0 ratings0% found this document useful (0 votes) 21 views24 pagesSelfstudys Com File
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
Web Applications and Security
Fastracl« Revision
> Computer Accessibility: Computer accessibility refers to
the options that make a computer system easy to use for
all, even for the people having disabilities.
Accessibility options are also referred as Assistive
Technology as these help disabled people to use
computers in a comfortable and efficient manner so they
canalso take Full advantage of the computer.
> Ease of Access Center: The Ease of Access Center
‘window has various utilities to enhance accessibility of the
computer. Let us learn about them.
> Start Magnifier: This tool has a display utility to
increase text readability by displaying a magnified
selected text in a separate window or screen.
> Start Narrator: This tool has a text-to-speech utility to
read the contents displayed on screen
> Start On-Screen Keyboard: This tool has a virtual
keyboard displayed on the screen to enable typing of
data using a joystick or any other pointing device.
> Set-up High Contrast: This tool has a utility to increase
the colour contrast on the screen for making it easier
toread.
» Launching Ease of Access Center: Click on start + All
programs -* Accessories > Ease of Access > Ease of
‘Access Center, to open the Ease oF Access Center.
» Other Basic Accessibility Features: The other basic
accessibility Features listed under the Explore all settings
section on the Ease of Access Center are as follows. Let us
learn about them.
> Use the Computer Without a Display: This feature
is very useful for the people who are unable to view
things on the screen and are having severely impaired
vision.
> The Turn on narrator option enables the Narrator
to read aloud the text displayed on the screen and
explains the various events such as appearance of error
messages and notifications while using the computer.
> The Turn on Audio Descriptor option describes what is
happening in a video.
> The Turn off All Unnecessary animations option is
Used for turning off all the animations that are not
required or are unnecessary suchas fading effects, etc.
> Make the Computer Easier to See: This Feature lets
Us adjust various settings related to the visual display
of the computer screen. It is useful For the people who
have eyesight problem.
+ The Choose a High Contrast Theme setting allows
Us to adjust a high-contrast colour scheme which
allows some text and images on the computer
screen to appear differently and easier to recognise.
‘+ The Turn on Audio Description setting allows audio
descriptions to play whenever we log on to our
computer.
+ The Adjust the colour and transparency borders
setting enables us to change the look of window
borders For making them easler to see.
> Use the Computer Without a Mouse or Keyboard: This
Feature Is useful for the people who are not capable
‘enough or have some difficulty in using the keyboard or
mouse. The Use On-Screen Keyboard setting Is used
to activate the on-screen keyboard,
> Make the Mouse Easier to Use: This feature helps in
deciding the looks of a pointer on screen or making it
appear larger on the screen so thata person with visual
disability can see the pointer on the screen.
> Make the Keyboard Easier to Use: This feature(s useful
for making the usage of keyboard easier For the people
‘whe have difficulty in using the keyboard, normally.
+ The Turn on Mouse Keys option allows using of
arrow keys on our keyboard or the numeric keypad
to move the pointer on screen instead of using mouse.
+ The Turn on Sticky Keys option lets us use multiple
shortcut keys (such as Ctrl + Alt + Delete) by
pressing one key at a time instead of pressing all the
three keys together.
‘+ The Turn on Toggle Keys option plays a tone when
the Caps Lock, Num Lock, or Scroll Lock keys are
pressed.
+ The Turn on Filter Keys option is helpful for
ignoring keystrokes that have taken place in rapid
succession, or keystrokes that are being pressed for
several seconds inadvertently.
> Serial Key: Serial key is a string of characters or
equivalent access code that Is input into 2 program
to activate it. It is an accessibility Feature that assists
people that have difficulty using a keyboard or a mouse
or both.
> Computer Network: A computernetworkisa collection oF
computers or other hardware devices that are connected
together using special hardware and software, which
enables us to exchange information and resources.
> Node: Each computer in the network is called 3 node.
There is no limit to the distance between two computers
in a network.
> Advantages of a Computer Network:
> Exchange of information/File Sharing
> Resource Sharing> Reduced Costs
> Better Storage Capacity
> Disadvantages of a Computer Network:
> Data Security
> Lack of Robustness
> Expensive Set-up Cost
> Threat to Virus and Malware
> ARPANET: Networks came into existence when Advance
Research Project Agency (ARPA) started working onanetwork,
in 1962. ARPA launched its first successful long distance
communication network, in 1969, with the name ARPANET.
Ie consisted of Four universities, which interconnected the
researchers working on the project at that time.
> Computer Network Components: The following are the
basic components of a computer networ
> Sender/Transmitter: The transmitter is the device,
such as a computer, workstation, telephone handset or
video camera, that sends a message.
> Recelver: It Is also a device such as a computer,
workstation, telephone handset ora video camera, that
receives a message.
> Medium: The physical path by which a message travels,
from the sender to receiver is called as a transmission
medium. For example, twisted palr cable, fibre-optic
cable, coaxial cable, laser or radio waves.
> Message: The messages the actual data whichis to be
transmitted for communication
> Protocol: A protocol is a set of guidelines that controls,
the data communication
4. Message
“3, Medium
1. Transmitter 2. Receiver
<< —.
setot_ | —————> | setor
Rules | Agreement betweenthe | Rules
‘communicating devices
L_., awa}
Fig, Relationship among the five components of network
> Types of Computer Network: Computer networks can be
classified on the basis oF geographical area covered by a
network, into the Following categories:
> Personal Area Network (PAN): PAN is the smallest
network which is very personal to a user. This may
include Bluetooth-enabled handheld devices or
infrared enabled devices. PAN's connectivity range is
up to 10 metres.
PAN may include wireless computer keyboard and
mouse, Bluetooth enabled headphones, wireless
printers, TV remotes and much more.
> Local Area Network (LAN): LAN covers a small area. It
isa privately-owned small network that spreads across
‘a small campus or @ building or from one room to 3
campus of a Few kilometres.
Usually, Local Area Network can be utlisedin offices,
schools, colleges or universities. The network inside
your school’s computer lab or a network within 2
‘small office are some examples of LAN.
> Metropolitan Area Network (MAN): MAN is an
extension of Local Area Network that can connect
computers in a big city. MANS are mainly owned by
large organisations to interconnect all their branches,
across acity.
> wide Area Network (WAN): WAN is the biggest type
of network available for the computer systems. As the
name suggests, this network covers @ wide area which
may spread across the cities or different countries
A Wide Area Network contains many sophisticated
and costly devices that are generally not used in
other networks, such as Local and Metropolitan Area
Networks. The examples of Few of these devices
are satellites, mobile phones, routers, bridges and
gateways.
> Network Architecture: Network Architecture is an overall
design of a computer hardware and their Functional
organisation and configuration. Computer networks are
designed in two different ways.
Network Architecture
Peer-to-Peer Network
Client-Server Network
> Peer-to-Peer Network: Peer means equal and
therefore in a peer-to-peer network, each computer
or node is equal to other computers in terms oF the
resources that it can access and share.
> Client-Server Network: in a client-server network,
there is @ powerful central computer which has more
resources than the other computers connected to the
network. This central computer is known as the Server
and the other computers are known as Clients or
Nodes or Workstations,
> Network Topology: Network topology refers to the basic
geometric layout according to which the server and clients
are connected via @ channel. The three most common
network topologies are bus, ring and star.
> Bus Topology: Bus topology is most commonly used in
LANs wherein the server, clients and shared resources
are all directly connected to a single common channel
This common channel is called as the bus. The channel
runs through the network from one end to another.
The common channel has terminators at each end. Only
‘one computer can transmit over the network at a time,
> Ring Topology: In Ring topology, all the computers
are connected in a large closed-loop circuit so that
each computer is linked to two adjacent computers,
on either side. in this topology, the message sent by 2
sender is received by every client in the network. But
the message is read only by the receiver to which it was
addressed.> Star Topology: In Star topology, all the clients are
individually connected to a centrally located server via
2 direct channel. This topology was commonly used
with the mainframe computers.
The entire communication over the network takes
place through the central server.
Network Devices: Network devices are the components
that help us to connect computers or other electronic
devices together so that they can share data or resources,
like printers or scanners.
> Hub: A network hub is a networking device thats used
to help us in connecting multiple network hosts. A
network hub is also used for data transfer.
> Switch: A switch is more intelligent than @ hub. While a
hub only Forwards the data, a switch does filtering and
forwarding which is a more prudent way of dealing with
the data packets.
> Router: A router is a network device which is
responsible For routing data traffic from one jammed
network to another free network
> Bridge: A bridge connects two subnetworks, which are
a part of same network. A bridge works as a router that
connects two different types of networks.
> Repeater: A repeater is an electronic device that
amplifies the received signal. It receives a signal and
retransmits it with a higher level or a higher power
so that the signal can travel longer distances before
Fading out.
> Gateway: A gateway is a network node that provides
access to another network that uses different protocols
and enables data to be transmitted from one node to
another.
Internet: The term Internet stands for International
Network. Its a worldwide system of computer networks.
It is the largest public network that allows users to get
connected with each other all over the world and to
exchange information with each other. An Intranet is @
private network that Is contained within an enterprise. It
may consist of many interlinked Local Area Network and
also use leased lines in the Wide Area Network
Working of the Internet: The Internet network is based
on the Client and Server architecture of the network
model.
Server: A Server computer is a core component of the
network, which provides services to the clients and
controls the access to hardware, software and other
resources.
CCllents: Clients are the computers that normally request
and receive Information or the services over the network
Clients and Server Network Model: The client computer
isthe computer onto which we want to access the Internet.
After acquiring a physical internet connection, a request
Is sent to the server computer requesting for a web page
Using an application program known as the web browser.
The web browser sends the request to a server computer,
which accepts the request and starts sending the
Information from the server computer to the client
computer.
> World Wide Web: The World Wide Web (WWW), often
calledasthe Web, isa collection of information arranged in
the Form of documents that may contain text, hyperlinks,
multimedia (Le, audio and video). It is an information-
sharing model that is built on the Internet.
> Basics of WWW: The working of WWW is based on the
Following web technologies:
> HTML (Hypertext Markup Language): A language that
is used to create web content that travel over the web,
> HTTP (Hypertext Transfer Protocol: It isthe protocol
that communicates and transports documents over @
large network like the internet.
> Web Servers: These are the host computers that store
all the web content
> Web Browser: Aweb browser san application program
installed at client's computer that sends the request to
a web server for viewing the web content, for example,
the Internet Explorer, Mozilla Firefox, Baidu, Google
Chrome, ete.
> Ways to Connect to the Internet Services: Internet
services enable the user to access and gain information
through the use of the Internet. There are different ways
to connect laptops, desktops, mobile phones and tablets
to the Internet, For example, dial-up, broadband, wireless
services and much more. Let us learn about them.
> Dial-Up: in the dial-up connection, a user needs to
link his/her telephone line to the computer through
2 modem. A modem connects to the Internet after
the computer dials a phone number. It works as an
interface between the computer and the telephone
line. tt converts analog signals to digital signals and
sent them through telephone lines, in order to connect
tothe internet.
> Broadband: It is 2 high-speed Internet connection
It is provided through either the cable or telephone
companies. It Is the one of the fastest options to
transfer data
> Cable Internet Connection: It is also a form of
broadband access. It provides the Internet through 2
cable modem, which is provided by the cable operator.
> Wireless: Wireless networking s also known as WIFI. It
is a way of getting the Internet without wires. It allows
you to connect several computers at once and from any
location which sin its network range.
> Mobile: Many cell phone and smartphone providers
offer different plans to access the Internet. For this,
you require a device called a dongle. Mobile Internet
connections have very good speeds to access the
Internet.
> Satellite: In a satellite Internet connection, the
transfer of data is through a satellite. Satelite Internet
equipment is made up of three main components: an
orbiting satellite in space, 2 satellite dish mounted
fon your home and a modem that transmits Internet
signals from the dish to your computer.
> ISP: An Internet Service Provider (ISP) Is an organisation
that provides services accessing and using the Internet.
> Hotspot: Hotspot is based on the WiFi technology. It
allows electronic devices to connect to the Intemet orexchange data wirelessly through radio waves in place of
the telephone or cable networks.
Instant Messaging: A communication service over the
Internet which allows instant transmission of text-based
messages from the sender to receiver is known as Instant
Messaging (IM).
‘Types of Instant Messaging Softwares: There are two
types of instant messaging software:
> Web-Based Instant Messaging Software: These
are accessed via a web browser. There is no need to
download and install any software on the computer
system for using them.
Example: Meebo, Kool IM, Yahoo!
> Application-Based Messenger Software: Application-
based messenger software are the messengers that
are downloaded and installed to a user's computer.
Example: Skype, Google Talk, Hike Messenger
Google Hangouts: Google Hangouts is a free instant
messenger software developed by Google. It can easily
be downloaded for free from the Internet. It supports
different platforms such as Windows, Linux , Mac OS, etc.
Blog: A website in which articles are posted regularly and
displayed on reverse sequential order is known as 2 blog
Blogger: The person who writes a blog.
Blogging: Authoring, maintaining or adding an article on
the existing blog is known as blogging.
Types of Blogs: The blogs can be of different types, some
oF which are as Follows:
> Personal Blogs: These blogs are developed by a user
for his/her personal use. It is just like maintaining 8
personal diary, online
> General Blogs: These blogs contain information,
articles and discussions related to a particular subject.
> Organisational Blogs: These blogs are created to
generate business. These types of blogs are generally
used by organisations, corporations, etc.
Blog Desk: Blog Desk isa free offline blog editor that can
easily be downloaded free From the Internet and installed
ona computer system.
Online Transaction: An online transaction is a financial
transaction that happens in real-time using the Internet.
Cookies: Cookies are small files which are stored on a
User's computer. These files contain the programs that are
created on our local computer when we visit websites.
Virus Threats: The term VIRUS stands for Vital
Information Resource Under Seize. A computer virus Is
similar to a biological virus. When a biological virus attacks
Us, it makes us Feel sick. It disrupts us From Functioning
normally and often requires something powerful to get
rid oF it. In the same manner, a computer virus Is capable
to replicate itself persistently. Computer viruses infect
computer programs and Files
Symptoms of a Computer Virus: Some of the common
symptoms that are exhibited by a computer, in case of a
Virus attack, are as Follows:
> Unusual messages start appearing on the screen while
working
> The computer tends to run slower than the normal.
> The space on the disk is reduced.
> Applications take 2 long time to load and may not work
propery.
> Types of Computer’
of computer viruses:
> Resident Viruses: They are permanent viruses that
reside in the RAM of a system. They can interfere and
disturb the normal working of a computer.
Some examples of such viruses are Jerusalem, Onehalf,
Magistr, Junkie and Satanbug.
> Non-resident Viruses: They are similar to the resident
viruses except that these do not reside in the RAM of
a system, rather they reside in a module of a program.
> Program Viruses: These infect the files with the
extension EXE, COM, SYS, OV and.SCR. The program
Files are used by the virus as they are easy to attack and
they have simple Format to which the virus can attach
itself.
> Macro Viruses: Macro language is used in the Macro
virus, for its programming. It is a set of commands
written by the user to be executed later. Data files are
affected by these viruses.
> Trojan Horse: It is a program which appears to be
Useful. Confidential information is stolen and passed
Using this virus. A Trojan horse enters the computer
with the help of the users. The users install it under
the wrong impression that it is a useful and harmless
program.
> Malware: It refers to the program which harms the
computer and comes into the computer without the
user's consent. Malware is the short name of Malicious
Software. It slows down the computer and networks. It
is actively destructive and annoying
> Spyware: Spyware Is a kind of malware that Is sent to
someone's computer intentionally to steal information
such as e-mail passwords, credit card password, etc.
> Worms: This virus is 2 program which is capable of
reproducing and spreading Itself to another computer
system with the help of the computer network. This
type of virus does not cause direct damage to the files
and the programs,
> Boot Virus: The boot records of hard disk are infected
by this virus. These viruses are more dangerous than
the program virus. Some examples of these viruses are
Disk killer and Stoned virus.
> Spamming: The unwanted e-mails that come in bulk from
strenge and unknown sources are called spam. Spamming
Is the process of sending same copies of e-mails to a large
number of people, worldwide, Usually spams are sent with
the purpose of advertising by commercial agencies.
> Phishing: Phishing is a form of fraud in which the attacker
tries to steal or take out information such as login
credentials or account information.
> E-mail Spoofing: E-mail spoofing is the Forgery of an
e-mail header so that the message appears to have
originated from someone or somewhere other than the
actual source
> Accident: It Is an unplanned, undesigned and unexpected
event that may happen all of a sudden and may lead to
unwanted or unprecedented results/outcomes.
5: There are many different types> Emergency: Any unexpected situation that needs
immediate attention, intervention or action to prevent a
‘worse situation is an emergency.
> Hazards: A hazard may be any object, situation or
behaviour that has the potential to cause injury, ill health
cor damage to property or the environment.
» Types of Hazards: Hazards can be of different types,
depending on the industry and the environment in which
the employees work. The different types of hazards are
as follows:
> Physical Hazards: They are environmental Factors that
canharm an employee without necessarily touching them.
Chemical Hazards: They are present when a worker is
exposed to any chemical preparation in the workplace,
in any Form (solid, liquid or gas)
>
Multiple choice Questions y
Which of the followin
networks?
a. Less cost
b. Less reliability
< Down performance
d Rigid working environment
a benefit of the computer
Q2. Which of the following is a type of network?
a. SAN b.NAN
TAN MAN
Q3. Which of the following devices is a network
connecting device?
a. Hub b. Mouse
Printer ¢. Monitor
4. Which type of network is used to connect two
computers and a printer?
a. PAN b LAN
WAN MAN
5. Which of the following is the full form of LAN?
‘a Local Area Network — b. Land Area Network
Large Area Network d, None of these
Which of the following is the full form of IM?
a. Instant Messaging
C.Internal Messaging d. None of these
What is the full form of HTML?
a. Hypertext Manipulating Links
bb. Hypertext Manipulation Language
Hypertext Managing Links
d. Hypertext Markup Language
What is the full form of Internet?
a. Internet Network
b. International Network
Inter Network
Intra Network
Q6.
b. Instant Message
Q7.
Q8.
Q9. ..
Quo.
qu
Qua.
Qus.
Qu.
Qus.
Que.
Qu.
Biological Hazards: They include exposure to harm or
disease From working with animals, people or Infectious
plant materials. Viruses, bacteria, insects, animals, etc,
‘can cause adverse health impacts.
Safety Hazards: These are hazards that create unsafe
working conditions which can cause injury, death or
illness. For example, exposed wires or a damaged
‘carpet might result ina tripping hazard.
Ergonomic Hazards: They are the result of physical
Factors that can cause musculoskeletal injuries.
Psychosocial Hazards: They include those hazards that
can have an adverse effect on an employee's mental
health or well-being, For example, sexual harassment,
victimisation, stress and workload demands.
xB Practice Exercise
is an accessibility function which is
designed for people who have vision impairment or
cognitive disabilities. [ces 2023)
a. Fitter Keys b. Sound Keys
Toggle Keys , Sticky Keys
Which of the following you must have in order to use
Google Hangouts?
‘a. Yahoo id
© Microsoft Id
b. Google id
d. None of these
In which of the following, title of the blog is
specified?
a, Menu bar b. Blog area
€ Title box d. Category list
Which of the following is a concern related to the
Internet security?
2, Data privacy b. Confidentiality
c Integrity d. All of these
Which of the following viruses can infect an Excel
document?
2. Boot virus b. Program virus
© Macro virus d. All of these
What is the full form of VIRUS?
a, Vital Information Resource Under Seize
b. Vast Information Resource Under Seize
€ Vital Information Record Under Seize
d. None of the above
Which of the following viruses resides in the RAM of
a computer system?
‘a. Non-resident virus. Resident virus
Boot Sector virus d. Creeper virus
What involves the forgery of an e-mail header so
that the message appears to have originated from
someone or somewhere other than the actual source?
2. Spamming b. Phishing
Hacking d. E-mail spoofing
A . is an unplanned event that may
happen all ofa sudden and may lead to unwanted or
unprecedented results/outcomes. [cose 2023)
a. emergency b. hazard
¢ accident linesQ16.
Qu9.
Q20.
QL. .
Qzz.
923.
Q24.
Q2s.
Q26.
Qa.
Q28.
Q29.
Q30.
Which of the following hazards are the result of
physical factors that can cause musculoskeletal
injuries?
a. Blological hazards —_b, Safety hazards
Ergonomic hazards — , Psychosocial hazards
Which of the following is not a benefit of the
computer network?
a. Less cost
b. Increased reliability
c. Improved performance
0. Lack of robustness
Which of the following is not a type of network?
a. TAN b. LAN
WAN 0. MAN
provides Internet access by transmitting
digital data over wires of a local telephone network.
[cose 2025]
a. HSDPA b, P2P
DSL d. Modem,
Which type of network will be used to connect five
computers and a printer?
2. PAN b. LAN
WAN 0. MAN
Which of the following is the full form of MAN?
‘2. Metropolitan Access Network
bb. Metro Access Network
Metro Area Network
d. Metropolitan Area Network
Which of the following is the full form of ISP?
2. Internet Service Provider
b. internet Service Promoter
Internet Service Promotion
4. None of the above
Which of the following terms defines an area where
access is available?
2. Hotlink b. Hypertink
c. Hyperspot d. Hotspot
What is the other name for wireless networking?
a. Android b. Mobile
c. WiFi d. None of these
Which of the following are used as satellite Internet
equipment?
2. Satellite b. Dish
c. Modem 4. Allof these
Which is no physical wired connection between
sender and receiver to communicate, called?
a. Dial-up b. Wireless:
. Broadband d, Allof these
Which of the following folders in the Control Panel
contains accessibility options?
a. Device Manager b, Ease af Access Center
c Font d, Personalisation
Which of the following options activates the Sticky
keys?
a. Turn on Sticky Keys
Tur on Toggle Keys
b. Turn on Filter Keys
J. None of these
31 Google Hangouts is the product of which company?
a. Microsoft b, Google
€ Yahoo Oracle
Q.32. When was Google talk discontinued?
2.205 —b, 2010 ©2008 4. 2004
Q.33. Which of the following is an example of blogging
website?
a. wwwyahoocom ——_b. wwigmailcom
cc. wwnwblogspotcam — d. wwwgaogle.com
034. Which of the following is an offline blog editor
developed by Microsoft?
a. BlogDesk b. Qumana
c Windows Live Writer d, Marsedit
Q35. Which of the following blog editor is especially
mean for MAC computers and is a paid software?
a. BlogDesk b. Qumana
Windows Live Writer d. Marsedit
Q.36. Which of the following is the correct full form of
wysiwyG?
a. What You Saw Is What You Get
b. What You See Is What You Get
What You Saw Is What You Got
d. None of the above
37. Which of the following contains commands that are
used to write, edit, format, save and publish blogs?
a. Menu bar b, Blog area
c Title box d. Category list
Q.38. Which of the following is the correct full form
of EFT?
a. Electric Funds Transfer
b. Electronic Funds Transfer
© Electronic Funds Transformation
d. None of the above
Q.39. Which of the following is an example of Web-based
instant messaging software?
a. MS Word b. Facebook
Meebo 4. Gmail
Q.40. Networks in which certain computers have special
dedicated tasks, providing services to other
computers (in the network) are called ..
networks. [c0st 2023}
a. hlerarchicat b. dedicated server
© peer-to-peer d. client-server
Qa. is the process of emptying a place in
case of an emergency, disaster. [case 2023)
a. Emergency b. Accident
c Drill . Evacuation
942. Which of the following viruses infects the boot
records on the hard disk?
a. Macro b. Malware
© Boot Virus d. Worm
Q.43. Which of the following is an example of an antivirus
software?
‘a. Quick Heal Total Security
b. Nortan Antivirus
c McAfee Antivirus
J. All of the aboveQ44.
45.
46.
gar.
48.
Q49.
Qs.
Qs.
sz.
53.
Qs.
ass.
Q 56.
Qs7.
Q se.
Q59.
60.
Qa.
ez.
63.
A worker will always perform to the
best to his ability. [cose 2023]
a. fast working b. highly educated
happy and healthy —d. stressed
Computer accessibility or friendliness of computer is
known as
a. technology b. assistance technology
assistive technology d. None of these
Identify the cognitive impairment from the following:
a. Dystexi b. ADHD
< Autism d. All of these
Keyboard accessibility options are useful for those
which have
a. Physical Disabilities
€ Both a. and b.
Fill in the Blanks type Questions y
b. Vision Impairment
d. None of these
device.
on a computer
Computers have evolved into a
We can share different
network.
Computers have really converted the world into 2
small zs
Accessibility options are also referred as
Ease of Access Centre is also a part of folder.
Computers include options which
make the computer more easy to use for the people
having disabilities.
The... is also known as web or net.
Each computer in a network is called a
MAN is an extension of.. .
is an example of Wide Area Network.
Name the device that converts digital signal to
analog that can travel over phone lines.
[cose Sop 2022, Term-2]
key is an accessibility function which is
designed for people who have vision impairment or
cognitive disabilities. [case sop 2022, Term2]
Networks in which certain computers have special
dedicated tasks, providing services to other
computers (in the network) are called.
network
[case Sop 2022, Term-2]
is an organisation which provides you
with access to the internet via dial-up or direct or
wireless connection. [case Sop 2022, Term-2]
is the software or hardware security
device that analyses the network traffic and
determines ifthe traffic should be allowed or not.
[cose Sop 2022, Tarm-2]
immediate assistance is provided to the
injured to save life and minimise health loss till the
proper medical aid/facility is provided.
[case Sop 2022, Term-2]
Assertion & Reason type Questions y
Directions (Q. Nos. 64-74): In the questions given
below, there are two statements marked as Assertion
(A) and Reason (R). Read the statements and choose the
correct option.
a. Both Assertion (A) and Reason (R) are true and
Reason (A) s the correct explanation of Assertion (A).
b. Both Assertion (A) and Reason (R) are true, but
Reason (R) Is not correct explanation of Assertion (A).
Assertian (A) is true, but Reason (R) is false.
d. Assertion (A) is false, but Reason (R) is true
64. Assertion (A): Make the computer easier to see
feature lets you adjust various settings related
to the visual display of the computer screen. It is
useful for the people who have eyesight problem.
Reason (R): The change the colour and size of
mouse pointers setting is helpful in increasing the
size of mouse pointer, or changing the colour to
make it easier to view on the screen.
Q65. Assertion (A): The Turn on Mouse Keys option lets
you use multiple shortcut keys (such as Ctrl + Alt
+ Delete) by pressing one key at a time instead of
pressing all the three keys together. This option
is helpful for the people who can work with both
hands and use all fingers.
Reason (R): The Use On-Screen Keyboard setting
is used to activate the on-screen keyboard. You can
press the keys of the on-screen keyboard by using
the pointing device such as mouse or joystick.
066. Assertion (A): Computer networks have made our
lives easier. From the World Wide Web (WWW) to
the Local Area Network (LAN), computers have
become indispensable in our daily life.
Reason (R): Toggle key is a string of characters or
equivalent access code that is input into a program
to activate it. It is an accessibility feature that
assists people that have difficulty using a keyboard
or a mouse or both.
67. Assertion (A): A computer network is a collection
‘of computers or other hardware devices that
are connected together using special hardware
and software, which enables us to exchange
information and resources.
Reason (R): There is no limit to the distance
between two computers in a network. It can vary
from a few meters to thousands of kilometers.
Each computer in the network is called a node.
Q68. Assertion (A): Through a computer network,
peripherals such as, printers, scanners, fax machines
‘and modems can be shared among different users.
Reason (R): In a computer network, application
programs and other costly software are installed
on one central computer. Users connected to a
network can access these programs or software
through the central computer.69. Assertion (A): The protocol is the device, such as 36.(b) 37. (2) 38. tb) 39.) 40. (6)
2 computer, workstation, telephone handset, or 4L@) 42 43 @) 44) 45.10)
video camera that sends a message. 46.() 47. (0)
Reason (R): The physical path by which a message 48. versatile 49. peripherals
travels from the sender to receiver is called as a 50. global village 51. assistive technology
transmission medium. For example, twisted pair 52 accessories 53. accessibility
cable, fiber-optic cable, coaxial cable, laser or radio 54. Internet 55. node
waves. . 56. Local Area Network 57. Internet
Q70. Assertion (A): PAN is the smallest network which 58. MODEM 59. Toggle Key
is very personal to a user. This may include eorciaecaa euaise
Bluetooth-enabled handheld devices or infrared
enabled devices. PAN's connectively range is up to Serie Ss GEA
10 meters. 64.(6) 65. (6) 66.1) 67. (b) 68. ()
Reason (R): PAN may include wireless computer 69.(4) 70.(a) 7b) 72. tb) 73. (d)
keyboard and mouse, Bluetooth enabled headphones, 74.(0)
wireless printers, TV remotes and much more.
Q7L Assertion (A): In a client-server network, there
is a powerful central computer which has more
resources than the other computers connected to Case Study 1
the network.
The school offers WiFi to the students of Class
Reason (R):Client-Servernetworks typical t
een eee tet at te edi XIL. For communication, the network security-
of two parts. The front-end of the application e ,
is what tha user seasrand Interacts cleccthy The staff of the school is having a registered URL
Case Study Based type Questions y
back-end part interacts with the shared resources “schoolwifi.edu". On 17th September, 2017,
such as databases, printers, or high power e-mails were received by all the students
processors. regarding expiry of their passwords. Instructions
72. Assertion (A): Network topology refers to the basic were also given renew their password within
geometric layout according to which the server 24 hours by clicking on particular URL provided.
and clients are connected via a channel. QL Specify which type of cybercrime is it?
Reason (R): The computers on the network need. a. Spamming b. Phishing
to be arranged according to a specific topology to Identity theft 0. Hacking
provide specific level of access to the network. Q2. URL stands for..
Q73. Assertion (A): Ring topology is most commonly a. Universal Resource Loader
used in LANs wherein the server, clients and b. Uniform Resource Locator
shared resources are all directly connected to a United Research Loader
single common channel. This common channel is 4. Uniform Resource Loader
called as the bus. Q3. Unsolicited commercial e-mail is known as:
Reason (R): The channel runs through the network a Malware b. Virus
from one end to another. The common channel has Spam a Spyvare
terminators at each end. Only one computer can (ae WF stands for
transmit over the network at a time.
Q74. Assertion (A): Network devices are the components
that help us to connect computers or other
electronic devices together so that they can share
data or resources, like printers or scanners.
a Wireless internet Frequent interface
b. Wireless Functioning
c. Wireless Fidelity
4. Wire Free Internet
Reason (R): Through a computer network,peripherals ‘Answers a
such as, printers, scanners, fax machines and modems
can be shared among different users LO) 2) 3 KO
‘Answers « Case Study 2
le 20 2 40 SO E-mail: It is an electronic version of sending
and receiving leters. The e-mail is. transmitted
ae fe FO Ro Be between computer systems, which exchange
fe a o et &) messages or pass them onto other sites according,
16.() 17.) 18) 19.) 20.) tocertain Internet protocols or rules forexchanging,
2-22) -23.(6) 2A. (2) 25.) e-mail. You can send ¢-mail from your computer
26.) 27.) 28.(b) 23. (6) 30. @) at any time to any address around the world and
31(b) 32.3) 33. 34. (9 35.) your electronic letter or e-mail will arrive at itsdestination in seconds after you send it, even if the from unknown people. Everytime he goes online,
receiver is not online. For sending and receiving he finds someone chasing him online.
an e-mail, you must have an e-mail account, which Q1. Smridh is a victim of which attack?
is either a web based online e-mail account or an Q2. What is the term used for a set of moral
e-mail account on your ISP server. Web based it :
Salnie'e all acne cas RE eae a aaa principles that governs the behaviour of a
sites like Gmail, Yahoo mail, Redifmail, etc Group or individual and regulates the use of
QL. Which of the following is always a part of computers?
e-mail address? Q3. Smridh needs to protect his personal information
a. Perlod() b. Space) or data from unintentional and intentional attacks
© Atsign(@) .Underscore(_) and disclosure. Name the term.
2. Which among the following is an area of e-mail i
that is short description of the message? 4. Define Phishing,
a. Subject b.Ce - Answers +
c Bcc d. Attachment
3. Identify the software that helps you in sending \ Cyber ataliiig
and receiving an e-mail. 2. Computer ethics
a. MS-Office b.internet explorer 3. The term used is Privacy
bade aad d.Neneot these, 4, The act of fraudulently acquiring someone's per-
Q4. Junk mail is also called: Tand 5 hae oni
“a8 —_ sonal and private information. such as online ac-
c Spam 4 Shiffer script count names, login information and passwords
{s called as Phishing.
Answers
Case Study 5
1 = 20) 30 46 ‘Types of Computer Network: Generally,
Case Study 3 networks are classified on the basis of
Sumit has to prepare a project on “Swachh Bharat geographical area covered. A network can be
Shreshth Bharat”. He decides to get information as small as the distance between your mobile
from the intermet. He downloads three webpages Phone and its bluetooth headphone and can be
(Webpapel, webpage 2, avebpage 3) conldining as large as the Internet covering the whole Earth.
information on the given topic. ‘Computer networks can be classified on the basis
He read a paragraph on from webpage | and of geographical area covered by a network, into
rephrased it in his own words. He finally the following categories:
pasted the rephrased paragraph in his project. (@) Personal Area Network
(ii) He downloaded three images of from webpage Gi) Local Area Network
2. He made a collage for his project using (iii) Metropolitan Area Network
these images. (iv) Wide Area Network
(Gi) He also downloaded an icon from webpage 3 QL. Define PAN.
ang) ae iene front pags SEIS project Q2. The network inside your school’s computer Lab
rape a or a network within a small office are examples
1. What is described in step 1? of which type of network?
Od: What eee af act ls defined instep 2? Q3. Whatis the maximum PAN’ connectivity range?
28. What type of acts defined in step 37 Q4. Which is the biggest type of network available
S14: What Is'a Website? for the computer systems?
Answers ‘Answers |
1. Step Tan example of paraphrasing
& doth ovenutsisgeen 1. Personal Area Network (PAN) is 2 computer
3
network that connects computersidevices with
Step 3 Is an act of copyright infringement.
in the range of an Individual person. As PAN
provides a network range within a person's
4. Awebsite is a collection of webpages.
Case Study 4 range typically within a range of 10 meters (33
Smridh has recently changed his school, so he is feet) itis called as Personal Area Network.
not aware of the people, but someone is posting 2. LAN (Local Area Network)
negative, demeaning comments on his social 10 metres.
media profile. He is also getting repeated mails 4, WAN (Wide Area Network).@ Very Answer type Questions
Qn
Ans.
Q4.
Ans.
Qs.
Ans.
Q6.
Ans.
Q7.
Ans.
Q8.
Ans.
Q9.
Ans.
What do you mean by the term accessibility?
Accessibility refers to the options that make a
computer system easy to use for all even for the
people having disabilties. Accessibility options are
also referred as Assistive Technology.
. Write the steps to open Ease of Access Center.
. Click on Start + All program —» Accessories ~» Ease
of Access —» Ease of Access Center are the steps to
‘open the Ease of Access Center.
|. Write the advantages of Turn on Narrator
accessibility feature.
;- The Turn on Narrator option enables the Narrator
to read aloud the text displayed on the screen and
explains the various events such as appearance of
error messages and notifications while using the
computer
What is the use of fine tune display accessibility
feature?
The fine tune display effects setting enables us
to customise how various items appears on our
desktop.
Define filter keys.
The filter keys option is helpful for ignoring
keystrokes that have taken place in rapid succession,
or keystrokes that are being pressed for several
seconds inadvertently,
Write the advantage of the feature that make the
mouse easier to use.
This feature helps in deciding the looks of a pointer
‘on screen or making it appear larger on the screen
50 that a person with visual disablity can see the
pointer on the screen.
Explain the Turn on Audio Description.
The Tum on Audio Description setting allows audio
descriptions to play whenever we log on to our
computer.
Define the term Serial key.
Serial key is a string of characters or equivalent
‘access code that is input into a program to activate
it Its an accessibility feature that assists people
‘who have difficulty using a keyboard or a mouse or
both
Explain the Underline keyboard shortcuts and
access keys option,
The Underline keyboard shortcuts and access keys
option is helpful in making the keyboard accessibility
easier in dialog boxes by highlighting access keys
for the controls present in them.
Quo.
Ans.
Qu.
Ans.
giz.
Qs.
Ans.
Qu.
Ans.
Qis.
Ans.
Qs.
Qu.
Ans.
‘What do you mean by the Turn on Text captions for
spoken dialog?
‘The Turn on text captions for spoken dialog option
allows Windows to display text captions instead of
sounds for indicating the happening of an activity on
the computer.
Define Computer Network.
A computer network is a collection of computers or
other hardware devices that are connected together
Using special hardware and software, which enables
Us to exchange information and resources.
What is a node?
Each computer attached in a network is called a
node
How can software be shared in a network?
In a computer network. application programs and
other costly software are installed on one central
computer. Users connected to a network can access
these programs or software through the central
computer.
Into how many categories can computer networks
be classified, on the basis of geographical area?
Computer networks can be classified on the basis
of geographical area covered by a network. into the
following categories:
(i) Personal Area Network
(i) Local Area Network
(il) Metropoutan Area Network
(iv) Wide Area Network
Expiain Personal Area Network with example.
PAN Is the smallest network which Is very personal
to_a user This may include Bluetooth-enabled
handheld devices or infrared enabled devices. PANS
connectivity range is up to 10 metres
Example: PAN may Include wireless computer
keyboard and mouse, bluetooth enabled head-
phones. wireless printers. TV remotes and much
more.
Define the following terms:
() Server i) Cllent,
. (i) Server: The central computer In the cllent-server
network is known as server. It is responsible For
providing all the information and resources to
the clients.
Client: The other computer_rather than the
central computer in the client-server model is
known as client. It is also known as clients or
nodes or workstations
Describe the parts of client-server networks.
Client-Server networks typically consist of two
parts. The front-end _of the application is what
the user sees and interacts directly. The back-end
part interacts with the shared resources such as
databases, printers, or high power processors.
(i)Que.
Ans.
Qu.
Ans.
Q20.
Ans.
gai.
Ans.
Qzz.
Ans.
gaa.
Ans.
Q24.
Ans.
Q2s.
Ans,
Q 26.
Ans.
What do you mean by Network Topology?
Network topology refers to the basic geometric
layout according to which the server and clients are
connected vio a channel The three most common
network topologies are bus, ring and star.
What do you understand by the term Network
devices?
Network devices are the components that help us
to connect computers or other electronic devices
Together so that they can share data or resources,
like printers or scanners
Explain Router.
A router Is a network device which Is responsible
for routing data traffic from one jammed network
toanother free network
‘What do you mean by the term Intranet?
‘An Intranet is a private network that is contained
within_an_enterprise. It may consist oF many
interlinked Local Area Network and also use leased
lines in the Wide Area Network
Write one advantage and one disadvantage of the
Internet.
Advantage: The Internet provides information on
any topic. Search engines are the best examples of
‘retrieving information from the internet.
Disadvantage: A lot of incorrect information is also
available on the internet, Anyone can post anything
and it can be misleading
Write any two characteristics of Internet.
The characteristics of Internet are as follows:
(i) Aweb browser is an application program that is,
used to access the websites and web pages an
the Internet.
(i) The Internet utilises the TCP/P protacal and Is
accessed using a computer modem, broadband
3G. 4G, or network that is connected through an
isp
Define the term medium in computer network.
The physical path by which a message travels from
the sender to receiver Is called as a transmission
‘medium. For example. twisted pair cable. fibre-optic
cable, coaxial cable, laser or radio waves.
Write any one major use of computer network.
One of the major use of computer network Is
communication. Using a computer network
different people can communicate with each other
across the globe. People can communicate at a
very low cost using tools. such as e-mail. chatting,
telephone, video conferencing, groupware and SMS
services
What is Broadband?
Broadband [s a high-speed Internet _cannectlon,
It is provided through either the cable or telephone
‘companies, Itis one of the fastest options to transfer
data.
Qa.
Ans.
Q2e.
Q29.
Ans.
(ii) W3C
What do you understand by the term protocol?
A protocol is a set_of guidelines that_controls
the data communication. It represents a natural
agreement between the communicating devices.
Define the term web browser with example.
‘A web browser is an application program installed
at clent's computer that sends the request to a web
server for viewing the web content. For example,
the Internet Explorer. Mozilla Firefox, Baidu. Google
Chrome, etc.
Write the full form of following terms:
( ISP i) Ww
(vy) HTTP
(i) ISP: Internet Service Provider
(i) Www: world Wide Web
(ii) W3C: World Wide Web Consortium
(iv) HTTP: Hypertext Transfer Protocol
Q30.
Ans.
al.
Ans.
Q 32.
Q33.
Ans.
934.
Ans.
035.
. Authoring, maintaining or adding an article an the
936.
Ans.
What do you understand by Hotspot?
Hotspot is based on the WiFi technology. It allows
electronic devices to connect to the Internet or
exchange data wirelessly through radio waves In
place of the telephone or cable networks.
Define the term WAP.
WAP stands for Wireless Access Point. It is a device
that connects wireless communication devices to
form a wireless network
Give some examples of
application.
Some examples of the instant Messaging application
are Jabber, Hike Messenger. Yahoo! Messenger.
Google Talk, Google Hangouts, Skype, etc
What do you mean by the term Google Hangouts?
Google Hangouts is a free instant_messenger
software developed by Google. It can easily be
Gownlaaded for free fram the internet. It supports
different platforms such as Windows. Linux . Mac
05. etc
Define Organisational blogs.
Organisational blogs are the blogs created to
generate business. These types of blogs are
generally used by organisations. corporations. etc
Define blogging.
Instant Messaging
existing blog is known as blogging
Explain the term BlogDesk.
The BlogDesk Is an offline desktop blog editar
used for offline blog creation, BlogDesk is a free
offline blog editor that can easily be downloaded
free from the Internet and installed on a computer
system.Q37. Define the following terms:
() Qumana (ji) MarsEdit
‘Qumana: itis a free offline blog editor that supports
both windows and Mac operating system:
(il) Mars€dit: It Is an offiine blog editor especial
meant for Mac computers. Itis a paid software
Q38. Give some examples of the websites using which
you can create and publish your blogs.
‘Ans. Some of the blogging websites that allow us to
create and publish our blogs are wwwublogspot.
com, www blogger.com, WordPress.com. et.
39. Write any two features of BlogDesk.
‘Ans. The two features of BlogDesk are as follows:
(i) It ls an offline blog editor. so we can work in it
even if we are nat connected to the Internet.
(li) It also has inbuilt help facility to help us while
working init
|. Distinguish between browsing history and
download history.
‘Ans. Browsing History: This is the list of all the web
pages that we have visited.
Download History: This isthe Ust of all the files that
we have downloaded
(Q4L What are the factors on which the effectiveness of
2 password depends?
‘Ans. The effectiveness of a password depends on the
following factors:
(i) Security mechanism of the software.
(W) User's involvernent_in generating a_strong
password.
wledge BOOSTER
Password effectiveness is checked by most of the
‘54 websites when a user attempts to register for the first
time or when they change password.
0.42, What are the different threats to Internet security?
‘Ans. Virus attacks. spamming. phishing hacking of
Ans.
Q.46. What do you mean by chat spoofing?
‘Ans. When a computer system or a user of a computer,
Masquerades to be another while engaging in 2
‘chat. it is known as chat spoofing,
Q47. Explain Evacuation.
‘Ans. Evacuation is the process of emptying a place in
case of an emergency or disaster
0.48. What is 360 Total Security program?
‘Ans. 360 Total Security is a complete free security suite.
provided by the leading Chinese security compani
Qihoo. it can easily be downloaded free fram the
Internet and can be used to safeguard the system
against different security threats,
Q.49. What do you mean by Phishing?
‘Ans. Phishing is a form of fraud in which the attacker
tries to steal or take out information such as login
Credentials or account information.
Q50. Define the term Cookies.
‘Ans. Cookies are small files which are stored on a user's,
computer. These files contain the programs that
are created on our local computer when we visit
websites.
QSL. Differentiate between cookies and cache files.
‘Ans. Cookies: Cookies store website specific information
that may or may not be important.
Cache: It stores HTML files and images from the
website we have visited and displays those iit does
not delete any changes to them when we choose to
Visit the site again.
Q52. Write any two basic fire safety rules in an
organisation.
Ans. The two basic fire safety rules in an organisation
are:
(i) Regularly take care of the maintenance of
safety equipment.
(i) install Fire escape plans at proper level
information, etc. are different types of threats
to information security that may lead to loss of
information and corruption of data
How is a computer virus different from a biological
virus?
‘Ans. & computer virus Is different from a biological virus
as biological _virus harms human body whereas
computer virus harms the computer system.
0.44. What type of virus was Melissa?
‘Ans, Melissa virus (March 1999) was so powerful virus
that it forced Microsaft_and many other_large
companies to turn off their e-mail systems until the
virus could be removed completely.
Q45. Explain Boot virus.
‘Ans. Boot virus is one that infects the boot records of
hard disk. These viruses are more dangerous than
the program virus. Some examples of these viruses
‘are Disk killer and Stoned virus.
Q43.
83. What do you understand by the term Accident?
Ans. Accident is an unplanned, _undesigned and
unexpected event that may happen all of a sudden
and may lead to unwanted or unprecedented
results/outcomes,
Q54, Define the term Hazard.
Ans. Any unexpected situation that_needs immediate
attention. intervention or action to prevent a worse
situation is an emergency,
55. Differentiate between Ergonomic hazards and
Psychosocial hazards.
‘Ans. Ergonomic Hazards: They are the result of physical
factors that can cause musculoskeletal injuries.
Psychosocial Hazards: They include those hazards
that can have an adverse effect on an employee's
mental health or well-being. for example sexual
harassment. victimisation. stress and workload
demands.56.
Ans.
qs7.
Ans.
958.
Ans.
959.
Ans.
Q 60.
Ans.
QoL
Ans.
Qo
Ans.
Q63.
Ans.
64.
What does a healthy lifestyle includes?
Anealthy lifestyles includes:
() Abalanced diet and healthy eating habits
(i) Staying hydrated
(i) Good-quality steep
{iv) Thinking positive
Define networking,
‘A computer network is a collection of computers
that allow sharing of resources and information.
Give any four advantages of networking.
Four advantages of networking are:
() Data Sharing
(i) Files Transfer
(ill) Hardware Sharing
(iv) Internet Access Sharing
Explain the term packet with reference to data
transfer.
Data transfer over the network is divided into small
‘Segments called packet. Each packet Is sent from
‘one computer to another computer until it finds its
destination
Explain WiFi and its significance.
WiFi stands for wireless fidelity. WIFI is a popular
technology that allows an electronic device such
‘as computers or mobile phones to exchange data
wirelessly over a network
WIFI Is used where cables cannot be run (such as
‘old buildings, outdoor areas) to provide network and
Internet access.
Expand and explain the term WAN. (CBSE 2023)
WAN stands for Wide Area Network. WAN is the
biggest type of network available for the computer
system. This network covers a wide area which may
spread across the cities or different countries. It
enables the users and computers in one location
to communicate with users and computers in other
locations.
List any four application based instant messa
software.
Four application based instant messaging software
are
() Google Talk
(i) Yahoo! Messenger
(ii) Skype
(iv) Windows Live Messenger
What do you mean by instant messages?
Instant Messaging (IM) is a form af communication
over the Internet that offers an instantaneous
{ransmission of text-based messages from sender
to receiver
(i) Identify the following network/Intemet
connectivities as wired or wireless:
(@) Dial-up
(b) WiMax
Ans.
65.
Ans.
66.
Ans.
Qo7.
Ans.
68.
Ans.
Q69.
Ans.
Q70.
Ans.
) Give any one feature of Instant Messaging.
() @) Wired
(b) Wireless
Two key features of instant Messaging are:
(i) (2) Text Messages can be sent to one or more
person.
(b) Audio and Video calling and conferencing
(Any one)
State any two rules and etiquettes to be followed
while chatting on the Internet.
Two rules and etiquettes to be followed while
chatting on the Internet are
() Messages should be short and to the point.
(i) Always introduce by name If the screen name
doesnt reflect it
What are the basic needs to use instant messaging
(chat) software?
The basic needs to use instant messaging (chat)
software are:
() A valid instant messaging account
(ii) An active internet connection.
Differentiate between web page and website.
A single HTML document is called a web page. A
Collection of web pages is called web site
Explain the purpose of Internet Security.
Internet security is a branch of computer security
Specifically related to the Internet. Its ablective Is to
establish rules and measures to use against attacks
over the internet
Name different kinds of online threats.
Different kinds of online threats are
(i) Phishing
(i) E-mail spoofing
(ii) Chat spoofing
Enlist any two basic safety rules to follow at
workplace.
Basic safety rules to follow at workplace are
()) Fire safety
(il) Falls and stps
-& Short Answer type Questions
Qu
Ans.
Write the advantages of a Computer Network.
‘Advantages of a Computer Network: The following
are the main advantages of computer networks,
(i) Exchange of Information/File Sharing: The
major advantage of a computer network is that
it allows file sharing. Users on a network can
easily share or exchange files or information
‘among themselves.
(ii) Resource Sharing: Resource sharing is another
Important advantage of a computer network
(Ili) Reduced Costs: When we share software
and hardware resources. the cost_of buying
resources is reduceda2.
Ans.
a3.
Ans.
Q4.
Ans.
Q5.
Ans.
Q6.
Ans.
Q7.
Ans.
(iv) Flexible Working Environment: A user can log
‘on toa computer anywhere on the network and
Gateway: A gateway is a network node that provides
access to another network that uses different
an access his/her files and data. This offers a
flexible working environment
Discuss flexible working environment as an
advantage of the computer networks.
‘A user can log on to a computer anywhere in the
network and can access his/her files and data. This
offers a flexible working environment. For examale.
if a person Is not able to go to office because of
‘any reason, he/she can get connected with his/her
‘company’s network and thus. can work from home.
Differentiate between LAN and MAN.
Local Area Network (LAN): LAN covers a small area,
itis a privately-owned small_network that spreads
‘cross a small campus or a building or from one
room toa campus of a few kilometres.
Metropolitan Area Network (MAN): MAN is an
extension of Local Area Network that can connect
computers in a big city MANs are mainly owned
by large organisations to interconnect all their
branches, across a city
What is Peer-to-Peer network?
Peer means equal and therefore in a peer-to-peer
network, each computer or node is equal to other
computers in terms of the resources that it can
‘access and share. All the computers in this type
oF network act both as the supplier as well as the
consumers of resources. It treats all the devices
2s having the equivalent capability. In this network.
each computer shares its resources such as CPU,
hard disk or hardware such as printers, with other
computers on the network
Define Ring Topology.
In Ring topology. all the computers are connected
ina large closed-loop circuit so that each computer
is linked to two adjacent computers. on either side.
in this topology, the message sent by a sender is,
received by every client in the network But the
message Is read only by the receiver to which it was
addressed
Distinguish between Hub and Switch.
Hub: A network hub is a networking device that is
used to help _us in connecting multiple network
hosts. A network hub is also used for data transfer.
‘Switch: A switch is more intelligent than a hub.
While a hub only forwards the data, a switch does
filtering and forwarding which is a more prudent
way of dealing with the data packets.
Differentiate between Repeater and Gateway.
Repeater: A repeater is an electronic device that
amplifies the recelved signal. It recelves a signal and
retransmits it with a higher level or a higher power
so that the signal can travel longer distances before
fading out.
Q8.
Ans.
Q9.
Ans.
Quo.
Ans.
protocols and enables data to be transmitted from
cone nade to anather.
How to clear the cache and cookies on web browser?
Follow the steps below for how to clear web history
on the Mozilla Firefox browser:
(i) Glick on the upper right of the browser toolbar.
(i) Click History
(ii) Click Clear Recent History.
(iv) Glick the drop-down menu next to Time range
to clear and select Everything
(v) Place a check mark next to the following options
User Details:
(2) Browsing and Download History
(0) Form and Search History
(©) Cookies
(d) Cache
(©) Active Logins
(f) Offline Website Data
{g) Site Preferences
(vi) Click on Clear Now button.
The window will close and the tems we have
selected wil be cleared
Write some features of an Instant Messaging
software.
The following are some distinct features of an
Instant messaging software:
(i) These softwares can be used for one-to-one or
{group conversation, in the form of conference
in real-time
(i) They offer chat rooms where we can chat with
multiple people at the same time
(ii) Files can easily be transferred to any account
inthese by simply dragging and dropping in the
chat window.
(v) Messages can be replied. Forwarded to a single
person or toa whole group.
How many types of instant messaging software are
there? Write about them.
‘There are two types of instant messaging software.
(i) Web-based instant messaging softwere.
(ii) Application-based instant messaging software.
Web-based instant messaging software are the
instant messengers that are accessed vio a web
browser. There is no need to download and install
any software on the computer system for using
them, We can use a messenger in a web browser.
Application-based messenger software are the
messengers that are downloaded and installed to
a user's computer. Many of such application-based
instant messengers are available for free on the
Internet and can easily be downloaded and installed
ona computer.