Chapter Wise Note Of Computer Science Class 10 || Dear Students Stay At home With These Note || Stay Safe
Fundamental Notes
Chapter-1
Data
Communictaion and Computer Networking
1.What is communication or computer
communication?List the type of communictaion.
=The process of transferring data,information
message etc between two or more persons using computer is called communication.
The types of communication are:
1. Data
communication
2. Tele
communication
2. Differentiate between tele communictaion and data
communication with examples.
=The differences between tele communication
and data communication are:
3.List the
elements of data communication.
=The elements of
data communication are:
i.
Sender
ii.
Medium
iii.
Receiver
iv.
Protocol
4.What is communication media or transmission
channel?List the diffrent types of communication media with examples.
= Communication media is the channelor
electornic pathawav through which data or signal can be transmitted from one
point to another.The two types of communication are:
i. Guided/bounded/wired communication media.
Ii .Unguided/unbounder/wireless
communication media.
i.Guided
or Bounded or wired communication media:Guided media are such types of communication
media use open wire or cable line for data transmission from one point to
another. Example: Twisted pair cable,Coaxial cable, Fiber optic cable etc.
ii.Unguided
or unbounded or wireless communication media:Unguided communication media
are such types of media in which data transmission is carries out through the
air so also calle wireless media.Example:Radio frequency,Microwave,
Satellite,infrared etc.
5.Write
the diffrences between Guided and Unguided media.
S.no |
Guided Media |
S.no |
Unguided Media |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6.What
is Computer Network?Write the purpose of network.
= The
interconnection between two or more than two computer through transmission
media in order to communicate and share resources is known Computer Network .
The purpose of
network are pointed follows:
i.
To
share pheripherals.
ii.
To
make communicate faster.
iii.
To
share software.
iv.
To
make information secure.
7. Mention
the advantage and disadvantage of computer network.
= Its advantage are:
i.
It
allows the sharing of hardware device such as printer, modem, hard disk.
ii.
It
allows the sharing of data, software etc.
iii.
It is cheaper.
iv.
Data
computing system is faster.
= Its disadvantage are:
i.
Computer
virus spread easily.
ii.
Cyber
crime were originated.
iii.
Initial
setup and cost is high.
iv.
Techinical
manpower is lack.
8.List the
different services provided by Computer Network.
=
Network services are the things that a network can provide.They are:
i.
Print
service
ii.
File
service
iii.
Message
service
iv.
Application
service
v.
Database
seervice
9.What is
data transmission made?write the different mode of data transmission with
examples.
= A data
transmission made may defined how to data travel from sender to reciver.
There are three types of data transmission
mode they are:
i.
Simplex
mode
ii.
Half
duplex mode
iii.
Full
duplex mode
i.
Simplex mode: In this mode
transmission takes place in only one direction so,it is also called one way
communication made. For e:g Radio,Television Newspapper etc.
ii.
Half duplex mode: In this mode
data transmission take place in both direction.but only one direction at a
time.For eg walking talky.
iii.
Full duplex mode: In this mode data
transmissiion take place in both directon or simultaneously so,it is also
called two way communcation mode. For eg: Mobile phone, Internet etc.
j.Write the
diffrences between simplen and duplen mode.
= The diffirences between them are tabulated
below:
k. How
are computer network classified into different types?List the types of computer
network account to the size and distance.
= Computer
network classified according to the various criteria such as size, speed of
data transmission distance covered technology used and architecture.
The most common
classification of computer network in its size and speed of data transmission
are pointed below:
i.
Local Area Network(LAN)
ii.
Metropolitian
Area Network(MAN)
iii.
Wide
Area Network(WAN)
l.What is LAN? Write its measure features.
= LAN is the
type of network which covers a very limited area like a single, collage,organization
etc and extending up to of few kilometeer by using guided transmission made. Eg: Computer
network in its building.
The feature of
LAN are pointed below.
i.
LAN
posses high data transmission rate usully 1 to 100 MBps.
ii.
LAN
is owned privately by a single organization.
iii.
It
uses guide or wide transmission channel.
iv.
It
is cheaper than other.
m. What is Man? List its Features.
= MAN is a type
of network which is entended to an entire metropolitian city or state through
guided or unguided media both according to the required .
For eg.Cable television network.
The features of MAN are pointed below.
i.
It
connects more or lan together.
ii.
It
is extend to an metropoitian city or state.
iii.
It
uses wire or wireless connection both.
iv.
Data
transmission in MAN is slower than LAN but Faste then WAN
n.Define
WAN?List its features.
= WAN can be
defined as the type of network that is entended to a large geographical area
such as among countries,continents or even in the world with the use of
unguided media like satellight.
The features of
WAN are listed below:
i.
LAN
is owned by the multiple organization.
ii.
It
is ectended to large geographical are to worldwide.
iii.
It
uses wireless technology for data transmission.
iv.
Data
transmission in wan is slower than below one MBps as compare to other network.
o.Differentiate between LAN and WAN.
= They are tabulated as below:
|
LAN |
|
WAN |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
p. What
is Network Architecture/model.Explain its types.
= The network
architecture of model is defined how the communicate in the network.
In another world, It is an interaction
behaviour of computers on the network system. Following are the common types of
network architecture.
i.
Centrailized
computing netwrok architecture.
ii.
Client/server
network architecture.
iii.
Peer
to peer network architecture.
i.
Centralized
computing network architecture:In this type of network architecture the
entire network system depends on the main computer called host computer which
uses the powerful operating system like linux.
ii.
Client/server architecture:In this types
of network architecture each computer is conncted to a device called server and
conncted to a device called server and communication is done threat.
iii.
Peer to peer
network architecture:In
this type of network architecture each computer on the nnetwrk have equal
responsiblitiies of resource and communication here is no specific server used
because computer can be either client or server.
q.Write
the advantage and disadvantage of peer to peer network architecture.
= Advantage of peer to peer network are:
i.
It
covers small geographical area.
ii.
It
provides simple coding schemes.
iii.
There
is no central administration who sets the network policies.
iv.
This
network arrchitecture is easy to trouble shoot.
= Disadvantage of peer to peer network are
pointed below:
i.
It
has less flenibility.
ii.
It
is not useful for larger organization.
iii.
It
provides less security.
r. Write the
advantage and disadvantage of client/server network architecture.
= Advantage of
client/server network architecture are:
i.
A
client/server network covers a larger geographical area.
ii.
The
cabling scheme can range from the simplest to the ost complicated one.
iii.
It
reduces the network traffic.
iv.
It
centralize the network management and scurityy to the server.
= Disadvantage of client server network
architecture are:
i.
Required
initial investment dedicated server.
ii.
Large
network will require a staff for regular maintainance to ensure efficient
operation.
iii.
When
server goes down,operation wull close across the network.
s.What is network topology or LAN topology?list the
major types of topologies used in LAN?
= The cabling
structure of computers n local area is called network topology or LAN topology.
In other world the geographical arrangement
or physical layout of computer in network us called network topology or LAN
topology.
The major are the types
of Network topology:
i.
Bus
topology
ii.
star
topology
iii.
Ring
topology.
t. Sketch and
explain about bus topology.
= This topology
aslo known as linear topology whichis a type of topology where all the
computers are connected to each other linear format through the common
distribution channel called backbone code cable is called bus topology.
u.List out the advantage and disadvantage of star
topology.
= Advantage of
star topologyy are pointed as below.
i. Easy
to install and cable connection.
ii. No distrubution to the network than
connecting or removing devices.
iii. Easy to detect fault.
iv.High data transmission is possible.
= Disadvantage
of star topology are pointed below.
i.
Require
more cable length than bus topology.
ii.
If
the hub are disabled all the network will fail.
iii.
This
topology ar difficult to enpand.
v.Explain startopology in short with labelled
diagram.
= This is a type of topology in which all the
nodes are connected with a central component or devic called hub or swotch
forming a star pattern.
w.What is ring topology?Explain with diagram.
= A ring topology is a such type of topology
in which all the nodes are connedcted to
each other in a circular loop or ring.In this topology there is no server and communication
takes place only one direction i.e either clockwise or anti clockwise.
x.List
out the advantage and disadvantage of Ring topology.
= Advantage of ring topology are pointed
below.
i. Ring
Topology works well where there is no central site computer system.
ii. Short cable connection which cause an
increase in network realibiling.
iii. Every
computer have equal acess.
iv.less chance
of data collision.
= Disadvatage of
ring topology are pointed below:
i.
Any
communcation path or node future cause network falure.
ii.
Addition
new mode increase the communication debug.
iii.
Network
cinfiuration is difiicult.
y. Expain in short the followig network transmission
devices.
i.Media
Connector
= Media connector serves as the physical
interface between cabling and network nodes which is attached between to the
medium itself.For example: RJ-45,Tconnector etc
ii.Network
Interface Card.(NIC)
=The NIC also known as network adaptor which
is network connecting device that contaians the electoronic circuity ensure
reliable communication between work station and server.
iii.Reapeters
A reapeters is a
network hardware which accepts with signlas regenerate them and send the
message on their way .For eg Amplifies,signal regenerting repeaters.
iv.Hub
Hub is a network connecting device also known
as multiport repeaters with various partts for connecting computers on the
network that is used in star topology .there are three type of hub they are:
i.
Passive
hub
ii.
Active
hub
iii.
Intelligent
hub
z.What is internetworking transmission device?
= Interworking device are hardware device used
to connect two or more networks for a signal network.
Following are
the examples of interworking transimission device:
i.
Bridge
ii.
Router
iii.
Gateway
switch
a Define the following transmission device.
i.
Modem
= It is a device by which we may connected our
pc to the ISP(Internet service protocol
)over the telephone line .modem converts the annalog signal to digital to an
other.There are two types of modem they are:
i.
External
Modem
ii.
Internal
Modem
ii.CSU/DSU
= CSU(Channel
Service Unit)/DSC(Digital Service Output)is used to connecte digital computer
to digital transmission media instead of analog transmission media.
b.What is protocol?List the diffirent types of
protocol.
= Protocol are
commonly agreed rules followed for interconection and communication between
computer in network.
In another word,
protocol is a set of rules and procedures followed by every computer on entire
network for making communation possible.The following are the common protocol
used in network system.
i.TCP/ICP -It is used in network system
ii.HTTP- It is used between web server abd web
clients.
iii.FTP- It is used to upload or download files.
iv.SHTP- It is used for sending e-mail.
v.POP- It is used to recive e-mail.
c.Write short notes on the following guided
transmission media.
= Twisted pair cable
is a common transmission media used in
voice grades telephone line. This media can be used for low speed transmission
or signals but when the length goes beyond loo the error rates become high.
ii.Coaxial cable:
Coaxial cable are
such type of cable of guided media which have wide band with width.these are
widely used in long distance telephone line .Its transmission speed is higher
than pair cable.
iii.Fiber optics cable:
Fiber optics
cable are made of plastics or glasses, fiber which give quality transmission of
signals at very high spped which is used to communcate either analog or digital
signal.
d.Write short notes on unguided transmission media.
i.Radio wave
transmission
It is used for communication between computer
in inacessable location for short range communication.
ii.Micro wave transmission
This is a type of unguided transmission media
which is mainly used for bandwith ine at site communication.This media cannot
obstacle by hills and mountains.
vi.Wi-Fi(wireless Fidility)
Wi-Fi is one of the
popular wireless technology considered as unguided transmission medium that use
radid wave to provide wireless high speed internet and network connection.
e.What is modulation?list its type.
= The process of
converting the amplitude ferequency or phase is called modulation.
The types of
modulation are:
i.
Amplitude
modulation(AM)
ii.
Frequency
Modulation(FM)
iii.
Phase
modulation(PM)
f.What
do you mean by band width.How isit enpressed.
= Bandwith is the amount of data that can be
transmitted through communication channel in a fined time period.It is
expreseed in term of Hertz.
g.What is server?list the types of different server?
= The computer that acts the central authority
on a server based network is called the server.The various types of server are:
i.
File
server
ii.
Print
server
iii.
Network
sever
iv.
Communication
server
h.Define the following network related rerms:
i.Client
The client are the computer on which user run
application.client are less powerful computer incomparision with other.
ii.Work station
The individual personal computer used as
network user is known as work station.
i.What
is network software?
= Software is
the measure components to create a network enviroment to share data and resources.
j.What
do you mean by network operating system.List its example.
= The group of
program that manage the resource on the network and etablished well defined
enviroment for smooth data processing is called network operating system.
for eg Windows
2000,linun,MS windows ,NT etc.
k.Who is
network admistration?what is role of network administratior?
= Network
administrator is the network expert or persosn who set up and control the entire
network enviroment .He/she is responsible to install the required hardware and
software and also control entire networking system and user.
i.Explain how the computer network reduce cost of
operation.
= computer
network enable information sharing ,hardware and software and povides
centralized administration and support .thus ,many resources like information, hardware,
software or any other related items can be shared with each other without
having bought new one.Therefore,it is true that network computer reduce cost
operation.
m.Write the difference between broad band and narrow
band width.
n.What is
signal?write its types.
= A signal is an
electornic current that is lose to convec data from one to another.
Its types are:
i.
Analog
signals
ii.
Digital
Signals
o.Difference
between Hub and Switch.
Full Form
LAN:Local Area Network
MAN:Metropolitian Area
Network
WAN:Wide Area Network
IPX:Internetwork
packet exchange
IEEE:Institude of
Electrical and Electornic Engineers
UTP:Unshield Twisted
pair
STP:Shielded Twisted Pair
PSTN:Public Switched
Telephone Network
NIC:Network Interface
Card
Wi-Fi:Wireless
Fidility
FDDI:Fiber Distributed
Data interface
ARC NET:Attached
Resource Computer Network
NAT:Network adress
translation
VOIP:Voice over
internet protocol
WWWC:World wide web consortium
SPX:Sequence packet
Acess
DIX:Digital intex
CSMA/CD:Carrier sense
multiple Acess/callision Detection
DNA:Deonyribonucleic
Acid
SNA:System Network Architecture
MBPS:Mega byte per
second
BPS:Byte per second
KBPS:Kilo byte per
second
FM:Frequency
Modulation
PM:Phase Modulation
BNC:British naval
connector
BMC:Baseboard
management contoller
CSU/DSU:Channel
service unit/Digital seeervice unit
EMI:Equated Monthly
installments
MAC:Media Acess
Control
CAN:Computer
Association Network
ADSL:Asunchronous
Digital Subscriber line
RJ45:Registered Jack
45
MODEM:Modulator Demodulator
USB:Universal Serial
Bus
POP:Post office
Potocol
ARP:Adress resolution
protocol
ISDN:Intergrated
Seervices Digital Network
ASCII:American
Standard code for Information terchange
WLAN:Wireless local
Area Network
EBCDIC:Entended Binary
coded Decimal Interchange code
VSAT:Very small amplitude
frequency
VHF:Very high
frequency
UHF:ultra high
frequency
DNS:Doman name sysytem
WWW:World wide web
EDP:Elcectornic data processing
NOS:Network operating
system
BBS:Buletin board
service
DEC:Digital equipment
coroporation
NEC:Nippon electric
company
LED:Light emitting
diode
ICM:International
computer limited
IBM:International
business machine
BIOS:Basic input
output service
OFC:Optical fiber
cable
NNTP:Network News
Transfer protocol
NETBEUI:Net Bios
Extended user interface
Technical Term
1.The process of transfering data or
information between computer
= Data communication
2.The interconnection between two or more than
two sets of computers through physical and logical component to share data and
information communication.
= Computer Network
3.The computer
that acts the central authority or a network.
= Server
4.The computer
on which user run application.
= Client
5.The amount of data that can be transmited
through communication channel in a fixed time and period.
= Bandwidth
6.The device which makes communication
between station and server.
= Network interface card
7.The device that use computer network to
translate digital into analog and vice versa.
= Modem
8.A network which is extend beyond 100km.
= MAN
9.A device with multiple parts.
= HUB
10.The network
in which all the servers to share software and responsiblities.
= Workstation
11.It is a
computer that serves program and data and controls also co-ordinates all
computer activities in a network.
= File server
12.It is a
physical interface between cabling and network nodes.
= Media connector
13.The topology in which all the computers are
connected by backbone cable.
= Bus topology
14.It accepts weak signals and regenerates
then and send them back to the way.
= Repeaters
15.It allows
sending multiple single across the straight lines.
= Multipelexers
16.The topology
in which all the computers are conected to each other in a flows through
single cable.
= Ring topology
17.Rules and
regulation for interconnection in a network
= Protocol
18.It is a server where incomming mails are
collected in the e-mail box.
= POP(POST OFFICE PROTOCOL)
19.The
communication made in which data are transmitted in one direction.
= Simplen Mode
20. A
communications media which uses light to carry data signal through a data
cable.
= Fiber optics
21.It is a wireless technology that can be
used to transmit data between two different network.
= Microwave
22.The network in which all the computers
have equipment capablities and responsiblities.
= Peer to peer network
23.Physical layout of computer network.
= Network topology
24.Commonly used media for physical channel
transmiting data across network.
= Cable
25.Network of Network.
= Internet
26.A device which copies electrical signals
form one ethernet to other.
= Repeateer
27.The network
architecture which consists at least one server and one more client of work station.
= Client server
28.The network
architecture which function both as server and workstation.
= Peer to peer network
29.An intelligent device that connects to
different network.
= Router
30.Cabling structure of lan.
= Lan topology
31.A program that controls and manage all the
resources in network system.
= Network operating
system.
32.Group of
computer that can share resorces.
= computer network
33.A computer limited with a room.
= LAN
34.A card use to connect the network cabling
computer.
= NIC
35.The electornic pathway through which data
travel a network.
= Transmission media
36.The computer
network which is extended beyond the boundaries of countries.
= WAN
37.A
transmission media through which data are transmitted through a light.
= Fiber optics
38.The smallest unit of measuring unit data.
= Bit
True or False
1.
Computer
networ reduce the cost. True
2. In peer to peer articture there is
dedicated server.True
3.In simplex transmission mode transmission
can takes place in two direction. Fasle
4. In half duplen mode data can be transmitted
on both direction. True
5. Man connects two or more lan together.True
6. LAN exists within a single room. True
7. Computer
network allows sharing software and hardware also.True
8.Coaxial cable helps much greater bandwidth
than fiber optics.True
9.Internet is an example of WAN. True
10.Bridge are
more intilligent than router. Fasle
12.Each computer
or device in a network is called node.True
13.NIC is
hardware device that connects one node physically. Fasle
14.It is easy to
add or remover computer star topology.True
15.In bus topology failure of one of a
singlecomputer does effect the raise of computer. Fasle
16.Data transfer rate is lower in co-axial
cable than optical fiber. True
17.A get way is used to connect computer
network using same communication. False
18.Fiber optics cable is one of the example of
cheapest cable of network. Fasle
19.Computer network doesnot allow sharing data
and program. Fasle
20.A gate way is a networking device that
connect two dissimilar network. True
21.Peer to Peer network cable that is
switable for large organization. Fasle
22.Device Driver is a hardware used in
computer. Fasle
23.Fiber optics uses light to carry data
signals through the cable. True
Choose the correct
answer.
a.It request services
data and other resources avialable in the server.
= Workstation
b.The computer that
acts the centre authority un network.
= server
c.Which of the following is
not connector?
= POP
d.Which of the
following is network service?
= all
e.Which component is
used for networking?
= Bridge
f.The network in which
all the components have equal acess?
= Peer to Peer
g.An internetworking
device that connects two disimilar network.
= Gateway
h.A deice which has
multiple portes.
= Hub
i.It is an intelligent
device that sets network traffic.
= Router
j.Which of the
following is protocol?
= all
k.Which of the
following is Network operating system.
= MS dos
l.Each computer and
device in a network is called.
= Node
m.The technology which
has only the point to point design.
= Mess topology
n.Which of the
following is not communication device?
= Microwave
o.Which of the
following is unbounded transmission media?
= All
p.Which of the
following is guided media?
= Fiber optics
q.Which is network
protocol?
= All
r.The device which is
used to connect computer with network.
= NIC
s.The topology which
has circular loop or point to point link.
= Ring topology
t.The topology which
extend beyond 100 km.
= MAN
u.Modem speed is measured in term of
= BPS
v.Two way communication
media is
= Internet
w.Data transfer rate in
WAN is
= BPS
x.Which refers to the
transmission channel?
= All
y.Which is network
operating system?
= Linum
z.Which is internet
Service?
= Telnet
aa.A central device
used in star topology.
= Star topology
ab.Choose the odd one.
= PS12
ac.Which is not
protocol?
= XTP
ad.Which is the
connector of co-anial cable?
= BNC
ae.Which is not network
hardware components?
= Windows NT
af.Which refers to the
network components?
= All
ag.Which of the
following is not network topology?
= Client server
ah.Which of the
following is guided media?
= Fiber optics
ai.Which of the
followings not communication media?
=
aj.In an e-mail adresss"Mero
Nepal @ yahoo.comwhat does yahoo refers?
= Doman name
Match the following
a.
Group
A Group B
Transmission
media = Fiber
optics
Simplex = one
way communication
Duplen = Two way communication
Modem = Communication
device
b.
Group
A Group B
Unguided
communication media = Radio
wave
Guided
communication media = Coaxial
cable
LINUX = NOS
Network
component = Hub
c.
Group
A Group B
LAN = Wired
communication
MAN = Radio
wave communication
WAN =
Satellite communication
d. Group A Group B
Computer in
network = Node
Networ Os =
Novel Netware
Types of
cable =
UTP
protocol =
HTTP
e.
Group
A Group B
Protocol = Rules to exchannge data
LAN = Network
within a building
MAN = Network within a city
f.
Group
A Group B
Gateway = Intelligent device
Bridge =
Similar Network
Types of cable = UTP
RJ45 =
Media-connector
g.
Group
A Group B
Hub = Repeats
the signals to all the connected nodes.
Switch = Repeats the signals to only destination
node.
Repeater = Regenerates
weak signal
Gateway = Joins multiple network having different event
protocol
Chapter-Two
Internet And E-mail service
State
wether the following statements are true or false.
a.E-fax is cheaper than e-mail. False
b.Intranet
can be used globalize. Fasle
c.Mozila firefox is an internet browsing
software.True
d.Chat program allow the user to comunicate
each other in real time.True
e.E-mail documents cannot shared in
computer. Fasle
f.Browsing software is not necessary to
use internet. False
g.Videoconference is one of the services
provided by internet.True
h.Search engine is an interactive tool to help
people to locate information via www.True
i.We can do the business through the
electornic media computer using internet.True
j.Http is used to desigining web page. False
k.Dialup connection is the easiest way to
connect a compare to the internet nowadays. False
l.Modem is necessary to acess internet
resources.True
m.Uploding is copying files from internet
to users computer. Fasle
n.Telnet allows for remote login to host
computer.True
Write full form
of the following
ARPA-Advanced
Research Project Agency
ECNR-European Center for
Nuclear Research
DARPA-Defence Advance Research Project
Agency
E-mail-Electornic mail
FAQ-Frequently
Asked Questions
FTP-File Transfer
Protocol
HTML-Hyper Text
Markup Language
HTTP-Hyper Text
Markup Protocol
IAB-Internet
Architecture Board
IETF-Internet
Engeenering Task Force
INIC-Internet
Network Information center
IRC-Internet Relay
chart
ISO-International
standard orgaization
ISOC-Internet
Society
ISP-Internet
Service provider
MIL-net-Military
Net
NCP-Network
control protocol
NSF-Net National
SScientific Fundamental Network
OSI-Open System
Inter connection
PERL-Pratical
Extraction and Reporting language
POP-Post Office
Protocol
PPP-Paint t paint
protocol
SMTP-Simple mail
transfer protocol
a.
What is
internet?Write the role and importance of internet in today’s world.
= Internet is a
world's largest computer network connecting millions and billions of computer
together in a common protocol TCP/IP for communication.
Internet has
chaned the method and technique of communication, education, trades, business,
entertainment etc.We cannot image our lifestyle without internet in todays
competitive world.Therefore, internet play vital role at present.
b.
What is the role
of TCP/IP in internet?
= Transmission
control protocol in internet is a communication protocol which is responsible
for diving the file/message in to the packets at the destination computer.
Internet protocol is responsible for handeling
the address of destenation of computer so that each received packets is sent to
the destenation of computer.
c.
List the major
services provided by internet.
= Following are the major services provided by
internet.
i.www iv.Internet topology
ii.chat v.E-fax
iii.E-mail vi.E-commerence
vii.video conferencing
d.
List any two
advantage and disadvantage of internet.
= The
two advantage of internet are:
i.It provides global
communication.
ii.It is faster and
cheaper means of communication.
= The two disadvantage of internet are:
i.It is initial cost
in high for set up.
ii.It increases
cyber crime
e.
What are the
differet types of internet account?
= There are two types of internet connection
account.They are:
i.TCP/IP
This is the text and graphics based
account in which the user can view graphics and photographs along with the
text.
ii.Shell
account
This is text based user interface account in
which user cannot view any graphics or photographic image.
f.
List the
different equipment required for conecting internet.
= The equipment needed for connecting internet
are:
i.Telephone line
ii.Modem
iii.Multimedia
computer system
iv.Internet software
v.ISP account
g.
Define website
with suitable examples
= Web site is the collectiion of several
related webpages with hypertext created
by any business organiation/university etc to provide their information world
wide through the internet.
EG: www.nhcbtl.edu.np
www.nepalnews.com
h.
List he
application uses of internet in different fields.
= The following
are the main application of internet.
i.Business: To
provide acess to complex and huge database.
ii.Entertainment:To
provide audio,video,connections,onlin chatting etc.
iii.Education:to
provide online education interactive clases.
iv.Indivisual:To
make global communication,use e-comerce facility etc.
i.
What is web
browser?write any twio browser software.
= Web browser or browser software are the
special software program which are used to run(surf)internet making all the
related imformation and facilities
avialable for the users.
The following are the popular web browsers.
i.Microsoft
internet exporer
ii.Google chrome
iii.Mozila firefox
iv.Opera mini
j.
What is URL?
Wite the main part with meanings.
= Uniform
Resources Locator is an unique adress for each website for its identification
which conatins protocol, domanime, doman type etc.
Examples-http//www.nhhss.edu.np
Here, http-protocol
www-host
computer name
nhhss-domain
name
edu-doman
type(education)
np-Nepal(country code)
k.
Define ISP and
write any two popular ISP of Nepal.
= ISP is an
organization that offers and provides the necessary internet related services
and acess to the user ot customless.Some popular ISPs of Nepal are:
i.World link
ii.Broad link
iii.NTC etc
l.
What is search Engine?List
any four popular search engines.
= Search engine are the interactive tool or
software which help people to locate and find the required websites and
iformation via view.The most popuar engine are pointed below:
i.Google.com ii.Altabista.com
iii.Yahoo.com iv.Bing.com etc
m. Write
shor notes on the following internet related terms
i.Webpage:
= Webpage is a collection of hypertext
information of any organzation company,goverment agency or indivisual stored in
the website.It is also known as single page or website.
ii.WWW:
= It is a
service of internet that is interconnected through hyper text.it provide link
in the web documents.
iii.Web
server:
= Web
server is a site on which the web pages are kept.It is program that responds to
request from web browser to relative resources.
iv.Domain
Name:
= It is the name of specific internet area
controlled by an organzation company
or government.
v.HTTP:
= It is protocol that is used by web sever and
web clients to communicate With each other.
Vi.FTP:
= It is a
protocol or tool that allows the user or host to transfer files an one computer to another over a
network.It also allows the users to upload and download the files.
vii.Chat:
It is a program
that allows user on the interrface to communicate textually with each other by
typing in real time situation.
viii.Upload:
It is the
process of copying files,documents,programs,data etc from the internet server
to the users computer.
m. What is e-commerce?Write any four popular e-commerce
sites that you know.
= Electornic
commerce is an internet service which alllows doing online business. It also
allows to buy and sell good and products thrugh internet.
The following
are the popular e-commerce sites.
i.www.kinmel.com
ii.www.sastobazar.com
iii.www.muncha.com
iv.www.amazon.com
n.
What do you mean
by intranet?
= Intranet is also a network but
intenal(private)network which utilize all the roles and regulation of the
internet provide facility to local area network.
o.
What is
e-mail?Explain the parts of e-mail address.
= The fullform
of E-mail is electronic mail.It is a process of sending and receiving message
electornically through internet.
E-mail
adress
E-mail is identified by an unique address
called e-mail address. Basically an e-mail address have five parts.
Example:nhc@yahooo.com.np
nhc- user name
yahoo, e-mail
program which provies e-mail service.
@- at sign
seperate username and domain name.
com- domain
type ie commercial organization
np- country
code ie Nepal
p.
Write the
advantage of e-mail.
= The advantage of e-mail:
i.It is the
cheapest and fastest means of communicaton.
ii.It is more
reliable than other means.
iii.It can be used
from any part of the world at any time.
iv.It supports
picture,graphics,image beside the text.
v.Single mail can
be sent to different mail adress.
q.
What do you mean
by E-Fax?
= It stands
for electornic fax.It is a powerful internet application that
allows to send and recieve faxes direcction our
computer.
r.
Define the
following term.
i.Telnet:Telecommunication network is an
internet services that enables to
connect a remote or hast computer so that an user can enter data ,run programs
and transfer the files as needed.
ii.Usenet/News
group: It stands for user net service which allows the user
form different
geographical location to share the views on any topic of intrest. It is also
known as newsgroup or discussion group.
iii. Internet telephony: Internet telephony
refers to the use of public
intrest for voice trasnmission.It is also
known as voice over iternet protocol.
iv.Video conferencing: It is also one of the
very intresting and useful
service gaining
popularity.now a days which allows to make an audio and video communication
across the world using web camera and related software.
t. Write the difference between.
i.E-mail and E-fan
E-mail
E-Fan
i.It is cheaper
than E-fan. i.It is expensive
thane-mail
ii.E-mailed message
first goes ii.E-faned message first
goes on the
to local
server. internet server
then its destenation.
iii.E-mailed
message is stored iii.E-Faxed message
is printed on the
in hard disk
of destination printer of
destenation computer.
computer.
ii.Postal mail
and E-mail
Postal
mail E-mail
i.It is much
sower than e-mail. i.It is very much
faster then postal
ii.In postal
mail,only the sp- mail.
ecific type
of handwritting ii.In email any type
of font and gra-
and style is
used. phics can be used
iii.It is not
reliable. iii.It is fully reliable.
iii.internet an
intranet
internet
intranet
i.It is public
global network. i.It is private
network.
ii.It is
independent to use the ii.It is
dependent to use all the
services and
resources. resources.
iii.It runs
slower then intranet. iii.It runs
faster than intranet.
Choose the
following answer from the following.
a.A home page
refers to the first page of:
= Website
b.The unique adress
of a website on the internet is called:
= URL
c.Web pages can be
written using:
= HTML
d.The protocol used
in internet is:
= TCP/IP
e.Which of the
following is internet service?
= All
f.Who is the
inventer of www?
= Tim burner lee
g.Which of the
following connection can be used for connection internet
at home?
= dialup networking
h.A client software
that allows the user to display and intract withe a
web page?
= Browser
i.Which of the
following is an online medium of communication?
= All
j.Which of the following provies
acess of the internet service?
= ISP
k.WWW is a
= Service of
internet
l.Which of the
following company developed the first intenet service?
= ARPA
m.In the URL
http://www//nhhss.edu.com what does it mean.
= Domain type
n.What is the
correct e-mail id?
= ramesh @
yahoo.com
o.Which device is
necessary to operate internet?
= Modem
p.Which is web
browser software?
= Internet explorer
q.Which is not
related in internet.
= UPS
r.In an e-mail
adress butwal @ yahoo.com,what does it refers?
= Domain name
Technical terms
a.The language
which is used to create web pages.
= HTML
b.Huge collection
of computer all over the world.
= internet
c.The process of
sending and reciving messgae electornically
through the
internet.
= E-mail
d.Internet service
that allows people to communicate each other by
typing in real
time?
= chat
e.The page which is
displayed from home page.
= Web page
f.A company that
providess internet account and other services to user.
= ISP
g.Software or
programs that search the websites for you.
= Searrch engine
h.Doing business
online through the internet.
= E-commerce
i.Online postal
service.
= E-mail
j.A protocol that
allows an user to log an one host to acess transfer
files to another
network.
= Internet browsing
l.The service of
internet which is used to make communication using
sound as well as
picture.
= video
conferencing
m.A person who
destroy the websites.
= hacker
n.The electornic
transfer or message.
= E-mail
o.The internet
service which provide oline shooping.
= E-shooping
p.A internet serice
which allows to do online business.
= E-commerce
q.The process of
copyin files or documents or program or data from users
computer to the
internet.
= Upload
r.An internet tool
that helps to upload/download the files.
= Ftp
s.Network of
Network.
= internet
t.The use of internet to
buy and sell goods and service.
= E-commerce
u.Buying and
selling products and service online.
= E-commerce
v.The program that
display the contents of web pages on a client computer.
= Web browser.
w.The world's
largest computer network for communication
= internet
x.The private
network within an organization that utilize the internet
service.
= Intranet
y.A network service
in different parts of world of the same organization
site that is
modified after the internet.
= Intranet
z.A web service
which contains answer to the question comanly used by user.
= FAQ
1.A world wide
discussion group in which people share information and
ideas on a
particular area of internet.
= Use net/news
group
2.E-mail message
you get that you didnt ask for insolicated e-mail.
= Spam mail/junk
mail
3.The communicaton
of hardware and software that block cerrtain network
traffic according
to their security policy.
= fire walls.
Computer security
1. What do you mean byy computer security?write the
importance of computer security.
= The
protection of computer pheripherals, data and program from its enemy heat,dust,fire,virus
etc is known as computer security.
computer securty is improtance in order to
prevent both hardware and software from being damaged,corrupted or theft.
2. What are the types of computer security?
= Computer
security can be classified into two types they are:
i. Hardware security
ii. Software security
3. What is hardware security?write any four measures to
protect the computer hardware.
= Hardware security refers to the
protection of computer and its pherhipals from physical loss,damaged and theft.
There are various ways to protect hardware:
i. Regular maintainance
ii Dust free enviroment
iii Air condition system
iv closed circuit camera
4.
What do you mean
by software security?
= Software
security means the protection of software program, data, file from being
deleted or corrupted.
5. Write the importance of data and software security.
= Data and
software are the most valuable and things to any private and public organization
as well as the goverment agiencies.if such valuable data are lost or damaged
then it cannot recover easily and there will be a great loss so,the data and
software security is very importance.
6. List any four software security measures.
= Some of the common software security
measures are:
i.Using backup system
ii.Keeping password
iii.Using scan disk
iv.Regular virus scanning
v.Apply defragmentation
7.
What is backup?
Write its importance.
= Backup is the process of making an
additional or reserver copy of data, programs and software for future use when
required.
Importance of
backup are:
If our orginal data, program software are
lost,deleted or damaged in such case we can restore our data,program and
softaware for future use when required.
8. What is password? Write the rules for creating a
valid password.
= A password is
a secret word or phase that gives an authorized user acess to a particular
program or system.
Rules for creating
a valid password,
i.Password must be at least of six
characters.
ii.Password must be confidental.
iii.Password must be frequently
modified.
iv.password must be difficult to
guess by other.
9. Define fragementation and defragementation.
= Fragmentation is the process of scattering
of the part of same disk file over different location.
=
Defragementation is one of the software security measures allowing of rewriting
part of a file to contguous sector on hard disk to increase the actual speed of
processing.
10. What are power protection devices?Why are they
needed.
= Power
protection device are hardware component used in computer system for proper
supply of electricity to the computer and its peripherals.
They are needed
in computer system to maintain the power from high or low voltage which may
cause several hardware damage as well as software loss.
11. List the common and popular power protection
devices.
= The common and popular power protection
devices are:
i.Uninterruptable Power supply
ii.Volt guard
iii.Constant Voltage Transformer
iv.Spike guard
12. What is the importance of UPS in computer security .
= UPS
in computer is very importance in order to supply regular power to the computer
and its pheripherals because voltage fluction may cause several hardware and
software damage as well as data loss. Therefore, to avoid unpredicatble problem
UPS is importance.
13. Define the Following term.
i.UPS
An uninterruptible power supply is a power
protection device which stores electricity and provide the backup power automatically
to the computer when required so that huge amount of data can be prevented from
being damaged or loss.
ii.Spike guard
It is also a power protection device which is
to prevent computer from sudden
high voltage(Spile) because of lightning in
rainy season and control such high voltage.
iii.Voltguard
It is a
power protection device which provides the constant output voltage to the
computer and prevents it from being damage due to high voltage.
iv.Scandisk
Scandisk is one of the software security
measures which works at as an utilty tool in order to scan,detect and repair
the error in the disk.
v.Virus
scanning
It is the procss
of scanning,detecting and removing viruses from our computer. It is also one of
the software and data security measure needed to be applied in our computer
system regularly by latest antivirus program.
State True or False
a.Always use password system in your
computer.True
b.Backup is used for protecting computer
viruses.False
c.Valuable data and information may get lost
due t virus.True
d.Defragementation does not help to improve
the performance of the disk of computer. False
e.Voltage regulators are used to supply
constant voltage even if the electricity goes off. Fasle
f.Scan disk files,folder,bad sectors,lost
custers and any errors of the specific
disk .True
g.Data seecurity helps to ensure privacy.True
h.The regular maintainance helps to protect
software only.False
i.The password prevets computer from
unauthorized use and acess.True
j.A
volt guard supplies backup electricity to the computer. False
k.The cc camera is hardware security measure.True
l.virus scanning helps to detect and remove
computer viruses. True
Write
the suitable technical term of the following.
a.The
policies,procedure,tools and techniques designed to protect computer assts.
= Computer security
b.An electornic device that supplies steady
voltage to the appian.
= Voltguard
c.The scattering of the parts of the same disk
file over different location.
= Fragmentation
d.The process of
rewritting parts of a file to contigeous sector on a hard disk to increase the
speed of acess and retrieval.
= Defragementation
e.A copy of a
file,which is used in the event of the orginal file being corrupted.
= Backup
f.The power regulating device which suppies
constant power to the computer and acessories even the time of power cut.
= UPS
g.The tool used
to check and keep the computer in good condition by fixing the error.
= Scandisk
h.The software used to scan computer's memory
and disks to detect virus.
= Antivirus
i.The devices
used to protect computer from sudden high power during lightining.
= Spikeguard
j.An attempts to
locate and save the deleted,Formatted or last data in usable form.
= Backup
k. A secret code-that gives an authorized user
acess particular program and system.
= Password
l.The method
applied to increase the life of computer and its assests.
= Computer security
m.An utility
program used to detect and repair lost clusters and bad sector of hard disk.
= Scandisk.
Computer Virus
Answer the following questions
a.
What is computer
virus?
= Computer virus
is an illegal self replicating small program that destroy data,software and
makes devices not usable.
or,
= Computer virus
is manmade malicious computer program which
malfunction the normal functoning of computer.
b.
What is the purpose or reason of creating
virus?
= The reason of creating virus are:
i. To protect
software from privacy.
ii.To entertain
the user during the use of the program by using displaying picture,message etc.
iii.To earn more
money by selling anti virus.
c.
Write the different types of computer virus
and explain them
in brief.
= There are
various type of computer virus found but some of the most popular and common
type of computer viruses are listed below.
i.Message
carrying virus
This type of virus doest not infect the
program and files but entertains the user producing unnecessary message
,quatation,pictures etc on the screen which may disturb the computer while
operating.
ii.Boot sector virus:
This type of
virus infects the information system during
start up process. It trend to create a bad sector of the harddrive or the
topology.
iii.System infector virus:
This type of
virus infects the various part of operating systems or master control program
and harm the computer system while
looping.
iv.File infector or application program infector
virus:
This type of
virus infects and damages the exectuable files with .com,exe ectension of
application packages.
v.Multipurpose
Viruses:
This type of
virus infects both file and boot sector.This Virus is compartively more
infectious and more difficult to remove.
vi.Polymorphic virus:
This type of
virus is most dangerous and harmful which
is designed to avoid detection by antivirus program that looks for specific viral signature.
vii.Stealth virus:
This Viruses try
to hide themselves and take uprecience in the memory making is hard to detect.
d.
List the major
symptoms of computer virus.
= The major
symptoms of comuter virus are:
i. Computer may not boot
properly and hang quickly.
ii.Changes the size of executable file.
iii.Slows down the computer
memory and disk space.
iv.Program loading and data
acessing take long time.
v.Regular files may lose and
unusual file may appear.
e.
How do computer
viruses transfer among computer?
= Computer
viruses transfer from the following mean of sources.
i. Virus infected external
disks.
ii.Pirated software.
iii.Internet,Email and
networks.
iv.Virus infected games.
f.
Write the features
of computer viruses?
= The features
of computer viruses are :
i.Self replication.
ii.Piggy back (hiding
themselves)
iii.Malfunctioning
iv.Fast spreading.
g.
Mention the
preventive measures from computer viruser.
or
List the
precaution to avoid virus infection.
= Following are
the precaution to avoid viruses infections.
i. By installing,uprading and
scanning latest antivirus regularly.
ii. Lacking the computer always
using strong password.
iii. Backingup the data and
program on regular basis.
iv. Not allowing other people to
use the computer wthout permission.
v. Check the new software for
virus before installing it.
vi. Using the geniue(not
pirated) signature.
h.
How can be
computer viruses detected and cleaned?
= Computer
viruses can be detected and cleaned by using antivirus software since each
computer virus has its unique or common code called viral signature.
i.
What is
Antivirus software?list some of the common antivirus Software.
= Antivirus
software are the special program that can locate,defect
and eliminate viruses from the computer
system. Some of the common
Antivirus software are.
i.AVG(Antivirus Virus Guard) V.MacAfee
Antivirus
ii.Kaspersky Antivirus vi.Narton Antivirus
iii.Pc-alin vii.Panda Antivirus
iv.Narton Antivirus
Write the fullform
VIRUS-Vital Information
Resources Under Seize
MCP-Master Control Program
MBR-Master Boot Record
FAT-File Allacation Table
NTFS-New Technology FIle
System
NAV-Norton Antivirus
KAV-kaspersky Anti Virus
PAV-Panda Anti Virus
CPAV-Central Point Anti virus
AVG-Anti Virus Guard
MSAV-Micro Soft Anti Virus
USB-Universal Serial Bus
Match the following groups
Group "A" Group"B"
Avira = Antivirus software
Light,dust = Enemies of computer
Data security = Protection
of data
Computer virus = Destructive program
Group"A"
Group"B"
Backup = Software
Security
Virus program = I love You
Antivirus program =
Panda
Internet = Mean
of virus transfer
State true or false
a. Pirated
software copies viruses to the computer.[True]
b. Computer Viruses cannot delete file amd
format users hard disk.[False]
c. Computer virus is a useful and necessary
program to be used in the computer .[Fasle]
d. Antivirus software is the main feature of
computer virus[True]
e. Self replication is the main features of
computer virus.[True]
f. Computer viruses corrupt only executable
file form the computer.[False]
g. One of the reason for virus creation is to
stop software privacy.[True]
h. System infector virus infect software such
as word processor,spreadsheat and data base.[Fasle]
i. Computer
virus can also affect hardware parts from their smooth functioning.[True]
j. Polymorphic is such type of virus which
avoids even antivirus.[True]
k. Pen drive is
one of the common medium for virus transfer.[True]
l. Viruses don't
transfer from E-mail and internet easily.[Fasle]
m. We should
install update and scan the antivirus regularly.[True]
Select the
correct answer from the given option.
a. Computer viruses are:
= Computer programs
b. Which of the following in
not antivirus
= NAC
c. Which virus doesnt affect
the data,program and files?
= Message Carrying
d. Which of the following is
the medium for virus transfer?
= All of the above
e. Which software protects the
computer from viruses?
= Antivirus software
f. Which is the source for
virus transfer?
= pen drive
g. Compter virus can
= All of above
h. Who introduced the concept
of replicating program for first time?
= John van Neuman
i. Which is type of Virus can
change its apperanance with every infection?
= Polymophic
j. Which type of virus infects
bt boot records and file?
= Multipartite
k. Boot sector infects
= Master boot record
Write the suitable technical
terms for the following.
a. The software used to scan
computer memory and disk to detect and eliminate
virus.
= Antivirus
b. A computer program that has
been created to infect and damage our computer
system.
= Computer virus
c. A destructive program that
hides and replicate itself.
= Computer Virus
d. A computer program that
entertains and damages users files.
= Computer virus
e. The virus that replaces of
implants itself in the boot sectors of a disk.
= Boot sector virus
f. The viruses which may attach
themselves to any executable file that is .com exe,bin.sys etc.
= Progrram or file virus
g. The viruses which have
combinationfeatures of both boot sector an program virus.
= Multiple Virus
h. A type of computer virus
that infects the document ot template of word
processing or spread sheet.
= Macro Virus
i. The iteself replicating
program users knowledge and permission.
= Computer Virus
j. A virus that corrupts
necessary system files of operating system.
= System infector Virus
j. A virus that corrupts
necessary system files of operating system.
= system infector virus
k. A harmful and destructive
program that destroys other program.
= Computer virus
l. The program used to detect
and eliminate computer virus.
= Antivirus
Cyber Law and
Ethnics
Answer the
following questions.
a.What is cyber space? Who used this term for
the first time?
= Cyber space is the virtual space created by
computer networks internet and telecommunication.
The term cyber space was used by cyberpunk
scienctifcation author william gibson for the first time.
b. What are the areas covered by Cyberspace?
= Cyberspace covers the following areas
including computer,network. Internet,websites,Email,Data. Software, programs, storage
devices, electornic devices,(cell phones,Atm machines) etc.
c.
Define computer crime/cyber crime with examples.
= It is
a crime or illegal activities comitted by people through the use of computer and internet related services .
The Following are the common types of cyber
crimes.
i.Hacking ii.Pornography
iii.Harrassment iv.Privacy etc
d. What
is cyber law? When was cyber law of Nepal introduced for first time?
= The
necessary laws,rules or pocedures formed and apoted by government or concerned authorities to control and above
cyber crime is known as cyber law.
Cyber law of nepal was itroduces on 30th
Bhadra 2061 bs [15th september 2004 A.D] after approving by council of
ministers for the first time.
e. Write the importance of cyber law for any
countries.
= The cyber law is very much important to
control cyber crime legalize the transcation electronically,control electornic
fraunds and punish the cyber criminals
legally.
f. List any
Four provisions made in the cyber law of nepal 2061 B.S?
= The following are the provisions made in the
cyber law of nepal 2061 B.S.
i. Provision for necessary punishment agnist
cyber crimes.
ii. Provision about the duty and responsilities
of user and
iii. Provision of digital
signature,electornc data processing etc.
iv. Provision of legal hearing
of cyber related problems through IT tribunal
and Appellate Tribunal.
g.
What are the
areas covered by cyber law?
= The
areas covered by cyber law are:
i. Computer crime and electornic
fraunds.
ii. Telecommunication laws
iii. Digital signature and data
protection law.
iv. Inteligentt property law.
v. Copyright and patent right law etc.
h.
List the
international cyber law.
=
International cyber law was basically started from 1970 A.D .some of
laws are:
i. Fair credit reporting act-1970 A.D.
ii. Freedom of informaton
act-1970 A.D.
iii. Federal privacy act-1974
A.D.
iv. Video privacy protection act-1998 A.D
v. Computer matching and privacy protection-1988
A.D.
vi.Copyright act-1992 A.D.
i. List
the different effect of cyber crime in society.
= The effects of Cyber crime are:
i. Physical theaft of the
computer and other equipment.
ii. Alterating the orginal web
page.
iii. The privacy of the compute
ca be lost due to unauthorized acess.
iv. Security problem may be
accurd.
v. New types of virus can
attack software or programs.
j. What
is hacking?Who does this activity?
= The
Hacking is the process of internationally going unauthorized acess to an
imformation to an imformation system.The person who does this activity is a
hacker.
k.
What do youu
mean by digital signature?
= A digital signature is the digital identity
of sender that uniquely identities the particular sender electronically which
is based on public key and private
key.
l.
What is public
key infrastructure?
= IT is a security management system including
hardware ,software,people and politics, dedicated to the management of digital
certificate for the purpose to exange of electornic message.
M. What
is Harassment?
= Harassment is the process of irritating the
defendent by sending obscurities and insulting comments focusing on
gender,caste,religon.
N. Define
hacker and cracker.
=
Hacker is a person who uses a computer to gain an unauthorized acess.
=
cracker is a computer user who attempts a break into copyrigt software
or an information system.
o. Define computer ethnics.
= IT is
a branch of pratica principle or general behaviour that deals with how the computer
experts and users should make decision in regerd to the social while using the
computer and electornic system.
p. Define
computer Ethnics.
= IT is
a branch of pratical principle or general behaviour that deals with how the copmuter
experts and users should make decision in regerd to the social while using the
computer and electornic system.
Q. What are the issues relating to computer
ethics?
=
Following are the issues relating with computer ethics:
i.Copyright ii. Privacy and piracy iii.Harassment
iv.Internet pornography etc.
r. List
the ethnical points that the computer user should be remembered.
= They are:
i. Not to use computer to steal
data.
ii. Not to disclose the secrecy
of computer.
iii. Not to use the computer to
harm other people
iv. Not to use passsword of
other.
v. Not to spread the illigal information.
Write
short notes on.
a. Salami
Saving:
It is a type of
computer crime in which a programmer/criminal alters a program so that it
subtracts a very small amount of money from each accounnts and diverts the fund
to the required account.
b. Data
Diddlng:
It is also a type of cyber crime in which
criminals alters the regular account and insides modify data therefore it is
dificult to know that they have stolen
or transferred fund.
c. Software
Privacy:
It is the act of
illegally,copying or distributing software without purchasing or having legal
right of the software.
d. Plagiarism.
It is the act of tacking other
persons, writting, conservation song or even idea and passing it off as own.
e. Pronography:
IT is the
representation of human body or hman senual behaviour for the purpose of sexual
stimulation which is distributed through internet to the computer user.
State whether the following is True or False:
a. Computer
ethnics gives awareness to the users in computing field [True]
b. Cyber law of
Nepal was introduced in 2060 B.S.[Fasle]
c. Cyber law
covers those places including ICT's and the places where more computer are connected.[True]
d. Software piracy is a cyber crime.[True]
e. The term"cyber space" was used by
charles Babbage in 1984.[Fasle]
f. Cyber law covers those area related to
ICT's .[True]
g. A hacker is a person who performs the
constructive work in the field of cyber space.[Fasle]
Choose the correct answer from the following
a. When was cyber law introduced in Nepal for
the first time?
= 2004 A.D
b. Which of the following is computer crime?
= All of above
c.
Cyber ethics is'
= Moral laws
d. Which of the following is not computer
crime?
= Authentication
e.
Which of following steals the confidential data,acquire free acess to the
program the malicious
distruction of files?
= Cracker
f. Which of the following is included in cyber
law?
= All of the above
g.
When was the term'cyber space" used for first time?
= 1984 A.D.
Write
the suitable technical term of the following.
a.
Internatioally getting unauthorized acess to an information system.
= Hacking
b. The laws related to the internet and cyber
space.
= cyber law
c. The branch of practical that deals with how
the computer experts should make decision in regard to social and professional
behaviour.
= Computer ehtics
d. The concept of keeping users data
confidential,such as stored files and email,which cannot be examined by anyone
else without users permission.
= Privacy
e. A security mechanism
used on the internet the refiles on two keys,one public and on private.
= Digital signature.
f. Virtual space created by computer
networks,internet to make communication.
= Cyber space
g. A person who uses a computer to gain an
unauthorized acess.
= hacker
h. A computer user who attempts to break into
copy right protected or an information system.
= Cracker
i. The process of encoding information in a
such way thatit is inreadable to all.
= Encryption
j. The
process of restoring encrypted data on its orginal form.
= Decryption
k. The
rules and regulation to systamatic the computer related to technology.
= Cyber law
l. Moral rules to be followed by computer
and other professionals.
= Cyber space
n. The misdeed carried out by usimg the
computer and IT based media.
= Cyber Crime.
o. An illegal activity to harm computer user
and their assests.
= Cyber crime
Chapter:6
Multimedia And
IT's Applications
1.
Answer the
following question
a.
What is
mutimedia? List thhe types of elements or components used in multimedia.
= Multimedia is the combination of
text,graphic,audio,video,animation etc that is delivered interactivey to the
user by electronicaly or digitally manuplate mean.
following are
the different types of elements or components used to multimedia.
i.Text ii.Sound iii.Graphics iv.Video
iv.Animation
b. Write the advanatges and disdvantage of multimedia.
= Advantage
of multimedia.
i.Multimedia is intresting and
easy to use.
ii.IT can store huge number of
data and information for long period.
iii.It makes
teaching,learning,easier and effective in the class room.
iv. It makes presentation
matter more attractive,clear and accurate.
Disadvantage
of multimedia are:
i.It is more expencive at the
initial stage.
ii.Technical manpower is
needed to operate multimedia system.
iii.It is difficult to
distribute and multimedia in remote area.
iv. Multimedia files ar two
large and occupy more space.
c. List the types of Multimedia contents used in
multimedia technology.
= Multimedia contents can be classified into
two types.They are:
i.Linear
Multimedia: In Linear multimedia an user is simply passive reciver of multimedia contents so cannot
modify them. E.g: Movies.
ii.Non linear multimedia: It is also known
as interactive multimedia in which user can interact and modify the multimedia
contents. Example: Hypermeda.
d.What
are the hardware parts required for making multimedia cable.
= The following are the hardware parts needed
for making multimedia
cable:
· Computer
set
· CD ROM drive
· Sound card
· Head phone
· Microphone
· Projector
· Digital
camera
· Scanner etc.
e. List the
different software needed in multimedia.
= The software needed in multimedia are as follow:
· Paint program
· Bit mapped
graphic(BMP)
· Joint photographic
Expert group(JPEG)
ii. Audio format
· MP3 format
· Multimedia
deck(sound editor)
· Musical
Instrument digital interface(MIDI)
iii.Video editor software
· Motion picture
expert group(MDEG-2)
· Quick
time(Format)
· Maya software
· Video for
window(AVI format)
iv.Image editor software
· Adope photo shop
· Photo express
· Photo deluxe
f.What is multimedia Technology?
= Multimedia
technology allows us to store data and imformation for
the future refrence .CD rom is a cheap durable
and portabl storage media used to
store the data and information in multmedia technology.
g.What
do you mean by multimedia system?
= Multimedia
system is computer system which is capable of creating, editing and processing
multimedia,data and application.
h.What do you mean by computer graphic?
= Computer
graphics is the display of still frame picture or photo on computer screen.
i.What is Virtual reality?write its uses.
= Virtual reality is an artificial enviroment
created with computer hardware and software and presented to use in such a way
that it appears as real.
The virtual reality is mainly used in fields
of enteertainment as well as difficult and dangerous jobs like parachuting
,airplanes vechile riding etc.
j.How
can multimedia help in education
= Through multimedia we can demostrate activites
related with different subjects using text,video,graphic,and sound.multmedia
program brings concept of life and help students intergate critical thinking problems
sloving skills.
k.How
can multimedia be used in training?
= The use of multimedia in training increasing
rapidly organization use multimedia interactive training programs to their
employees through a network or multiedia OS.
l.What is computer Animation?
= Computer animation deals with the
generation,sequencing and displaying of a set of image to create an effect of
visual change or motion,similar to a
movie film.
m.What do you mean by video conferencing?
= Video conferencing aslo known as multimedia
conferencing refers to a system that simulates face-to-face interaction among
particpating users located far from other,as if they are sitting and discussing
in a single room.
n. List the application field of multimedia.
= The following are the application field of
multimedia:
i.Presentation ii.Education and training
iii.Entertainment iv.Advetisement
v.Foreign language training vi.Virtual reality
State true or
False.
a. Multimedia is used in scietific research [True].
b. Images do not play role in
multimedia.[Fasle].
c. multimedia is not used in
entertainment.[Fasle]
d. Sound card is an essential decice to play
multimedia.[T]
e. Cartoon on television is an example of
animation.[T]
f. Multimedia technology is used in public
places as imformation providers.[T]
g. Multimedia system is a computer capable of
handaling multimedia technology.
[T]
h. Adope photoshop is an example of multimedia
software.[T]
i. In Multimedia application more than one
medium used to present the
Imformation.[T]
j. Multimedia manipulates the imformation for
better communication.[T]
k. Interative multimedia doesnot allow to modify
the multimedia hi contents.[F]
l. Virtual reality is the natural reality used
in multimedia ststem.[F]
Select the correct answer.
a. Which of the following is
the type of media used in multimedia?
= All of Above.
b. In Which field multimedia
is used.
= All of Above.
c. Which software is used in
Multimedia technology?
= Adope photoshop
d. which of the following is
not multimedia software?
= windows xp
e. Which of the following are
component of multimedia?
= All of above
f. Which of the following
software assosiated with the multimedia technology.
= Maaromedia flash
g. Through Which,knowledge
and skill can be gained.
= Multimedia technology
h. Which of the following are
used in multimeddia system.
= Text,graphics,video and visual
i. A techonology that allows
people to enter and intrest with three
dimonsional computer
graphics world.
= virtual reality
j. Which of the following is
not multimedia software?
= Avira
k. Which of the following is
main component of multimedia .
= sound card
l. Which of the following is
not component of multimedia.
= pixel
Write the suitable technical
term..
a. The elements of multimedia
which display alphanumeri character on screen
to present imformation.
= Text
b. it deals with recording and
displaying of a sequence of images at a
reasonable speed to create
an impression of movement.
= video
c. It is a simulation of
movement created by displaying a series of pictures
or games.
= Animation
d. The artificial enciroment
created by computer technology to entertain user.
= virtual reality
e. A high capacity storage
device that can read and write data into storage media.
= CD ROM drive
f. The integration of
audio,text,video,and animation.
= multimedia
g. It is a computer haing
capabilit to integrate two or more types of media
for imformation
presentation,
= Multimedia computer
h. The program used to create
and present multimedia system.
= Multimedia software
i. The moving of real events.
= Video
Give Full Forms:
PDF=Platform Independent
Document Formed.
PNG=Portable Network
Graphics
WMF=Widows metafile format
TIFF=Tagged image file
format
CBE=Computer Based educaton
CBT=Computer Based Training
BMP=Bit Map
GIF=Graphic Interchange
Format
JPEG=Joint Photograph
Expert Group
MIWI=Musical instrument
Digital Interface
LCD=Liquid Crystal Display
HMD=Head Mouted Display
MUk=Multimedia Upradge Kit
CD-ROM=Compact Disk -Read
Only Memory
DVD=Digital Versatile Disk
CAVE=Cave Automic Virtual
Enviroment
VRML=Virtual Reality Modeling
language
MPEG=Motion Picture
Ecpert-Grat
e.n. Drawing software
i. Macromedia Freehanf
ii. Adobe Illustrator
iii. Cores Draw
f. List the application
field of multimedia.
= The following are the
application field of multimedia:
i.Presentation ii.Education and training
iii.Entertainment iv.Advetisement
v.Foreign language training vi.Virtual reality
Comments
Post a Comment