Monday 21 August 2023

ICT - VII


 

Answer the Following 

1. What are 3 disadvantages of AI?

Ans- 

  1. Unemployment. ...
  2. Make Humans Lazy. ...
  3. No Ethics. ...
  4. Emotionless. ...
  5. No Improvement.


2. What are 3 advantages of AI?
Ans- 

  1. By Reducing Human Error. ...
  2. Allows Automating Repetitive Tasks. ...
  3. Easily Handles Big Data. ...
  4. Faster Decision-Making with Continuous Availability. ...
  5. AI-powered Digital Assistants. ...
  6. Mitigates Risks.
3.What fields are used in AI?
Ans
  1. Virtual assistants like Siri and Alexa.
  2. Recommendation systems used in e-commerce platforms.
  3. chatbots and customer service.
  4. Medical diagnosis and healthcare systems.
  5. Social media
  6. Military sector
  7. Delivering goods


4. What are the multiple layers of Security?

Ans- 

  1. Physical Security
  2. Personal Security
  3. Operations Security
  4. Communication Security
  5. Network Security
  6. Information Security


5. What is sorting?

 Ans- Sorting means rearranging data into ascending or descending order. For Ex. rearranging data from A to Z or Z to A.

6. What is filter?

Ans- Filter means to show data according to the condition or criteria. For Ex. Display the of students who scored more than 60 marks.


7. What is conditional formatting?

Ans-Conditional formatting allows to highlight data based on the criteria selected from the drop down list.


8. What are the components of information system?

  1. Software
  2. Hardware
  3. Data
  4. People
  5. Procedures
  6. Networks.


11. What are the functions of Locks & Keys?

Ans- Locks & Keys are the traditional tools of physical security, which restricts access to, and interaction with the hardware components of an information system.


12. What are the problems related with computer security ?
Ans. Problems related with computer security are :1. Phishing

  1.  Vishing
  2.  Smishing
  3.  Pharming
  4. Vulnerability
  5. Exposures


13. What are the steps taken to protect computer system hardware?
Ans. Five steps to protect computer system hardware are :

1. Install firewall
2. Install antivirus software
3. Install anti-spyware software
4. Use complex and secure passwords
5. Check on the security settings of the browser

================================================================

Answer in one sentence

1) Does MS word have advanced formatting facilities?

Ans- yes, MS word have advanced formatting facilities

2) By default excel provides how many worksheet in a workbook?
Ans – by Default excel provides three worksheet in the work book

3) Which command is used to save the workbook?
Ans- Ctrl +S Is the command which is used to save the workbook

4) Navigation buttons are presented in the?
Ans- Navigation buttons are presented in the lower left corner of the Excel workbook

5) In Excel text entries and values are aligned to which side of the cell?
Ans- In Excel text entries and values are aligned to the left border of the cell while numbers are align to the right side of the cell .

6) Which Command is used to display the go to dialogue box?
Ans- F5 Is the command is used to display the go to dialogue box

7) What is a custom list?

Ans-Custom lists are those lists created by user with his own customization or own list.

8) What do you mean by cell rules for conditional formatting?

Ans-Cell rules are criteria specification that is used to highlight data in a spreadsheet.

9) Define Information Security.
 Ans-It is a well-informed sense of assurance that the information risks and controls are in balance.
 
10) What is Security?
Ans- Security is “the quality or state of being secure-to be free from danger”.


11) What is E-mail Spoofing?

Ans- It is the process of sending an e-mail with a modified field.



12) What is Utility of information?

Ans- Utility of information is the quality or state of having value for some purpose or end.

========================================================================

No comments:

Post a Comment