MOECDC Class 8 Information and Communication Technology

MOECDC Class 8 Information and Communication Technology

MOECDC Class 8 Science and Technology | Information and Communication Technology | Nepal Class 8 | Exercise | Question Answer
MOECDC Class 8 English Medium Science Chapter 2 Information and Communication Technology Exercise Question Answer Solution.

Board  Government of Nepal.
Class  Eight (8).
Subject  Science and Technology.
Chapter  Information and Communication Technology
Topic  Exercise Solve / Question Answer / Notes.

MOECDC Class 8 Information and Communication Technology

(1) Choose the best alternative :

(a) What is the main function of a set-top box (STB)?

(i) Receiving the digital signal

(ii) Displaying the television channel

(iii) Decoding

(iv) All of the above

Answer : 

The main function of a set-top box (STB) is – (iv) All of the above

(b) What is the fixed address of the website

(i) www

(ii) URL

(iii) wave browser

(iv) wave page

Answer : 

The fixed address of the website is – (ii) URL

(c) Which type of cybercrime is related to Intimidation, defamation or any other form of mental degradation by using electronic means or modes such as social media?

(i) Identity Theft

(ii) Cyberbullying

(iii) Trade Secrets

(iv) Hacking

Answer : 

(ii) Cyberbullying – is related to Intimidation, defamation or any other form of mental degradation by using electronic means or modes such as social media.

(d) What is the latest technology that can understand intelligence and human ability through the use of machines?

(i) Robotics

(ii) Artificial Intelligence

(iii) Virtual Reality

(iv) Google Plus

Answer : 

(ii) Artificial Intelligence – is the latest technology that can understand intelligence and human ability through the use of machines.

(e) In which category do digital signature falls which measures internet security?

(i) Certification

(ii) Browser Selection

(iii) email security

(iv) antivirus software

Answer : 

Digital signature falls in – (i) Certification category which measures internet security.

(f) Which of the following is an advantage of cloud computing?

(i) Cloud migration

(ii) Global scale

(iii) IT Governance

(iv) Unexpected Costs

Answer : 

(ii) Global scale – is an advantage of cloud computing.

(2) Differentiate between :

(a) Printers and Scanners

Answer : 

Printers and Scanners –

(i) Printers produce hard copy but scanners produce soft copy.

(ii) Printers are output device while scanners are input device.

(b) Search Engines and Websites

Answer : 

Search Engines and Websites – Search Engine is a communication program to search the content on the internet, while website is a hub for the collection of multiple web pages and the storage of information about an organization.

(c) Virtual Reality (VR) and Artificial Intelligence

Answer : 

Virtual Reality (VR) and Artificial Intelligence – Virtual reality refers to a computer-generated imitation of a three-dimensional environment that can be interacted within a seemingly real or physical way using special electronic equipment but artificial intelligence is an emerging technology that can act by understanding intelligence and human abilities through the use of machine.

(d) Computer Code of Conduct and Cyber Law

Answer : 

Computer Code of Conduct and Cyber Law – A computer code of conduct is a set of guidelines that outlines the ethical and professional standards expected of individuals who use computers and technology while Cyber law is the legal framework that governs the use of internet, computers, and related technologies.

(e) Robotic Humans and Humans

Answer : 

Robotic Humans and Humans –

(i) Robotic humans are machines but humans are biological organisms.

(ii) Robotic humans can perform tasks with more accuracy and faster than humans.

(iii) Robotic humans are programmed by humans to do some specific tasks while humans can learn, reason and make their own decisions.

(3) Answer the following questions :

(a) What kind of technology is an ATM? Write its important functions.

Answer : 

ATM is an electromechanical machine that provides automated banking services.

ATMs help customers conduct transactions by providing fast, easy and automated services such as cash withdrawals, cash deposits, bill payments and account to account fund transfers etc.

(b) Make a list of various parts of a photocopy machine.

Answer : 

Various parts of a photocopy machine – paper tray, output tray, the cover (top) of the photocopy machine, glass surface, control panel.

(c) What is a printer? Mention its function in brief.

Answer : 

The output device that takes electronic data stored on a computer or other device and produces a hard copy, is called printer.

A printer is the most popular device used to print textual materials and photo among the external devices of the computer. Nowadays, there are different types and capacities of printers available in the market for different purposes. Some printers only produce plain black and white prints, while other also produce multicolored prints.

(d) What is a search engine? Illustrate the need for search engines with examples.

Answer : 

The search engine is a communication program to search the content on the internet.

To get information on any topic, we can use a search engine to find a website related to that topic. Refining our content with a search engine is used for search, saving time and allowing for more precise results. Differentiating between official and non-copyrighted content is simple with a refined search. Even if do not know the address of the website related to the subject are trying to get, can search by just typing a word. Among the search engines used today, the most used is Google which has provided various services such as emailing and translating from one language to another through Google Translator along with the search engine.

(e) Write the main features of ISP.

Answer : 

The main features of ISP –

(i) ISP provides high-speed internet service,

(ii) Most ISPs provide email addresses to their customers,

(iii) Most ISPs protect their customers against problems such as phishing, malware,

(iv) Some ISPs also provide web hosting services.

(f) Mention the opportunities and benefits of social media.

Answer : 

The opportunities for Social media – Social media has helped to spread information and communication over the world. The use of social media has spread to almost every nation. People from villages and cities everywhere are addicted to social media. If used correctly, social media can be powerful tool in the world of communication.

Benefits of social media – Strong medium, brand development, customer interaction.

(g) What is cybercrime? What are the forms of cybercrime?

Answer : 

Cybercrime is defined as any crime against a person or group that harms someone’s reputation or causes physical or mental trauma through electronic means.

The forms of cybercrime are identity theft, cyber terrorism, cyberbullying, hacking and defamation.

(h) Mention the dangers of internet security and ways to avoid them.

Answer : 

The dangers of internet security – Malware, phishing, identity theft, hacking and botnet.

Ways to avoid the dangers of internet security – Use strong passwords, Enable two-factor authentication, Keep software up-to-date, Use reputable antivirus and security software, Use a firewall, Back up important data, Educate users.

(i) What is computer ethics?

Answer : 

Computer ethics is a set of guidelines that outlines the ethical and professional standards expected of individuals who use computers and technology.

(j) What is Artificial Intelligence? What is the main objective of artificial intelligence?

Answer : 

Artificial intelligence is an emerging technology that can act by understanding intelligence and human abilities through the use of machine.

Artificial intelligence is becoming essential for today’s time. It can solve complex problems efficiently in multiple industries, such as healthcare, entertainment, finance, education, etc. AI can perform tasks that normally require human intelligence, such as understanding natural language, recognizing objects, making decisions, and solving problems.

(k) What is robotics? Mention some important tasks performed by robots.

Answer : 

Robotics is an interdisciplinary branch of computer science and engineering.

Robotics develops machines that can assist humans and imitate human actions. Robots can be used to perform hazardous tasks that humans are unable to complete with the aid of programming, such as following orders in space, disposing of explosives, performing a range of tasks in the deep sea, and working securely in areas with radiation threats.

What is meant by Virtual Reality? Write the various sector in which it is used.

Answer : 

Virtual reality refers to a computer-generated imitation of a three-dimensional environment that can be interacted within a seemingly real or physical way using special electronic equipment.

Virtual reality is used in the military field, education sector, sports, the field of mental health, medical training, the field of fashion, the field of architecture.

(m) What is cloud computing? Write down any two services provided by cloud computing.

Answer : 

Cloud computing refers to the use of remote servers hosted on the internet to store, manage, and process data and applications, rather than relying on local servers or personal computers.

Two uses of Cloud computing –

(i) Instead of keeping various files on a hard drive or local storage device, cloud-based storage makes it possible to store them in a remote database.

(ii) As long as an electronic device is within reach of the web, the data and software programs to operate it are accessible through cloud computing.

(n) Which is device is used to convert hard copy to soft copy?

Answer : 

Scanner is used to convert hard copy to soft copy.

(o) What is a collective form of online communication channel dedicated to community-based interaction, content sharing and collaboration?

Answer : 

Social media is a collective from of online communication channel dedicated to community-based interaction, content sharing and collaboration.

(p) What is the act of shutting down or abusing a website or computer network by unethical means?

Answer : 

Hacking is the act of shutting down or abusing a website or computer network by unethical means.

(q) What is the name of the software program that makes copies from one computer to another?

Answer : 

Malware is the name of the software program that makes copies from one computer to another.

(r) What is the legal framework to combat cybercrime and harassment?

Answer : 

Cyber law is the legal framework to combat cybercrime and harassment.

(s) Write the full form of the following terms.

(i) ATM

(ii) www

(iii) URL

(iv) Wi-Fi

(v) ISP

(vii) VR

(vi) Al

Answer : 

(i) Full form of ATM – Automatic Teller Machines

(ii) Full form of www – World Wide Web

(iii) Full form of URL – Uniform Resource Locator

(iv) Full form of Wi-Fi – Wireless Fidelity

(v) Full form of ISP – Internet Service Provider

(vi) Full form of AI – Artificial Intelligence

(vii) Full form of VR – Virtual Reality

 

More Solutions :  

👉 (1) Scientific Learning

👉 (3) Living Beings and Their Structure

👉 (4) Biodiversity and Environment

👉 (5) Life Process

👉 (6) Force and Motion

👉 (7) Energy in Daily Life

👉 (8) Electricity and Magnetism

👉 (9) Matter

👉 (10) Materials Used in Daily Life

👉 (11) The Earth and Universe

Leave a Reply

Your email address will not be published. Required fields are marked *