M1-R5: INFORMATION TECHNOLOGY TOOLS AND NETWORK
BASICS (JAN 2021)
DURATION: 3 Hours
ALL THE QUESTIONS:
Each question below gives a multiple
choice of answers. Choose the most appropriate one and enter in the “OMR”
answer sheet supplied with the question paper, following instructions
1.1 To paste text from the clipboard in the document being edited, press the
Ctrl and V
Ctrl and X
Ctrl and S
Ctrl and P
The correct answer is (A) Ctrl and V.
Which of the following is an input device?
The correct answer is (C) Keyboard.
An input device is any hardware component that allows the user to enter data,
commands, or instructions into a computer or other electronic device. A
keyboard is a common input device used to enter text, numbers, and other types
of data into a computer. Screens, speakers, and printers are output devices,
which display or produce information from a computer or other electronic
Which of the following file extension indicate file created in Paint?
The correct answer is (A) BMP.
Paint is a basic image editing software included in Windows operating system.
When you create a file in Paint and save it, the default file format is Bitmap
(BMP), which is a common image file format used to store bitmap digital images.
Therefore, the file extension that indicates a file created in Paint is BMP.
The other file extensions mentioned in the options are related to different
software programs. DOC is a file extension used for Microsoft Word documents,
PPT is used for Microsoft PowerPoint presentations, and STK is not a commonly
used file extension.
OTP stand for:
Once and twice password
On time password
None of the Above
The correct answer is (A) One-time Password.
OTP stands for “One Time Password”. It is a password that is valid
for only one login session or transaction, on a computer system or other
digital device. OTPs are often used as a second factor of authentication in
addition to a user’s password, to add an extra layer of security to online
accounts and transactions. An OTP is typically generated by a security token or
an authentication app and sent to the user’s mobile device or email, which the
user must then enter within a short period of time to complete the login or
CC in Email stand for
The correct answer is (B) Carbon copy.
CC in an email stands for “Carbon Copy”. It refers to the practice of
sending a copy of an email message to one or more recipients in addition to the
primary recipient. The term “carbon copy” comes from the traditional
method of making a copy of a written or typed document using carbon paper,
where the same message could be duplicated and distributed to multiple
recipients. In email, the CC field allows the sender to specify additional
recipients who will receive a copy of the message.
To get Help when using Office, you would click the
The correct answer is (A) F1 Key.
In Office, you can get help by clicking the F1 key on your keyboard. This will
open the Help pane, where you can search for help topics related to your
current task or question. The F1 key is a commonly used shortcut for accessing
help in many software programs, including Office. Alternatively, you can also
access help by clicking on the “Help” button in the ribbon menu, or
by pressing the “Alt” key and typing “help” in the search
Size of IPV4 is:
The correct answer is (A) 32.
IPV4 (Internet Protocol version 4) is a protocol for assigning unique numerical
addresses (IP addresses) to devices connected to the Internet. The size of IPV4
addresses is 32 bits, which means there are 2^32 or over 4 billion possible
unique IP addresses in the IPV4 address space. However, due to the growth of
the internet and the proliferation of devices, the IPV4 address space is now
exhausted and a new protocol, IPV6, has been introduced to expand the address
Which of the following is a tool to send letter to many recipients in Libre
The correct answer is (B) Mail merge.
Mail merge is a tool in LibreOffice (and other office productivity suites) that
allows you to create and send customized letters or emails to many recipients
at once. With mail merge, you can create a template letter with placeholders
for variable information, such as names and addresses, and then merge the template
with a data source, such as a spreadsheet or database, to generate individual
letters for each recipient. This can save time and effort when sending out a
large number of similar letters or emails. “What-if”, “Goal
seeking”, and “Sorting” are other tools commonly used in
spreadsheets for different purposes.
Twitter is example of:
correct answer is (C) Social networking.
Twitter is a social networking platform that allows users to send and receive
short messages called “tweets” of up to 280 characters. Twitter is
used by millions of people worldwide for a variety of purposes, such as sharing
news, opinions, ideas, and information, following celebrities, organizations,
or trends, networking with others in their field, and promoting products or
services. Twitter can be accessed through a web browser or mobile app, and
users can interact with each other by following, retweeting, liking, or
replying to tweets. “E-mail system” and “Web URL” are
different types of online communication systems, and “System
application” is a software program designed for specific tasks.
Which of the following refers to the fastest biggest and most expensive
The correct answer is (C) Super Computer.
A supercomputer is a type of computer that is designed to perform extremely
complex calculations and simulations at high speeds. Supercomputers are
generally the fastest, most powerful, and most expensive computers available,
with the ability to perform trillions of calculations per second (teraflops) or
more. They are used in a variety of fields, such as scientific research, weather
forecasting, and national defense, where massive amounts of data need to be
processed quickly. Personal computers, laptops, and notebooks are all types of
general-purpose computers that are designed for individual use, productivity,
and entertainment, but they are not as powerful as supercomputers.
Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the “OMR” answer sheet supplied with the question paper, following
instructions therein. (1X10)
An icon on the desktop that represent a temporary holding place for files that
are deleted is called as Recycle Bin.
Yes, that statement is
The Recycle Bin is a desktop icon in the Windows operating system that serves
as a temporary holding place for files and folders that have been deleted from
the computer’s file system. When a file or folder is deleted, it is not
immediately removed from the hard drive but is instead moved to the Recycle
Bin, where it can be restored if needed. The Recycle Bin provides a safety net
for users who accidentally delete files or later realize they still need a
deleted item. The Recycle Bin can be accessed by double-clicking the icon on
the desktop or by right-clicking it and selecting “Open”.
Absolute cell referncing always refer to the same cell in spreadsheet
Yes, that statement is
Absolute cell referencing is a technique used in spreadsheet applications, such
as Microsoft Excel and Google Sheets, to create formulas that always refer to the
same cell or range of cells, regardless of where the formula is copied or moved
within the spreadsheet. An absolute cell reference is indicated by a dollar
sign ($) before the column letter and/or row number of the cell reference, such
as $A$1. When a formula contains an absolute cell reference, the formula always
refers to the same cell or range of cells, even if the formula is copied or
moved to another location in the spreadsheet. This can be useful when creating
complex formulas that involve multiple cells and need to be applied
consistently across the spreadsheet.
Operating System is a specific hardware
No, that statement is
An operating system (OS) is a software program that manages computer hardware
and provides common services for computer programs. An operating system is not
a specific hardware, but rather a program that runs on a computer and manages
its resources, such as memory, processing power, and input/output devices. The
operating system acts as an intermediary between the hardware and the software
applications that run on the computer. Some examples of popular operating
systems include Microsoft Windows, macOS, Linux, iOS, and Android. The hardware
components of a computer, on the other hand, include the physical parts of the
computer, such as the central processing unit (CPU), memory, motherboard, hard
disk drive, and peripheral devices, such as keyboard, mouse, and monitor.
ISP cannot provide internet connection to user
No, that statement is
Internet Service Provider (ISP) is a company that provides internet access to
customers. ISPs offer different types of internet connection options, such as
dial-up, broadband, cable, DSL, fiber optic, and satellite. Users can subscribe
to an ISP’s service and receive internet connectivity through their
internet-enabled devices, such as computers, laptops, tablets, and smartphones.
ISPs typically provide a range of internet plans with varying speeds, data
allowances, and pricing to suit the needs of different customers. So, it is
possible for an ISP to provide internet connection to a user.
e-payment can be done through UPI
that statement is correct.
UPI (Unified Payments Interface) is a payment system developed by the National
Payments Corporation of India (NPCI) that enables users to make instant,
secure, and cashless transactions from their bank accounts using a mobile
device. UPI allows users to transfer money to other users, pay bills, recharge
mobile phones, book tickets, and make purchases at online and offline stores.
UPI has become a popular mode of electronic payment in India due to its ease of
use, convenience, and security. Users can link multiple bank accounts to a UPI
ID and make transactions without the need to enter bank details or OTP
(one-time password) for every transaction. UPI transactions can be initiated
through various mobile banking apps, payment wallets, or UPI-enabled apps
provided by banks. Therefore, it is possible to make e-payments through UPI.
Flipkart is an example of Social Networking.
Flipkart is not an example of social networking. It is an Indian e-commerce
company that operates online marketplaces for selling goods and services.
Internet is network of networks
Yes, that is correct.
Internet is a global network of networks that connects millions of computers
and other devices around the world. It is made up of a vast number of
interconnected networks that use standardized communication protocols to
communicate with each other and share information.
E-mail is elegant mail.
E-mail is not an
acronym for “elegant mail”. It is simply a shortened form of
Mobile Hot Spot cannot be used to share internet with other user.
The statement is false.
Hotspot allows a user to share their mobile device’s internet connection with
other devices like laptops, tablets, or other smartphones via Wi-Fi, Bluetooth,
You cannot hyperlink to a picture
This statement is not
It is possible to hyperlink to a picture in many software applications,
including web browsers, word processors, and presentation software. When you
create a hyperlink in a document or web page, you can select an image or
picture as the hyperlink object, so that clicking on the image will take you to
the linked content.
words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “OMR” answer sheet
supplied with the question paper, following instructions there
4. Each statement below has a blank space to
fit one of the words(s) and phrase(s) in the list below.
Choose the most appropriate options, enter your choice in the
“OMR” answer sheet supplied with the question paper, following instructions
An Electronic document sent with the E-Mail is termed as ___________.
An electronic document sent with email is termed as an attachment.
The Central module of an operating system is called__________.
The central module of an operating system is called the kernel.
The kernel is responsible for managing the computer’s hardware and software
resources, including the CPU, memory, input/output devices, and file system. It
provides a layer of abstraction between the hardware and the applications
running on the system, and is essential for the proper functioning of the
Portrait and Landscape are ___________.
Portrait and Landscape Are Page Orientation.
Portrait and Landscape
are two different orientations used for displaying content on a screen or page.
refers to the vertical orientation where the height of the display is greater
than its width. This orientation is typically used for reading documents,
browsing websites or social media, and taking photos of individuals.
on the other hand, refers to the horizontal orientation where the width of the
display is greater than its height. This orientation is typically used for
viewing images, watching videos, and playing games that require a wider field
The choice of
orientation depends on the content being displayed and the device being used.
Many devices such as smartphones and tablets allow users to switch between
portrait and landscape modes, depending on their preferences and needs.
The ______ features in Internet Explorer, allows a user to save a website on a
list for easy access later.
The feature in Internet Explorer that allows a user to save a website on a list
for easy access later is called “Favorites”. This feature is similar
to the “Bookmarks” feature
in other web browsers, such as Google Chrome and Mozilla Firefox.
When a user adds a
website to their Favorites list in Internet Explorer, they can quickly access
that site later by selecting it from the list. This can be especially useful
for sites that a user visits frequently or for sites that they want to save for
To add a website to the
Favorites list in Internet Explorer, the user can click on the
“Favorites” button (represented by a star icon) in the browser
toolbar and then select “Add to favorites”. They can then choose a
name and location for the favorite and click “Add” to save it to the
Accessing e-Govenance Service on Mobile using _________.
Accessing e-Govenance Service on Mobile using UMANG APP
UMANG (Unified Mobile
Application for New-age Governance) is a mobile app developed by the Government
of India to provide citizens with easy access to various e-Governance services
offered by multiple government agencies on a single platform. The app was
launched in 2017 as a part of the Digital India initiative.
The UMANG app allows
users to access a wide range of services such as Aadhaar, EPFO, PAN,
DigiLocker, Passport, Gas booking, and many others. Users can view their
service request status, download documents, and track their application status
through the app. The app also provides alerts and notifications related to the
services that the users have availed or applied for.
UMANG supports multiple
languages, and users can access the app in English, Hindi, Tamil, Telugu,
Punjabi, and other regional languages. The app also provides various features
such as access to customer support, feedback and ratings, and a user-friendly
UMANG is available for
free download on both Android and iOS platforms, and users can download it from
Google Play or the App Store. Users need to create a UMANG account to access
the services on the app, and they can also link their Aadhaar or other
government IDs to their account for seamless authentication.
____________ is an electronic page in a presentation.
Slide is an electronic page in a presentation.
Size of IPV6 is _____ bit.
The size of IPv6 is 128 bits. This is four times larger than the 32-bit IPv4
address space, providing a much larger pool of unique addresses for devices
connected to the internet. The increased address space is necessary due to the
explosive growth of internet-connected devices in recent years.
Crime that involves computer and network is known as _______ crime.
The crime that involves computer and network is known as cybercrime. Cybercrime
refers to criminal activities that are committed using computers, networks, and
the internet. Cybercriminals use technology to commit crimes such as hacking,
identity theft, phishing, online scams, and cyberbullying, among others. The
use of technology in these crimes makes them difficult to detect and trace, and
therefore, cybercrime has become a significant threat to individuals,
businesses, and governments worldwide.
_________ will copy formatting from one place ad apply it to another.
feature that will copy formatting from one place and apply it to another is
called the format painter. The format painter is a tool found in many software
applications such as Microsoft Word, Excel, and PowerPoint, and it allows users
to copy formatting such as font type, font size, and color from one location
and apply it to another. This tool saves time and effort in formatting
documents or presentations, especially when working with large or complex
The Command to view the contents of a file in LINUX is __________________.
The command to view the contents of a file in Linux is “cat”.
To view the contents of
a file using the “cat” command, you can open the terminal and type
the following command:
“filename” with the actual name of the file that you want to view.
This command will display the contents of the file on the terminal. If the file
is too large to fit on one screen, you can use the “more” or
“less” command to view the file one screen at a time.
Q5. a Draw an internal
Diagram of computer system and explain in brief the application of various
Solution: here is an
internal diagram of a computer system:
Random Access Memory
Explanation of various
components and their applications:
Central Processing Unit
(CPU): It is the brain of the computer and is responsible for executing
instructions. The CPU performs arithmetic and logical operations and controls
the flow of data within the computer. The CPU contains the control unit,
arithmetic logic unit, and registers.
Random Access Memory
(RAM): It is the main memory of the computer and is used to store data and
program instructions temporarily while they are being processed. The RAM is volatile
memory, which means that its contents are lost when the power is turned off.
These devices allow users to input data into the computer and receive output
from it. Examples of input devices include keyboards, mice, scanners, and
microphones, while output devices include monitors, printers, and speakers.
The CPU, RAM, and
input/output devices work together to perform various tasks on a computer. The
CPU executes instructions stored in the RAM and communicates with input/output
devices to receive input and provide output. The RAM allows the CPU to access
data and instructions quickly, while input/output devices enable users to
interact with the computer.
In addition to these
components, a computer system may also include a hard disk drive, a power
supply unit, a motherboard, and other components depending on the specific
configuration. The hard disk drive is used for long-term storage of data and
programs, while the power supply unit provides power to the components. The
motherboard connects all the components and provides a communication pathway
Overall, each component
of a computer system plays a critical role in the functioning of the system,
and they work together to provide users with a powerful tool for performing
various tasks such as creating documents, browsing the internet, and playing
How to turn off and activate automatic spelling checking and automatic grammer
checking in Libra Office program?
turn off and activate automatic spelling and grammar checking in LibreOffice,
follow these steps:
1. Open LibreOffice
2. Click on
“Tools” from the menu bar and select “Options”.
3. In the
“Options” dialog box, select “Language Settings” from the
left-hand side menu.
4. Click on
“Writing Aids” tab.
5. To turn off the
automatic spelling checking, uncheck the “Check spelling as you type”
6. To turn off the
automatic grammar checking, uncheck the “Check grammar as you type”
7. To turn on the
automatic spelling checking and automatic grammar checking, check the
Note: The steps may
vary slightly depending on the version of LibreOffice you are using.
Once you have made the
changes, click on “OK” to save the settings. The automatic spelling
and grammar checking will now be turned off or activated according to your
What are advantages and disadvantage of social networking sites? Give two
example of social networking site.
Advantages of social networking sites:
1. Connecting with
people: Social networking sites allow individuals to connect with people from
all over the world, making it easy to communicate with family, friends, and
relationships: Social networking sites help people build and maintain
relationships with others, even those they may not see on a regular basis.
information: Social networking sites make it easy to share information, such as
news, photos, and videos, with a wide audience.
4. Finding new
opportunities: Social networking sites can provide opportunities for
individuals to find jobs, business partnerships, and other opportunities.
of social networking sites:
Social networking sites can be a breeding ground for cyberbullying and
harassment, with individuals using the anonymity of the internet to bully
concerns: Social networking sites often require users to share personal
information, which can raise privacy concerns, especially if the information is
shared with third-party advertisers.
Social networking sites can be addictive, with individuals spending hours
scrolling through their feeds and checking notifications.
4. Spread of
misinformation: Social networking sites can also be a source of misinformation
and fake news, which can spread quickly and have negative consequences.
of social networking sites:
is one of the largest social networking sites in the world, with over 2 billion
monthly active users. It allows users to connect with friends and family, join
groups, and share photos, videos, and other content.
Twitter is a social networking site that allows users to post short messages,
or tweets, of up to 280 characters. It is used by individuals, businesses, and
organizations to share news, information, and opinions.
How to manage disk partition on windows using inbuilt disk management tool?
You can manage disk
partitions on Windows using the inbuilt Disk Management tool. Here are the
the Disk Management tool by pressing the Windows key + X and selecting “Disk
Management” from the menu.
Disk Management is open, you will see a list of all the disks and partitions on
create a new partition, right-click on the unallocated space and select
“New Simple Volume”.
the instructions in the New Simple Volume Wizard to create a new partition,
including selecting the size, assigning a drive letter, and formatting the
extend a partition, right-click on the partition you want to extend and select
the instructions in the Extend Volume Wizard to add the unallocated space to
shrink a partition, right-click on the partition you want to shrink and select
the amount of space you want to shrink the partition by, and then click
delete a partition, right-click on the partition and select “Delete
Confirm that you want
to delete the partition, and then click “Yes”.
Note: Make sure to
backup all important data before making any changes to disk partitions.
Differentiate: LAN, WAN and MAN.
(Local Area Network), WAN (Wide Area Network), and MAN (Metropolitan Area
Network) are three types of computer networks. Here are the differences between
LAN (Local Area
Network): A LAN is a network that is confined to a small geographic area, such
as an office building, school, or home. It typically uses Ethernet cables or
Wi-Fi to connect devices and provides high-speed data transfer. A LAN is
typically owned and managed by a single entity and is used for sharing
resources, such as printers and files, and for communication among devices
within the network.
WAN (Wide Area
Network): A WAN is a network that spans a large geographic area, such as a
city, country, or even the world. It connects LANs and other smaller networks
together over long distances, typically using leased lines, satellite links, or
other technologies. WANs are often used by businesses and organizations to
connect multiple offices or sites together and to provide access to the
MAN (Metropolitan Area
Network): A MAN is a network that covers a larger geographic area than a LAN
but smaller than a WAN. It typically covers a city or metropolitan area and is
used to connect multiple LANs and other networks together. A MAN may use
technologies such as fiber-optic cables or microwave links to provide
high-speed data transfer, and it is often used by government agencies,
educational institutions, and large businesses.
In summary, LANs are
small networks that connect devices within a small area, WANs connect large
networks over long distances, and MANs connect networks within a metropolitan
a Define the following financial terms
Credit and Debit card
1. Credit and Debit Card:
Credit card and debit
card are two different types of payment cards used to purchase goods and
services. A debit card is linked to your checking account, and when you use it
to make a purchase, the funds are withdrawn directly from your account. On the
other hand, a credit card is issued by a financial institution and allows you
to borrow money to make purchases, which you then have to pay back with
interest over time. In other words, a debit card lets you spend the money you
have, while a credit card lets you spend money you don’t have (but will have to
pay back with interest).
Interface (UPI) is a digital payment system that allows you to transfer money
between bank accounts instantly using a mobile app. UPI was developed by the
National Payments Corporation of India (NPCI) and is widely used in India. With
UPI, you can send and receive money, pay bills, make online purchases, and
more, all without needing to enter your bank details every time.
Point of Sale (PoS)
refers to the place where a transaction takes place between a buyer and a
seller. In the context of finance, a PoS system refers to the hardware and
software used to process credit and debit card transactions at retail stores,
restaurants, and other businesses. When a customer swipes or inserts their card
into a PoS terminal, the system connects to their bank to authorize the payment
and transfer funds from the customer’s account to the merchant’s account. PoS
systems can also be used to track inventory, generate sales reports, and manage
What is an array formula in Spreadsheet? By taking suitable data, explain sum
operation on array data?
An array formula is a
special type of formula in a spreadsheet that allows you to perform
calculations on a range of cells at once. Unlike regular formulas, which
operate on a single cell or a fixed range of cells, an array formula can
operate on an entire range of cells, or even multiple ranges of cells, at the
One common use of array
formulas is to perform a SUM operation on an array of data. Here’s an example:
Suppose you have a
table of sales data for four different products in columns A through D, and you
want to calculate the total sales for each product across all four quarters of
the year. You could use the following array formula:
To enter this formula,
you would type it into the formula bar, then instead of hitting Enter, you
would hit Ctrl + Shift + Enter. This tells the spreadsheet that you’re entering
an array formula.
The formula works by
multiplying the sales figures for each quarter by a corresponding array of 1s
(which acts as a placeholder), and then adding up the results. So, for example,
if the sales figures for Product 1 were 100, 200, 300, and 400 in quarters 1
through 4, respectively, the formula would calculate the total sales as
=SUM(100, 200, 300,
which would result in a
total of 1,000.
Note that if you try to
enter this formula without using the Ctrl + Shift + Enter shortcut, you will
get an error message, because the formula is not valid as a regular formula. It
must be entered as an array formula in order to work correctly.
Write steps to do E-mail. What is Email-id and its uses in Email?
Solution: Steps to send an email:
1. Open your email
account: To send an email, you need to first open your email account. This can
be done by going to the website of your email service provider (e.g. Gmail,
Yahoo Mail, Outlook), or by opening an email app on your computer or mobile
2. Click on
“Compose” or “New Email”: Once you’re logged in to your email
account, look for a button or link that says “Compose” or “New
Email”. This will open a new window where you can start writing your
3. Enter the
recipient’s email address: In the “To” field, enter the email address
of the person you want to send the email to. If you’re sending the email to
multiple people, you can enter multiple email addresses separated by commas.
4. Write your
message: In the body of the email, write your message. You can format the text
using different fonts, sizes, and colors, and you can add attachments like
images or documents if needed.
5. Add a subject
line: In the subject field, write a brief description of what the email is
about. This helps the recipient to quickly understand the purpose of your
6. Review and send:
Before sending the email, review it to make sure everything looks good. Once
you’re satisfied, click on the “Send” button to send the email to the
An email ID, also known
as an email address, is a unique identifier that is used to send and receive
emails. It consists of two parts: a username (which comes before the
“@” symbol) and a domain name (which comes after the “@”
symbol). For example, “email@example.com” is an email ID, where
“deveshmalik” is the username and “gmail.com” is the domain
The email ID is a
fundamental component of email communication as it allows email clients to
route messages to the intended recipient’s email server. In addition to this,
email IDs also serve the following purposes in email communication:
Verification: Email IDs are used to verify the
identity of the sender and the recipient of an email message.
Book: Email IDs can be stored in an address book or
contact list, making it easy to send messages to frequently contacted
Services: Email IDs are often used to subscribe to
newsletters or other online services, where email is the primary method of
Email IDs are used to filter messages using rules that can automatically sort
incoming messages to a particular folder or label.
Email IDs are used in the authentication process, where the user is required to
enter their email ID and password to access their email account.
Overall, email IDs are
an essential component of email communication, allowing users to easily send
and receive messages, subscribe to services, and verify identities.
a Explain how slide transition is used in ppt.
Slide transitions in PowerPoint are used to add visual effects when moving from
one slide to the next during a presentation. They help to create a smooth flow
and improve the overall look and feel of a presentation. Here’s how slide
transitions are used in PowerPoint:
the slide: First, select the slide to which you want to apply a transition.
the “Transitions” tab: Next, go to the “Transitions” tab in
the PowerPoint ribbon.
a transition: There are several types of transitions available in PowerPoint,
such as fade, dissolve, and slide. Click on the transition you want to apply to
the transition: To preview the transition, click on the “Preview”
button in the “Transitions” tab.
the transition duration: You can set the duration of the transition by
adjusting the “Duration” slider in the “Transitions” tab.
the transition: Once you’re satisfied with the transition settings, click on
the “Apply to All Slides” button to apply the same transition to all
slides in the presentation. Alternatively, you can apply transitions to
individual slides by selecting them one at a time.
tips for using slide transitions effectively in PowerPoint are:
Keep it simple: Use
transitions sparingly and choose ones that are appropriate for the content and
tone of your presentation.
Don’t use overly flashy or distracting transitions that can take away from the
message of your presentation.
Consistency is key: Use
the same transition throughout your presentation to maintain a consistent look
transitions are a useful tool in PowerPoint for adding visual interest and
improving the flow of a presentation. However, they should be used judiciously
and with purpose to avoid distracting from the content of the presentation.
Explain briefly “Intellectual Property Right”.
rights (IPR) are legal rights that protect creative works and ideas from
unauthorized use by others. They are a form of property that is intangible and
non-physical, meaning they cannot be touched or seen, but still have value.
There are several types
of intellectual property rights, including:
protect inventions and give the inventor the right to prevent others from
making, using, or selling the invention for a certain period of time.
protect brand names, logos, and other symbols used to identify and distinguish
goods or services from those of others.
protect original works of authorship, such as books, music, and software,
giving the creator the right to control how their work is used and distributed.
Trade secrets: Trade
secrets protect confidential information, such as formulas, processes, and
customer lists, that give a business a competitive advantage.
Industrial designs protect the visual appearance of a product, such as its shape,
pattern, or color.
IPR are important
because they encourage innovation and creativity by allowing creators to profit
from their work and maintain control over how it is used. They also promote
fair competition by preventing others from using someone else’s work without
permission. However, IPR can also be a source of controversy and debate, as
there are often questions about how much protection is necessary and whether
IPR can be used to stifle innovation and creativity.
Write steps to add watermarks in Libra office writer.
You can add watermarks
to your documents in LibreOffice Writer by following these steps:
1. Open LibreOffice
Writer and open the document you want to add a watermark to.
2. Click on the
“Format” menu and select “Page”.
3. In the
“Page Style” dialog box, click on the “Background” tab.
4. Select the
5. lick on the
“Image” drop-down menu and select the type of watermark you want to
use. You can choose between predefined watermarks or use an image from your
6. Adjust the
transparency and rotation of the watermark as needed using the options
“OK” to apply the watermark to your document.
Your watermark will now
be applied to your document, and it will appear on all pages. If you want to
remove the watermark, simply go back to the “Background” tab in the
“Page Style” dialog box and uncheck the “Watermark” checkbox.
Write short notes on
Internet of Things
QR code and its Application
Virtual Reality (VR) – Virtual Reality is a
computer-generated, immersive experience that simulates a real-life environment
or situation. It uses headsets and software to create a sensory experience that
can be similar to or completely different from reality. VR is widely used in
gaming, education, training, and simulations.
Internet of Things (IoT) – The Internet of Things refers to
the interconnectivity of everyday devices through the internet. IoT devices,
such as smart home appliances, wearable devices, and industrial sensors, are
connected to the internet, allowing them to exchange data and perform automated
actions. IoT has the potential to revolutionize the way we live, work, and
interact with technology.
Cyber Security – Cyber Security refers to the protection
of computer systems, networks, and digital data from unauthorized access,
theft, and damage. Cyber security is essential in today’s digital age, where
cyber threats such as hacking, malware, and phishing are becoming increasingly
prevalent. Cyber security measures include firewalls, encryption,
authentication, and backup systems.
QR code and its Application – QR codes are
two-dimensional barcodes that can be scanned using a smartphone camera. They
are widely used in advertising, product packaging, and marketing campaigns. QR
codes can contain a wide range of information, such as website URLs, contact
information, and payment details. QR codes are also used in contact tracing and
to provide quick access to information in public places.
Blockchain Technology – Blockchain is a decentralized,
digital ledger that records transactions in a secure and transparent manner. It
is widely used in cryptocurrency transactions, but it has applications in
various fields such as healthcare, supply chain management, and digital
identity verification. Blockchain’s unique features, such as immutability,
transparency, and security, make it a promising technology for the future.