Anda di halaman 1dari 8

CHAPTER

. .

8 Introduction to Windows
Q.1: Complete the fotlowin,Q statements.
(i) . DOS is ac 1 f // (_nterface.
(ii) Windows is a t\ ' ·' · · interface. J ~
(iii ) The icons on .the desktop aHo\v you to view and J {~fl ( I· i with
Wi n d9~ 1

(iv) The ~f(t) button has both rr me and icon.


( ) To close DOS program type at the DOS prompt.
Answers:
(i) com mand line (it) graph ic u ser · ~ (iii ) interact
(iv) Start (v)cxi t

Q.2: Tfck the following statements either True or False.


i) M nu bar appea rs just below the status ~ar . \\!rue/False\ /
ii) Statu s bar . hows more tha n six co mm ands on it. . ' rue/Fal se l
ii i) . . cree n save r ca n blank yo ur screen when you are not
using mouse or keyboard . ·\}f rue/Fals
i ) An fi le yo u de lete from the hard di ·k goes straight to
Recyde bi ~1 . . \ T rue/Fal se
v) The ic on on the Co ntrol Pa nel is used to in tall uninstall
so fhvare program. J frue/False
Answers:
(i) False (ii ) f al se (iii ) True
(i ·) True (v ) True

Q.3: Encircle one choice A, B, C or D in each case.


(i) Any comm and th at is not available for se lecti on in the drop-down menu
Ii t appcars: -
a. Dark

vb. ln\·isibk

d.
Di m
nd~ rl i n ~d
(ii ) The num bcr of mouse action s with two button mouse are:-
a. 3
b. 4

Visit Ratta.pk for more notes Page 1 of 8 www.office.com.pk


5
6
(iii) /\ tc\thook is a l)pc of: -
a.
CommanJ box
M~nu box
b.
I .i t ho\
c.
~ Dial og box
{iv) Number ol"Shut Jo\-vn op tions on Windows 2000 profc ional are:-
a. 2
b. 3
4
5
(v) The con1111and s that i not present on edit menu:-
Font .
(.J n To
c. Find
d. Ctrl + Z
(vi) The number of items pre ent on Control Pnnel depends upon:-
a. Hard'Aan~ items attached \Vith the system
b.
Items contained on \Vindo\VS CD
C/"l tcm installed during setup
~I. Item required by yo ur system
Answers:
( i) c (ii) c (iii) d
(iv) c (v) a (vi) c

Q.4: Match the items given in Column I with those given in Column II.
Column I ~
Colurnn II
i) Too l bars rt fl
a) Rep Iication
ii ) Ctr! + L ._ b) Table menu
iii) Ctr I v v \:) Tools menu
i \') Di si nfectant
. ,)
d) Vie\v menu
-
v) Computer Virus ( c) Undo action
vi) OlTic~ cl ipboarJ L f) Paste command
\ ii) PagL' Setup C\ 1!)
c. Fi le lllCllll
·-
\'iii) Rukr ~/ h) ('op) \.:ommanJ
i\) Ctrl -t- C \ '\ i) Ldit menu
I \ ) SlH"l t') _j •) /\nti\·irus prul.!ram

Visit Ratta.pk for more notes Page 2 of 8 www.office.com.pk


Answers:
( i) d (ii ) e (iii) r
(iv) j ( )a (vi) I
(v ii) g ( iii) d (ix) h ( ;\) b

Q.5: What is an operating system?


Answer:
The so ft\\C.ll'e that enable the communi cati on between the user and the
ct) mrut er system ~ · a \ hole is called an operating _" tern. The operating system is
the co mputer· · master control prourarn. When you i ·sut ·1 command it interprets the
us -rs c o mmand~ into a language which the mac hine ca n unJL:rstand, and executes the
instruction · an<l help · the c mputer to handle va ri us peripheral de ices such as
~C) b )arJ. moni tor. ll oppy di sk dri e. hard di k drive. the printer and the other
de \ iu.~s.

Q.6: Describe three primary mouse movements in Windows?


Answer:
The mo. t ·rnn111011 1nou c me 1 cmc1ll arc:-
www.ratta.pk
PO I ~Tl NG
~love the rn uu ·con your desk to pos iti on tht: tip of the mouse pointer over the
desire i L)l je t on the crccn.
CLICKL G
Prc:s anJ relea se th e mou e button without 1110 ing the mou e. Clicking may
be used t sclc t ic ns. to po ·iti on the cursor, to cle t menu commaf1d · and to
ch ) 0.' ' 1J n orti on in a menu dialog box .
DO UBLE-CLICKING
Press and relca 'C the mou -e button twice in rapid succession without moving
the mou se. D Liblc-clicking in Window may be u cd to activate a drive or to select a
!ilc/l' )ldcr. It may als be u ed to se lect and activat an object such as My Computer
and Recyc le Bin m the Jcsktop .
RIG Ill-CLICKING
l)rcss amJ relea se the ri'ght mouse button without moving the mouse. Right-
L·l i L'k in ~ l 11 a11 iL·p 11 c r \\·ord may Jisplay a shortcut menu .

DR \~;(;l\C
'>r ·s: ~md lwlJ thL' JllL)USc bullon \\'hilc yo u move the mouse. pointer acro~s th1:
c.;c rL'Cll . \\'hen till' pl1intcr reaches the desired I cation,. release the mouse button .
D ra~1 !.!. i11 g i ~ U:-il'd to 11wn: L1hji:i.:ts or \\'indo'rvs and to trcatc shortcuts 1.· r objects.

Visit Ratta.pk for more notes Page 3 of 8 www.office.com.pk


Q.7: Describe four common mouse pointers shapes?
Answer:
The most common mouse pointer shapes are:-
LEFT ARROW
It is used to select objects, choose menu commands, acces buttons on the
taskbar and application toolbars, and dialog boxes.
HOURGLASS
It informs you that windows is busy in performing an assigned task and
requests you to wait.
I-BEAM
It is used to modify and edit text and to position the insertion point. It is also
cal led a cursor.
·HAND
It is used to select shortcuts and definitions in the Help window.
MOVE
It is used to drag the table to the new definition
While working in Windows you may also find other mouse pointer shapes. In
Windows the characteristic of mouse pointers changes with its shape.

Q.8: What does a Windows represents in a GUI?


Answer:
Windows is a graphical user interface (GUI) in contrast to the DOS, which is
command line interface. A window in. a GUI represents documents, program and
devices on screen as graphical elements. which the user can use by clicking or
dragging. An interface determines how you interact with your computer to do things
like entering data or runni·ng programs like changing fonts, numbering lines, breaking
the text into columns or spell checking. .
Windows is easy to learn because its graphical interface is consistl!nt from one
application to the next. When you have learned to use one application such as M
Word. you have learned the essential for using ar1y other application with window .

Visit Ratta.pk for more notes Page 4 of 8 www.office.com.pk


• -;,"< '! hill.. •

.~-· .............. ~.

·~~·--

........ dm ·
~.(
p_..,

:£ ~·U....••
"Nl-
._....-....._...

Fig: Windows operating system represents a GlJI

Q.9: What happens when you maximize a window?


Answer:
You can maximize window by clicking the maximize button, which enlarge
the window to fill the entire screen. When a window i maximizing, a restore button
appears in its place. With the restore button you can return a window to its original
size.

Q.10: What are two important characteristics of a well designed GUI?


Answer:
l. Graphical user interface (GUI) helps us to interact with the computer
easily and user friendly.
2. In GUI environment there is not need to remember the commands like
DOS.

Q.11: What is meant by plug and play?


Answer:
In Windows operating system plug and play means to detect the device and
install the necessary software.

Q.12: Describe the purpose of the taskbar.


Answer:
The task bar has two primary functions, which ~re as follows:
1. It acts as a launching pad for all the application being open. It keeps in track
of all the working and all the application being performed at a given time .

Visit Ratta.pk for more notes Page 5 of 8 www.office.com.pk


2. When you have multiple prograins running you ~an shift from ·one program to
the other _by simply clicking on the desired program button on the task bar.
The program in the foreground with the highlighted button in the taskbar is
ca lled the active program. As you open more programs, the taskbar
automaticall y resizes ;ts icon view of the applicati·ons to ensure that they can
always be seen. In addition to the 'above function, the taskbar is also a bit of
·statu bar containing a system tray displayed on the right most si_de of the task
bar. It contained a clock, small icons to indicate volume control etting for
sound, waiting e-mail, printing a document, anti virus program etc.

/ 0.13: What is meant by the phrase wallpaper you desktop?


j Answer:
Wallpaper is a picture or image that you can display on your desktop. It means
to change. the appearance of the desktop's background and other window settings
using the display properties dialog box .

a
Q.14: What is the benefit of using screen saver? .
Answer:
A screen sa er wi 11 blank you r screen or displa a mo ing image or a pattern
if you do not use the mouse or keyboard for a predetermined amount of i1 e. Screen
savers protect the quality of yo ur monitor. The avo id burning the pho phor creen of
the monitor from a static image when a inonitor is left on fo r a prolong periods of
tim e.

Q.15: Compare MY Computer and Windows Explorer;


Answer:
My Co mputer Windows Explorer
I lt enables yo u to see what l.S 111 I lt enab les you to ee what is in
your computer. your computer.
2 lt helps to manage the folders, 2 Like 'My Com puter', the
files and di sks on your comp uter Windows Exp lorer help you
or network manage the folders , files and
disks on our compute r or
netwo rk
J

3 It uses icon and ve rl appi ng 3- It uses a single win~ w v ith a


wi ndow on the desktop dual_ panned hierarchical 1ew
of your co mputer resource
4 My computer i the easier n le 4 Windows explorer IS preterred
management model for by experienced users
beginners to use.

Visit Ratta.pk for more notes Page 6 of 8 www.office.com.pk


Q.16: What is a Computer Virus? Describe some of their activities. How
computer virus can be c1hecked in your disk?
Answer: .
COMPUTER VIRUS
ln the past few years, a new processing crime has gained the attention- of
computer users all over the world. Some people have found a way to create program
that silently repI icate themselves on storage media without the computer users
reali zing it. These programmers are referred to as computer viruses. A computer virus
is a program that literally infects other programs and databases upon contact. When
the program is loaded ·into the computer, the virus attaches itself to other programs
that are residing in the system. When some one inserts an infected disk into a
computer,. the files in co1nputer s memory become infected. The reverse is also true,
that is, a disk used in an infected computer becomes infected. Computer can be
infected when ~ hacker creates a virus and sends it over the phone lines to a network.
Since network is connected to thousands of computer, the infection is carried to all
th e connected computers. Running a program or accessing the network or infected
disk activities the virus without the user' s knowledge.
There are many types of viruses . Some act quickly by erasing user programs
and files on disk. Others grow like a cancer, destroying small parts of a fil.e each day.
Some acts like a time bomb. They lay dormant for days or months and all of s sudden
become active, attacking on any software on the systen1 at a particular time. When the
virus at a computer, it performs the activities assigned to it for which it was created.
VIRUS ACTIVITIES
Some of the activities that a virus has been programmed to do are:-
(

www.ratta.pk
Copy themselves to other programs
• Display infor.mation on the screen
• Destroy data files
• Erase an entire hard disk
• Lie dormant for a specified time or until a given condition is met
Like the viruses that cause cold and diseases in humans, computer viruses do
not occur naturally . .A virus program may be harmless, simply producing an obscene
or silly unexpectedly on the computer screen. But it may also be a very destructive
and harmful. It may wipe out huge amount of data or corrupt files on the user' s hard
disk. Whatever is the motive behind it, anger, revenge, or intellectual chall~nge, it is
cleat that people creating virus do not have respect for other people's hard work.
ANTI VIRUS
Computer users n;: ~ d· to protect their computers from viruses until they are
eradicated from the source ·and until they no longer exist. Fortunately there are
solutions to sage guard your system against viruses. The first thing that you need to

Visit Ratta.pk for more notes Page 7 of 8 www.office.com.pk


know is the way. in \- hich y ur system may be infected. The most c mmon ways that
ma infect your y tern are:-
• A fl oppy or a rem vable hard disk rom another user may be a carrier of virus
• Virus may be tran mitted to other computers via Network. That is your ystem
my e infected when you link your system with another user, an on line
erv i c, r the Internet.
• Program purchased from unauthorized dealers may be the potential carrier of
v1ruse .

A number of programs have been designed to protect software from viruses.


These are cal led anti-virus programs. However no anti-virus program guarantee
protection against all vi ru es. If you suspect that a program is a carrier of virus, yo u
can analyze the program using anti-virus pr gram to see if it contains arly kn ow
viruses. Most anti-viru~ program. can be used to eliminate to a virus found in a disk.
Many computer users have installed these anti-virus programs on their computers. A
good anti-virus progran1 checks fo r infected files automatically every time you insert
any kind of disk or use ~u r n1odem to retrieve a file. Several ant1-virus p~og rams are
available and some are even free. Some common anti-viru programs are:-
• McAfee Virus scan
• Norton Ant iv iru
• Vire

Visit Ratta.pk for more notes Page 8 of 8 www.office.com.pk

Anda mungkin juga menyukai