Wednesday, August 28, 2024

Thursday, August 22, 2024

Technologies of Future

Technologies of Future

1. A Veracity

2. B public

3. A Siri

4. Ai Technology

5. IOT

Fill in the blanks

1. Value

2. Cloud

3. ACCESS

4. Visualization

5. Digital


CIRCLE THE ODD

1. Company cloud

2. GOTO

3. Pickbox

4. Google drive

5. Google NOW


1. What is structured data?

ANS1. Structured data is the data that conveys meaning or information. Examples of structured data can be ratings given by users for a particular app and location data on a smart phone or device.

2. List four examples of AI.

3. ANS- Artificial intelligence is the technology that enables a computer or a machine to think, learn and take decisions like human beings. Some examples of AI used these days are Siri, Google Now and Cortana. These are intelligent digital personal assistants on the Ios, Android and Windows operating systems, respectively. Google and Tesla self-driving cars are modelled on the concept of AI.

3. What is cloud computing? List three examples of cloud storage platforms.

Ans3. Cloud computing means storing, sharing and accessing data and services over the internet. Some of the most popular cloud storage platforms are Google Drive, Dropbox and OneDrive.

4. Write any three advantages of cloud computing.

Ans- Three advantages of cloud computing are:

1. It is less costly.

2. It helps to share software and utility programs through the internet.

3. It is available 24x7.

Long Answer Questions-

1. What is AI? List the uses of AI in our daily life.

Ans- AI is the technology that enables a computer or a machine to think, learn and take decisions like human beings. Some examples of AI used these days are Siri, Google Now, Alexa and Cortana, Alexa, Google Assistant, AI based chat bots and so on provide interactions using Natural Language Processing (NLP) in communicating with the user.

AI is being implemented in our everyday life through various ways:

1. Smart home devices such as smart ac, smart lights, smart heater, camera and so on.

2. Entertainment applications such as Netflix, Spotify and YouTube keep suggesting the music or video based on the type of music you have been listening to.

3. Smartphone and various apps in it.

4. Biometrics such as face recognition or voice recognition systems.

Q2. What do you understand by big data?

ANS2. Big data is described as a large volume of data that is organized using different technologies to extract meaningful information from it for a given set of problems.

Q3. Write a short note on Internet of things.

Ans3. The internet of things is a technology that connects non interactive electronic devices such as a refrigerator, air conditioner, microwave and so on to the internet. Using a software or an application, it enables you to make electronic device work by just clicking your smartphone. Some examples of common applications of IOT include the ability to turn on your air conditioner 15 minutes before you enter your home through your smartphone. Even your car can inform you about the devices to turn on/off in your house.

Q4. What is the difference between augmented and virtual reality? What are the elements needed for AR?

ANS4. Augmented reality- Augmented reality is a concept that brings digital world to the real word. Using this concept, you are able to see and hear the virtual objects moving on the digital layer of your camera screen. Example: Snapchat app

Virtual Reality- Virtual Reality is the technology that immerses you completely in the virtual (unreal) environment and completely shuts the physical or real environment. Example: HTC Vive, Google Cardboard and Samsung Gear.

Some elements required for AR are:

1. A device with an internet connection.

2. Active GPS

3. Augmented reality application installed on the device.

4. A product to scan, such as a picture, sound, building, place or person.

Q5. Write a short note on robotics.

Ans5. Robotics is the science that deals with issues related to design, manufacture and use of robots. It involves fundamentals from various disciplines such as physics, mathematics, mechanical engineering, computer science engineering and electronic engineering. 

Robotics tries to copy 3Hs from human beings namely, Hand, Head and Heart. Robots can perform jobs that are:

1. Dangerous for humans

2. Repetitive jobs that are boring, stressful or intensive.

Apart from assisting humans in day to day life, robots will soon be able to emulate emotions as well. One example of a human-like robot is Sophia, a robot developed by a Hong Kong based company. Hanson Robotics. It is able to display more than 50 facial expressions and became the first robot to receive citizenship of a country. 


Tuesday, August 20, 2024

CLASS IX Practical (2024-25) M S WORD

            Q1.




                                   Thanking you
                                    Mr Mohan Pandey
                                     coordinator
     Q2. 

         Q3.

Q4. 

Q5. 


Monday, August 12, 2024

Chapter 2 Internet Services and Mobile Technologies

 

Question 1

In web services, the communication takes place between ............... .

  1. Two electronic devices
  2. Two human beings
  3. Two spiders
  4. None of the above

Answer

Two electronic devices

Reason — Web services are the software based services that take place when two electronic devices connected via network, communicate over WWW's HTTP.

Question 2

An email can be sent via, ............... .

  1. PC
  2. Tablet
  3. Smart phone
  4. All the above

Answer

All the above

Reason — An email can be sent via PC, tablet or smart phone.

Question 3

In an email address, the characters following '@' character represent ............... .

  1. User name
  2. E-mail Recipient
  3. Domain name
  4. None of these

Answer

Domain name

Reason — In an email address, the characters following '@' character represent the domain name for the host server.

Question 4

In the email address "hithere@edupillar.com", what is the domain name ?

  1. the whole email address
  2. .com
  3. edupillar.com
  4. hithere

Answer

edupillar.com

Reason — In an email address, the characters following '@' character represent the domain name for the host server.

Question 5

............... field of email-compose box allows to send same message to multiple recipients without getting them know about other recipients.

  1. cc
  2. To
  3. bcc
  4. Message

Answer

bcc

Reason — bcc stands for Blind Carbon Copy. bcc field of email-compose box allows to send same message to multiple recipients without letting them know about other recipients.

Question 6

Which of the following is not a legal domain in context of web address ?

  1. edu
  2. com
  3. tv
  4. work

Answer

work

Reason — edu, com and tv are legal domain names of web addresses and they represent educational firms, commercial firms and television channels respectively.

Question 7

Chatting on Internet is :

  1. Talking face to face
  2. Talking on phone
  3. Online textual talk
  4. None of these

Answer

Online textual talk

Reason — Online textual talk is called chatting.

Question 8

Chat Rooms are actual rooms where chat session takes place.

Answer

False

Reason — Chat rooms are not actual rooms but websites or a part of some online services that provide an online venue for communities of users with a common interest to communicate in real time.

Question 9

To participate in a chat, you must be logged in the same site and communicate live with others by typing words on your computer. (T/F)

Answer

True

Reason — To participate in a chat, you must be logged in the same site and communicate live with others by typing words on your computer.

Question 10

A ............... room or online forum allows users to communicate through typed messages which are displayed almost instantly.

  1. Mail
  2. Buddy
  3. Chat
  4. Message

Answer

Chat

Reason — A chat room or online forum allows users to communicate through typed messages which are displayed almost instantly.

Question 11

Online textual talk is called ............... .

  1. Video Conferencing
  2. Telephony
  3. Text Phone
  4. Chat

Answer

Chat

Reason — Online textual talk is called chatting.

Question 12

Electronic mail cannot be used for ............... .

  1. Sending documents
  2. Sending bulk data (say over 2GB)
  3. Sending attachments
  4. Sending messages

Answer

Sending bulk data (say over 2GB)

Reason — Email can be used to send documents, attachments and messages. There are limitations on attachment size imposed by email providers.

Question 13

A two way video phone conversation among multiple participants is called ............... .

  1. Video chatting
  2. Video talking
  3. Video conferencing
  4. Video watching

Answer

Video conferencing

Reason — A two way video phone conversation among multiple participants is called Video conferencing.

Question 14

Which of the following is not a feature / service of the web ?

  1. E-mail
  2. Telnet
  3. CPU
  4. Chat

Answer

CPU

Reason — CPU (Central Processing Unit) is a part of computer and not a feature / service of the web. E-mail, chat and telnet are feature / service of the web.

Question 15

You can use email to send messages but not files across Internet. (T/F)

Answer

False

Reason — E-mails can be used to send messages as well as files of a limited size.

Question 16

Pick the odd one out.

  1. Amazon
  2. e-bay
  3. twitter
  4. naaptol

Answer

twitter

Reason — While Amazon, eBay and Naaptol are all e-commerce platforms or online marketplaces, Twitter is a social media platform primarily focused on micro-blogging and social networking.

Question 17

The benefit of E-learning is :

  1. Class work can be scheduled around work and family
  2. Reduces travel time and travel costs for off-campus students
  3. Students can study anywhere they have access to a computer and Internet connection
  4. All the above

Answer

All the above

Reason — E-learning reduces travel time and travel costs for off-campus students, allows remote learning facilities and scheduling of class work around work and family.

Question 18

Fill in the blanks

  1. A ............... is a set of rules that are needed for communication.
  2. ............... enables the actual sending and receiving of messages.
  3. The symbol, '@' is pronounced as ............... and this remains same in every email address.

Answer

  1. protocol is a set of rules that are needed for communication.
  2. SMTP (Simple Mail Transfer Protocol) enables the actual sending and receiving of messages.
  3. The symbol, '@' is pronounced as at the rate or at and this remains same in every email address.

Question 19

Out of the following which one is the most used feature of Internet :

  1. E-mail
  2. FTP
  3. Telnet
  4. Usenet ?

Answer

E-mail

Reason — E-mail is the most used feature of Internet as it is publicly used for sending messages.

Question 20

e-Reservation is a process of making reservations of ............... .

  1. Tickets
  2. Hotel rooms
  3. Tourist packages
  4. All of these

Answer

All of these

Reason — e-Reservation is a process of making reservations of tickets, hotel rooms and tourist packages.

Question 21

Buying goods by placing orders online is called ............... .

  1. e-Commerce
  2. e-Shopping
  3. e-buying
  4. all the above

Answer

e-Shopping

Reason — e-Shopping means buying goods by placing orders online.

Question 22

Which of the following is the major reason cited for e-Shopping's popularity ?

  1. unique offers
  2. price
  3. impulse
  4. convenience

Answer

convenience

Reason — Convenience is the major reason cited for e-Shopping's popularity.

Question 23

Which of the following is/are immensely popular services of Internet ?

  1. e-commerce
  2. blogs
  3. social-networking
  4. e-shopping

Answer

social-networking

Reason — Social-networking is a popular service of the internet.

Question 24

Which of the following is/are example(s) of e-governance ?

  1. Applying for passport online
  2. Sending email to your school friend
  3. Buying books online
  4. Enquiring about the status of Aadhaar application.

Answer

Applying for passport online & Enquiring about the status of Aadhaar application

Reason — e-governance refers to the application of electronic means in governance. Since applying for passport and enquiring about the status of Aadhaar involves using online services provided by the government, they are examples of e-governance.

Theoretical Questions

Question 1

Out of the following which one is the most used feature of Internet ?

  1. e-mail
  2. FTP
  3. Telnet
  4. Usenet

Answer

E-mail is the most used feature of Internet as it is publicly used for sending messages.

Question 2

What are the two parts of an e-mail address ? Which character is used to separate these two parts ?

Answer

An e-mail address has two parts separated by '@' symbol :

  1. Username — On the left side of @ operator is the username.
  2. Domain name for the host server — The portion to the right of @ identifies the server or host or network that services our e-mail.

Question 3

In an e-mail account, which folder stores the received emails ?

Answer

Inbox folder stores the received emails.

Question 4

What is emoticon ? What is its usage ?

Answer

An emoticon is a symbol, most often used in computer-mediated communications.

It is used to represent a facial expression that communicates the emotional state of the sender.

Question 5

Why is it necessary to be online while chatting ?

Answer

We need to be online while chatting for the following reasons :

  1. Chatting is a web service which requires internet. If we want to chat, we need to log on to a server that provides chat facility.
  2. Chat platforms often rely on instant messaging, where messages are delivered and received instantly.
  3. Being online while chatting allows us to engage in real-time conversations with other users. This allows for immediate responses and facilitates smooth and dynamic communication.

Question 6

Explain the structure of an e-mail address.

Answer

E-mail addresses are commonly written in the form given below:

username@hostname

An email-address has two parts separated by '@' symbol.

  1. Username — On the left side of @ separator is the user name. A user name can not have blanks.
  2. Domain name for the host server — The portion to the right of @ identifies the server or host or network that services your e-mail. It is sometimes also called the e-mail server.

For example, pacas@gmail.comhello@kboat.in, etc.

Question 7

Explain the structure of an e-mail message. Also differentiate between Cc: and Bcc: fields.

Answer

The general structure of an e-mail message is as follows:

  1. From — This is the address of the sender of the e-mail.
  2. To — This is the address or addresses to which the e-mail is sent.
  3. CC — It stands for Carbon Copy. Here we specify the address/addresses of those to whom we want to send a copy of the e-mail. The CC recipient's name is visible to all recipients.
  4. BCC — It is for Blind Carbon Copy. This is also a list of addresses that will receive a copy of the e-mail but BCC recipient's name is not visible to other recipients. The BCC recipients can see the TO and CC addresses.
  5. Subject — A short title for the mail which speaks about contents of the message.
  6. Body — It is the actual message.
  7. Attachments — We can attach one or more pictures and documents or any other file with our e-mail.
  8. Date — This is the date and time on which the message was sent from the sender's computer.
  9. Message-id — Every message will have a unique id, which is used to track replies to it. The message id is not visible to us. It is used internally by the e-mail program and the e-mail system.

The difference between cc and bcc is as follows:

CcBcc
It stands for Carbon Copy.It stands for Blind Carbon Copy.
The e-mail addresses of all the recipients are displayed in the message.It hides the e-mail addresses of all recepients such that they are not visible in the message.
It does not protect the privacy of our recipients.It protects the privacy of our recipients.

Question 8

To find out about e-mail address of one of your friends, which utility will you use and how ?

Answer

I can use the website — www.123people to find out about e-mail address of my friend.

To find the e-mail address of a person, follow these steps:

  1. Log onto www.123people.com.
  2. We will see the people search page on our screen. Now type the first name and last name of the person whose email-id is to be searched.
  3. Click Search button and the search engine will search for the name given in its database and display the results on the screen.

Question 9

What do you understand by video conferencing ? What all things must be installed on your computer in order to have video conferencing ?

Answer

A two-way videophone conversation among multiple participants is called Video Conferencing.

The things that must be installed on a multimedia computer in order to have video conferencing are :

  1. a camera hardware
  2. a video compression hardware
  3. access to Internet over an ordinary telephone line
  4. videophone software

Question 11

What are the uses and misuses of social networking sites ?

Answer

Major uses of social networking sites are :

  1. It is easier to connect with people from all across the world on social networking site.
  2. With social networking, conducting discussions and collecting views or opinions on anything has become easier.
  3. Social networking sites provide interactive involvement with other people.
  4. Interactive involvement in online and social networking forums helps in improving the world awareness.

Major misuses of social networking sites are :

  1. Some people with wrong intentions can misuse the personal information posted by innocent users such as date-of-birth, address, school address, phone numbers etc.
  2. Some people with bad intentions use social networking sites for spreading baseless 'facts' resulting in a complete abuse of the 'freedom of expression'.
  3. There are numerous fake user profiles in these sites.
  4. With growing use of social networking sites undesirable elements have crept up who resort to needless bullying, defamation, harmful commenting and pranks and persecute hapless, innocent victims and pages.
  5. In order to fit under peer-pressure, often people lie or put exaggerated information about them. This leads to consequences born out of jealousy and harmful reactions.

Question 12

Name some social networking sites.

Answer

Some social networking sites are as follows:

  1. Facebook
  2. Twitter
  3. Reddit
  4. LinkedIn

Question 13

What precautions and measures should you take while using web services such as social networks, e-shopping etc.?

Answer

We should take the following precautions and measures while using web services such as social networks, e-shopping, etc. :

  1. One should carefully upload the contents, pictures, videos etc. as it may also involve others and posting these may violate other users' privacy.
  2. One should deliberately keep away from indulging in illegal and unethical activities like hacking and posting of threatening online messages.
  3. One should treat every other user equal and no less in any way.
  4. Any of our action must not hinder in any way the betterment of the society and promoting common good of the users.
  5. One should use strong, unique passwords for each online account to minimize the risk of unauthorized access.
  6. One should review and configure privacy settings on social networks to control the visibility of personal information.
  7. One should be cautious of suspicious emails, messages, or links that may lead to phishing websites.
  8. One should regularly update software and devices.
  9. Read terms and conditions carefully before signing up or using a web service.
  10. One should regularly monitor and review accounts.

Question 14

What are blogs ? How are they useful ?

Answer

A blog refers to an online journal where entries are posted.

Blogs are useful in the following ways:

  1. Information sharing — Blogs allow sharing valuable information and expertise.
  2. Personal expression — Blogs provide a platform for personal experiences and stories.
  3. Community building — Blogs foster a sense of community and encourage discussions.
  4. Authority and credibility — Blogs establish expertise and professional credibility.
  5. Marketing and promotion — Blogs promote businesses, products, or services.
  6. Creative and professional development — Blogs enhance writing skills and foster growth.

Question 15

What is video conferencing ? Name some popular video conferencing software.

Answer

A two-way videophone conversation among multiple participants is called Video Conferencing.

Some popular video conferencing software include Skype, Zoom, Google Meet, ooVoo, etc

Question 16

What are commonly used Mobile technologies?

Answer

Commonly used mobile technologies are :

  1. SMS (Short Message Service) — It is also commonly referred to as a "text message". With an SMS, one can send a message of up to 160 characters to another mobile device. Most cell phones support this type of text messaging.
  2. MMS (Multimedia Messaging Service) — It is a standard way to send messages that include multimedia content (such as pictures, video, or audio content) to and from mobile phones.
  3. 3G (Third Generation) — It enabled wireless devices to operate at speeds which made web browsing a more enjoyable experience on mobile devices.
  4. 4G (Fourth Generation) — 4G is the next generation of mobile technologies with enhanced download and upload speeds, and better connectivity. A 4G network offers peak data rates of at least 100 megabits per second for high mobility communication.
  5. 5G (Fifth Generation) — 5G enables a new kind of network that is designed to connect virtually everyone and everything together including machines, objects, and devices.

Question 17

How is an MMS different from SMS ?

Answer

SMS (Short Message Service) lets us send only short text messages of up to 160 characters over mobile phones. SMS cannot include pictures, video or audio content.

MMS (Multimedia Messaging Service) is a standard way to send messages that include multimedia content to and from mobile phones. MMS can include various types of media in it, such as pictures, video, or audio content.

Question 18

Give one difference between 3G and 4G.

Answer

A 3G network can produce a download data rates of upto 384 kbps under normal conditions and up to 2 Mbps in some instances while a 4G network offers peak data rates of at least 100 megabits per second for high mobility communication (users in cars, trains, etc.) and at least 1 Gigabit per second for low mobility communication (pedestrians and stationary users).

ONLINE SAFETY QUIZ FOR ALL CLASSES

https://www.safekids.com/quiz/  https://www.nspcc.org.uk/keeping-children-safe/online-safety/quiz/ https://edu.gcfglobal.org/en/internetsafe...