https://www.fyrebox.com/play/zqjz53dredlbamzkjy/
Wednesday, August 28, 2024
Thursday, August 22, 2024
Technologies of Future
Technologies of Future
1. A Veracity
2. B public
3. A Siri
4. Ai Technology
5. IOT
Fill in the blanks
1. Value
2. Cloud
3. ACCESS
4. Visualization
5. Digital
CIRCLE THE ODD
1. Company cloud
2. GOTO
3. Pickbox
4. Google drive
5. Google NOW
1. What is structured data?
ANS1. Structured data is the data that conveys meaning or information. Examples of structured data can be ratings given by users for a particular app and location data on a smart phone or device.
2. List four examples of AI.
3. ANS- Artificial intelligence is the technology that enables a computer or a machine to think, learn and take decisions like human beings. Some examples of AI used these days are Siri, Google Now and Cortana. These are intelligent digital personal assistants on the Ios, Android and Windows operating systems, respectively. Google and Tesla self-driving cars are modelled on the concept of AI.
3. What is cloud computing? List three examples of cloud storage platforms.
Ans3. Cloud computing means storing, sharing and accessing data and services over the internet. Some of the most popular cloud storage platforms are Google Drive, Dropbox and OneDrive.
4. Write any three advantages of cloud computing.
Ans- Three advantages of cloud computing are:
1. It is less costly.
2. It helps to share software and utility programs through the internet.
3. It is available 24x7.
Long Answer Questions-
1. What is AI? List the uses of AI in our daily life.
Ans- AI is the technology that enables a computer or a machine to think, learn and take decisions like human beings. Some examples of AI used these days are Siri, Google Now, Alexa and Cortana, Alexa, Google Assistant, AI based chat bots and so on provide interactions using Natural Language Processing (NLP) in communicating with the user.
AI is being implemented in our everyday life through various ways:
1. Smart home devices such as smart ac, smart lights, smart heater, camera and so on.
2. Entertainment applications such as Netflix, Spotify and YouTube keep suggesting the music or video based on the type of music you have been listening to.
3. Smartphone and various apps in it.
4. Biometrics such as face recognition or voice recognition systems.
Q2. What do you understand by big data?
ANS2. Big data is described as a large volume of data that is organized using different technologies to extract meaningful information from it for a given set of problems.
Q3. Write a short note on Internet of things.
Ans3. The internet of things is a technology that connects non interactive electronic devices such as a refrigerator, air conditioner, microwave and so on to the internet. Using a software or an application, it enables you to make electronic device work by just clicking your smartphone. Some examples of common applications of IOT include the ability to turn on your air conditioner 15 minutes before you enter your home through your smartphone. Even your car can inform you about the devices to turn on/off in your house.
Q4. What is the difference between augmented and virtual reality? What are the elements needed for AR?
ANS4. Augmented reality- Augmented reality is a concept that brings digital world to the real word. Using this concept, you are able to see and hear the virtual objects moving on the digital layer of your camera screen. Example: Snapchat app
Virtual Reality- Virtual Reality is the technology that immerses you completely in the virtual (unreal) environment and completely shuts the physical or real environment. Example: HTC Vive, Google Cardboard and Samsung Gear.
Some elements required for AR are:
1. A device with an internet connection.
2. Active GPS
3. Augmented reality application installed on the device.
4. A product to scan, such as a picture, sound, building, place or person.
Q5. Write a short note on robotics.
Ans5. Robotics is the science that deals with issues related to design, manufacture and use of robots. It involves fundamentals from various disciplines such as physics, mathematics, mechanical engineering, computer science engineering and electronic engineering.
Robotics tries to copy 3Hs from human beings namely, Hand, Head and Heart. Robots can perform jobs that are:
1. Dangerous for humans
2. Repetitive jobs that are boring, stressful or intensive.
Apart from assisting humans in day to day life, robots will soon be able to emulate emotions as well. One example of a human-like robot is Sophia, a robot developed by a Hong Kong based company. Hanson Robotics. It is able to display more than 50 facial expressions and became the first robot to receive citizenship of a country.
Tuesday, August 20, 2024
Monday, August 19, 2024
Monday, August 12, 2024
Chapter 2 Internet Services and Mobile Technologies
Question 1
In web services, the communication takes place between ............... .
- Two electronic devices
- Two human beings
- Two spiders
- None of the above
Answer
Two electronic devices
Reason — Web services are the software based services that take place when two electronic devices connected via network, communicate over WWW's HTTP.
Question 2
An email can be sent via, ............... .
- PC
- Tablet
- Smart phone
- All the above
Answer
All the above
Reason — An email can be sent via PC, tablet or smart phone.
Question 3
In an email address, the characters following '@' character represent ............... .
- User name
- E-mail Recipient
- Domain name
- None of these
Answer
Domain name
Reason — In an email address, the characters following '@' character represent the domain name for the host server.
Question 4
In the email address "hithere@edupillar.com"
, what is the domain name ?
- the whole email address
- .com
- edupillar.com
- hithere
Answer
edupillar.com
Reason — In an email address, the characters following '@' character represent the domain name for the host server.
Question 5
............... field of email-compose box allows to send same message to multiple recipients without getting them know about other recipients.
- cc
- To
- bcc
- Message
Answer
bcc
Reason — bcc stands for Blind Carbon Copy. bcc field of email-compose box allows to send same message to multiple recipients without letting them know about other recipients.
Question 6
Which of the following is not a legal domain in context of web address ?
- edu
- com
- tv
- work
Answer
work
Reason — edu, com and tv are legal domain names of web addresses and they represent educational firms, commercial firms and television channels respectively.
Question 7
Chatting on Internet is :
- Talking face to face
- Talking on phone
- Online textual talk
- None of these
Answer
Online textual talk
Reason — Online textual talk is called chatting.
Question 8
Chat Rooms are actual rooms where chat session takes place.
Answer
False
Reason — Chat rooms are not actual rooms but websites or a part of some online services that provide an online venue for communities of users with a common interest to communicate in real time.
Question 9
To participate in a chat, you must be logged in the same site and communicate live with others by typing words on your computer. (T/F)
Answer
True
Reason — To participate in a chat, you must be logged in the same site and communicate live with others by typing words on your computer.
Question 10
A ............... room or online forum allows users to communicate through typed messages which are displayed almost instantly.
- Buddy
- Chat
- Message
Answer
Chat
Reason — A chat room or online forum allows users to communicate through typed messages which are displayed almost instantly.
Question 11
Online textual talk is called ............... .
- Video Conferencing
- Telephony
- Text Phone
- Chat
Answer
Chat
Reason — Online textual talk is called chatting.
Question 12
Electronic mail cannot be used for ............... .
- Sending documents
- Sending bulk data (say over 2GB)
- Sending attachments
- Sending messages
Answer
Sending bulk data (say over 2GB)
Reason — Email can be used to send documents, attachments and messages. There are limitations on attachment size imposed by email providers.
Question 13
A two way video phone conversation among multiple participants is called ............... .
- Video chatting
- Video talking
- Video conferencing
- Video watching
Answer
Video conferencing
Reason — A two way video phone conversation among multiple participants is called Video conferencing.
Question 14
Which of the following is not a feature / service of the web ?
- Telnet
- CPU
- Chat
Answer
CPU
Reason — CPU (Central Processing Unit) is a part of computer and not a feature / service of the web. E-mail, chat and telnet are feature / service of the web.
Question 15
You can use email to send messages but not files across Internet. (T/F)
Answer
False
Reason — E-mails can be used to send messages as well as files of a limited size.
Question 16
Pick the odd one out.
- Amazon
- e-bay
- naaptol
Answer
Reason — While Amazon, eBay and Naaptol are all e-commerce platforms or online marketplaces, Twitter is a social media platform primarily focused on micro-blogging and social networking.
Question 17
The benefit of E-learning is :
- Class work can be scheduled around work and family
- Reduces travel time and travel costs for off-campus students
- Students can study anywhere they have access to a computer and Internet connection
- All the above
Answer
All the above
Reason — E-learning reduces travel time and travel costs for off-campus students, allows remote learning facilities and scheduling of class work around work and family.
Question 18
Fill in the blanks
- A ............... is a set of rules that are needed for communication.
- ............... enables the actual sending and receiving of messages.
- The symbol, '@' is pronounced as ............... and this remains same in every email address.
Answer
- A protocol is a set of rules that are needed for communication.
- SMTP (Simple Mail Transfer Protocol) enables the actual sending and receiving of messages.
- The symbol, '@' is pronounced as at the rate or at and this remains same in every email address.
Question 19
Out of the following which one is the most used feature of Internet :
- FTP
- Telnet
- Usenet ?
Answer
Reason — E-mail is the most used feature of Internet as it is publicly used for sending messages.
Question 20
e-Reservation is a process of making reservations of ............... .
- Tickets
- Hotel rooms
- Tourist packages
- All of these
Answer
All of these
Reason — e-Reservation is a process of making reservations of tickets, hotel rooms and tourist packages.
Question 21
Buying goods by placing orders online is called ............... .
- e-Commerce
- e-Shopping
- e-buying
- all the above
Answer
e-Shopping
Reason — e-Shopping means buying goods by placing orders online.
Question 22
Which of the following is the major reason cited for e-Shopping's popularity ?
- unique offers
- price
- impulse
- convenience
Answer
convenience
Reason — Convenience is the major reason cited for e-Shopping's popularity.
Question 23
Which of the following is/are immensely popular services of Internet ?
- e-commerce
- blogs
- social-networking
- e-shopping
Answer
social-networking
Reason — Social-networking is a popular service of the internet.
Question 24
Which of the following is/are example(s) of e-governance ?
- Applying for passport online
- Sending email to your school friend
- Buying books online
- Enquiring about the status of Aadhaar application.
Answer
Applying for passport online & Enquiring about the status of Aadhaar application
Reason — e-governance refers to the application of electronic means in governance. Since applying for passport and enquiring about the status of Aadhaar involves using online services provided by the government, they are examples of e-governance.
Theoretical Questions
Question 1
Out of the following which one is the most used feature of Internet ?
- FTP
- Telnet
- Usenet
Answer
E-mail is the most used feature of Internet as it is publicly used for sending messages.
Question 2
What are the two parts of an e-mail address ? Which character is used to separate these two parts ?
Answer
An e-mail address has two parts separated by '@' symbol :
- Username — On the left side of @ operator is the username.
- Domain name for the host server — The portion to the right of @ identifies the server or host or network that services our e-mail.
Question 3
In an e-mail account, which folder stores the received emails ?
Answer
Inbox folder stores the received emails.
Question 4
What is emoticon ? What is its usage ?
Answer
An emoticon is a symbol, most often used in computer-mediated communications.
It is used to represent a facial expression that communicates the emotional state of the sender.
Question 5
Why is it necessary to be online while chatting ?
Answer
We need to be online while chatting for the following reasons :
- Chatting is a web service which requires internet. If we want to chat, we need to log on to a server that provides chat facility.
- Chat platforms often rely on instant messaging, where messages are delivered and received instantly.
- Being online while chatting allows us to engage in real-time conversations with other users. This allows for immediate responses and facilitates smooth and dynamic communication.
Question 6
Explain the structure of an e-mail address.
Answer
E-mail addresses are commonly written in the form given below:
username@hostname
An email-address has two parts separated by '@' symbol.
- Username — On the left side of @ separator is the user name. A user name can not have blanks.
- Domain name for the host server — The portion to the right of @ identifies the server or host or network that services your e-mail. It is sometimes also called the e-mail server.
For example, pacas@gmail.com
, hello@kboat.in
, etc.
Question 7
Explain the structure of an e-mail message. Also differentiate between Cc: and Bcc: fields.
Answer
The general structure of an e-mail message is as follows:
- From — This is the address of the sender of the e-mail.
- To — This is the address or addresses to which the e-mail is sent.
- CC — It stands for Carbon Copy. Here we specify the address/addresses of those to whom we want to send a copy of the e-mail. The CC recipient's name is visible to all recipients.
- BCC — It is for Blind Carbon Copy. This is also a list of addresses that will receive a copy of the e-mail but BCC recipient's name is not visible to other recipients. The BCC recipients can see the TO and CC addresses.
- Subject — A short title for the mail which speaks about contents of the message.
- Body — It is the actual message.
- Attachments — We can attach one or more pictures and documents or any other file with our e-mail.
- Date — This is the date and time on which the message was sent from the sender's computer.
- Message-id — Every message will have a unique id, which is used to track replies to it. The message id is not visible to us. It is used internally by the e-mail program and the e-mail system.
The difference between cc and bcc is as follows:
Cc | Bcc |
---|---|
It stands for Carbon Copy. | It stands for Blind Carbon Copy. |
The e-mail addresses of all the recipients are displayed in the message. | It hides the e-mail addresses of all recepients such that they are not visible in the message. |
It does not protect the privacy of our recipients. | It protects the privacy of our recipients. |
Question 8
To find out about e-mail address of one of your friends, which utility will you use and how ?
Answer
I can use the website — www.123people
to find out about e-mail address of my friend.
To find the e-mail address of a person, follow these steps:
- Log onto
www.123people.com
. - We will see the people search page on our screen. Now type the first name and last name of the person whose email-id is to be searched.
- Click Search button and the search engine will search for the name given in its database and display the results on the screen.
Question 9
What do you understand by video conferencing ? What all things must be installed on your computer in order to have video conferencing ?
Answer
A two-way videophone conversation among multiple participants is called Video Conferencing.
The things that must be installed on a multimedia computer in order to have video conferencing are :
- a camera hardware
- a video compression hardware
- access to Internet over an ordinary telephone line
- videophone software
Question 11
What are the uses and misuses of social networking sites ?
Answer
Major uses of social networking sites are :
- It is easier to connect with people from all across the world on social networking site.
- With social networking, conducting discussions and collecting views or opinions on anything has become easier.
- Social networking sites provide interactive involvement with other people.
- Interactive involvement in online and social networking forums helps in improving the world awareness.
Major misuses of social networking sites are :
- Some people with wrong intentions can misuse the personal information posted by innocent users such as date-of-birth, address, school address, phone numbers etc.
- Some people with bad intentions use social networking sites for spreading baseless 'facts' resulting in a complete abuse of the 'freedom of expression'.
- There are numerous fake user profiles in these sites.
- With growing use of social networking sites undesirable elements have crept up who resort to needless bullying, defamation, harmful commenting and pranks and persecute hapless, innocent victims and pages.
- In order to fit under peer-pressure, often people lie or put exaggerated information about them. This leads to consequences born out of jealousy and harmful reactions.
Question 12
Name some social networking sites.
Answer
Some social networking sites are as follows:
Question 13
What precautions and measures should you take while using web services such as social networks, e-shopping etc.?
Answer
We should take the following precautions and measures while using web services such as social networks, e-shopping, etc. :
- One should carefully upload the contents, pictures, videos etc. as it may also involve others and posting these may violate other users' privacy.
- One should deliberately keep away from indulging in illegal and unethical activities like hacking and posting of threatening online messages.
- One should treat every other user equal and no less in any way.
- Any of our action must not hinder in any way the betterment of the society and promoting common good of the users.
- One should use strong, unique passwords for each online account to minimize the risk of unauthorized access.
- One should review and configure privacy settings on social networks to control the visibility of personal information.
- One should be cautious of suspicious emails, messages, or links that may lead to phishing websites.
- One should regularly update software and devices.
- Read terms and conditions carefully before signing up or using a web service.
- One should regularly monitor and review accounts.
Question 14
What are blogs ? How are they useful ?
Answer
A blog refers to an online journal where entries are posted.
Blogs are useful in the following ways:
- Information sharing — Blogs allow sharing valuable information and expertise.
- Personal expression — Blogs provide a platform for personal experiences and stories.
- Community building — Blogs foster a sense of community and encourage discussions.
- Authority and credibility — Blogs establish expertise and professional credibility.
- Marketing and promotion — Blogs promote businesses, products, or services.
- Creative and professional development — Blogs enhance writing skills and foster growth.
Question 15
What is video conferencing ? Name some popular video conferencing software.
Answer
A two-way videophone conversation among multiple participants is called Video Conferencing.
Some popular video conferencing software include Skype, Zoom, Google Meet, ooVoo, etc
Question 16
What are commonly used Mobile technologies?
Answer
Commonly used mobile technologies are :
- SMS (Short Message Service) — It is also commonly referred to as a "text message". With an SMS, one can send a message of up to 160 characters to another mobile device. Most cell phones support this type of text messaging.
- MMS (Multimedia Messaging Service) — It is a standard way to send messages that include multimedia content (such as pictures, video, or audio content) to and from mobile phones.
- 3G (Third Generation) — It enabled wireless devices to operate at speeds which made web browsing a more enjoyable experience on mobile devices.
- 4G (Fourth Generation) — 4G is the next generation of mobile technologies with enhanced download and upload speeds, and better connectivity. A 4G network offers peak data rates of at least 100 megabits per second for high mobility communication.
- 5G (Fifth Generation) — 5G enables a new kind of network that is designed to connect virtually everyone and everything together including machines, objects, and devices.
Question 17
How is an MMS different from SMS ?
Answer
SMS (Short Message Service) lets us send only short text messages of up to 160 characters over mobile phones. SMS cannot include pictures, video or audio content.
MMS (Multimedia Messaging Service) is a standard way to send messages that include multimedia content to and from mobile phones. MMS can include various types of media in it, such as pictures, video, or audio content.
Question 18
Give one difference between 3G and 4G.
Answer
A 3G network can produce a download data rates of upto 384 kbps under normal conditions and up to 2 Mbps in some instances while a 4G network offers peak data rates of at least 100 megabits per second for high mobility communication (users in cars, trains, etc.) and at least 1 Gigabit per second for low mobility communication (pedestrians and stationary users).
ONLINE SAFETY QUIZ FOR ALL CLASSES
https://www.safekids.com/quiz/ https://www.nspcc.org.uk/keeping-children-safe/online-safety/quiz/ https://edu.gcfglobal.org/en/internetsafe...
-
Form: It provides an easy way to collect required information from web page visitors. Web page forms have three important parts: a tag, fo...
-
PRACTICAL EXAM 2023-24 CLASS VIII HTML Q1. Write the HTML Code for the following:- a. A. India B. Srilanka c. Aust...
-
https://www.fyrebox.com/play/r4wpk5gpbqn2e83nqn/