COMPUTER 5 - FIRST TERM (1)
Objective
Marks 20 Time 30 min
All questions are compulsory. Overwriting and cutting will not be rewarded.
Q1. Encircle the correct options. 10
1. The product key is available
a) on the hard disk
b) in the disk data
c) on the disk cover
d) on demand if you call Microsoft
2. “Press any key to boot from CD”. This message appears for
a) 25 minutes b) 2 minutes
c) half a minute d) a few seconds
3. If you miss the prompt, “Press any key to boot from CD”,
a) press the Shift key
b) press the Control key
c) restart your computer
d) press the Eject button on the CD-drive.
4. Press the ________ key when the Welcome to Setup screen appears.
a) Enter b) F7
c) F8 d) F3
5. Press the L key to confirm
a) drive deletion
b) formatting the drive
c) stop Windows installation
d) install Windows later
Write T for the true and F for the false statements.Q2.
5
1. When the execution completes, the result is displayed.
The input is in two forms: output and instructions.
2. The output information is never stored.
3. You click the print button to get the printout of an image.
5.
4. The printer prints an image on the desktop.
Subjective
Marks 20 Time 60 min
Q1. What is a robot? 5 Q2. How do robots work? 5
Q3. What things should you ensure before starting installation of Windows XP? 5
Q4. What is a device driver? 5
Practical
Marks 10 Time 30 min
1. Install a device driver in your computer. 5
2. Draw the picture of ASIMO robot on a chart. 5
COMPUTER 5 - SECOND TERM (1)
Objective
Marks 20 Time 30 min
All questions are compulsory. Overwriting and cutting will not be rewarded
Q1. Fill in the blanks. 10
1. Move relevant files to the folders.
2. When your data is arranged, you can easily ___________ any file.
3. Unused programs waste space and can ___________ down your computer.
4. When your computer is having some threat, Microsoft Security Essentials gives _______________.
5. _____________ to backup files will not be saved unless you back up your files again.
Q2. Circle the correct option
1. A logic bomb infects
a) a computer’s memory
b) a computer’s electric circuit
c) the monitor
d) the chassis
2. An illegal access to a computer system or network is called
a) cyber extortion b) phishing c) denial of service attack d) hacking
3. Obtaining something from someone using threats or force is called
a) phishing b) hacking c) extortion d) denial of service attack
4. The criminal use the collected information to
a) befriend others
b) harass others
c) give them useful information d) to protect the information collected
5. A lot of spam results in
a) phishing b) extortion c) hacking d) denial of service
Subjective
Marks 20 Time 30 min
Attempt all questions. All questions carry equal marks.
\Q1. What do you understand by organizing data?
Q2. What is Microsoft Security Essentials?
Q3. What are cybercrimes?
Q4. What is the difference between a time bomb and an ordinary virus?
Practical
Marks 10 Time 30 min
1. Create a file structure for the files in your computer and then move data to relevant files. 10
COMPUTER 5 - THIRD TERM (1) Objective
Marks 20 Time 30 min
All questions are compulsory. Overwriting and cutting will not be rewarded.
Q1. Fill in the blanks with the appropriate words.. 10
1. When you click a user account type, the advantages are displayed _____________.
2. Only the ______________ can change the account type.
3. Selecting Delete Files deletes both the account and user’s files on desktop and in ________________________.
4. If some person has no user account, they can use a computer through the __________ account.
5. If you have fears that someone may use the computer improperly, keep the guest account turned ____________.
Q2. Circle the correct option 10
1. The extension for web documents is a) .doc b) .html c) .docx d) .rtf
2. Mozilla Firefox is a) a word processor
b) a designing program
c) a web browser\
d) a picture editing program
3. The command in HTML documents is enclosed in two a) round brackets b) braces
c) square brackets d) angle brackets
4. The title appears on
a) The bar at the top of the window
b) The bar at the bottom of the window
c) The bar at the right of the window
d) The bar at the left of the window
5. The <strike> … </strike> paired tag is used to
a) strikethrough the text b) underline the text c) apply boldface to text d) repeat the text
Subjective
Marks 20 Time 60 min
Attempt all questions. All questions carry equal marks.
Q1. Are HTML tags case sensitive? Explain. 5
Q2. What do you know about hexadecimal color codes? 5 Q3. Who can create and delete accounts? 5
Q4. Can you delete your own account? Explain. 5
Practical
Marks 10 Time 30 min
1. Add a new user account with your friend’s name. 5
2. Prepare an HTML document using the basic tags only. 5
COMPUTER 5 - ANNUAL (1)
Objective
Marks 20 Time 30 min
All questions are compulsory. Overwriting and cutting will not be rewarded.
Q1. Fill in the blanks with the appropriate words.. 10
1. If some person has no user account, they can use a computer through the _______ account.
2. If you have fears that someone may use the computer improperly, keep the guest account turned _________.
3. When your computer is having some threat, Microsoft Security Essentials gives __________.
4. _________ to backup files will not be saved unless you back up your files again.
5. A lot of spam results in the consumption of ________.
6. __________ filters protect users by alerting users to potentially fraudulent websites.
7. We use the <i> … </i> paired tag to make the text appear in ______________.
8. The heading levels are just like heading, ________, and so on.
9. The <center> … </center> paired tag aligns text ________ in the center.
10. #000000 is the code for ____________ color.
Q2. Circle the correct option 10
1. Once you confirm drive deletion, all data on your selected hard disk drive will be removed. The data
a) cannot be recovered
b) moves to the next drive
c) moves to the last drive
d) remains stored in the free space of the same drive
2. It is recommended to choose
a) Format the partition using the FAT file system
b) Format the partition using the NTFS file system
c) Format the partition using the NTFS file system (Quick)
d) Format the partition using the FAT file system (Quick)
3. When the Display Settings dialog appears
a) Click OK
b) press the Escape key
c) press the Alternate key
d) press the Alt+Ctrl keys
e) Hacking
4. Obtaining something from someone using threats or force is called
e) Phishing
f) Hacking
g) Extortion h) Denial of service attack
5. The criminal use the collected information to e) Befriend others
f) Harass others
g) Give them useful information
h) To protect the information collected
6. Light sensors work for
a) Mouth b) Ears
c) Tongue d) Eyes
7. A robot is
a) Solar powered b) Electrically powered
c) Battery powered d) All of the above
8. The intelligence is provided by programmers in the form of
a) Sound b) Movement c) Instructions d) Energy
9. A simple robot with three degrees of freedom can move
a) up & down
b) left & right
c) forward & backward
d) all the above given directions
10. _______ drive systems give a robot great speed and strength.
a) Hydraulic b) Electric
c) Pneumatic d) All of the above
Subjective
Marks 20 Time 60 min
Attempt all questions. All questions carry equal marks.
Q1. How does a device behave if a proper driver is not installed? 5
Q2. Write down the process of creating a new account. 5
Q3. What would you do to organize your data? 5
Q4. Write in detail about the denial of service attack? 5
Practical
Marks 10 Time 30 min
1. Write an essay on robots for displaying in an HTML document. The essay must display headings and subheadings. Align text to the left. The title of the essay should be centrally aligned. Use suitable font size, and font color. Apply some background to your document. 5
COMPUTER 5 - FIRST TERM (2)
Objective
Marks 50 Time 120 min
All questions are compulsory. Overwriting and cutting will not be rewarded.
Q1. Circle the correct option 10
1. Press the L key to confirm
e) Drive deletion
f) Formatting the drive
g) Stop Windows installation
h) Install Windows later
2. Once you confirm drive deletion, all data on your selected hard disk drive will be removed. The data e) cannot be recovered
f) moves to the next drive
g) moves to the last drive
h) remains stored in the free space of the same drive
3. It is recommended to choose
e) Format the partition using the FAT file system
f) Format the partition using the NTFS file system
g) Format the partition using the NTFS file system (Quick)
h) Format the partition using the FAT file system (Quick)
4. When the Display Settings dialog appears
e) Click OK
f) press the Escape key
g) press the Alternate key
h) press the Alt+Ctrl keys
5. Double-click in Device Manager the device for which you want to install drivers.
a) The device gets removed
b) The device driver installation starts
c) The device gets registered
d) The device properties window opens
e) All of the above
6. _______ can play table tennis against a human being.
a) TOPIO b) ASIMO
c) Boe-Bot d) Galileo
7. Height of ASIMO is
a) 4 ft 4 in b) 4 ft 3 in
c) 4 ft 5 in d) 3 ft 3 in
8. The running speed of ASIMO is
a) 7 km/hour b) 8 km/hour c) 9 km/hour d) 6 km/hour
9. Operating time of ASIMO is a) 1 hour b) 1 hour and a half c) 2 hours d) 3 hours
10. ASIMO has total degrees of freedom
a) 34 b) 32 c) 36 d) 38
Q2. Tick T for the true and F for the false statements. 10
1. Chemical sensors play the role of skin.
2. All robots have artificial intelligence.
3. A joint does not add degrees of freedom.
4. Pneumatic drive systems are used for larger robots that have fewer axes of movement.
5. ASIMO interprets the positioning and movement of a hand.
Subjective
Marks 20 Time 60 min
Attempt all questions. All questions carry equal marks.
Q1. What is ASIMO? 5
Q2. What do the industrial robots do? 5
Q3. What does the windows do during the format process? 5
Q4. What happens when copying of files is complete? 5
Practical
Marks 10 Time 30 min
1. Open your internet explorer, and find five robots other than described in your book. 10
COMPUTER 5 - SECOND TERM (2)
Objective
Marks 50 Time 120 min
All questions are compulsory. Overwriting and cutting will not be rewarded.
Q1. Fill in the blanks with the appropriate words. 10
1. When your data is arranged, you can easily ___________ any file.
2. Unused programs waste space and can ____________ down your computer.
3. When your computer is having some threat, Microsoft Security Essentials gives ___________________.
4. ____________ to backup files will not be saved unless you back up your files again.
5. Go to www.______________ to download Microsoft Security Essentials.
Q2. Tick T for the true and F for the false statements. 10
1. Computer Viruses are useful computer programs.
2. Rabbits and bacteria create many instances of themselves.
3. The pirates usually sell pirated software as pirated..
4. International Relay Chat (IRC) servers give the facility of chatting with your contacts only.
5. Phishing criminals claim to be a famous organization. Subjective
Marks 20 Time 60 min
Attempt all questions. All questions carry equal marks
Q1. What is the difference between a quick scan and a full scan? 5
Q2. Where would you prefer to store your backup? 5
Q3. What is a virus? 5
Q4. How do the criminals get access to credit card details? 5
Practical
Marks 10 Time 30 min
1. Apply the thumbnails view to a folder. Then apply it to all the folders. 5
2. Scan some files and folders. 5
COMPUTER 5 - THIRD TERM (2)
Objective
Marks 50 Time 120 min
All questions are compulsory. Overwriting and cutting will not be rewarded
Q1. Fill in the blanks with the appropriate words. 10
1. If some person has no user account, they can use a computer through the ___________________ account.
2. Only the ____________ can change the account type.
3. Limited users cannot ___________ their own account.
4. When you click a user account type, the advantages are displayed ____________.
5. If you have fears that someone may use the computer improperly, keep the guest account turned _________.
Q2. Circle the correct option 10
1. The command in HTML documents is enclosed in two e) round brackets f) braces g) square brackets h) angle brackets
2. The title appears on e) The bar at the top of the window
f) The bar at the bottom of the window
g) The bar at the right of the window h) The bar at the left of the window
3. The <strike> … </strike> paired tag is used to e) strikethrough the text f) underline the text
g) apply boldface to text h) repeat the text
4. We have _______ heading paired tags.
a) five b) seven c) six d) eight
5. We can apply the text size up to a) 5 b) 6 c) 7 d) 8
Subjective
Marks 20 Time 60 min
Attempt all questions. All questions carry equal marks
Q1. Write down the process of creating a new account. 5
Q2. What is the advantage of creating an account? 5
Q3. What are HTML tags? Discuss their role. 5
Q4. How do you save an HTML document? 5
Practical
Marks 10 Time 30 min
1. Prepare an HTML document that displays following details about you: your name, your father’s name, your class, your address, your telephone number. 10
COMPUTER 5 – ANNUAL (2)
Objective
Marks 20 Time 30 min
All questions are compulsory. Overwriting and cutting will not be rewarded.
Q1. Fill in the blanks with the appropriate words. 10
1. Only the ____________ can change the account type.
2. Selecting Delete Files deletes both the account and user’s files on desktop and in _______.
3. When your data is arranged, you can easily any file.
4. Unused programs waste space and can ________ down your computer.
5. Viruses spread through USB memory, CDs/DVDs, _____, the Internet, and the ______.
6. _________are usually designed as a game.
7. The _______ are instructions to the browser on how to display text contained within them.
8. The tag marks the start and end of an HTML file.
9. The ______ tag contains all the content that will be displayed.
10. We use the <i> … </i> paired tag to make the text appear in ____________.
Q2. Circle the correct option 10
Press any key to boot from CD”. This message appears for
e) 25 minutes
g) Half a minute
f) 2 minutes
h) a few seconds
2. If you miss the prompt, “Press any key to boot from CD”,
e) press the Shift key
f) press the Control key
g) restart your computer
h) press the Eject button on the CD-drive.
3. An illegal access to a computer system or network is called
f) Cyber extortion g) Phishing
h) Denial of service attack i) Hacking
4. Obtaining something from someone using threats or force is called
i) Phishing j) Hacking
k) Extortion
l) Denial of service attack
5. Robot brain is in the form of a
a) Transistor b) Tube
c) Microprocessor d) Screen
6. NASA’s Galileo is
a) An industrial robot
b) A classroom robot
c) An entertainment robot
d) An unpiloted space probe
7. Boe-Bot is
a) An entertainment robot b) Classroom robot
c) An industrial robot
8. Mozilla Firefox is
e) a word processor
f) a designing program
g) a web browser
h) a picture editing program
d) An explorer robot
9. The command in HTML documents is enclosed in two
i) round brackets
j) braces
k) square brackets l) angle brackets
10. The title appears on
i) The bar at the top of the window
j) The bar at the bottom of the window
k) The bar at the right of the window
l) The bar at the left of the window
Subjective
Marks 20 Time 60 min
Attempt all questions. All questions carry equal marks.
Q1. How would you respond the message Press any key to boot from the CD? 5
Q2. What is the advantage of creating an account? 5
Q3. What is the purpose of backup? 5
Q4. What do you know about i-cybie? Write in detail. 5
Practical
Marks 10 Time 30 min
1. Install Windows XP on a computer in the presence of your teacher. 10
COMPUTER 5 – FIRST TERM (3)
Objective
Marks 50 Time 150 min
All questions are compulsory. Overwriting and cutting will not be rewarded.
Q2. Tick T for the true and F for the false statements. 10
1. The robotic Mars Exploration rovers landed on Mars in 2003.
2. Chemical sensors play the role of skin.
3. All robots have artificial intelligence.
4. A joint does not add degrees of freedom.
5. Pneumatic drive systems are used for larger robots that have fewer axes of movement.
Q2. Circle the correct option 10
1. i-Cybie is a robot
a) Dog b) Horse c) Cat d) Monkey
2. Light sensors work for e) Mouth f) Ears g) Tongue h) Eyes
3. A robot is e) Solar powered f) Electrically powered g) Battery powered h) All of the above
4. The intelligence is provided by programmers in the form of e) Sound f) Movement g) Instructions h) Energy
5. A simple robot with three degrees of freedom can move
e) up & down f) left & right g) forward & backward h) all the above given directions
Subjective
Marks 20 Time 30 min
Attempt all questions. All questions carry equal marks.
Q1. How would you respond the message Press any key to boot from the CD?
Q2. HDo computers always come with Windows pre-installed? 5
Q3. Name the types of robots you have studied in the unit. 5
Q4. How do the criminals get access to credit card? 5
Practical
Marks 10 Time 60 min
1. 1. Install Windows XP on a computer in the presence of your teacher. 10
COMPUTER 5 – SECOND TERM (3)
Objective
Marks 50 Time 60 min
All questions are compulsory. Overwriting and cutting will not be rewarded.
Q1. Fill in the blanks with the appropriate words. 10
1. Unused programs waste space and can __________ down your computer.
2. When your computer is having some threat, Microsoft Security Essentials gives _____________.
3. _________ to backup files will not be saved unless you
back up your files again.
4. A lot of spam results in the consumption of _________.
5. ________ filters protect users by alerting users to potentially fraudulent websites. 10
Write T for the true and F for the false statements. Q2.
Computer Viruses are useful computer programs.
1. Rabbits and bacteria create many instances of themselves.
2. The pirates usually sell pirated software as pirated.
3. International Relay Chat (IRC) servers give the facility of chatting with your contacts only.
4. Phishing criminals claim to be a famous organization.
5.
Subjective
Marks 20 Time 30 min
Attempt all questions. All questions carry equal marks. 5
How would you deal a program you do not know the purpose of? Q1. 5
What do you understand by system maintenance? Q2. 5
Some programs are to be installed on certain number of computers. What will you call the crime if the software is installed on a greater number of computers?
How do the criminals get access to credit card details? Q4.
Q3. 5
Practical
Marks 10 Time 30 min
1. Apply the thumbnails view to a folder. Then apply it to all the folders. 5
57 2. Update Windows. 5
COMPUTER 5 – THIRD TERM (3) Objective
Marks 50 Time 60 min
All questions are compulsory. Overwriting and cutting will not be rewarded.
Q1. Fill in the blanks with the appropriate words. 10
1. The heading levels are just like heading, _________, and so on.
2. The <center> … </center> paired tag aligns text _________ in the center.
3. #000000 is the code for ________ color.
4. If some person has no user account, they can use a computer through the ______ account.
5. If you have fears that someone may use the computer improperly, keep the guest account turned ________.
Q2. Circle the correct option 10
1. The title appears on
m) The bar at the top of the window
n) The bar at the bottom of the window
o) The bar at the right of the window
p) The bar at the left of the window
2. The <strike> … </strike> paired tag is used to i) strikethrough the text j) underline the text
k) apply boldface to text l) repeat the text
3. We have _______ heading paired tags. e) five f) seven g) six h) eight
4. We can apply the text size up to e) 5 f) 6 g) 7 h) 8
5. The Hexadecimal code for the blue color is a) #FF0000 b) #0000EE c) #00FF00 d) #0000FF
Subjective
Marks 20 Time 60 min
Attempt all questions. All questions carry equal marks. 5
How many font sizes can you apply to the text in HTML documents?
Q1. 5
What is required for preparing, testing and launching HTML documents? Q2. 5
SWhen should you turn the guest account off?Q3. 5
Write down the process of creating a new account. Q4.
Practical
Marks 10 Time 30 min
1. Change the account picture of your own account. 5
2. Turn the guest account on and then off. 5
COMPUTER 5 – ANNUAL (3) Objective
Marks 50 Time 60 min
All questions are compulsory. Overwriting and cutting will not be rewarded.
Q2. Circle the correct option 10
1. Press the ________ key when the Welcome to Setup screen appears.
e) Enter f) F7
g) F8 h) F3
2. It is recommended to choose
i) Format the partition using the FAT file system
j) Format the partition using the NTFS file system
k) Format the partition using the NTFS file system (Quick)
l) Format the partition using the FAT file system (Quick)
3. The criminal use the collected information to
i) Befriend others
j) Harass others
k) Give them useful information
l) To protect the information collected
4. A lot of spam results in
e) Phishing f) Extortion
g) Hacking h) Denial of service
5. NASA’s Galileo is
e) An industrial robot f) A classroom robot
g) An entertainment robot h) An unpiloted space probe
6. Boe-bot is
e) An entertainment robot f) Classroom robot
g) An industrial robot h) An explorer robot
7. i-Cybie is a robot
e) Dog f) Horse g) Cat h) Monkey
8. Light sensors work for
i) Mouth j) Ears k) Tongue l) Eyes
9. Type ________________ to apply red color to the background.
a) <body bgcolor=“#FF0000”>
b) <body bkcolor=“#FF0000”>
c) <body bgrcolor=“#FF0000”>
d) <body background=“#FF0000”>
10. <em> … </em> tag is used to apply
a) Strong emphasis b) Emphasis c) Insert a dash d) Insert a comma
Q1. Fill in the blanks with the appropriate words. 10
1. If you have fears that someone may use the computer improperly, keep the guest account turned _______.
2. Limited users cannot __________ their own account.
3. Move relevant files to the folders.
4. When your data is arranged, you can easily ________ any file.
5. Viruses spread through USB memory, CDs/DVDs, ________, the Internet, and the ___________.
6. ___________ are usually designed as a game.
7. A lot of spam results in the consumption of __________.
8. The ____________ are instructions to the browser on how to display text contained within them.
9. The __________ tag marks the start and end of an HTML file.
10. The _________ tag contains all the content that will be displayed. Subjective
Marks 20 Time 60 min
Attempt all questions. All questions carry equal marks. 5
What things should you ensure before starting installation of Windows XP?
Q1. 5
Can you delete you own account? Explain your answer. Q2. 5 What is the difference between a quick scan and a full scan? Q3.
What is the difference between a time bomb and an ordinary virus?
Q4. 5
What can ASIMO do?Q5. Practical
Marks 10 Time 30 min
1. Download and install Microsoft Security Essentials 5
2. Add a new user account with your friend’s name. 5
Computer 5 ( First Semester)
Part A – Multiple Choice Questions
Marks 20 Time 54 min
Instructions: Multiple-choice questions are given in this part. Attempt all questions. All questions carry equal marks.
1. Which message appears to direct boot from CD?
a) Press Spacebar to boot from CD.
b) Press Enter key to boot from CD.
c) Press any key to boot from CD.
d) Press Alt key to boot from CD.
2. Which is the recommended choice for formatting disk?
a) Format the partition using the NTFS file system. <quick>
b) Format the partition using the FAT file system. <quick>
c) Format the partition using the NTFS file system.
d) Format the partition using the FAT file system.
3. How long is the Windows XP product key?
a) 23 digit b) 24 digit c) 25 digit d) 26 digit
4. What is standard time of Pakistan?
a) GMT+04:00 b) GMT+05:00 c) GMT+06:00 d) GMT+07:00
5. If you miss the prompt, “Press any key to boot from CD”,
a) restart your computer.
b) press the Shift key.
c) press the Control key.
d) press the Eject button on the CD-Drive.
6. Only the ______ can change the account type.
a) administrator b) user
c) guest d) owner
7. Does the Guest account require a password?
a) Yes, it does. b) No, it does not.
8. While deleting a user account, what happens if you select Delete Files?
a) All the files created by the user get deleted.
b) The user’s files on the desktop get deleted.
c) The user’s files on the Desktop and in My documents get deleted.
d) The user’s files in My Documents get deleted.
9. What can you NOT do with a limited account?
a) Delete your own account.
b) Change or remove your password.
c) View files you created.
d) View files in the Shared Documents folder.
10. Which is not an account type on Windows XP?
a) Computer administrator b) Standard c) Limited d) User
Part B - Open Ended Questions
Marks 10 Time 35 min
Instructions: This part has 2 open ended questions. Please use blank space given below the question to write the answer
1. (a) What is a device driver? How important is a device driver? (5)
2. (a) What is the advantage of creating an account? (3) (b) Can you delete your own account? Explain your answer. (2)
Part - C Practical Work
Marks 20 Time 35 min
1. Install Windows XP on a computer in the presence of your instructor. (15)
2. Add a new user account with your friend’s name. (5)
Computer 5 ( Second Semester)
Part A – Multiple Choice Questions
Marks 20 Time 54 min
Instructions: Multiple-choice questions are given in this part. Attempt all questions. All questions carry equal marks.
1. What is a subfolder?
a) a folder with the same name
b) a folder in another folder
c) a folder with the same name in another drive
d) a folder in the documents
2. Which is the most careful way to delete an item?
a) Select and press Shift+Delete keys. Then follow instructions according to the dialog boxes.
b) Select and press the L key. Then follow instructions according to the dialog boxes.
c) Select and press the M key. Then follow instructions according to the dialog boxes.
d) Select and press the Delete key. Then follow instructions according to the dialog boxes.
3. Which button is pressed during the Windows Update process to get recommended high priority updates only?
a) Custom b) High Priority
c) Express d) High Priority Only
4. What is Microsoft Security Essentials?
a) a software program for managing
b) an antivirus and antispyware program
c) a software program for arranging data
d) a software program for deleting unwanted files
5. What is the function of a quick scan?
a) It scans only those areas which malicious software is likely to attack.
b) It scans all the files of the computer quickly.
c) It completely scans the computer.
d) It scans only the selected files.
6. What do you understand by the term “backup”?
a) to copy data to a safe place to recover them in case of a loss of data
b) to put files in the folders where they were created the first time
c) to lock your computer so that others cannot harm data
d) to keep your computer in a room where it is safe
7. What would you do to organize your data?
a) Remove unused and unwanted programs.
b) Change the view style of files and folders.
c) Fully scan your computer.
d) Properly name files, etc. and create a folder structure.
8. If Microsoft Security Essentials gives an alert, what should you do?
a) Just close the alert.
b) Close the Microsoft Security Essentials program.
c) Click Clean computer button.
d) Delete the file or folder that contains threat.
9. If you do not understand what an installed program does,
a) uninstall the program.
b) get information about the program and act accordingly.
c) uninstall the program and get information about it.
d) get information about the program and uninstall it.
10. Unwanted programs waste space and can ______ (on) a computer.
a) slow b) harm c) delete data d) use space
Part B - Open Ended Questions
Marks 10 Time 35 min
Instructions: This part has 2 open ended questions. Please use blank space given below the question to write the answer.
1.
(a) What is the disadvantage of unwanted programs? (2)
(b) What steps would you take to arrange your data? (3)
2.
(a) What is the difference between a quick scan and a full scan? (2)
(b) Where would you prefer to store backup of your data? Explain with reasons. (3)
Part C - Practical Work
Marks 20 Time 35 min
1. Perform a quick scan on a computer in the presence of your instructor. (5)
2. Apply the thumbnails view to a folder. Then apply it to all the folders. (5)
3. Update Windows. (10)
Computer
( Third
Part A – Multiple Choice Questions
Marks 20 Time 54 min
1. What is HTML?
(a) HyperText Manual Language
(b) HyperText Markup Language
(c) HyperText Maximal Language
(d) HyperText Mutual Language
2. Which is NOT a text editor?
(a) MS Word (b) Notepad (c) WordPad (d) MS Paint
3. What do you use to test the HTML code?
(a) a server (b) a text editor
(c) a browser (d) an email service provider
4. What is the symbol < called in HTML documents?
(a) opening angle bracket
(b) closing angle bracket
(c) right angle bracket (d) left angle bracket
5. <BR> … </BR> paired tag is used to (a) insert page break (b) insert paragraph break (c) insert line break
(d) insert an image link
6. <i> … </i> paired tag is used to (a) italicize text (b) indent text (c) insert image (d) initialize text
7. Which tag is used to insert the highest heading level? (a) <H1> … </H1> (b) <H2> … </H2> (c) <H3> … </H3> (d) <H4> … </H4>
8. Which is the center align tag?
(a) <ALIGN CENTER> … </ALIGN CENTER> (b) <C> … </C> (c) <CENTER TEXT> … </CENTER TEXT> (d) <CENTER> … </CENTER>
9. RGB value for the blue color is (a) 0,0,255 (b) 0,255,0 (c) 255,0,0 (d) 255,255,0
10. The extension for a web document is (a) .doc (b) .docx (c) .html (d) .rtf
Part B - Open Ended Questions
Marks 10 Time 35 min
1. Are HTML tags case sensitive? Explain. (3)
2. How many font sizes can be applied to text in an html document? Write font size tags for them. (3)
Part C - Practical Work
Marks 20 Time 35 min
Prepare an HTML document that displays the following details about you: your name, your father’s name, your class, your address, your telephone number. The document should have proper title and head that show these details. The body of the document must be properly formatted with headings, etc. Apply suitable text colors and a background also. (20)
SCHEME OF STUDY
34 weeks 5/6 days a week Four Terms.
1st Term
WEEK UNIT #
Ist 1
NAME OF UNIT
INSTALLATION OF WINDOWS XP
TOPICS
Pre-Installation Checklist / Installation Process / Installation Process Contd….
2nd " " Revision and Test of the Above Topics (Unit 1 )
PAGE #
5 to 12
3rd " " Installing Drivers of Windows XP / Exercise & Lab Activities 13 to 19
4th 5
ROBOTS
What Is A Robot? / Types of Robots : (2.1 to 2.6) / Characteristics of Robots (3.1 to 3.4)
5th " " Revision and Test of the Above Topics (Unit 1 & 5 )
6th Parts of an Industrial Robot (4.1 to 4.5) / How do robots work? / Humanoid Robots
77 to 87
88 to 94
7th ASIMO Robot / Exercise & Lab Activities 95 to 101
8th 1st Term Paper (Unit 1 & 5)
2nd Term
WEEK UNIT #
9th 3
10th "
NAME OF UNIT
TOPICS
MAINTAIN YOUR SYSTEM Organize Your Files and Folders / Specifying the View of Files and Folders / Deleting Unwanted Files
"
11th " "
12th 4
13th "
PAGE #
37 to 42
Remove programs you do not need anymore / Updating Windows XP 43 to 51
Revision and Test of the Above Topics (Unit 3 )
CYBERCRIME Using an antivirus and spyware program (6.1 to 6.4) 52 to 59
74 " Backup Your Files / Exercise & Lab Activities 60 to 65
14th Revision and Test of the Above Topics (Unit 3 )
15th Types of Cybercrimes (1.1 to 1.9 ) Exercise 67 to 75
16th 2nd Term Paper (Units 3 & 4)
3rd Term
WEEK UNIT #
17th 2
NAME OF UNIT
PASSWORDS AND USER ACCOUNTS
TOPICS
PAGE #
Opening User Accounts / Adding a New User Account 21 to 22
18th " Changing an Account (3.3 to 3.7) 23 to 30
19th Revision and Test of the Above Topics (Unit 32)
20th 6
''
Turning the Guest Account On / Deleting Your Own Account Off / Exercise & Lab Activities
21st MY FIRST WEB PAGE Rquirements for Creating HTML Docunents / Understanding HTML Tags / Creating Your Web Page (3.1 to 3.3)
22nd Revision and Test of the Above Topics (Unit 2 & 6 )
31 to 35
103 to 108
23rd " Inserting Text for Display in a Document (4.1 to 4.12) 109 to 124
24th " Applying Background Colour / Exercise & Lab Activities 125 to 128
25th 3rd Term Paper (Units 2 & 6)
Annual WEEK UNIT #
26th 1st
TERM (REVISION)
UNIT
1 to 5
NAME OF UNIT
INSTALLATION OF WINDOWS XP
TOPICS
PAGE #
75 Pre-Installation Checklist / Installation Process / Installing Drivers of Windows XP / Exercise & Lab Activities
5 to 19
27th "
28th 2nd TERM (REVISION) UNIT 3 & 4
ROBOTS Installing Drivers of Windows XP / Exercise & Lab Activities 77 to 101
MAINTAIN YOUR SYSTEM
Organize Your Files and Folders / Specifying the View of Files and Folders / Deleting Unwanted Files / Remove programs you do not need anymore / Updating Windows XP / Using an antivirus and spyware program (6.1 to 6.4) / Backup Your Files / Exercise & Lab Activities
37 to 65
29th "
30th 3rd terms (REVISION) unit 2 to 6
CYBERCRIME Types of Cybercrimes (1.1 to 1.9 / Exercise 67 to 75
PASSWORDS AND USER ACCOUNTS
Opening User Accounts / Adding a New User Account / Changing an Account (3.3 to 3.7) / Turning the Guest Account On / Deleting Your Own Account Off / Exercise & Lab Activities /
21 to 35
31st " MY FIRST WEB PAGE
Rquirements for Creating HTML Docunents / Understanding HTML Tags / Creating Your Web Page (3.1 to 3.3) / Inserting Text for Display in a Document (4.1 to 4.12) / Applying Background Colour / Exercise & Lab Activities
103 to 128
32nd 5 (REVISION
Preporatory Leaves' Week 62 to 80
Final Term Paper (Units 1 to 6) 81 to 96
34th "
76 33rd 6 (REVISION
SCHEME OF STUDY
40 weeks 5/6 days a week Four Terms.
1st Term
WEEK UNIT #
NAME OF UNIT
Ist 1 INSTALLATION OF WINDOWS XP
TOPICS
# PAGE
Pre-Installation Checklist / Installation Process 5 to 9
2nd " " Installation Process Contd…. 10 to 12
3rd " "
4th 5
5th "
Revision and Test of the Above Topics (Unit 1 )
" Installing Drivers of Windows XP / Exercise & Lab Activities 13 to 19
ROBOTS What Is A Robot? / Types of Robots : (2.1 to 2.6) / Characteristics of Robots (3.1 to 3.4)
6th Revision and Test of the Above Topics (Unit 1 & 5 )
7th " Parts of an Industrial Robot (4.1 to 4.5) / How do robots work? / Humanoid Robots
77 to 87
88 to 94
8th ASIMO Robot / Exercise & Lab Activities 95 to 101
9th Revision and Test of the Above Topics (Unit 5 )
10th 1st Term Paper (Units 1 & 5)
2nd Term
WEEK UNIT #
NAME OF UNIT TOPICS
11th 3 MAINTAIN YOUR SYSTEM Organize Your Files and Folders / Specifying the View of Files and Folders / Deleting Unwanted Files
# PAGE
37 to 42
12th " " Remove programs you do not need anymore / Updating Windows XP 43 to 51
13th " " Revision and Test of the Above Topics (Unit 3 )
14th 5
77 " Using an antivirus and spyware program (6.1 to 6.4) 52 to 59
15th
" Backup Your Files / Exercise & Lab Activities 60 to 65
16th Revision and Test of the Above Topics (Unit 3 )
17th 4 CYBERCRIME Types of Cybercrimes (1.1 to 1.9 67 to 73
18th " Exercise 74 to 75
19th Revision and Test of the Above Topics (Unit 4 )
20th 2nd Term Paper (Units 3 & 4)
3rd Term
WEEK UNIT #
21st 2
NAME OF UNIT
PASSWORDS AND USER ACCOUNTS
TOPICS
Opening User Accounts / Adding a New User Account
PAGE #
21 to 22
22nd " Changing an Account (3.3 to 3.7) 23 to 30
23rd " Revision and Test of the Above Topics (Unit 32)
24th " Turning the Guest Account On / Deleting Your Own Account Off / Exercise & Lab Activities
25th 6 MY FIRST WEB PAGE Rquirements for Creating HTML Docunents / Understanding HTML Tags / Creating Your Web Page (3.1 to 3.3)
26th Revision and Test of the Above Topics (Units 2 & 6 )
27th
31 to35
103 to 108
" Inserting Text for Display in a Document (4.1 to 4.12) 109 to 124
28th " Applying Background Colour / Exercise & Lab Activities 125 to 128
29th Revision and Test of the Above Topics (Unit 6 )
78 30th
3rd Term Paper (Units 2 & 6)
Final Term
WEEK UNIT #
31st 1st term (revision) Unit 1 to 5
32nd "
33rd 2nd TERM (REVISION) UNIT 3 & 4
NAME OF UNIT
INSTALLATION OF WINDOWS XP
TOPICS
Pre-Installation Checklist / Installation Process / Installing Drivers of Windows XP / Exercise & Lab Activities
PAGE
5 to 19
ROBOTS Installing Drivers of Windows XP / Exercise & Lab Activitie 77 to 101
MAINTAIN YOUR SYSTEM Organize Your Files and Folders / Specifying the View of Files and Folders / Deleting Unwanted Files / Remove programs you do not need anymore / Updating Windows XP / Using an antivirus and spyware program (6.1 to 6.4) / Backup Your Files / Exercise & Lab Activities
37 to 65
34th " CYBERCRIME Types of Cybercrimes (1.1 to 1.9 / Exercise 67 to 75
35th 6 PASSWORDS AND USER ACCOUNTS
36th 3rd TERM REVISION) UNIT 3 & 4
37th
MY FIRST WEB PAGE
Rquirements for Creating HTML Docunents / Understanding HTML Tags / Creating Your Web Page (3.1 to 3.3)
Rquirements for Creating HTML Docunents / Understanding HTML Tags / Creating Your Web Page (3.1 to 3.3) / Inserting Text for Display in a Document (4.1 to 4.12) / Applying Background Colour / Exercise & Lab Activities
Preporatory Leaves' Week
38th Final Term Paper (Units 1 to 6) ORAL & LAB ACTIVITIES
39th Final Term Paper (Units 1 to 6) WRITTEN
40th
103 to 108
103 to 128
Division of Units
First Term Unit 1,2 & 3
Second Term Unit 5 & 6
From Page 4 to 32
From Page 43 to 74
From Page 75 to 96 Final
Third Term Unit 4 & 7
All 7 Units