Posts

Computer Applications Class IX Types of Software (Chap 3)

Image
  HARDWARE- Hardware represents the physical and tangible components of the computer i.e. the components that can be seen and touched. Input devices, output devices, CPU, floppy disk, hard disk, CD, DVD etc. are examples of computer hardware.  ● SOFTWARE- software represents the set of programs that govern the operation of computer system and make the hardware run.  ● SOFTWARE can be classified broadly into two categories.  1. System Software- refers to the programs that control internal computer operations and make best use of the hardware. The system software can further be classified into following categories: Operating system Language processor Utilities or Utility Software  2. Application Software- is the set of programs necessary to carry out operations for a specified application. These are the programs written by programmers to enable computer to perform a specific task such as processing words, inventory control, handling calculations and figures, medic...

HTML 1

  Que 1. HTML stands for  _____ . Answer:  Hypertext Markup Language Que 2. What do you understand by ‘Tag’ ? Answer:  TAG in HTML is a coded command, which indicates how part of web page should be displayed. HTML. It also has an element. Que 3. What is an attribute in HTML ? Answer:  An attribute is a special word used inside tag to specify additional information to tag such as color, alignment, etc. Que 4. Define the tag HTML. Answer:  The <HTML> .. </HTML> tag are used to mark the beginning and end of an HTML document. Que 5. HR tag  is used for  _____ . Answer:  HR tag is used for inserting Horizontal Rule. Que 6. <TITLE> tag is used to define  _____ . Answer:  <TITLE> tag is used to give title of the document. Que 7. Differentiate between container element and empty element ? Container and Empty Elements The HTML elements (Tags) can be classified as two types – (1) Container elements (2) Empty elements. ...

CLASS IX D TYPES OF HARDWARE REVISION TEST

https://www.fyrebox.com/bot/nrndo7me6momby89e2/ Play Now!

class viii protect computer quiz

Computer Security & Ethics Quiz Computer Ethics & Security Assessment Reference Material: 122.PNG, 145.PNG, 45.PNG Name: Class: Roll No: 1. Which of the following is NOT a step to prevent hacking? a) Keep a weak password b) Use difficult passwords c) Update OS frequently d) Use secure websites 2. Software piracy is the _________ use of software without purchasing it. a) Authorized b) Unauthorized c) Legal d) Ethical 3. Which virus infects the booting records of the system? a)...

READ THE TECH STORIES - An idea can chang your life

https://www.msn.com/en-in/news/world/meet-apurva-shrivastava-indian-origin-engineer-who-turned-a-missed-call-idea-into-1-billion-ai-startup/ar-AA22bwR3?uxmode=ruby&ocid=edgdhpruby&pc=U531&cvid=69f5794a948c4dee971e5b7c1ca6a485&ei=10

CLASS X MCQ BASED TEST 02 MAY 2026

TEST CLASS X TEST CLASS X COMPUTER APPLICATIONS (165) NAME: CLASS: SECTION: 1. The first page that you normally view at a website is its:[cite: 1] First page Home page Master page Banner page 2. A website is a collection of:[cite: 1] Graphic files HTML documents Audio files All of these 3. What is the full form of SMTP?[cite: 1] Simple Mail Transfer Protocol System Mail Text Process Secure Mail Transfer Protocol 4. Which protocol is responsible for "Transferring Files"?[cite: 1] ...

CLASS IX 02 MAY 2026

  https://www.fyrebox.com/play/nrndo7me6oz5rrdxpk/ https://www.fyrebox.com/bot/nrndo7me6oz5rrdxpk/ Play Now!