Chapter Wise Note Of Computer Science Class 10 || Dear Students Stay At home With These Note || Stay Safe

 Fundamental Notes

Chapter-1

Data Communictaion and Computer Networking

1.What is communication or computer communication?List the type of communictaion.

 =The process of transferring data,information message etc between two or more persons using computer is called communication. The types of communication are:

                             1. Data communication

                             2. Tele communication

 

2. Differentiate between tele communictaion and data communication with examples.

 =The differences between tele communication and data communication are:

                            

         

 

 

 

 

 

 

 3.List the elements of data communication.

=The elements of data communication are:

i.                   Sender

ii.                Medium

iii.             Receiver

iv.             Protocol

 

4.What is communication media or transmission channel?List the diffrent types of communication media with examples.

 = Communication media is the channelor electornic pathawav through which data or signal can be transmitted from one point to another.The two types of communication are:

                     i.  Guided/bounded/wired communication media.

                     Ii .Unguided/unbounder/wireless communication media.

                    

 i.Guided or Bounded or wired communication media:Guided media are such types of communication media use open wire or cable line for data transmission from one point to another. Example: Twisted pair cable,Coaxial cable, Fiber optic cable etc.

 ii.Unguided or unbounded or wireless communication media:Unguided communication media are such types of media in which data transmission is carries out through the air so also calle wireless media.Example:Radio frequency,Microwave, Satellite,infrared etc.

 

 

 

 

               

 5.Write the diffrences between Guided and Unguided media.

  

S.no

Guided Media

S.no

Unguided Media

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

                

   6.What is Computer Network?Write the purpose of network.

  = The interconnection between two or more than two computer through transmission media in order to communicate and share resources is known Computer Network .

The purpose of network are pointed follows:

i.                   To share pheripherals.

ii.                To make communicate faster.

iii.             To share software.

iv.             To make information secure.

  7. Mention the advantage and disadvantage of computer network.

  = Its advantage are:

i.                   It allows the sharing of hardware device such as printer, modem, hard disk.

ii.                It allows the sharing of data, software etc.

iii.              It is cheaper.

iv.             Data computing system is faster.

  = Its disadvantage are:

i.                   Computer virus spread easily.

ii.                Cyber crime were originated.

iii.             Initial setup and cost is high.

iv.             Techinical manpower is lack.

 8.List the different services provided by Computer Network.

   = Network services are the things that a network can provide.They are:

i.                   Print service

ii.                File service

iii.             Message service

iv.             Application service

v.                Database seervice

 9.What is data transmission made?write the different mode of data transmission with examples.

= A data transmission made may defined how to data travel from sender to reciver.

 There are three types of data transmission mode they are:

i.                   Simplex mode

ii.                Half duplex mode

iii.             Full duplex mode

i.                   Simplex mode: In this mode transmission takes place in only one direction so,it is also called one way communication made. For e:g Radio,Television Newspapper etc.

ii.                Half duplex mode: In this mode data transmission take place in both direction.but only one direction at a time.For eg walking talky.

iii.             Full duplex mode: In this mode data transmissiion take place in both directon or simultaneously so,it is also called two way communcation mode. For eg: Mobile phone, Internet etc.

                                    

 j.Write the diffrences between simplen and duplen mode.

 = The diffirences between them are tabulated below:

                 

                           

 

 

 

 

 

 

 k. How are computer network classified into different types?List the types of computer network account to the size and distance.

= Computer network classified according to the various criteria such as size, speed of data transmission distance covered technology used and architecture.

The most common classification of computer network in its size and speed of data transmission are pointed below:

i.                    Local Area Network(LAN)

ii.                Metropolitian Area Network(MAN)

iii.             Wide Area Network(WAN)

l.What is LAN? Write its measure features.

= LAN is the type of network which covers a very limited area like a single, collage,organization etc and extending up to of few kilometeer by using   guided transmission made. Eg: Computer network in its building.

The feature of LAN are pointed below.

i.                   LAN posses high data transmission rate usully 1 to 100 MBps.

ii.                LAN is owned privately by a single organization.

iii.             It uses guide or wide transmission channel.

iv.             It is cheaper than other.

 

 

m. What is Man? List its Features.

= MAN is a type of network which is entended to an entire metropolitian city or state through guided or unguided media both according to the required .

 For eg.Cable television network.

 The features of MAN are pointed below.

i.                   It connects more or lan together.

ii.                It is extend to an metropoitian city or state.

iii.             It uses wire or wireless connection both.

iv.             Data transmission in MAN is slower than LAN but Faste then WAN

     n.Define WAN?List its features.

= WAN can be defined as the type of network that is entended to a large geographical area such as among countries,continents or even in the world with the use of unguided media like satellight.

The features of WAN are listed below:

i.                   LAN is owned by the multiple organization.

ii.                It is ectended to large geographical are to worldwide.

iii.             It uses wireless technology for data transmission.

iv.             Data transmission in wan is slower than below one MBps as compare to other  network.

 

 

 

 

 

 

 

 

o.Differentiate between LAN and WAN.

 = They are tabulated as below:

  

 

LAN

 

WAN

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 p. What is Network Architecture/model.Explain its types.

= The network architecture of model is defined how the communicate in the network.

 In another world, It is an interaction behaviour of computers on the network system. Following are the common types of network architecture.

i.                   Centrailized computing netwrok architecture.

ii.                Client/server network architecture.

iii.             Peer to peer network architecture.

i.                   Centralized computing network architecture:In this type of network architecture the entire network system depends on the main computer called host computer which uses the powerful operating system like linux.

ii.                Client/server architecture:In this types of network architecture each computer is conncted to a device called server and conncted to a device called server and communication is done threat.

iii.             Peer to peer network architecture:In this type of network architecture each computer on the nnetwrk have equal responsiblitiies of resource and communication here is no specific server used because computer can be either client or server.

 q.Write the advantage and disadvantage of peer to peer network architecture.

 = Advantage of peer to peer network are:

i.                   It covers small geographical area.

ii.                It provides simple coding schemes.

iii.             There is no central administration who sets the network policies.

iv.             This network arrchitecture is easy to trouble shoot.

  = Disadvantage of peer to peer network are pointed below:

i.                   It has less flenibility.

ii.                It is not useful for larger organization.

iii.             It provides less security.

 r. Write the advantage and disadvantage of client/server network architecture.

= Advantage of client/server network architecture are:

i.                   A client/server network covers a larger geographical area.

ii.                The cabling scheme can range from the simplest to the ost complicated one.

iii.             It reduces the network traffic.

iv.             It centralize the network management and scurityy to the server.

      = Disadvantage of client server network architecture are:

i.                   Required initial investment dedicated server.

ii.                Large network will require a staff for regular maintainance to ensure efficient operation.

iii.             When server goes down,operation wull close across the network.

s.What is network topology or LAN topology?list the major types of topologies used in LAN?

= The cabling structure of computers n local area is called network topology or  LAN topology.

  In other world the geographical arrangement or physical layout of computer in network us called network topology or LAN topology.

                      The major are the types of Network topology:

i.                   Bus topology

ii.                star topology

iii.             Ring topology.

 

 

 t. Sketch and explain about bus topology.

= This topology aslo known as linear topology whichis a type of topology where all the computers are connected to each other linear format through the common distribution channel called backbone code cable is called bus topology.

u.List out the advantage and disadvantage of star topology.

= Advantage of star topologyy are pointed as below.

        i.  Easy to install and cable connection.

        ii. No distrubution to the network than connecting or removing devices.

       iii. Easy to detect fault.

       iv.High data transmission is possible.

= Disadvantage of star topology are pointed below.

i.                   Require more cable length than bus topology.

ii.                If the hub are disabled all the network will fail.

iii.             This topology ar difficult to enpand.

v.Explain startopology in short with labelled diagram.

  = This is a type of topology in which all the nodes are connected with a central component or devic called hub or swotch forming a star pattern.

 

 

 

 

             

 

 

 

 

 

w.What is ring topology?Explain with diagram.

 = A ring topology is a such type of topology in which all the nodes are connedcted  to each other in a circular loop or ring.In this topology there is no server and communication takes place only one direction i.e either clockwise or anti clockwise.

 

 

 

 

 

 

 

  x.List out the advantage and disadvantage of Ring topology.

  = Advantage of ring topology are pointed below.

 i.  Ring Topology works well where there is no central site computer system.

 ii. Short cable connection which cause an increase in network realibiling.

iii. Every computer have equal acess.

iv.less chance of data collision.

= Disadvatage of ring topology are pointed below:

i.                   Any communcation path or node future cause network falure.

ii.                Addition new mode increase the communication debug.

iii.             Network cinfiuration is difiicult.

 

               

y. Expain in short the followig network transmission devices.

    i.Media Connector

  = Media connector serves as the physical interface between cabling and network nodes which is attached between to the medium itself.For example: RJ-45,Tconnector etc

   ii.Network Interface Card.(NIC)

 =The NIC also known as network adaptor which is network connecting device that contaians the electoronic circuity ensure reliable communication between work station and server.

  iii.Reapeters

                           A reapeters is a network hardware which accepts with signlas regenerate them and send the message on their way .For eg Amplifies,signal regenerting repeaters.

 iv.Hub

  Hub is a network connecting device also known as multiport repeaters with various partts for connecting computers on the network that is used in star topology .there are three type of hub they are:

i.                   Passive hub

ii.                Active hub

iii.             Intelligent hub

 

z.What is internetworking transmission device?

 = Interworking device are hardware device used to connect two or more networks for a signal network.

Following are the examples of interworking transimission device:

i.                   Bridge

ii.                Router

iii.             Gateway switch

a Define the following transmission device.

i.                   Modem

 = It is a device by which we may connected our pc to the ISP(Internet service  protocol )over the telephone line .modem converts the annalog signal to digital to an other.There are two types of modem they are:

i.                   External Modem

ii.                Internal Modem

 

ii.CSU/DSU

= CSU(Channel Service Unit)/DSC(Digital Service Output)is used to connecte digital computer to digital transmission media instead of analog transmission media.

b.What is protocol?List the diffirent types of protocol.

= Protocol are commonly agreed rules followed for interconection and communication between computer in network.

In another word, protocol is a set of rules and procedures followed by every computer on entire network for making communation possible.The following are the common protocol used in network system.

i.TCP/ICP -It is used in network system

ii.HTTP- It is used between web server abd web clients.

iii.FTP- It is used to upload or download files.

iv.SHTP- It is used for sending e-mail.

v.POP- It is used to recive e-mail.

 

c.Write short notes on the following guided transmission media.

= Twisted pair cable is a common  transmission media used in voice grades telephone line. This media can be used for low speed transmission or signals but when the length goes beyond loo the error rates become high.

ii.Coaxial cable:

Coaxial cable are such type of cable of guided media which have wide band with width.these are widely used in long distance telephone line .Its transmission speed is higher than pair cable.

iii.Fiber optics cable:

Fiber optics cable are made of plastics or glasses, fiber which give quality transmission of signals at very high spped which is used to communcate either analog or digital signal.

 

d.Write short notes on unguided transmission media.

 i.Radio wave transmission

 It is used for communication between computer in inacessable location for short range communication.

ii.Micro wave transmission

 This is a type of unguided transmission media which is mainly used for bandwith ine at site communication.This media cannot obstacle by hills and mountains.

 vi.Wi-Fi(wireless Fidility)

                           Wi-Fi is one of the popular wireless technology considered as unguided transmission medium that use radid wave to provide wireless high speed internet and network connection.

 

e.What is modulation?list its type.

= The process of converting the amplitude ferequency or phase is called modulation.

The types of modulation are:

i.                   Amplitude modulation(AM)

ii.                Frequency Modulation(FM)

iii.             Phase modulation(PM)

 

  f.What do you mean by band width.How isit enpressed.

 = Bandwith is the amount of data that can be transmitted through communication channel in a fined time period.It is expreseed in term of Hertz.

 

g.What is server?list the types of different server?

 = The computer that acts the central authority on a server based network is called the server.The various types of server are:

i.                   File server

ii.                Print server

iii.             Network sever

iv.             Communication server

 

 

 

 

 

h.Define the following network related rerms:

 i.Client

 The client are the computer on which user run application.client are less powerful computer incomparision with other.

ii.Work station

 The individual personal computer used as network user is known as work station.

 i.What is network software?

= Software is the measure components to create a network enviroment to share data and resources.

 

 j.What do you mean by network operating system.List its example.

= The group of program that manage the resource on the network and etablished well defined enviroment for smooth data processing is called network operating system.

for eg Windows 2000,linun,MS windows ,NT etc.

 

 k.Who is network admistration?what is role of network administratior?

= Network administrator is the network expert or persosn who set up and control the entire network enviroment .He/she is responsible to install the required hardware and software and also control entire networking system and user.

 

i.Explain how the computer network reduce cost of operation.

= computer network enable information sharing ,hardware and software and povides centralized administration and support .thus ,many resources like information, hardware, software or any other related items can be shared with each other without having bought new one.Therefore,it is true that network computer reduce cost operation.

 

m.Write the difference between broad band and narrow band width.

                     

 

 

 

 

 

 

  n.What is signal?write its types.

= A signal is an electornic current that is lose to convec data from one to another.

                        Its types are:

i.                   Analog signals

ii.                Digital Signals                   

 

 o.Difference between Hub and Switch.

 

 

 

 

 

 

 

 

                    

                          

  

Full Form

         

                         LAN:Local Area Network

                         MAN:Metropolitian Area Network

                         WAN:Wide Area Network

                         IPX:Internetwork packet exchange

                         IEEE:Institude of Electrical and Electornic Engineers

                         UTP:Unshield Twisted pair

                         STP:Shielded Twisted Pair

                         PSTN:Public Switched Telephone Network

                         NIC:Network Interface Card

                         Wi-Fi:Wireless Fidility

                         FDDI:Fiber Distributed Data interface

                         ARC NET:Attached Resource Computer Network

                         NAT:Network adress translation

                         VOIP:Voice over internet protocol

                         WWWC:World wide web consortium

                         SPX:Sequence packet Acess

                         DIX:Digital intex

                         CSMA/CD:Carrier sense multiple Acess/callision Detection

                         DNA:Deonyribonucleic Acid

                         SNA:System Network Architecture

                         MBPS:Mega byte per second

                         BPS:Byte per second

                         KBPS:Kilo byte per second

                         FM:Frequency Modulation

                         PM:Phase Modulation

                         BNC:British naval connector

                         BMC:Baseboard management contoller

                         CSU/DSU:Channel service unit/Digital seeervice unit

                         EMI:Equated Monthly installments

                         MAC:Media Acess Control

                         CAN:Computer Association Network

                         ADSL:Asunchronous Digital Subscriber line

                         RJ45:Registered Jack 45

                         MODEM:Modulator Demodulator

                         USB:Universal Serial Bus

                         POP:Post office Potocol

                         ARP:Adress resolution protocol

                         ISDN:Intergrated Seervices Digital Network

                         ASCII:American Standard code for Information terchange

                         WLAN:Wireless local Area Network

                         EBCDIC:Entended Binary coded Decimal Interchange code

                         VSAT:Very small amplitude frequency

                         VHF:Very high frequency

                         UHF:ultra high frequency

                         DNS:Doman name sysytem

                         WWW:World wide web

                         EDP:Elcectornic data processing

                         NOS:Network operating system

                         BBS:Buletin board service

                         DEC:Digital equipment coroporation

                         NEC:Nippon electric company

                         LED:Light emitting diode

                         ICM:International computer limited

                         IBM:International business machine

                         BIOS:Basic input output service

                         OFC:Optical fiber cable

                         NNTP:Network News Transfer protocol

                         NETBEUI:Net Bios Extended user interface

 

 

          

Technical Term

            

 1.The process of transfering data or information between computer

                        = Data communication

 

 2.The interconnection between two or more than two sets of computers through physical and logical component to share data and information communication.

                        = Computer Network

 

3.The computer that acts the central authority or a network.

                        = Server

 

4.The computer on which user run application.

                       = Client

 5.The amount of data that can be transmited through communication channel in a fixed time and period.

                       = Bandwidth

 

   6.The device which makes communication between station and server.

                       = Network interface card

                 

 7.The device that use computer network to translate digital into analog and vice versa.

                       = Modem

 

 8.A network which is extend beyond 100km.

                       = MAN

 

 9.A device with multiple parts.

                       = HUB

 

10.The network in which all the servers to share software and responsiblities.

                       = Workstation

 

11.It is a computer that serves program and data and controls also co-ordinates all computer activities in a network.

                       = File server

 

12.It is a physical interface between cabling and network nodes.

                       = Media connector

 

 13.The topology in which all the computers are connected by backbone cable.

                       = Bus topology

 

 14.It accepts weak signals and regenerates then and send them back to the way.

                       = Repeaters

 

15.It allows sending multiple single across the straight lines.

                       = Multipelexers

 

16.The topology in which all the computers are conected to each other in a flows  through  single cable.

                       = Ring topology

 

17.Rules and regulation for interconnection in a network

                       = Protocol

 

  18.It is a server where incomming mails are collected in the e-mail box.

                       = POP(POST OFFICE PROTOCOL)

19.The communication made in which data are transmitted in one direction.

                       = Simplen Mode

20. A communications media which uses light to carry data signal through a data cable.

                      = Fiber optics

 21.It is a wireless technology that can be used to transmit data between two different network.

                      = Microwave

   22.The network in which all the computers have equipment capablities and responsiblities.

                       = Peer to peer network

 

 

 23.Physical layout of computer network.

                       = Network topology        

 24.Commonly used media for physical channel transmiting data across network.

                       = Cable

 25.Network of Network.

                       = Internet

  26.A device which copies electrical signals form one ethernet to other.

                       = Repeateer

 

27.The network architecture which consists at least one server and one more client of work station.

                       = Client server

28.The network architecture which function both as server and workstation.

                       = Peer to peer network

 

 29.An intelligent device that connects to different network.

                       =  Router

 

 30.Cabling structure of lan.

                       = Lan topology

 

  31.A program that controls and manage all the resources in network system.

                       = Network operating system.

 

  

32.Group of computer that can share resorces.

                       = computer network

 

 33.A computer limited with a room.

                       = LAN

 

 34.A card use to connect the network cabling computer.

                       = NIC

 

 35.The electornic pathway through which data travel a network.

                       = Transmission media

 

36.The computer network which is extended beyond the boundaries of countries.

                       = WAN

 

37.A transmission media through which data are transmitted through a light.

                       = Fiber optics

 

 38.The smallest unit of measuring unit data.

                       = Bit

 

         

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

True or False

                      

1.    Computer networ reduce the cost. True

 2. In peer to peer articture there is dedicated server.True

 3.In simplex transmission mode transmission can takes place in two direction. Fasle

 4. In half duplen mode data can be transmitted on both direction. True

 5. Man connects two or more lan together.True

 6. LAN exists within a single room. True

7. Computer network allows sharing software and hardware also.True

 8.Coaxial cable helps much greater bandwidth than fiber optics.True

 9.Internet is an example of WAN. True

10.Bridge are more intilligent than router. Fasle

12.Each computer or device in a network is called node.True

13.NIC is hardware device that connects one node physically. Fasle

14.It is easy to add or remover computer star topology.True

 15.In bus topology failure of one of a singlecomputer does effect the raise of computer. Fasle

 16.Data transfer rate is lower in co-axial cable than optical fiber. True

 17.A get way is used to connect computer network using same communication. False

 18.Fiber optics cable is one of the example of cheapest cable of network. Fasle

 19.Computer network doesnot allow sharing data and program. Fasle

 20.A gate way is a networking device that connect two dissimilar network. True

  21.Peer to Peer network cable that is switable for large organization. Fasle

  22.Device Driver is a hardware used in computer. Fasle

   23.Fiber optics uses light to carry data signals through the cable. True                   

                                                                                            

                          Choose the correct answer.

 

                        a.It request services data and other resources avialable in the server.

                        = Workstation

 

                        b.The computer that acts the centre authority un network.

                        = server

 

                        c.Which of the following is not connector?

                        = POP

 

                        d.Which of the following is network service?

                        = all

 

                        e.Which component is used for networking?

                        = Bridge

            

                        f.The network in which all the components have equal acess?

                        = Peer to Peer

 

                        g.An internetworking device that connects two disimilar network.

                        = Gateway

 

                        h.A deice which has multiple portes.

                        = Hub

 

                        i.It is an intelligent device that sets network traffic.

                        = Router

 

                        j.Which of the following is protocol?

                        = all

 

                        k.Which of the following is Network operating system.

                        = MS dos

 

                        l.Each computer and device in a network is called.

                        = Node

 

                        m.The technology which has only the point to point design.

                        = Mess topology

 

                        n.Which of the following is not communication device?

                        = Microwave

 

                        o.Which of the following is unbounded transmission media?

                        = All

 

                        p.Which of the following is guided media?

                        = Fiber optics

 

                        q.Which is network protocol?

                        = All

 

                        r.The device which is used to connect computer with network.

                        = NIC

          

                        s.The topology which has circular loop or point to point link.

                        = Ring topology   

 

                        t.The topology which extend beyond 100 km.

                        = MAN

 

                        u.Modem speed is measured in term of

                        = BPS

 

                        v.Two way communication media is

                        = Internet

 

                        w.Data transfer rate in WAN is

                        = BPS

 

                        x.Which refers to the transmission channel?

                        = All

 

                        y.Which is network operating system?

                        = Linum

 

                        z.Which is internet Service?

                        = Telnet

   

                        aa.A central device used in star topology.

                         = Star topology

 

                        ab.Choose the odd one.

                         = PS12

         

                        ac.Which is not protocol?

                         = XTP

              

                        ad.Which is the connector of co-anial cable?

                         = BNC

      

                        ae.Which is not network hardware components?

                         = Windows NT

   

                        af.Which refers to the network components?

                         = All

 

                        ag.Which of the following is not network topology?

                         = Client server

 

                        ah.Which of the following is guided media?

                         = Fiber optics

 

                        ai.Which of the followings not communication media?

                         =

 

                        aj.In an e-mail adresss"Mero Nepal @ yahoo.comwhat does yahoo refers?  

                         = Doman name

 

 

                           Match the following

 

a.     Group A                                Group B

                             Transmission media      =      Fiber optics

                             Simplex                        =      one way communication

                             Duplen                          =     Two way communication

                             Modem                         =     Communication device

 

b.    Group A                                Group B

                             Unguided communication media    =      Radio wave

                             Guided communication media       =      Coaxial cable

                             LINUX                                          =      NOS

                             Network component                     =      Hub

 

 

 

 

 

c.     Group A                                Group B

                             LAN                  =    Wired communication

                             MAN                =   Radio wave communication

                             WAN                =    Satellite communication

 

                          d. Group A                                Group B

                             Computer in network      =     Node

                             Networ Os                       =    Novel Netware

                             Types of cable                 =    UTP

                             protocol                           =    HTTP

 

e.     Group A                                 Group B

                            Protocol                  =   Rules to exchannge data

                            LAN                       =   Network within a building

                            MAN                       =  Network within  a city

 

f.      Group A                                 Group B

                            Gateway                  =               Intelligent device

                            Bridge                     =               Similar Network

                            Types of cable         =               UTP

                            RJ45                        =               Media-connector

                          

g.     Group A                                 Group B

 Hub       =  Repeats the signals to all the connected nodes.

  Switch   = Repeats the signals to only destination node.                                                                                                            Repeater   =  Regenerates weak signal

Gateway   =    Joins multiple network having different event protocol

                  

 

                                

        

 

                              Chapter-Two

 

                                                Internet And E-mail service

  State wether the following statements are true or false.

    a.E-fax is cheaper than e-mail. False

    b.Intranet can be used globalize. Fasle

    c.Mozila firefox is an internet browsing software.True

    d.Chat program allow the user to comunicate each other in real time.True

    e.E-mail documents cannot shared in computer. Fasle

     f.Browsing software is not necessary to use internet. False

     g.Videoconference is one of the services provided by internet.True

     h.Search engine is an interactive tool to help people to locate information via www.True

      i.We can do the business through the electornic media computer using internet.True

      j.Http is used to desigining web page. False

      k.Dialup connection is the easiest way to connect a compare to the internet nowadays. False

      l.Modem is necessary to acess internet resources.True

     m.Uploding is copying files from internet to users computer. Fasle

     n.Telnet allows for remote login to host computer.True

 

 

 

 

 

 

 

Write full form of the following

ARPA-Advanced Research Project Agency                                                                              ECNR-European Center for Nuclear Research

                            DARPA-Defence Advance Research Project Agency

                             E-mail-Electornic mail

                             FAQ-Frequently Asked Questions

                             FTP-File Transfer Protocol

                             HTML-Hyper Text Markup Language

                             HTTP-Hyper Text Markup Protocol

                             IAB-Internet Architecture Board

                             IETF-Internet Engeenering Task Force

                             INIC-Internet Network Information center

                             IRC-Internet Relay chart

                             ISO-International standard orgaization

                             ISOC-Internet Society

                             ISP-Internet Service provider                    

                             MIL-net-Military Net

                             NCP-Network control protocol

                             NSF-Net National SScientific Fundamental Network

                             OSI-Open System Inter connection

                             PERL-Pratical Extraction and Reporting language

                             POP-Post Office Protocol

                             PPP-Paint t paint protocol

                             SMTP-Simple mail transfer protocol

 

 

 

a.    What is internet?Write the role and importance of internet in today’s world.

= Internet is a world's largest computer network connecting millions and billions of computer together in a common protocol TCP/IP for communication.

Internet has chaned the method and technique of communication, education, trades, business, entertainment etc.We cannot image our lifestyle without internet in todays competitive world.Therefore, internet play vital role at present.

b.    What is the role of TCP/IP in internet?

= Transmission control protocol in internet is a communication protocol which is responsible for diving the file/message in to the packets at the destination computer.

 Internet protocol is responsible for handeling the address of destenation of computer so that each received packets is sent to the destenation of computer.

 

c.     List the major services provided by internet.

 = Following are the major services provided by internet.

                           i.www                  iv.Internet topology     

                           ii.chat                   v.E-fax

                           iii.E-mail             vi.E-commerence

                                                       vii.video conferencing

d.    List any two advantage and disadvantage of internet.

  = The two advantage of internet are:

                           i.It provides global communication.

                           ii.It is faster and cheaper means of communication.

   = The two disadvantage of internet are:

                           i.It is initial cost in high for set up.

                           ii.It increases cyber crime

 

e.     What are the differet types of internet account?

 = There are two types of internet connection account.They are:

    i.TCP/IP

      This is the text and graphics based account in which the user can view graphics and photographs along with the text.

 

 

     ii.Shell account

 This is text based user interface account in which user cannot view any graphics or photographic image.

 

f.      List the different equipment required for conecting internet.

 = The equipment needed for connecting internet are:

                           i.Telephone line

                           ii.Modem

                           iii.Multimedia computer system

                           iv.Internet software

                           v.ISP account

 

g.    Define website with suitable examples

 = Web site is the collectiion of several related webpages with hypertext created by any business organiation/university etc to provide their information world wide through the internet.

                              EG: www.nhcbtl.edu.np

                                     www.nepalnews.com

                 

h.    List he application uses of internet in different fields.

= The following are the main application of internet.

                           i.Business: To provide acess to complex and huge database.

                           ii.Entertainment:To provide audio,video,connections,onlin chatting etc.

                           iii.Education:to provide online education interactive clases.

                           iv.Indivisual:To make global communication,use e-comerce facility etc.           

 

           

i.       What is web browser?write any twio browser software.

 = Web browser or browser software are the special software program which are used to run(surf)internet making all the related imformation and  facilities avialable for the users.

               The following are the popular web browsers.

                            i.Microsoft internet exporer

                            ii.Google chrome

                            iii.Mozila firefox

                            iv.Opera mini

 

j.       What is URL? Wite the main part with meanings.

= Uniform Resources Locator is an unique adress for each website for its identification which conatins protocol, domanime, doman type etc.

                             Examples-http//www.nhhss.edu.np

                         Here, http-protocol

                                   www-host computer name

                                   nhhss-domain name

                                   edu-doman type(education)

                                   np-Nepal(country code)

                            

k.    Define ISP and write any two popular ISP of Nepal.

= ISP is an organization that offers and provides the necessary internet related services and acess to the user ot customless.Some popular ISPs of Nepal are:

                           i.World link

                           ii.Broad link

                           iii.NTC etc

 

                        

l.       What is search Engine?List any four popular search engines.

 = Search engine are the interactive tool or software which help people to locate and find the required websites and iformation via view.The most popuar engine are pointed below:

                          i.Google.com                     ii.Altabista.com

                          iii.Yahoo.com                    iv.Bing.com etc

 

 m. Write shor notes on the following internet related terms

 i.Webpage:

 = Webpage is a collection of hypertext information of any organzation company,goverment agency or indivisual stored in the website.It is also known as single page or website.

 

 ii.WWW:

= It is a service of internet that is interconnected through hyper text.it provide link in the web documents.

 

 iii.Web server:

 =  Web server is a site on which the web pages are kept.It is program that responds to request from web browser to relative resources.

 

 

 iv.Domain Name:

 = It is the name of specific internet area controlled by an organzation company or government.

 

 v.HTTP:

 = It is protocol that is used by web sever and web clients to communicate With each other.

 

 Vi.FTP:

= It is a protocol or tool that allows the user or host to transfer files an one computer to another over a network.It also allows the users to upload and download the files.

 

vii.Chat:

It is a program that allows user on the interrface to communicate textually with each other by typing in real time situation.

 

viii.Upload:

It is the process of copying files,documents,programs,data etc from the internet server to the users computer.

 

m. What is e-commerce?Write any four popular e-commerce sites that you know.

= Electornic commerce is an internet service which alllows doing online business. It also allows to buy and sell good and products thrugh internet.

                                The following are the popular e-commerce sites.

                             i.www.kinmel.com

                             ii.www.sastobazar.com

                             iii.www.muncha.com

                             iv.www.amazon.com

 

n.    What do you mean by intranet?

  = Intranet is also a network but intenal(private)network which utilize all the roles and regulation of the internet provide facility to local area network.

 

o.    What is e-mail?Explain the parts of e-mail address.

= The fullform of E-mail is electronic mail.It is a process of sending and receiving message electornically through internet.

 E-mail adress

 E-mail is identified by an unique address called e-mail address. Basically an e-mail address have five parts.

 

                                  Example:nhc@yahooo.com.np

                                   nhc- user name

                                   yahoo, e-mail program which provies e-mail service.

                                  @- at sign seperate username and domain name.

                                  com- domain type ie commercial organization

                                  np- country code ie Nepal

p.    Write the advantage of e-mail.

       = The advantage of e-mail:

                            i.It is the cheapest and fastest means of communicaton.

                            ii.It is more reliable than other means.

                            iii.It can be used from any part of the world at any time.

                            iv.It supports picture,graphics,image beside the text.

                            v.Single mail can be sent to different mail adress.

 

 

q.    What do you mean by E-Fax?

 = It stands for electornic fax.It is a powerful internet application that

allows to send and recieve faxes direcction our computer.

 

r.      Define the following term.

 i.Telnet:Telecommunication network is an internet services that enables       to connect a remote or hast computer so that an user can enter data ,run programs and transfer the files as needed.

 

ii.Usenet/News group: It stands for user net service which allows the user

form different geographical location to share the views on any topic of intrest. It is also known as newsgroup or discussion group.

 

 iii. Internet telephony: Internet telephony refers to the use of public

 intrest for voice trasnmission.It is also known as voice over iternet protocol.

                         

 iv.Video conferencing: It is also one of the very intresting and useful

service gaining popularity.now a days which allows to make an audio and video communication across the world using web camera and related software.

 

 

 

 

 

 

 

 

 

t. Write the difference between.

 

                             i.E-mail and E-fan

 

                                            E-mail                            E-Fan

                             i.It is cheaper than E-fan.      i.It is expensive thane-mail

                             ii.E-mailed message first goes   ii.E-faned message first goes on the

                                to local server.                 internet server then its destenation.

                             iii.E-mailed message is stored   iii.E-Faxed message is printed on the

                                 in hard disk of destination      printer of destenation computer.

                                 computer.            

 

 

                              ii.Postal mail and E-mail

 

                                         Postal mail                            E-mail

                               i.It is much sower than e-mail.   i.It is very much faster then postal

                               ii.In postal mail,only the sp-      mail.

                                  ecific type of handwritting    ii.In email any type of font and gra-

                                  and style is used.                phics can be used

                               iii.It is not reliable.           iii.It is fully reliable.

 

                              iii.internet an intranet

 

                                             internet                          intranet

                              i.It is public global network.      i.It is private network.

                              ii.It is independent to use the     ii.It is dependent to use all the

                                services and resources.              resources.

                              iii.It runs slower then intranet.   iii.It runs faster than intranet.

 

                              Choose the following answer from the following.

 

                            a.A home page refers to the first page of:

                            = Website

 

                            b.The unique adress of a website on the internet is called:

                            = URL

 

                            c.Web pages can be written using:

                            = HTML

 

                            d.The protocol used in internet is:

                            = TCP/IP

 

                            e.Which of the following is internet service?

                            = All

 

                            f.Who is the inventer of www? 

                            = Tim burner lee

 

                            g.Which of the following connection can be used for connection internet

                              at home?

                            = dialup networking

 

                            h.A client software that allows the user to display and intract withe a

                              web page?

                            = Browser

   

                            i.Which of the following is an online medium of communication?

                            = All

 

                            j.Which of the following provies acess of the internet service?

                            = ISP

 

                            k.WWW is a

                            = Service of internet

 

                            l.Which of the following company developed the first intenet service?

                            = ARPA

  

                            m.In the URL http://www//nhhss.edu.com what does it mean.

                            = Domain type

 

                            n.What is the correct e-mail id?

                            = ramesh @ yahoo.com

   

                            o.Which device is necessary to operate internet?

                            = Modem

 

                            p.Which is web browser software?

                            = Internet explorer

 

                            q.Which is not related in internet.

                            = UPS

 

                            r.In an e-mail adress butwal @ yahoo.com,what does it refers?

                            = Domain name   

 

 

                            Technical terms

 

                            a.The language which is used to create web pages.

                            = HTML

 

                            b.Huge collection of computer all over the world.

                            = internet

 

                            c.The process of sending and reciving messgae electornically

                              through the internet.

                            = E-mail

 

                            d.Internet service that allows people to communicate each other by

                              typing in real time?

                            = chat

 

                            e.The page which is displayed from home page.

                            = Web page

 

                            f.A company that providess internet account and other services to user.

                            = ISP

 

                            g.Software or programs that search the websites for you.

                            = Searrch engine

 

                            h.Doing business online through the internet.

                            = E-commerce

 

                            i.Online postal service.

                            = E-mail

 

                            j.A protocol that allows an user to log an one host to acess transfer

                              files to another network.

                            = Internet browsing

 

                            l.The service of internet which is used to make communication using

                              sound as well as picture.

                            = video conferencing

 

                            m.A person who destroy the websites.

                            = hacker

 

                            n.The electornic transfer or message.

                            = E-mail

 

                            o.The internet service which provide oline shooping.

                            = E-shooping

 

                            p.A internet serice which allows to do online business.

                            = E-commerce

 

                            q.The process of copyin files or documents or program or data from users

                              computer to the internet.

                            = Upload

 

                            r.An internet tool that helps to upload/download the files.

                            = Ftp

 

                            s.Network of Network.

                            = internet

 

                            t.The use of internet to buy and sell goods and service.

                            = E-commerce

 

                            u.Buying and selling products and service online.

                            = E-commerce

 

                            v.The program that display the contents of web pages on a client computer.

                            = Web browser.

   

                            w.The world's largest computer network for communication

                            = internet

  

                            x.The private network within an organization that utilize the internet

                              service.

                            = Intranet

     

                            y.A network service in different parts of world of the same organization

                              site that is modified after the internet.

                            = Intranet

 

                            z.A web service which contains answer to the question comanly used by user.

                            = FAQ

 

                            1.A world wide discussion group in which people share information and

                              ideas on a particular area of internet.

                            = Use net/news group

 

                            2.E-mail message you get that you didnt ask for insolicated e-mail.

                            = Spam mail/junk mail

 

                            3.The communicaton of hardware and software that block cerrtain network

                              traffic according to their security policy.

                            = fire walls.  

 

 

 

 

                            

 

 

 

 

 

 

 

 

 

 

 

 

                                            Computer security

               

            

1.    What do you mean byy computer security?write the importance of computer security.

  = The protection of computer pheripherals, data and program from its enemy heat,dust,fire,virus etc is known as computer security.

  computer securty is improtance in order to prevent both hardware and software from being damaged,corrupted or theft.

 

2.    What are the types of computer security?

= Computer security can be classified into two types they are:

             i. Hardware security

             ii. Software security

 

3.    What is hardware security?write any four measures to protect the computer hardware.

             = Hardware security refers to the protection of computer and its pherhipals from physical loss,damaged and theft. There are various ways to protect hardware:

             i.  Regular maintainance

             ii Dust free enviroment

             iii Air condition system

             iv closed circuit camera

 

4.    What do you mean by software security?

= Software security means the protection of software program, data, file from being deleted or corrupted.

 

5.    Write the importance of data and software security.

= Data and software are the most valuable and things to any private and public organization as well as the goverment agiencies.if such valuable data are lost or damaged then it cannot recover easily and there will be a great loss so,the data and software security is very importance.

 

6.    List any four software security measures.

 = Some of the common software security measures are:

             i.Using backup system

             ii.Keeping password

             iii.Using scan disk

             iv.Regular virus scanning

             v.Apply defragmentation

 

7.    What is backup? Write its importance.

 = Backup is the process of making an additional or reserver copy of data, programs and software for future use when required.

Importance of backup are:

  If our orginal data, program software are lost,deleted or damaged in such case we can restore our data,program and softaware for future use when required.

         

8.    What is password? Write the rules for creating a valid password.

= A password is a secret word or phase that gives an authorized user acess to a particular program or system.

Rules for creating a valid password,

             i.Password must be at least of six characters.

             ii.Password must be confidental.

             iii.Password must be frequently modified.

             iv.password must be difficult to guess by other.

9.    Define fragementation and defragementation.

 = Fragmentation is the process of scattering of the part of same disk file over different location.

= Defragementation is one of the software security measures allowing of rewriting part of a file to contguous sector on hard disk to increase the actual speed of processing.

 

10.  What are power protection devices?Why are they needed.

= Power protection device are hardware component used in computer system for proper supply of electricity to the computer and its peripherals.

They are needed in computer system to maintain the power from high or low voltage which may cause several hardware damage as well as software loss.

 

11.  List the common and popular power protection devices.

 = The common and popular power protection devices are:

              i.Uninterruptable Power supply

              ii.Volt guard

              iii.Constant Voltage Transformer

              iv.Spike guard

 

12.  What is the importance of UPS in computer security .

  =  UPS in computer is very importance in order to supply regular power to the computer and its pheripherals because voltage fluction may cause several hardware and software damage as well as data loss. Therefore, to avoid unpredicatble problem UPS is importance.

 

 

 

 

13.  Define the Following term.

     i.UPS

    An uninterruptible power supply is a power protection device which stores electricity and provide the backup power automatically to the computer when required so that huge amount of data can be prevented from being damaged or loss.

 

ii.Spike guard

 It is also a power protection device which is to prevent computer from sudden

 high voltage(Spile) because of lightning in rainy season and control such high voltage.

 

 iii.Voltguard

  It is a power protection device which provides the constant output voltage to the computer and prevents it from being damage due to high voltage.

 

iv.Scandisk

  Scandisk is one of the software security measures which works at as an utilty tool in order to scan,detect and repair the error in the disk.

 

 v.Virus scanning

It is the procss of scanning,detecting and removing viruses from our computer. It is also one of the software and data security measure needed to be applied in our computer system regularly by latest antivirus program.

 

                 

                

 

 

State True or False

  a.Always use password system in your computer.True

  b.Backup is used for protecting computer viruses.False

  c.Valuable data and information may get lost due t virus.True

 d.Defragementation does not help to improve the performance of the disk of computer. False

 e.Voltage regulators are used to supply constant voltage even if the electricity goes off. Fasle

 f.Scan disk files,folder,bad sectors,lost custers and any errors of the specific

  disk .True

 g.Data seecurity helps to ensure privacy.True

  h.The regular maintainance helps to protect software only.False

  i.The password prevets computer from unauthorized use and acess.True

  j.A volt guard supplies backup electricity to the computer. False

  k.The cc camera is hardware security measure.True

  l.virus scanning helps to detect and remove computer viruses. True

 

 Write the suitable technical term of the following.

a.The policies,procedure,tools and techniques designed to protect computer assts.

                = Computer security  

 

 b.An electornic device that supplies steady voltage to the appian.

                = Voltguard

 

 c.The scattering of the parts of the same disk file over different location.

                = Fragmentation

 

d.The process of rewritting parts of a file to contigeous sector on a hard disk to increase the speed of acess and retrieval.

                = Defragementation

 

e.A copy of a file,which is used in the event of the orginal file being corrupted.

                = Backup

 

  f.The power regulating device which suppies constant power to the computer and acessories even the time of power cut.

                = UPS

g.The tool used to check and keep the computer in good condition by fixing the error.

                = Scandisk

 

 h.The software used to scan computer's memory and disks to detect virus.

                = Antivirus

 

i.The devices used to protect computer from sudden high power during lightining.

                = Spikeguard

 

j.An attempts to locate and save the deleted,Formatted or last data in usable form.

                = Backup

 

 k. A secret code-that gives an authorized user acess particular program and system.

                = Password

l.The method applied to increase the life of computer and its assests.

                = Computer security

 

m.An utility program used to detect and repair lost clusters and bad sector of  hard disk.

                = Scandisk.  

                  

       

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Computer Virus

Answer the following questions

a.    What is computer virus?

= Computer virus is an illegal self replicating small program that destroy data,software and makes devices not usable.

                                      or,

= Computer virus is manmade malicious computer program which  malfunction the normal functoning of computer.

 

b.     What is the purpose or reason of creating virus?

= The reason of creating virus are:

i. To protect software from privacy.

ii.To entertain the user during the use of the program by using displaying picture,message etc.

iii.To earn more money by selling anti virus.

 

c.      Write the different types of computer virus and explain them

                     in brief.

= There are various type of computer virus found but some of the most popular and common type of computer viruses are listed below.

 i.Message carrying virus

 This type of virus doest not infect the program and files but entertains the user producing unnecessary message ,quatation,pictures etc on the screen which may disturb the computer while operating.

ii.Boot sector virus:

This type of virus infects the information system during start up process. It trend to create a bad sector of the harddrive or the topology.

 

               

iii.System infector virus:

This type of virus infects the various part of operating systems or master control program and harm the computer system while looping.

 

iv.File infector or application program infector virus:

This type of virus infects and damages the exectuable files with .com,exe ectension of application packages.

 

 v.Multipurpose Viruses:

This type of virus infects both file and boot sector.This Virus is compartively more infectious and more difficult to remove.

 

vi.Polymorphic virus:

This type of virus is most dangerous and harmful which is designed to avoid detection by antivirus program that looks for specific viral signature.

 

vii.Stealth virus:

This Viruses try to hide themselves and take uprecience in the memory making is hard to detect.

 

d.    List the major symptoms of computer virus.

= The major symptoms of comuter virus are:

                i. Computer may not boot properly and hang quickly.

                ii.Changes the size of executable file.

                iii.Slows down the computer memory and disk space.

                iv.Program loading and data acessing take long time.

                v.Regular files may lose and unusual file may appear.

 

e.     How do computer viruses transfer among computer?

= Computer viruses transfer from the following mean of sources.

                i. Virus infected external disks.

                ii.Pirated software.

                iii.Internet,Email and networks.

                iv.Virus infected games.

 

f.      Write the features of computer viruses?

= The features of computer viruses are :

                i.Self replication.

                ii.Piggy back (hiding themselves)

                iii.Malfunctioning

                iv.Fast spreading.

 

g.    Mention the preventive measures from computer viruser.

                                     or

    List the precaution to avoid virus infection.

= Following are the precaution to avoid viruses infections.

               i. By installing,uprading and scanning latest antivirus regularly.

               ii. Lacking the computer always using strong password.

               iii. Backingup the data and program on regular basis.

               iv. Not allowing other people to use the computer wthout permission.

               v. Check the new software for virus before installing it.

               vi. Using the geniue(not pirated) signature.

 

 

 

h.    How can be computer viruses detected and cleaned?

= Computer viruses can be detected and cleaned by using antivirus software since each computer virus has its unique or common code called viral signature.

 

i.       What is Antivirus software?list some of the common antivirus  Software.

= Antivirus software are the special program that can locate,defect

   and eliminate viruses from the computer system. Some of the common

   Antivirus software are.

             i.AVG(Antivirus Virus Guard)         V.MacAfee Antivirus

             ii.Kaspersky Antivirus                      vi.Narton Antivirus 

             iii.Pc-alin                                           vii.Panda Antivirus

             iv.Narton Antivirus

 

                  Write the fullform

                VIRUS-Vital Information Resources Under Seize

                  MCP-Master Control Program

                  MBR-Master Boot Record

                  FAT-File Allacation Table

                  NTFS-New Technology FIle System

                  NAV-Norton Antivirus

                  KAV-kaspersky Anti Virus

                  PAV-Panda Anti Virus

                  CPAV-Central Point Anti virus

                  AVG-Anti Virus Guard

                  MSAV-Micro Soft Anti Virus

                  USB-Universal Serial Bus

 

                  Match the following groups

 

                  Group "A"                                       Group"B"

                  Avira                     =              Antivirus software

                  Light,dust                =              Enemies of computer

                  Data security             =              Protection of data      

                  Computer virus            =              Destructive program

 

                  Group"A"                                         Group"B"

                  Backup                    =        Software Security

                  Virus program             =     I love You

                  Antivirus program         =   Panda

                  Internet                  =          Mean of virus transfer

               

 

      State true or false

a. Pirated software copies viruses to the computer.[True]

 b. Computer Viruses cannot delete file amd format users hard disk.[False]

 c. Computer virus is a useful and necessary program to be used in the computer .[Fasle]

 d. Antivirus software is the main feature of computer virus[True]

 e. Self replication is the main features of computer virus.[True]

 f. Computer viruses corrupt only executable file form the computer.[False]

 g. One of the reason for virus creation is to stop software privacy.[True]

 h. System infector virus infect software such as word processor,spreadsheat and data base.[Fasle]

i. Computer virus can also affect hardware parts from their smooth functioning.[True]

 j. Polymorphic is such type of virus which avoids even antivirus.[True]

k. Pen drive is one of the common medium for virus transfer.[True]

l. Viruses don't transfer from E-mail and internet easily.[Fasle]

m. We should install update and scan the antivirus regularly.[True]

 

 

Select the correct answer from the given option.

               

                a. Computer viruses are:

                 = Computer programs

 

                b. Which of the following in not antivirus

                 = NAC

 

                c. Which virus doesnt affect the data,program and files?

                 = Message Carrying

               

                d. Which of the following is the medium for virus transfer?

                 = All of the above

  

                e. Which software protects the computer from viruses? 

                 = Antivirus software

           

                f. Which is the source for virus transfer?

                 = pen drive

             

                g. Compter virus can

                =  All of above

 

                h. Who introduced the concept of replicating program for first time?

                =  John van Neuman

               

                i. Which is type of Virus can change its apperanance with every infection?

                =  Polymophic

    

                j. Which type of virus infects bt boot records and file?

                =  Multipartite

 

                k. Boot sector infects

                =  Master boot record

 

                   Write the suitable technical terms for the following.

               

                a. The software used to scan computer memory and disk to detect and eliminate

                   virus.

                =  Antivirus

 

                b. A computer program that has been created to infect and damage our computer

                   system.

                =  Computer virus

 

                c. A destructive program that hides and replicate itself.

                =  Computer Virus

 

                d. A computer program that entertains and damages users files.

                =  Computer virus

 

                e. The virus that replaces of implants itself in the boot sectors of a disk.

                =  Boot sector virus

 

                f. The viruses which may attach themselves to any executable file that is .com exe,bin.sys etc.

                =  Progrram or file virus

  

                g. The viruses which have combinationfeatures of both boot sector an program virus.

                 = Multiple Virus

 

                h. A type of computer virus that infects the document ot template of word

                   processing or spread sheet.

                =  Macro Virus

 

                i. The iteself replicating program users knowledge and permission.

                =  Computer Virus

 

                j. A virus that corrupts necessary system files of operating system.

                =  System infector Virus

 

                 j. A virus that corrupts necessary system files of operating system.

                 =  system infector virus

 

                 k. A harmful and destructive program that destroys other program.

                 =  Computer virus

   

                 l. The program used to detect and eliminate computer virus.

                 =  Antivirus

             

 

 

 

 

 

 

 

 

                                      

 

 

 

 

 

 

 

 

Cyber Law and Ethnics

Answer the following questions.

a.What is cyber space? Who used this term for the first time?

=  Cyber space is the virtual space created by computer networks internet and telecommunication.

  The term cyber space was used by cyberpunk scienctifcation author william gibson for the first time.

 

b. What are the areas covered by Cyberspace?

=  Cyberspace covers the following areas including computer,network. Internet,websites,Email,Data. Software, programs, storage devices, electornic devices,(cell phones,Atm machines) etc.

 

 c. Define computer crime/cyber crime with examples.

 =  It is a crime or illegal activities comitted by people through the use  of computer and internet related services .

  The Following are the common types of cyber crimes.

                    i.Hacking                                ii.Pornography

                    iii.Harrassment                        iv.Privacy etc

 

  d. What is cyber law? When was cyber law of Nepal introduced for first time?

 =  The necessary laws,rules or pocedures formed and apoted by government or concerned authorities to control and above cyber crime is known as cyber law.

 Cyber law of nepal was itroduces on 30th Bhadra 2061 bs [15th september 2004 A.D] after approving by council of ministers for the first time.

 

 

 

e. Write the importance of cyber law for any countries.

=  The cyber law is very much important to control cyber crime legalize the transcation electronically,control electornic fraunds and punish the cyber criminals legally.

 

 f. List any Four provisions made in the cyber law of nepal 2061 B.S?

  =  The following are the provisions made in the cyber law of nepal 2061 B.S.

               i.  Provision for necessary punishment agnist cyber crimes.

               ii.  Provision about the duty and responsilities of user and

               iii. Provision of digital signature,electornc data processing etc.

               iv. Provision of legal hearing of cyber related problems through IT tribunal  and Appellate Tribunal.

 

g.    What are the areas covered by cyber law?

 =   The areas covered by cyber law are:

                i. Computer crime and electornic fraunds.

                ii. Telecommunication laws

                iii. Digital signature and data protection law.

                iv. Inteligentt property law.

                v.  Copyright and patent right law etc.

 

h.    List the international cyber law.

=  International cyber law was basically started from 1970 A.D .some of laws are:

                i.  Fair credit reporting act-1970 A.D.

                ii. Freedom of informaton act-1970 A.D.

                iii. Federal privacy act-1974 A.D.

                iv.  Video privacy protection act-1998 A.D

                v.  Computer matching and privacy protection-1988 A.D.

                vi.Copyright act-1992 A.D.

 

  i. List the different effect of cyber crime in society.

                =  The effects of Cyber crime are:

                i. Physical theaft of the computer and other equipment.

               ii. Alterating the orginal web page.

               iii. The privacy of the compute ca be lost due to unauthorized acess.

                iv. Security problem may be accurd.

                v. New types of virus can attack software or programs.

 

  j. What is hacking?Who does this activity?

 =  The Hacking is the process of internationally going unauthorized acess to an imformation to an imformation system.The person who does this activity is a hacker.

               

k.    What do youu mean by digital signature?

=  A digital signature is the digital identity of sender that uniquely identities the particular sender electronically which is based on public key and private key.

  

l.       What is public key infrastructure?

=  IT is a security management system including hardware ,software,people and politics, dedicated to the management of digital certificate for the purpose to exange of electornic message.

 

 M. What is Harassment?

=  Harassment is the process of irritating the defendent by sending obscurities and insulting comments focusing on gender,caste,religon.

 N. Define hacker and cracker.

 =  Hacker is a person who uses a computer to gain an unauthorized acess.

 =  cracker is a computer user who attempts a break into copyrigt software or an information system.

 

o. Define computer ethnics.

 =  IT is a branch of pratica principle or general behaviour that deals with how the computer experts and users should make decision in regerd to the social while using the computer and electornic system.

 

 p. Define computer Ethnics.

 =  IT is a branch of pratical principle or general behaviour that deals with how the copmuter experts and users should make decision in regerd to the social while using the computer and electornic system.

               

Q. What are the issues relating to computer ethics?

 =  Following are the issues relating with computer ethics:

                   i.Copyright           ii. Privacy and piracy          iii.Harassment

                   iv.Internet pornography  etc.

               

 r. List the ethnical points that the computer user should be remembered.

                =  They are:

                i. Not to use computer to steal data.

                ii. Not to disclose the secrecy of computer.

                iii. Not to use the computer to harm other people

                iv. Not to use passsword of other.

                v.  Not to spread the illigal information.

 

                  

 Write short notes on.

        

 a. Salami Saving:

                            It is a type of computer crime in which a programmer/criminal alters a program so that it subtracts a very small amount of money from each accounnts and diverts the fund to the required account.

 

 b. Data Diddlng:

                           It is also a type of cyber crime in which criminals alters the regular account and insides modify data therefore it is dificult to  know that they have stolen or transferred fund.

                

 c. Software Privacy:

                            It is the act of illegally,copying or distributing software without purchasing or having legal right of the software.

 

d. Plagiarism.

                It is the act of tacking other persons, writting, conservation song or even idea and passing it off as own.

 

 e. Pronography:

                            IT is the representation of human body or hman senual behaviour for the purpose of sexual stimulation which is distributed through internet to the computer user.

    

 

 

 

 

State whether the following is True or False:

                

a. Computer ethnics gives awareness to the users in computing field [True]

b. Cyber law of Nepal was introduced in 2060 B.S.[Fasle]

c. Cyber law covers those places including ICT's and the places where  more computer are connected.[True]

 d. Software piracy is a cyber crime.[True]

 e. The term"cyber space" was used by charles Babbage in 1984.[Fasle]

 f. Cyber law covers those area related to ICT's .[True]

 g. A hacker is a person who performs the constructive work in the field of cyber space.[Fasle]

 

 

 Choose the correct answer from the following

  a. When was cyber law introduced in Nepal for the first time?

                 =  2004 A.D

 

  b. Which of the following is computer crime?

                 =  All of above

 

  c. Cyber ethics is'

                 =  Moral laws

                

   d. Which of the following is not computer crime?

                 =  Authentication

 

   e. Which of following steals the confidential data,acquire free acess to the

                    program the malicious distruction of files?

                 =  Cracker

 

    f. Which of the following is included in cyber law?

                 =  All of the above

 

     g. When was the term'cyber space" used for first time?

                 =  1984 A.D.

 

 

 Write the suitable technical term of the following.

a. Internatioally getting unauthorized acess to an information system.

                  = Hacking

 

 b. The laws related to the internet and cyber space.

                  = cyber law

                

 c. The branch of practical that deals with how the computer experts should make decision in regard to social and professional behaviour.

                  = Computer ehtics

   

 d. The concept of keeping users data confidential,such as stored files and email,which cannot be examined by anyone else without users permission.

                 = Privacy

 

e. A security mechanism used on the internet the refiles on two keys,one  public and on private.

                 =  Digital signature.

 

 f. Virtual space created by computer networks,internet to make communication.

                 =  Cyber space

  g. A person who uses a computer to gain an unauthorized acess.

                 =  hacker

  h. A computer user who attempts to break into copy right protected or an information system.

                 =  Cracker

 

  i. The process of encoding information in a such way thatit is inreadable to all.

                 =  Encryption

 

  j. The process of restoring encrypted data on its orginal form.

                 =  Decryption

 

   k. The rules and regulation to systamatic the computer related to technology.

                 =  Cyber law

 

    l. Moral rules to be followed by computer and other professionals.

                 =  Cyber space

 

    n. The misdeed carried out by usimg the computer and IT based media.

                 =  Cyber Crime.

       

        

   o. An illegal activity to harm computer user and their assests.

                 =  Cyber crime

Chapter:6

 

                                Multimedia And IT's Applications

 

 

1.    Answer the following question

a.    What is mutimedia? List thhe types of elements or components used in multimedia.

 = Multimedia is the combination of text,graphic,audio,video,animation etc that is delivered interactivey to the user by electronicaly or digitally manuplate mean.

following are the different types of elements or components used to multimedia.

                  i.Text         ii.Sound            iii.Graphics        iv.Video

                  iv.Animation

 

b.    Write the advanatges and disdvantage of multimedia.

 = Advantage of multimedia.

                i.Multimedia is intresting and easy to use.

                ii.IT can store huge number of data and information for long period.

                iii.It makes teaching,learning,easier and effective in the class room.

                iv. It makes presentation matter more attractive,clear and accurate.

 

      Disadvantage of multimedia are:

                 i.It is more expencive at the initial stage.

                 ii.Technical manpower is needed to operate multimedia system.

                 iii.It is difficult to distribute and multimedia in remote area.

                 iv. Multimedia files ar two large and occupy more space.

 

c.     List the types of Multimedia contents used in multimedia technology.

   = Multimedia contents can be classified into two types.They are:

      i.Linear Multimedia: In Linear multimedia an user is simply passive   reciver of multimedia contents so cannot modify them. E.g: Movies.

      ii.Non linear multimedia: It is also known as interactive multimedia in which user can interact and modify the multimedia contents. Example: Hypermeda.

 

 d.What are the hardware parts required for making multimedia cable.

 = The following are the hardware parts needed for making multimedia

                    cable:

·       Computer set   

·       CD ROM drive       

·       Sound card     

·       Head phone

·       Microphone     

·       Projector         

·       Digital camera 

·       Scanner etc.

 

e. List the different software needed in multimedia.

= The software needed in multimedia are as follow:

·       Paint program

·       Bit mapped graphic(BMP)

·       Joint photographic Expert group(JPEG)

                   ii. Audio format

·       MP3 format

·       Multimedia deck(sound editor)

·       Musical Instrument digital interface(MIDI)

 

                   iii.Video editor software

·       Motion picture expert group(MDEG-2)

·       Quick time(Format)

·       Maya software

·       Video for window(AVI format)

            

                    iv.Image editor software

·       Adope photo shop

·       Photo express

·       Photo deluxe

                   

f.What is multimedia Technology?

= Multimedia technology allows us to store data and imformation for

 the future refrence .CD rom is a cheap durable and portabl storage media used to store the data and information in multmedia technology.

 

 g.What do you mean by multimedia system?

= Multimedia system is computer system which is capable of creating, editing and processing multimedia,data and application.

                  

h.What do you mean by computer graphic?

= Computer graphics is the display of still frame picture or photo on computer screen.

 

  i.What is Virtual reality?write its uses.

 = Virtual reality is an artificial enviroment created with computer hardware and software and presented to use in such a way that it appears as real.

 The virtual reality is mainly used in fields of enteertainment as well as difficult and dangerous jobs like parachuting ,airplanes vechile riding etc.

                  

 j.How can multimedia help in education

 = Through multimedia we can demostrate activites related with different subjects using text,video,graphic,and sound.multmedia program brings concept of life and help students intergate critical thinking problems sloving skills.

 

 k.How can multimedia be used in training?

 = The use of multimedia in training increasing rapidly organization use multimedia interactive training programs to their employees through a network or multiedia OS.

 

l.What is computer Animation?

  = Computer animation deals with the generation,sequencing and displaying of a set of image to create an effect of visual change or motion,similar to a movie film.

 

m.What do you mean by video conferencing?

  = Video conferencing aslo known as multimedia conferencing refers to a system that simulates face-to-face interaction among particpating users located far from other,as if they are sitting and discussing in a single room.

 

n. List the application field of multimedia.

 = The following are the application field of multimedia:

                     i.Presentation                           ii.Education and training

                    iii.Entertainment                       iv.Advetisement

                    v.Foreign language training      vi.Virtual reality      

                                         

                    

 

 

 

 

 

 

 

 

 State true or False.

                 

                  a.  Multimedia is used in scietific research [True].

                  b.  Images do not play role in multimedia.[Fasle].

                  c.  multimedia is not used in entertainment.[Fasle]

                  d.  Sound card is an essential decice to play multimedia.[T]

                  e.  Cartoon on television is an example of animation.[T]

                  f.  Multimedia technology is used in public places as imformation providers.[T]

                  g.  Multimedia system is a computer capable of handaling multimedia technology.

                      [T]

                  h.  Adope photoshop is an example of multimedia software.[T]

                  i.  In Multimedia application more than one medium used to present the

                      Imformation.[T]

                  j.  Multimedia manipulates the imformation for better communication.[T]

                  k.  Interative multimedia doesnot allow to modify the multimedia hi contents.[F]

                  l.  Virtual reality is the natural reality used in multimedia ststem.[F]

 

                       Select the correct answer.

                  a. Which of the following is the type of media used in multimedia?

                  =  All of Above.

 

                  b. In Which field multimedia is used.

                  =  All of Above.

 

                  c. Which software is used in Multimedia technology?

                  =  Adope photoshop

 

                  d. which of the following is not multimedia software?

                  =  windows xp

 

                  e. Which of the following are component of multimedia?

                  =  All of above

 

                  f. Which of the following software assosiated with the multimedia technology.

                  =  Maaromedia flash

 

                  g. Through Which,knowledge and skill can be gained.

                  =  Multimedia technology

 

                  h. Which of the following are used in multimeddia system.

                  =  Text,graphics,video and visual

 

                  i. A techonology that allows people to enter and intrest with three

                     dimonsional computer graphics world.

                  =  virtual reality

                   

                  j. Which of the following is not multimedia software?

                  =  Avira

 

                  k. Which of the following is main component of multimedia .

                  =  sound card

 

                  l. Which of the following is not component of multimedia.

                  = pixel

 

 

                   Write the suitable technical term..

 

                 a. The elements of multimedia which display alphanumeri character on screen

                    to present imformation.

                 =  Text

 

                 b. it deals with recording and displaying of a sequence of images at a

                    reasonable speed to create an impression of movement.

                 =  video

 

                 c. It is a simulation of movement created by displaying a series of pictures

                    or games.

                  = Animation

 

                 d. The artificial enciroment created by computer technology to entertain user.

                  = virtual reality

 

                 e. A high capacity storage device that can read and write data into storage media.

                 =  CD ROM drive

             

                 f. The integration of audio,text,video,and animation.

                 =  multimedia

                 

                 g. It is a computer haing capabilit to integrate two or more types of media

                    for imformation presentation,

                 =  Multimedia computer

    

                 h. The program used to create and present multimedia system.

                 =  Multimedia software

 

                 i. The moving of real events.

                 =  Video

Give Full Forms:

 

                    PDF=Platform Independent Document Formed.

                    PNG=Portable Network Graphics

                    WMF=Widows metafile format

                    TIFF=Tagged image file format

                    CBE=Computer Based educaton

                    CBT=Computer Based Training

                    BMP=Bit Map

                    GIF=Graphic Interchange Format

                    JPEG=Joint Photograph Expert Group

                    MIWI=Musical instrument Digital Interface

                    LCD=Liquid Crystal Display

                    HMD=Head Mouted Display

                    MUk=Multimedia Upradge Kit

                    CD-ROM=Compact Disk -Read Only Memory

                    DVD=Digital Versatile Disk

                    CAVE=Cave Automic Virtual Enviroment

                    VRML=Virtual Reality Modeling language

                    MPEG=Motion Picture Ecpert-Grat

 

                 e.n. Drawing software

                   i. Macromedia Freehanf

                   ii. Adobe Illustrator

                   iii. Cores Draw

 

                   f. List the application field of multimedia.

                    = The following are the application field of multimedia:

                    i.Presentation         ii.Education and training

                    iii.Entertainment      iv.Advetisement

                    v.Foreign language training      vi.Virtual reality      

                                         

    

                     

                

Comments

Popular posts from this blog

File Handling Important questions and Solutions

Full Form

Test Result 2077/78