PLUS ONE COMPUTER APPLICATION / COMPUTER SCIENCE
Chapter 9. Internet(Chapter 12 - Internet And Mobile Computing for CS)
+1. Computer Application / +1 Computer Science
(Questions and answers from text book)
1. ARPANET stands for _____________.
The antivirus software uses virus definition files containing signatures (details) of viruses and other malware that are known. When an antivirus program scans a file and notices that the file matches a known piece of malware, the antivirus program stops the file from running, and puts it into ‘quarantine’. Quarantine is a special area for storing files probably infected with viruses. These files can later be deleted or the virus can be removed. For effective use of antivirus software, virus definitions must be updated regularly.
It is short distance (up to 100M) data transmission method using Wi Fi router or wireless network access point(Hot spot). It is less secure than wired connection.
(Questions and answers from text book)
1. ARPANET stands for _____________.
Ans. Advanced Research Projects Agency Network
2. Who proposed the idea of www?
Ans. Tim Berners Lee
3. The protocol for Internet communication is _____________.
Ans.TCP/IP
4. What do you mean by an ‘always on’ connection?
The term broadband refers to a broad range of technologies that helps us to connect to the Internet at a higher data rate (speed). Wired broadband connections are ‘always on’ connections that do not need to be dialled and connected. Broadband connections use a broadband modem and allow us to use the telephone even while using the Internet
The term broadband refers to a broad range of technologies that helps us to connect to the Internet at a higher data rate (speed). Wired broadband connections are ‘always on’ connections that do not need to be dialled and connected. Broadband connections use a broadband modem and allow us to use the telephone even while using the Internet
5. A short distance wireless Internet access method is _____________.
6. Give an example for an e-mail address.
scertkerala@gmail.com
scertkerala@gmail.com
7. Which of the following is not a search engine?
(a) Google
(b) Bing
(c) Facebook
(d) Ask
Ans. c
8. Name the protocol used for e-mail transmission across Internet.
SMTP(Simple Mail Transfer Protocol)
SMTP(Simple Mail Transfer Protocol)
9. What is a blog?
A blog (web log) is a discussion or informational website consisting of entries or posts displayed in the reverse chronological order i.e., the most recent post appears first. Some blogs provide comments on a particular subject; others function as personal online diaries and some others as online brand advertising for a particular individual or company. Initially blogs were created by a single user only. But now there are multiauthor blogs that are professionally edited. Blogger.com and Wordpress.com are popular sites that offer blogging facility.
A blog (web log) is a discussion or informational website consisting of entries or posts displayed in the reverse chronological order i.e., the most recent post appears first. Some blogs provide comments on a particular subject; others function as personal online diaries and some others as online brand advertising for a particular individual or company. Initially blogs were created by a single user only. But now there are multiauthor blogs that are professionally edited. Blogger.com and Wordpress.com are popular sites that offer blogging facility.
10. Name two services over Internet.
a) World wide Web(WWW):It is a system of interlinked hyper text document accessed via internet. It is a huge client-server system with millions of clients and servers. Each server maintain a collection of documents that can access using a URL. WWW works by establishing hyper text links between documents anywhere in the internet.
b). Search engines: search engines websites are special programs to help people to find information available on WWW. It searches WWW for possible key words by using programs like crawler/spider or robots and make indexes of web pages containing that keywords and saved in its server. When a user search with a key word, the search engine software searches its server and show a list of URLs matching the search to the user.
a) World wide Web(WWW):It is a system of interlinked hyper text document accessed via internet. It is a huge client-server system with millions of clients and servers. Each server maintain a collection of documents that can access using a URL. WWW works by establishing hyper text links between documents anywhere in the internet.
b). Search engines: search engines websites are special programs to help people to find information available on WWW. It searches WWW for possible key words by using programs like crawler/spider or robots and make indexes of web pages containing that keywords and saved in its server. When a user search with a key word, the search engine software searches its server and show a list of URLs matching the search to the user.
11. Each document on the web is referred using ________.
12. What is a virus?
A computer virus is a program that attaches itself to another program or file enabling it to spread from one computer to another without our knowledge and interferes with the normal operation of a computer. A virus might corrupt or delete data on our computer, replicate itself and spread to other computers or even erase everything in the hard disk. Almost all viruses are attached to executable files. A virus may exist on a computer, but it cannot infect the computer unless this malicious program is run or opened. Viruses spread when the file they are attached to, is transferred from one computer to another using a portable storage media (USB drives, portable hard disks, etc.), file sharing, or through e-mail attachments.Viruses have become a huge problem on the Internet and have caused damage worth billions.
A computer virus is a program that attaches itself to another program or file enabling it to spread from one computer to another without our knowledge and interferes with the normal operation of a computer. A virus might corrupt or delete data on our computer, replicate itself and spread to other computers or even erase everything in the hard disk. Almost all viruses are attached to executable files. A virus may exist on a computer, but it cannot infect the computer unless this malicious program is run or opened. Viruses spread when the file they are attached to, is transferred from one computer to another using a portable storage media (USB drives, portable hard disks, etc.), file sharing, or through e-mail attachments.Viruses have become a huge problem on the Internet and have caused damage worth billions.
13. What do you mean by phishing?
Phishing is a type of identity theft that occurs online. Phishing is an attempt to acquire information such as usernames, passwords and credit card details by posing as the original website, mostly that of banks and other financial institutions. Phishing websites have URLs and home pages similar to their original ones. The act of creating such a misleading website is called spoofing. People are persuaded to visit these spoofed websites through e-mails. Users are tempted to type their usernames, passwords, credit card numbers, etc. in these web pages and lose them to these websites. These frauds use this information to steal money. Phishing is currently the most widespread financial threat on the Internet.
Phishing is a type of identity theft that occurs online. Phishing is an attempt to acquire information such as usernames, passwords and credit card details by posing as the original website, mostly that of banks and other financial institutions. Phishing websites have URLs and home pages similar to their original ones. The act of creating such a misleading website is called spoofing. People are persuaded to visit these spoofed websites through e-mails. Users are tempted to type their usernames, passwords, credit card numbers, etc. in these web pages and lose them to these websites. These frauds use this information to steal money. Phishing is currently the most widespread financial threat on the Internet.
14. The small text files used by browsers to remember our email id’s,
user names, etc are known as _____________ .
Ans. Cookies
Ans. Cookies
15. The act of breaking into secure networks to destroy data is called
_____________ hacking.
Ans.Black hats
Ans.Black hats
16. What is quarantine?
The antivirus software uses virus definition files containing signatures (details) of viruses and other malware that are known. When an antivirus program scans a file and notices that the file matches a known piece of malware, the antivirus program stops the file from running, and puts it into ‘quarantine’. Quarantine is a special area for storing files probably infected with viruses. These files can later be deleted or the virus can be removed. For effective use of antivirus software, virus definitions must be updated regularly.
17. Why is the invention of HTTP and HTML considered as an important land mark
in the expansion of Internet?
18. Compare intranet and extranet.
Intranet is considered as a private computer network similar to internet using TCP/IP for sharing resources within an organization.
If the intranet is allowed to communicate with some computers that are not part of the organization is known as Extranet.
Intranet is considered as a private computer network similar to internet using TCP/IP for sharing resources within an organization.
If the intranet is allowed to communicate with some computers that are not part of the organization is known as Extranet.
19. Write short notes on
a. Mobile broadband
b. Wi-MAX
Ans.
1). Mobile Broadband: It used in mobile devices like mobile phone, tablets etc in
which modem is built in or USB dongle is used. It allows freedom to use internet
on move. It uses cellular network to data transfer. Its speed increases with
generations like 2G, 3G, and 4G.
2).Wi-MAX:Worldwide interoperability for MicrowaveAccess combines the benefits of
wireless and broadband. It has a bandwidth up to 70 Mbps to a range of 45 KM.
a. Mobile broadband
b. Wi-MAX
Ans.
1). Mobile Broadband: It used in mobile devices like mobile phone, tablets etc in
which modem is built in or USB dongle is used. It allows freedom to use internet
on move. It uses cellular network to data transfer. Its speed increases with
generations like 2G, 3G, and 4G.
2).Wi-MAX:Worldwide interoperability for MicrowaveAccess combines the benefits of
wireless and broadband. It has a bandwidth up to 70 Mbps to a range of 45 KM.
20. Explain the terms web browser and web browsing.
A web browser is a software application for accessing information on the World Wide Web. ... He then recruited Nicola Pellow to write the Line Mode Browser, which displayed web pages on dumb ... The menu has different types of settings.
A web browser is a software application for accessing information on the World Wide Web. ... He then recruited Nicola Pellow to write the Line Mode Browser, which displayed web pages on dumb ... The menu has different types of settings.
21. Compare blogs and microblogs.
Social Blogs: Blog(Web Log) is a discussion or informational website contains entries /posts in reverse chronological order. It may be comments about a subject , personnel diaries, advertisement etc..
Microblogs:It allows the user to exchange short sentences, individual images or video links. It offers a communication mode that is spontaneous and can influence public opinion.
Eg. Twitter
Social Blogs: Blog(Web Log) is a discussion or informational website contains entries /posts in reverse chronological order. It may be comments about a subject , personnel diaries, advertisement etc..
Microblogs:It allows the user to exchange short sentences, individual images or video links. It offers a communication mode that is spontaneous and can influence public opinion.
Eg. Twitter
22. What are wikis?
:Wikies allow people to add content or edit existing information in a web page to form a community document.
:Wikies allow people to add content or edit existing information in a web page to form a community document.
23. Your neighbour Ravi purchased a new PC for his personal use. Mention the components required to connect this PC to Internet.
24. What are the advantages of using broadband connection over a dial-up connection?
25. XYZ engineering college has advertised that its campus is Wi-Fi enabled. What is Wi-Fi? How is the Wi-Fi facility implemented in the campus?
25. XYZ engineering college has advertised that its campus is Wi-Fi enabled. What is Wi-Fi? How is the Wi-Fi facility implemented in the campus?
It is short distance (up to 100M) data transmission method using Wi Fi router or wireless network access point(Hot spot). It is less secure than wired connection.
26. Madhu needs to prepare a presentation. For this, he uses www.google.com to
search for information. How does google display information when he types
‘Phishing’ in the search box and clicks search button?
27. Manoj’s e-mail id is manoj@gmail.com. He sends an e-mail to Joseph whose
e-mail id is joseph@yahoo.com. How is the mail sent from Manoj’s computer to
Joseph’s computer?
28. How does a Trojan horse affect a computer?
It is appear to be a useful program but once it is installed , it will do damages to the computer like deleting or altering files. It may also make path(back door) in computer through which illegal users can access personnel information from computer through network. Trojan can’t self-replicate.
It is appear to be a useful program but once it is installed , it will do damages to the computer like deleting or altering files. It may also make path(back door) in computer through which illegal users can access personnel information from computer through network. Trojan can’t self-replicate.
29. Explain a few threats that affect a computer network.
a). Firewall: Firewall is a system of computer hardware and software that provides security to the computers in an organization. It controls the incoming and outgoing network traffic and deny malicious data from entering in to the computer.
b). Antivirus Scanners: Antivirus tools scans files and programs for known malware like viruses and remove them or store them in quarantine area to preventing them from execution.
c). Cookies: Cookies are small text files created when we browse a website. It may remember our username, password etc..so hackers can use them for their malicious purpose. They use cookies as spyware to keep track our activities in system. So cookies should be frequently removed.
a). Firewall: Firewall is a system of computer hardware and software that provides security to the computers in an organization. It controls the incoming and outgoing network traffic and deny malicious data from entering in to the computer.
b). Antivirus Scanners: Antivirus tools scans files and programs for known malware like viruses and remove them or store them in quarantine area to preventing them from execution.
c). Cookies: Cookies are small text files created when we browse a website. It may remember our username, password etc..so hackers can use them for their malicious purpose. They use cookies as spyware to keep track our activities in system. So cookies should be frequently removed.
30. What is firewall?
Firewall is a system of computer hardware and software that provides security to the computers in an organization. It controls the incoming and outgoing network traffic and deny malicious data from entering in to the computer
Firewall is a system of computer hardware and software that provides security to the computers in an organization. It controls the incoming and outgoing network traffic and deny malicious data from entering in to the computer
31. Suppose you wish to visit the website of kerala school kalolsavam,
www.schoolkalolsavam.in and you have entered the URL in the address bar. Write
the steps that follow until the home page is displayed.
32. Write the disadvantages of social media. What are the different ways to avoid the
disadvantages of social media?
i). Bring people together ii). Can plan and organize events iii). Business promotion
iv). Can express social skills .
a). Avoid unnecessary uploading of personal data.
b). Setting time schedule for the usage.
c). Think twice before you post anything in social media.
d). Set exact privacy levels.
e). Do not use bad languages
i). Bring people together ii). Can plan and organize events iii). Business promotion
iv). Can express social skills .
a). Avoid unnecessary uploading of personal data.
b). Setting time schedule for the usage.
c). Think twice before you post anything in social media.
d). Set exact privacy levels.
e). Do not use bad languages
33. Explain the various broadband technologies available for Internet access.
a) Internet connectivity is based on speed of the connection and technology used. They can broadly classify in to dial up, wired broad band, and wireless broad band.
a). Dial Up connection: It uses telephone line and dial up modem connection is made
by dialing . It has a speed of 56kbps.
b). Wired Broadband connection: It is “always on” type connectivity with high band
width.
Common types of Wired Broadband connection are,
1). Integrated Service Digital Network(ISDN): It has a transfer rate It is capable of transferring voice and digital data
Cable Internet: It uses co-axial cables of cable TV network for data transfer. A
cable modem is used to connect cable network and computer. Its band width is about 10Mbps.
3). Digital Subscriber Line( DSL): It uses telephone line to transfer data and
voice. Commonly it uses Asymmetric Digital Subscriber Line(ADSL) technology
to allow a speed up to 24 Mbps.
4). Leased Line: It is a dedicated line used to transfer data with speed up to 100
Mbps.
5). Fibre To The Home(FTTH): It uses optical fiber from ISP to users home. By
using light signals , it has a very high band width.
A Network Terminal Unit(NTU) is installed at homes which connect
computers through FTTH Modem.
c). Wireless Broadband connectivity:
1). Mobile Broadband: It used in mobile devices like mobile phone, tablets etc in
which modem is built in or USB dongle is used. It allows freedom to use internet
on move. It uses cellular network to data transfer. Its speed increases with
generations like 2G, 3G, and 4G.
2).Wi-MAX:Worldwide interoperability for MicrowaveAccess combines the benefits of
wireless and broadband. It has a bandwidth up to 70 Mbps to a range of 45 KM.
3). Satellite Broadband: Very Small Aperture Terminal(VSAT) dishes and transceiver
are used to communicate with satellite. A modem links the transceiver to
computer. Its speed is up to 1Gbps and is more expensive one
a) Internet connectivity is based on speed of the connection and technology used. They can broadly classify in to dial up, wired broad band, and wireless broad band.
a). Dial Up connection: It uses telephone line and dial up modem connection is made
by dialing . It has a speed of 56kbps.
b). Wired Broadband connection: It is “always on” type connectivity with high band
width.
Common types of Wired Broadband connection are,
1). Integrated Service Digital Network(ISDN): It has a transfer rate It is capable of transferring voice and digital data
Cable Internet: It uses co-axial cables of cable TV network for data transfer. A
cable modem is used to connect cable network and computer. Its band width is about 10Mbps.
3). Digital Subscriber Line( DSL): It uses telephone line to transfer data and
voice. Commonly it uses Asymmetric Digital Subscriber Line(ADSL) technology
to allow a speed up to 24 Mbps.
4). Leased Line: It is a dedicated line used to transfer data with speed up to 100
Mbps.
5). Fibre To The Home(FTTH): It uses optical fiber from ISP to users home. By
using light signals , it has a very high band width.
A Network Terminal Unit(NTU) is installed at homes which connect
computers through FTTH Modem.
c). Wireless Broadband connectivity:
1). Mobile Broadband: It used in mobile devices like mobile phone, tablets etc in
which modem is built in or USB dongle is used. It allows freedom to use internet
on move. It uses cellular network to data transfer. Its speed increases with
generations like 2G, 3G, and 4G.
2).Wi-MAX:Worldwide interoperability for MicrowaveAccess combines the benefits of
wireless and broadband. It has a bandwidth up to 70 Mbps to a range of 45 KM.
3). Satellite Broadband: Very Small Aperture Terminal(VSAT) dishes and transceiver
are used to communicate with satellite. A modem links the transceiver to
computer. Its speed is up to 1Gbps and is more expensive one