Professional Documents
Culture Documents
Second Semester
program.(True)
7. Usually the user gets to know when a virus enters the system.(False)
8. A worm is a program that makes and facilitates the distribution of copies
of itself. (True)
9. many antivirus programs should be installed for better protection. (False)
10.People can be found without their account on internet.(False)
11.Through skype,we can chat with a person and also see his image.(True)
12.Internet does not have information on all the topics. internet.(False)
13.Online education means to create learning communities through internet.
(True)
14.The eyedropper tool is used for copying colours and styles and apply the
same to other objects.(True)
15.You cannot import external pictures into your flash movie.(False)
16.You can get simple animations by using timeline effects.(True)
17.The pen tool is used to draw precise path.(True)
5. What is the use of tool box in Photoshop? Give any three features?
Ans: The use of tool box in Photoshop For selecting, painting, drawing,
editing, erasing and viewing images.
The features Photoshop are:
1. Creating a new image.
2. You can adjust the size.
3. Background and the resolution of the image file.
6. Write a short note on computer using anti-virus? Write the steps.
Ans:Computer Viruses are small software programs that are designed to
spread from one computer to another and to interfere with computer
operation.
7.What are the various impacts of viruses on the computer?
Ans: Viruses commonly have the following effects on computer:
1. Destruction/theft of data and malicious access to the computer resources.
2. Computers become slow while working.
3. Unusual messages are displayed.
4. It hangs the system frequently.
5.Deletes and damages the files in the system.
6.Prevent software to run.
8. How can the computer be protected form viruses?
Ans:Computer can be protected against viruses by using antivirus software.
9.Name few anit virus softwares.
Ans:Some of the popular antivirus softwares are:
Norton Antivirus, AVG antivirus, Quick heal Antivirus.
10. Write a short note on internet.
Ans:Internet is important as it has made information available in a quick and
easy manner, publicly accessible and within easy reach.
11. What is online education? What are the ways of providing course
material in online education?
Ans:Online education utilizes the Internet or video conferencing to create
learning communities.Following are the ways of providing course material
in online education are CD-ROM, email, bulletin boards, forums, and
chat rooms
The tools are use: 1.Selection tool are used to select any image.
2. Path, Text and shape tools are used to give the path , add the text and
shape the image/graphics.
3. Painting tools and The brush tool are used to paints with smooth
edges,color replacement tool to replace any color on a picture
4.View tools are used magnify the image.
3. How to scan computer using anti-virus? Write the steps.
Ans:To use Antivirus software to scan (check for viruses) your computer.
Before scanning, the Anti virus must be installed in your computer.
Follow th Given Steps to scan the computer using an anti virus.
Open the anti virus
Click the scan option.
Click the full scan option to scan all the drives of your computer.
You see the status of scanning.The window displays a message
computer is protected
Click the close button
to exit
4. Write about different types of viruses.
Ans: Types of computer viruses
1.Bootsestor Virus :A virus that affects the boot sector area of hard disk.
2. Macro Virus: Macro viruses are viruses that use another applications
macro programming language to distribute themselves eg:MS Word or MS
Excel.
3.Memory Resident Viruses: Memory Resident Viruses reside in a
computers volatile memory (RAM)
4. Trojan Horse eg:1. It neither replicates nor copies itself
2. It can spread only when it is copied to another system.
5. Worms: A worm is a malicious program that duplicates itself. They fill up
the disks space and make your computer slow.
6. E-mail Viruses: These viruses are spread through e-mail attachments.
Attachments can have funny images, greeting cards, or audio and video files.
7. Logic Bombs/Time Bombs: These viruses are programmed to initiate at
a specific date or when a specific event occurs.
8.Spyware:It is software when installed on computer, collects various
personal information about the users without their knowledge such as e-mail
addresses, passwords, netbanking and even credit card numbers and transmit
the information to someone else.
************************************************************