Professional Documents
Culture Documents
SCHOOL
CLASS : XII
COMPUTER SCIENCE
THEORY QUESTIONS
CHAPTER NAME : STRUCTURES
1. Define a structure.
Ans. A structure is a collection of variables of different data types which are
referred under one common name.
2. What is the need for structure ?
Ans. To store any information in the form of record which contains information of
different data types, the structure is used.
3. Differentiate between structure and class.
Ans.
Structure
Class
All members are public by default
All members are private by default
4. Differentiate between array and structure.
Ans.
Structure
Array
Collection of variables of different data
Collection of variables of same data
type.
type.
5. What is nested structure ? Give an example.
Ans. A structure within another structure is called nested structure.
Eg. struct date
{
int d,m,y;};
struct emp
{ int eno;
char ename[25];
date doj;};
6. How to refer the structure elements outside the structure ?
Ans. The structure elements are referred using the structure variable name followed
by the dot operator.
7. When the memory is allocated for structure ?
Ans. The memory is allocated for structure only when the variable is declared of that
type.
8. When does the structure assignment takes place ?
Ans. The structure assignment is possible only when both the sides of the
assignment operator has the variables of the same structure type.
9. What is typedef statement ? Explain
Ans. Typedef statement is used for defining an alternative name for the datatype.
typedef int a;
In this statement a is given an alternative name for int data type.
10.
What is #define ? Explain
Ans. It is used for defining constants and functions. It is a pre-processor directive.
Eg. #define p 3.14
#define str Maharishi Vidya Mandir
#define cube(a) a*a*a
11.
What is the advantage and disadvantage of using #define ?
Ans. Advantage :
When we want to make any change in the constant value we can change it only in
the statement and it will be reflected in the program which uses the value. Function
overhead is avoided in #define macro.
Disadvantage is that the function can include only one statement. Data types will
not specified any where in the statement.
12.
What is self referential structure ?
Ans. A structure which refers to itself is called self referential structure.
Eg. struct student
{
int sno;
char name[25];
float avg;
student *next;
};
CHAPTER NAME : CLASSES AND OBJECTS
1. How encapsulation is implemented in C++ ? Give an example.
Ans. Encapsulation is implemented in C++ through classes.
Eg. class item
{
int itno;
char itemname[25];
int qty;
float price;
public :
void accept();
void display();
float totcost();
};
2. Define a class and an object.
Ans. A class is a collection of objects with common characteristics and behavior. An
object is an individual entity with its own characteristics and behavior.
3. What are the ways of defining the member functions of a class ?
Ans. There are 2 ways of defining the member functions of a class.
1. The function definition can be given within the class.
2. The function definition can be given outside the class using scope resolution
operator.
4. What are access specifiers ?
Ans. Access specifiers specifies the accessibility of the members of the class.
They are private, public, protected.
Private - members can be accessed only within the class
Protected - members can be accessed within the class and by the derived class.
Public members can be accessed within the class, by the derived class and by
other functions.
5. Explain inline function .
Ans. Member functions which are defined inside the class are automatically inline.
The users can define their functions as inline by including the keyword inline before
the return type in their function header.
6. Discuss the advantages and disadvantages of inline function.
Ans. Advantage : Function overhead is avoided.
Disadvantage : Goto statements are to be avoided.
7. What is nested member function ? Give example.
Ans. A member function call given in other member function definition is called
nested member function.
Eg. class sample
{
int a,b;
public :
void Calc()
{
cout<<a+b;
}
void accept()
{
cin>>a>>b;
Calc();
}
};
8. What is a friend function ?
Ans. A non-member function given the privilege to access the private members of a
class is called a friend function.
9. Differentiate between member function and non-member function.
Member function
Non-member function
It is a member of a class
It is not a member of a class
It can access the private members of
the class.
10.
What is the purpose of the scope resolution operator ?
Ans. (i) It is used to access the global variable which has the same name as that of
the local variable.
(ii) It is used to define the member function outside the class.
11.
How the memory is allocated for objects ?
Ans. Data members occupy different memory allocation and member functions
occupy common memory allocation.
12.
13.
Why it is a bad idea to declare the data members of a class under the
public category ?
Ans. It is because the data members contain the information which has to be
protected from outside and data abstraction to be retained in the program.
14.
Ans. When the user defined constructor is not given by the user then the
compiler invokes the constructor of its class. It will be overridden by the user
defined constructor.
5. Give two situations when the copy constructor is called automatically .
Ans. (i) When any function takes an object as an argument by value.
(ii) When the function returns an object.
6. What are the two ways of calling a constructor ?
Ans. (i) implicity call - sample s;
(ii) explicit call - sample s=sample();
In explicit call to a constructor temporary instances are created. It lives in the
memory as long as the statement is executed.
7. Give the special characteristics of a constructor.
Ans. (i) Constructor does not have return type.
(ii) It cannot be static.
(iii) We cannot take the address of the constructor.
(iv) It cannot be the member of the union.
8. What is destructor ?
Ans. It is used for destroying objects created by the constructor.
9. Differentiate between constructor and destructor.
Ans.
Constructor
Destructor
It is used for creating objects
It is used for destroying objects
It can take arguments
It cannot take arguments
It is labelled with the class name
It is labeled with the tilde symbol and
the class name
10.What are temporary instances or anonymous objects ?
Ans. It is a temporary object that lives in the memory as long as the statement
gets executed. It is created when an explicit call is made to a constructor.
11. Give any two characteristics of a destructor.
Ans. (i) it doesnt take any arguments.
(ii) it is used for destroying objects.
12. Give the order of constructor and destructor invocation in a nested class.
Ans. First the constructors of the classes used inside a class will be called and the
classs constructor. Destructor invocation is just the opposite of the constructor
invocation.
1. Define Inheritance.
Ans. The capability of one class to inherit the properties and behavior of another
class is called inheritance.
2. Give the advantages of inheritance.
Ans. (i) Closest to the real world.
(ii) reusability
(iii) transitive nature of inheritance.
3. What are the types of inheritance ?
Ans. (i) Single (ii) Multiple (iii) Multi-level
class A
{
int a;
public :
A(int x)
{
a=x;
}
};
class B :public A
{
int b;
public :
B(int x,int y):A(x)
{
b=y;
}
};
8. What are virtual base classes ?
Ans. Base classes which helps us to avoid two copies of the base classes in the
derived classes are called as virtual base classes.
9. Discuss some facts about inheritance.
Ans. (i) When the global variable, the base class member and the derived class
member is with the same name, the global variable is hidden. To access the
global variable the ::SRO is used. To access the base class member base class
name::variable name is used.
(ii) We cannot deny the access to certain data members.
Eg.
class A
{
public :
int x; };
class B : public A
{
A::x; };
By default as per the public derivation public goes public. But we have made the
x to be in private of derived class which is not possible.
10. Explain constructors in nesting of classes.
Ans. In nested classes the constructors of the inner classes will be called first
and then the outer class.
class A
{
int x;
public :
A(int);
};
class B
{int y;
public :
B(int);
};
class C
{
A a1;
B b1;
public :
C(int m,int n):a1(m),b1(n)
{
}
};
CHAPTER NAME : DATA FILE HANDLING
1. Define a file.
Ans. It is a collection of related information.
2. What is a stream ?
Ans. It is a collection of bytes.
3. Name the streams associated with file related operations.
Ans. Input stream and output stream.
4. Name the stream classes associated with file related operations.
Ans. ifstream, ofstream and fstream.
5. Which header file is used for file related operations ?
Ans. fstream.h
6. Differentiate between text and binary file.
Text file
Binary file
It stores information in ASCII
It stores information as block of data or
characters.
records.
Character translation takes place.
Character translation does not take
place.
7. What are the ways of opening files ?
Ans. There are 2 ways of opening files. They are (i) using constructor and (ii)
using open function.
8. Differentiate between opening files using constructor and open().
Using constructor
Using open()
To open multiple files in succession
To open multiple files in succession
using the same object, constructor will using the same object, the open() can
not work because the object has to be
be used.
created.
Ios::app
The file pointer will be positioned at the
end of the file and insertion can take
place from the end.
Associated with ofstream
10.Differentiate between ios::out and
Ans.
Ios::app
Helps us to add the contents to the file
without erasing the existing content
Ios::ate
The file pointer will be positioned at the
end of the file whereas the insertion can
take place anywhere in the file.
Associated with ofstream and ifstream
ios::app
Ios::out
Helps us to overwrite the contents of
the file.
seekg()
Seekg()
Moves the get pointer to the respective
location for reading.
10.
What is a null pointer ?
Ans. A pointer variable which is initialized to NULL is called null pointer.
11.
Name the operations performed using pointers.
Ans. Increment and decrement operations and assignment.
12.
11.
What are the conditions for applying union operation ?
Ans. 1. The relations must be of the same degree.
2. One tuple should be in common in the relations.
CHAPTER NAME : SQL
1. What is SQL ?
Ans. SQL is structured Query Language it is a language which is used to create
and operate on relational databases. It was developed at IBMs San Jose Research
Laboratory.
2. What is DDL, DML ?
Ans. DDL is Data Definition Language has commands for designing the relation
structure.
DML - Data Manipulation Language has commands for operating on the
records/tuples in the relation.
3. What is a constraint ?
Ans. It is a condition to check on a field/attribute.
10.
Differentiate between alter table and update command.
Ans. Alter table will alter only the design of the table.
Update command is used to update the values in the records.
Ans. (i) Circuit switching The physical connection is established between the
source and the destination computer and then the datas are transmitted. It is used
when end-to-end path between the computers is needed.
(ii) Message switching It uses the technique of store and forward. The data are
sent from the source computer to the switching office and then to the destination
computers. In this technique the data are stored in the disk. There is no limit on the
block size of the data.
(iii) Packet switching The data is divided into different packets in this technique.
Packet means the datas are divided into byte format. All the packets of fixed size are
stored in the main memory. It places a tight upper limit on the block size.
12.
Define transmission media or communication channel.
Ans. It means connecting cables or connecting media in a network.
13.
What are the types of communication media ?
Ans. The communication media is categorized as guided media and unguided media.
(i)
Guided media includes cables and (ii) unguided media include waves
through air, water or vacuum.
14.
What are the types of guided media.
Ans. The types of guided media are
(i)
Twisted pair cable
(ii)
Co-axial cable
(iii)
Fibre optic cable
15.
What is twisted pair cable ?
Ans. The twisted pair cable consists of two identical wires wrapped together in a
double helix. The twisting of wires reduces crosstalk, which is the bleeding of signal
from one wire to another which in turn can cause network errors.
16.
List out the advantages and disadvantages of twisted pair cable .
Ans. Advantages :
1. It is easy to install and maintain.
2. It is very inexpensive.
Disadvantages :
1. It is incapable of carrying a signal over long distances without using the
repeaters.
2. It supports maximum data rates of 1 Mbps without conditioning to 10 Mbps with
conditioning.
17.
List out the types of twisted pair cable.
Ans. 1. Unshielded twisted pair cable
2.Shielded twisted pair cable.
18.
Ans.
Mbps
while
19.
What is coaxial cable ?
Ans. Coaxial cable consists of a solid wire core surrounded by one or more foil or
wire shields, each separated by an insulator. The inner core carries the signal and
the shield provide the ground. It is widely used for television signals which supports
high speed communication.
20.
List out the advantages and disadvantages of coaxial cable .
Ans. Advantages :
1. Offer high bandwidth upto 400 Mbps.
2. It can be used for broadband transmission.
Disadvantages :
1. Expensive when compared to twisted pair.
2. It is not compatible with twisted pair.
21.
List out the types of coaxial cable.
Ans. 1. Thicknet : This type of cable can be upto 500 mts long.
2.Thinnet : This type of cable can be upto 185 mts. Long.
22.
What is optical fibre ?
Ans. Optical fibres consists of thin strands of glass that carry light from a source at
one end of the fiber to a detector at the other end. The fiber optic cable consists of 3
pieces : (i) the core the glass or plastic through which the light travels. (ii) the
cladding which is the covering of the core which reflects light back to the core and
(iii) protective coating - which protects the fiber cable from hostile environment.
23.
List out the advantages and disadvantages of fibre optic cable .
Ans. Advantages :
1. It is immune to interference either magnetic or electrical.
2. It supports secured transmission and a very high transmission capacity.
Disadvantages :
1. Installation is very hard.
2. They are most expensive.
24.
What is microwave transmission ?
Ans. The microwave transmission are used to transmit without the use of cables. It
consists of a transmitter, receiver and the atmosphere. Parabolic antennas are
mounted on towers to send a beam to other antennas ten kms away. The higher the
tower, the greater the range. When the radio wave frequency is higher than 3 GHz it
is named as microwave.
25.
List out the advantages and disadvantages of microwave transmission.
Ans. Advantages :
1. It offers freedom from land acquisition rights that are required for laying,
repairing the cables.
2. It has the ability to communicate over oceans.
Disadvantages :
1. It is an insecure communication.
2. The cost of design, implementation and maintenance is high.
26.
What is radio wave transmission ?
Ans. The transmission making use of radio frequencies is termed as radio wave
transmission. It has two parts : the transmitter and the receiver. The transmitter
takes the message and encodes it onto a sine wave and transmits it with radio
waves. The receiver receives the radio waves and decodes the message from the
sine wave it receives. Both of them uses antennas to radiate and capture the radio
signal.
27.
List out the advantages and disadvantages of radiowave transmission.
Ans. Advantages :
1. It offers mobility.
2. It offers ease of communication over difficult terrain.
Disadvantages :
1. It is an insecure communication.
2. It is susceptible to weather conditions.
28.
What is satellite means of communication ?
Ans. Satellite communication is a special way of microwave relay system. In this
communication, the earth station consists of a satellite dish that functions as an
antenna and the communication equipment to transmit and receive the data from
satellites passing overhead.
29.
List out the advantages and disadvantages of satellite transmission.
Ans. Advantages :
1. The area coverage through satellite transmission is large.
2. The heavy usage of intercontinental traffic makes the satellite commercial
attractive.
Disadvantages :
1. The high investment cost.
2. Over crowding of available bandwidths due to low antenna gains.
30.
Explain other unguided media .
Ans. (i) Infrared : This type of transmission uses infrared light to send data. Eg. TV
remotes. It offers secured transmission.
(ii)
Laser : The laser transmission requires direct line-of-sight. It is
unidirectional and it transmits data at a higher speed than microwave.
31.
(i)
(ii)
kHz kilohertz
MHz - Megahertz
GHz - gigahertz
THz - Terahertz
33.
What are the types of network ?
Ans. (i) LAN Local Area Network(ii) MAN Metropolitan Area Network
(iii)WAN Wide Area Network
34.
Explain the types of network .
Ans. (i) LAN Small computer networks that are limited to a localized area is known
as LAN.
(ii)MAN The network which is spread over a city is called MAN.
(iii)WAN The network which is spread across countries and continents is called WAN.
35.
LAN
Diameter is not more than a few
kilometers
Very low error rates
WAN
Span across countries and continents.
Higher error rates.
36.
What is topology ?
Ans. The layout of the computers on the network is called topology.
37.
List out the different types of topology.
Ans. (i) Star
(ii) bus
(iii) ring
(iv) Tree
(v) graph
(vi) Mesh
38.
What is star topology ? List out the advantage and disadvantage of it.
Ans. Star topology consists of a central node to which all other nodes are connected.
Advantage :
1. Centralized control
2. One device per connection failure of one node will
not affect the network.
Disadvantage :
39.
What is bus topology ? List out the advantage and disadvantage of it.
Ans. It is linear topology which consists of a single length of the transmission
medium onto which the various nodes are connected. The bus has terminators at
both the ends which absorb the signal, removing it from the bus.
Advantage :
1. Short cable length
2. Resilient architecture means which has a single
cable through which all the datas are transmitted.
Disadvantage :
1. Fault diagnosis is difficult
2. Fault isolation is difficult if a node is not
working in the bus it has to be rectified at the point where the node is connected.
40.
What is ring topology ? List out the advantage and disadvantage of it.
Ans. Nodes are connected in a circular fashion. The data can be transmitted in only
one direction.
Advantage :
1. Short cable length.
2. No wiring closet space is required Since there is
only one cable connecting each node to its neighbouring node, no separate space
is allocated for wiring.
Disadvantage :
1. Node failure causes network failure.
2. Difficult to diagnose faults.
41.
What is tree topology ?
Ans. The shape of the network is that of an inverted tree with the central node
branching to various nodes and the sub-branching to the extremities of the network.
42.
What is graph topology ?
Ans. Nodes that are connected in an arbitrary fashion is called graph topology. A link
may or may not connect nodes.
43.
What is mesh topology ?
Ans. In this topology, each node is connected to more than one node to provide an
alternative route.
44.
Define modem.
Ans. A modem is a device which allows us to connect and communicate with other
computers via telephone lines.
MODEM MOdulator DEModulator
45.
What is RJ-45 ?
Ans. RJ-45 is Registered Jack -45. It is an eight-wire connector, which is commonly
used to connect computers on the local area networks.
46.
What is Ethernet Card ?
Ans. Ethernet is a LAN architecture which used bus or star topologies . The
computers that are part of Ethernet, must have an Ethernet card. It contains
connections for either coaxial cable or twisted pair cable. Some Ethernet cards also
contain an AUI connector (ie. Attachment Unit Interface 15 pin connector that can
be used for attaching coaxial, fibre optic or twisted pair cable).
47.
Ans. A hub is a device used to connect several computers together. Hub is also
referred as multi-slot concentrator.
Hub can be classified as active and passive hub.
(i)
Active hubs : These electrically amplifies the signal as it moves from one
connected device to another.
(ii)
Passive hubs : It allows the signal to pass from one computer to another
without any change.
48.
What is a switch ?
Ans. A switch is a device that is used to segment networks into different
subnetworks called subnets or LAN segments. It prevents the traffic overloading in a
network. It can filter traffic in the network.
49.
What is a repeater ?
Ans. A repeater is a device which is used to amplify the signals being transmitted in
a network.
50.
What is a bridge ?
Ans. A bridge is a network device that connects two similar networks which supports
the same protocol.
51.
What is a router ?
Ans. A router is a network device that connects networks which supports different
protocols.
52.
What is a gateway ?
Ans. It is a device that connects dissimilar networks.
53.
What is a protocol ?
Ans. It is a formal description of message formats and the rules to be followed for
communication in a network.
54.
Expand and explain the following protocols.
Ans. 1. HTTP Hyper Text Transfer Protocol is an application level protocol used
for distributed, collaborative, hypermedia information systems.
2. FTP File Transfer Protocol is a protocol used for transferring files from one
system to another.
3. TCP/IP Transmission Control Protocol/Internet Protocol It is a protocol used
for sending and receiving messages which are divided into packets.
4. SLIP Serial Line Internet Protocol It was the first protocol for relaying IP
packets over dial-up lines. This doesnt support dynamic address assignment.
5. PPP Point to Point Protocol - It is the Internet Standard for transmission of IP
packets over serial lines. It is a layered protocol which contains Link Control
Protocol (LCP) for link establishment, Network Control Protocol (NCP) for
transport traffic, IP Control Protocol (IPCP) permits the transport of IP packets
over a PPP link.
55.
What is Datagram ?
Ans. A Datagram is a collection of the data that is sent as a single message.
56.
What is Wireless communication ?
Ans. Wireless refers to the method of transferring information between a computing
device and a data source without a physical connection. It is a data communication
without the use of landlines. Eg. two-way radio, fixed wireless, laser or satellite
communications. The computing device is continuously connected to the base
network.
57.
What is Mobile computing ?
Ans. Mobile computing device means that the computing device is not continuously
connected to the base or central network. Eg. PDA, laptop computers, cell phones.
These products may communicate with the base location with or without wireless
connection.
58.
What is GSM ?
Ans. GSM stands for Global System for Mobile Communications. In covered areas,
cell-phone users can buy one phone that will work anywhere where the standard is
supported. GSM users simply switch SIM cards. (Subscriber Identification Module).
GSM uses narrowband TDMA, which allows eight simultaneous calls on the same
radio frequency.
59.
What is TDMA ?
Ans. TDMA means Time Division Multiple Access is a technology which works on
dividing a radio frequency into time slots and then allocating slots to multiple calls.
60.
What is SIM ?
Ans. SIM stands for Subscriber Identification Module which is a chip that gives a
cellular device a unique phone number. It has the memory, the processor and the
ability to interact with the user. Current SIMs have 16 to 64 kb of memory.
61.
What is CDMA ?
Ans. CDMA stands for Code Division Multiple Access is a technology which uses a
spread spectrum technique where the data is sent in small pieces over a number of
discrete frequencies available for use. Each users signal is spread over the entire
bandwidth by unique spreading code and at the receiver end the same unique code
is used to recover the signal.
62.
What is WLL ?
Ans. WLL is Wireless in Local Loop is a system that connects subscribers to the
Public Switched Telephone Network (PSTN) using radio signals as a substitute for
other connecting media.
63.
Discuss the advantages of WLL ?
Ans. (i) It does not suffer from weather conditions.
(ii)It offers better bandwidth than the traditional telephone systems.
(iii)
It supports high quality transmission, signaling services.
64.
What is 3G and EDGE ?
Ans. 3G stands for Third Generation also called as UMTS ( Universal Mobile
Telecommunication Systems) is a broadband, packet- based transmission of text,
digitized voice, video and multimedia at data rates upto and possibly higher that 2
mbps (mega bits per second), offering consistent services to mobile computer and
phone users where ever they are in the world.
EDGE stands for Enhanced Data Rates for Global Evolution is a radio based highspeed mobile data standard. It allows data transmission speeds of 384 kbps to be
achieved when all eight time slots are used.
65.
Define SMS.
Ans. SMS Short Message Service is the transmission of short text messages to and
from a mobile phone, fax machine and/or IP address.
66.
How the SMS is being sent ?
Ans. Once the message is sent by the sender, it is received by the Short Message
Service Center (SMSC), which will get into the appropriate mobile phone. To do
this,the SMSC sends the SMS Request to the Home Location Register (HLM) to find
the roaming customer. Once the HLR receives the request, it will respond to the
SMSC with the subscribers status : (i) inactive or active, (ii) where subscriber is
roaming.
67.
What is e-mail ?
Ans. E-mail is Electronic mail is sending and receiving messages by the computer.
68.
List the advantages of E-mail.
Ans. (i) low cost (ii) speed (iii) waste reduction (i.e. paper) (iv) ease of use (v)
record maintenance .
69.
What is Voice mail ?
Ans. The voice mail refers to e-mail systems supporting audio. Users can leave
spoken messages for one another and listen to the messages by executing the
appropriate command in the e-mail system.
70.
What is chat ?
Ans. Online textual talk in real time is called chatting.
71.
What is video-conferencing ?
Ans. A two-way videophone conversation among multiple participants is called
video- conferencing. Eg. Microsoft NetMeeting is the software which supports videoconferencing.
72.
Define the following terms :
Ans. (i) WWW - World Wide Web is a set of protocols that allows the user to access
any document on the internet through a naming system based on URL.
(ii) URL Uniform Resource Locator is the distinct address for each resource on the
internet, which acts a pointer to information on the WWW.
(iii)Domain Name The characters based naming system by which servers are
identified is known as Domain Naming system. Eg. .com, .gov, .edu
(iv)
(v)
(vi)
(vii)
(viii)
(ix)
73.
Give the types of Web Hosting .
Ans. (i) Free Hosting (ii) Virtual or Shared Hosting (iii) Dedicated Hosting (iv) Colocation Hosting.
74.
Define the following :
Ans. (i) HTML - Hyper Text Markup Language It is a document layout and
hyperlink specification language which contains pre-defined tags that let us control
the presentation of the information on the web-pages. It supports only static
webpages.
(ii) XML Extensible Markup Language It is a language for documents containing
structured information ie. Which contains both content and some indication of what
role that content plays. The tags are not predefined and it allows the user to define
the tag and their semantics. It supports dynamic web pages.
(iii)DHTML Dynamic Hyper Text Markup Language The language which uses the
combinations of HTML, style sheets and scripts that allows documents to be
animated.
(iii)
(iv)
(v)
Types of Script :
(i) Client Side Script : This type of scripting enables interaction within a web
page. They are browser dependent. Popular Client side scripting are VBScript,
JavaScript, PHP (Hyper Text Preprocessor).
(ii) Server-Side Script : This type of scripting enables the completion or carrying
out a task at the server- end and then sending the result to the client-end.
Popular server side scripting are PHP,ASP (Active Server Pages), JSP (Java Server
Pages).It is not browser dependent.
75.
What are the problems encountered under network security ?
Ans. It can be classified as (i) Physical Security holes
(ii) Software security holes (iii) Inconsistent Usage holes
76.
What are the protection methods followed to secure the network ?
Ans. (i) Authorization login-id
(ii) Authentication password-protection
(iii)Encrypted Smart Cards It is a hand held card that can generate a token that a
computer can recognize. Everytime a new and different token is generated.
(iv)
Biometric systems finger-prints
(v)
Firewall It is a system designed to prevent unauthorized access to or
from a private network. It can be implemented in both hardware and
software.
77.
Give the types of firewall techniques.
Ans. (i) Packet filter (ii) Application gateway (iii) Circuit-level gateway (iv) Proxy
server.
78.
What are cookies ?
Ans. Cookies are messages that a web server transmits to a web browser so that the
web server can keep track of the users activity on a specific web site.
79.
Differentiate between Hackers and Crackers.
Ans. The Crackers are the malicious programmers who break into secure systems.
The Hackers are more interested in gaining knowledge about the computers and
possibly using this knowledge form playful pranks.
80.
What is Cyber Law ?
Ans. It is a term which refers to all the legal and regulatory aspects of internet and
the world wide web. Information Technology Act, 2000 is based on the United
Nations Commission for International Trade related laws(UNCITRAL) model law.
81.
Explain Cyber Crime ?
Ans. Cyber Crime are the crimes committed with the use of computers or relating to
computers, especially through the internet.
Classification of Cyber Crime :
(i)
Tampering with the computer source documents
(ii)
Hacking
(iii)
Publishing of information, which is obscene in electronic form
(iv)
Child Pornography
(v)
Accessing protected system
(vi)
Breach of confidentiality and privacy
82.
What is IPR ?
Ans. The Intellectual Property may be defined as a product of the intellect that has
commercial value, including copyrighted property such as literary or artistic works
and ideational property.
83.
Ans. Computer virus is a malicious program that requires a host and is designed to
make a system sick.
84.
List out the damages that the virus can cause.
Ans. (i) to make the system unstable.
(ii) destroy file allocation table.
(iii)can create bad sectors in the disk, destroying parts of programs and files.
(iv)can destroy specific executable files.
(v) Can cause the system to hang.
85.
What is Trojan Horse ?
Ans. A Trojan Horse is code hidden in a program such as a game or spreadsheet that
looks safe to run but has hidden side effects.
86.
What is a worm ?
Ans. A worm is a program designed to replicate.
87.
What is SPAM ?
Ans. SPAM refers to electronic junk mail or junk newsgroup postings. It is the
unsolicited usually commercial e-mail sent to a large number of addresses.
88.
Discuss the ways of avoiding Spam.
Ans. (i) to create a filter that finds and does something to email that you suspect as
spam. (ii) Not to register with true id on the internet.
89.
How to prevent viruses ?
Ans. The following are the points that we must remember to follow to prevent
viruses : 1. Use Licensed software.
2. Install and use antivirus software.
3. Check for virus when using secondary storage devices in the system.
4. Keep antivirus software up to date.
5. Always scan files downloaded from the internet or other sources.
101. What is meant by GPRS?
General Packet Radio Service, a standard for wireless communications which
supports a wide range of bandwidths. it is a second generation (2G) and third
generation (3G) wireless data service that extends GSM data capabilities for Internet
access, multimedia messaging services, and early mobile Internet applications via
the wireless application protocol (WAP), as well as other wireless data services.
102. Explain 1G.
1G (or 1-G) refers to the first-generation of wireless telephone technology. These are
the analog telecommunications standards that use digital signaling to connect the
radio towers (which listen to the handsets) to the rest of the telephone system, the
voice during a call is is modulated to higher frequency, typically 150 MHz and up.
103. Explain 2G.
2G (or 2-G) is short for second-generation wireless telephone technology. 2G cellular
telecom networks were commercially launched on the GSM standard and were
significantly more efficient on the spectrum allowing for far greater mobile phone
penetration levels. 2G technologies can be divided into TDMA-based and CDMA-based
standards depending on the type of multiplexing used.