📘 Class 10 SEE Preparation Notes
Class 10

📘 Class 10 SEE Preparation Notes


📘 Class 10 SEE Preparation Notes

🖥️ Computer (Complete Revision Guide)


🛡️ Unit 3: Computer Security

🔐 Computer Security

Computer Security refers to the protection of computer data, information, software, and hardware from being damaged, lost, or accessed without authorization.


🖥️ Hardware Security

Hardware Security means protecting computer components and peripherals from physical damage or loss.

Measures of Hardware Security:

  • Regular maintenance
  • Keeping computer in a dust-free environment
  • Insurance coverage
  • Protection from fire and theft
  • Using power protection devices
  • Air conditioning for proper temperature control

💾 Software Security

Software Security means protecting computer data and software from being damaged, corrupted, or lost.

Measures of Software Security:

  • Keeping strong passwords
  • Keeping regular backups
  • Using updated antivirus software
  • Defragmentation
  • Running scandisk

⚡ Power Protection Devices

Power protection devices manage power supply problems.

🔋 UPS (Uninterruptible Power Supply)

  • Provides backup power during electric failures
  • Prevents sudden shutdown and data loss

🔌 Volt Guard / CVT (Constant Voltage Transformer)

  • Regulates incoming voltage
  • Protects from voltage fluctuation
  • Does NOT provide backup power

🦠 Computer Virus

A Computer Virus is a malicious program that replicates itself and destroys data, files, and programs.


🧬 Types of Computer Virus:

  1. Boot Sector Virus
    • Infects Master Boot Record (MBR)
  2. File Infector Virus
    • Infects executable files (.exe)
  3. Multipartite Virus
    • Infects both boot sector and files
  4. Macro Virus
    • Infects MS Word and Excel files
  5. Stealth Virus
    • Hides itself from detection
  6. Trojan Horse
    • Malfunctions the system but does NOT replicate
  7. WORM (Write Once Read Many)
    • Spreads itself across networks

⚠️ Causes of Virus Infection:

  • Exchanging infected files
  • Opening spam emails or suspicious links
  • Using pirated software
  • Using unauthorized web applications

🛑 Symptoms of Virus Infection:

  • Programs take longer to load
  • Unwanted messages appear
  • File sizes change automatically
  • Computer frequently reboots

✅ Precautions Against Virus:

  • Use updated antivirus software
  • Avoid unauthorized links
  • Avoid pirated software
  • Keep regular backups
  • Use strong passwords

📂 Important Terms

Backup

Duplicate copy of original data used when original data is lost.


Fragmentation

Files are scattered in different sectors of the disk.

Defragmentation

Rewrites scattered files into contiguous sectors to increase disk speed.


Antivirus

Utility software used to detect and eliminate viruses.
Examples:

  • AVG
  • Norton
  • Kaspersky

💳 E-Commerce and M-Commerce

🌐 E-Commerce

Buying and selling goods, services, and information through the Internet.


Types of E-Commerce:

  1. B2C (Business to Consumer)
    Example: Amazon
  2. B2B (Business to Business)
    Example: Alibaba
  3. C2C (Consumer to Consumer)
    Example: Hamrobazaar

✔️ Advantages of E-Commerce:

  • Buy and sell anytime
  • Global expansion
  • Low operational cost
  • No physical store required

❌ Disadvantages:

  • Depends on internet
  • Prone to electronic fraud
  • Technical failure may halt business

🏪 Traditional Commerce vs E-Commerce

TraditionalE-Commerce
Requires physical storeNo physical store required
Limited to local areaGlobal audience
No real-time feedbackProvides real-time feedback
Both are profit-oriented 

📱 M-Commerce (Mobile Commerce)

Extended version of E-Commerce.
Transactions are done through handheld devices like mobile phones.

✔ Highly portable
✔ Widely used


💰 Online Payment

Cashless and paperless transactions using payment gateways.

Examples:

  • Credit Card
  • Debit Card
  • Electronic Fund Transfer
  • E-Cheques

Advantages:

  • Safe from physical theft
  • Minimizes human interaction

🚀 Unit 5: Contemporary Technology

🔬 Contemporary Technology

Latest innovations integrated into daily life.
Examples:

  • Email
  • Video Conferencing

☁️ Cloud Computing

Storing, managing, and processing data on remote servers hosted on the Internet.

Example:

  • Google Drive

Benefits:

  • Data backup
  • Live streaming
  • High-speed data transfer

📲 Mobile Computing

Using handheld devices to transfer data over a network.
✔ Highly portable


🏛️ E-Governance

Government services provided electronically.

Advantages:

  • Increases transparency
  • Reduces corruption
  • Encourages public participation

🤖 Artificial Intelligence (AI)

Integrating human thinking and behavior into machines.

Examples:

  • Robotics
  • Machine Learning

Advantages:

  • Handles large data
  • Improves decision-making
  • Introduces new problem-solving methods

🕶️ Virtual Reality (VR)

Artificial simulated environment giving realistic experience.

Used in:

  • Gaming
  • Aviation training

🌐 Internet of Things (IoT)

Network of physical devices communicating via sensors and software.

Examples:

  • Smart watches
  • Alexa
  • Tesla cars

Benefits:

  • Automates daily life
  • Increases efficiency

⚖️ Unit 2: Ethical and Social Issues in ICT

📜 Cyber Law

Law governing cyberspace.

In Nepal:
Introduced on 30th Bhadra 2061 BS
Name: Electronic Transaction and Digital Signature Act

Purpose:

  • Control cybercrime
  • Legalize online transactions

🧠 Computer Ethics

Moral principles for computer users.

Commandments:

  • Do not use computers to commit crimes
  • Do not steal data
  • Do not publish fake news

🚨 Cyber Crime

Criminal activity using computer or internet.

Examples:

  • Piracy
  • Hacking
  • Phishing

🔑 Key Legal Terms

Intellectual Property Right (IPR)

Protects creations like music and art.

Patent Right

Protects technological inventions.

Digital Signature

Ensures correct delivery of messages over network.

Encryption

Converting readable data into unreadable code.

Decryption

Converting unreadable code back to readable form.

Hacker

Person who enters system without authorization.


🗄️ Unit 7: DBMS (Database Management System)

📊 Data vs Information

Data:
Raw, unprocessed facts
Example: 32, John

Information:
Processed meaningful result


📚 Database

Organized collection of data for quick access.

Examples:

  • Dictionary
  • Telephone directory

🛠️ DBMS

Software used to manage, store, and manipulate database.

Examples:

  • MS-Access
  • Oracle

Advantages:

  • Prevents duplication
  • Secures data
  • Allows sharing

MS-Access Elements

Table

Stores data in rows (records) and columns (fields).

Form

User-friendly interface for entering/editing data.

Query

Retrieves data based on conditions.

Types:

  • Select
  • Action
  • Update
  • Append
  • Delete
  • Make-table

Report

Displays results like bills and summaries attractively.


Primary Key

  • Unique identifier
  • Prevents duplication
  • No null values
  • Helps establish relationships

DBA (Database Administrator)

Responsible for planning, securing, maintaining, and operating DBMS.


🌐 Chapter 1: Networking & Telecommunication

📡 Communication Modes

  1. Simplex – One way (TV)
  2. Half Duplex – Two way but one at a time (Walkie-Talkie)
  3. Full Duplex – Two way simultaneous (Mobile phone)

🖧 Computer Network

Interconnected computers sharing resources.

Advantages:

  • Faster communication
  • Resource sharing

Disadvantages:

  • Expensive
  • Security risk
  • Skilled manpower needed

📶 Transmission Media

Wired (Guided):

  • Twisted Pair (UTP/STP)
  • Co-axial Cable
  • Fibre Optics (Uses light/photons)

Wireless (Unguided):

  • Microwave (Line of sight)
  • Radiowave
  • Infrared

🌍 Types of Network

  • LAN – Local Area
  • MAN – Metropolitan Area
  • WAN – Wide Area (Internet)

🔗 Network Topologies

Bus

Cheap but fails if main cable fails.

Star

Central hub, easiest to expand.

Ring

Failure of one device collapses network.

Mesh

Expensive but highly reliable.


🔌 Networking Devices

  • Router – Finds best route
  • Repeater – Amplifies signal
  • Hub – Multi-port repeater
  • Bridge – Connects similar networks
  • Gateway – Connects dissimilar networks
  • MODEM – Converts analog/digital signals

🌐 Internet Services

  • Email
  • E-commerce
  • Telnet
  • Video conferencing

Web Browsers:

  • Google Chrome
  • Safari

🏢 Intranet vs Extranet

Intranet – Private network within organization
Extranet – Accessible outside organization


💻 Programming in C and QBASIC

C Programming

  • High-level modular language
  • Developed by Dennis Ritchie
  • Used for UNIX
  • Case sensitive
  • 32 keywords

Modular Programming

Breaking large program into smaller modules.

Advantages:

  • Easy debugging
  • Reusable code
  • Independent coding

Procedures

Sub Procedure

  • Does not return value
  • Uses CALL statement

Function Procedure

  • Returns value
  • No CALL statement
  • Library or User-defined

Variables & Parameters

Local Variable – Inside procedure
Global Variable – In main module

Formal Parameter – Declares data type
Actual Parameter – Passes real value


📁 File Handling

Creating, retrieving, adding data to files.

Types:

  • Sequential
  • Random

Commands:

  • Kill
  • Name AS
  • MKDIR
  • EOF

📢 Important Notice for SEE Students

These notes provide foundational concepts directly extracted from your textbook material.

⚠ These notes are NOT 100% complete.

For maximum success in SEE:

  • Study your full textbook
  • Follow your teacher’s guidance
  • Practice past questions

React:
Tanka Prasad Lamichhane
Written by
Tanka Prasad Lamichhane
Data Scientist · Computer Teacher · Founder of PiXEL iT SOLUTION
I'm a data enthusiast and professional computer instructor based in Pokhara, Nepal. Through this blog I share what I learn and teach every day — from programming and data science to personal growth, life lessons, and trends that matter.

💬 Comments 0
💬
No comments yet
Be the first to share your thoughts!