:
      • Does not return a value.
      • Syntax: SUB ProcedureName.
    • Function-Procedure:
      • Returns a value.
      • Syntax: FUNCTION FunctionName.
  4. Define main-module.
    A main-module is the primary module in a program that integrates and controls all sub-modules, ensuring the execution of the overall program.
  5. Differentiate between local and global variable.
    • Local Variable:
      • Declared within a procedure or function.
      • Accessible only within that procedure.
    • Global Variable:
      • Declared outside all procedures.
      • Accessible throughout the program.
  6. Write anyone QBASIC program to show the difference between call by reference and call by value.

Example Program:

DECLARE SUB CallByValue (x AS INTEGER)

DECLARE SUB CallByReference (x AS INTEGER)

 

DIM a AS INTEGER

a = 10

 

PRINT "Before CallByValue: "; a

CallByValue a

PRINT "After CallByValue: "; a

 

PRINT "Before CallByReference: "; a

CallByReference a

PRINT "After CallByReference: "; a

 

END

 

SUB CallByValue (x AS INTEGER)

    x = x + 5

END SUB

 

SUB CallByReference (BYREF x AS INTEGER)

    x = x + 5

END SUB

Output:

    • In CallByValue, changes are not reflected in the main variable.
    • In CallByReference, changes are reflected in the main variable.

Unit 3.2: Modular Programming

  1. Define Program File and Data File.
    • Program File: A file containing the program's source code.
    • Data File: A file storing information used or generated by a program.
  2. Explain the different modes used for opening the file.
    • Input Mode: Opens a file for reading data.
    • Output Mode: Opens a file for writing data.
    • Append Mode: Opens a file to add new data without overwriting.
  3. What are "Read" and "Write" in data file?
    • Read: Retrieves data from a file.
    • Write: Saves data to a file.
  4. Explain the below points in short:
    • Opening Data File: Specifies the file name, mode, and purpose before accessing it.
    • Closing Data File: Terminates the file connection to free resources.
  5. Mention the need of data file in programming.
    • Stores data permanently for future use.
    • Facilitates data sharing between programs.
    • Simplifies large data handling.

Unit 3.3: File Handling in QBASIC

  1. What is structured programming? Give any four examples of structured programming language.
    Structured programming is a method that uses logical control structures like loops and conditionals for program development.
    Examples:
    • C
    • Python
    • Java
    • Pascal
  2. Write the advantages of structured programming.
    • Easier to debug and maintain.
    • Promotes code reuse.
    • Enhances readability.
    • Reduces development time.
  3. Write the features of C language.
    • Simple and efficient.
    • Supports structured programming.
    • Provides rich library functions.
    • Portable and platform-independent.
  4. List the data types supported by 'C' language.
    • Primary Data Types: int, float, char, double.
    • Derived Data Types: arrays, pointers, structures.
  5. Explain the structure of C program.
    A C program consists of:
    • Header Files: Includes libraries (e.g., stdio.h).
    • Main Function: Entry point of the program.
    • Body: Contains logic and statements.
  6. Differentiate between int and float data type in C.
    • int: Used for integers (e.g., 10).
    • float: Used for decimals (e.g., 10.5).
  7. Explain the different looping statements used in C.
    • for loop: Repeats a block of code a specific number of times.
    • while loop: Repeats code while a condition is true.
    • do-while loop: Executes code at least once before checking the condition.

Unit 4.1: Structured Programming in C

  1. Explain the importance of comments in structured programming.
    Comments enhance readability by explaining the code. They help others understand the logic and make debugging easier.
  2. Differentiate between structured and unstructured programming.
    • Structured Programming: Uses logical structures like loops and functions.
    • Unstructured Programming: Relies on sequential code with minimal organization.

😊

 


Post a Comment

Post a Comment (0)

Previous Post Next Post