Professional Documents
Culture Documents
TECHNOLOGY
10
SOLUTION
Contents
1. The Internet 1
4. Database Queries 21
8. Introduction to XML 46
1
8. Internet is
a. a local computer network b. a world wide network of networks
c. a world wide Interconnected d. all of these
network of computers which
use a common protocol to
communicate with one another
Ans. b. a world wide network of networks
9. Each computer connected to the Internet must
a. be a Pentium machine b. have a unique IP address
c. have a web browser d. have a modem connection
Ans. b. have a unique IP address
10. World Wide Web
a. is another name for internet b. world wide connection for computers
c. a collection of worldwide d. a collection of linked information residing
information on computers connected by the internet
Ans. d
11. A web page is located using a
a. Universal Record Linking b. Uniform Resource Locator
c. Universal Record Locator d. Uniformly Reachable Links
Ans. b. Uniform Resource Locator
The Internet 3
7. State the significance of IP Address in a network.
Ans. An IP Address is a group of numbers separated by full stops that identifies each computer using
the Internet Protocol to communicate over a network. Therefore an Internet Protocol address
governs online communication by identifying both initiating devices and various Internet
destinations, thereby making two-way communication possible.
8. Give the general syntax of an URL. Also explain each of its component.
Ans. The general form of a URL syntax is as follows:
Protocol://domain name/<directory path>/<object name>
For example:
https://www.openoffice.org/why/why_compliance.html
9. State one use of each of the following protocols:
a. HTTP
b. FTP
Ans.
a. HTTP: HTTP is a protocol used to transfer data over the World Wide Web.
b. FTP: FTP is a protocol to download/uploads a file from a server using the Internet or to upload
a file to a server.
10. Explain the significance of the text before and after @ an email address.
Ans. An email address, for example, Anubhav.sharma@example.com is made up of a user-name
(Anubhav.sharma), a @ symbol, then a domain part (example.com). The domain part is not
case-sensitive, but the user-name may be. In practice, the mail framework at example.com may
decide to treat Anubhav.sharma as equal anubhav.sharma or even anubhavsharma.
ail frameworks regularly constrain their user’s decision of name to a subset of technically
M
characters and may sometimes additionally restrict which addresses it is conceivable to send
mails to.
The Internet 5
5. S ulekha has heard the term URL and IP address. But she does not understand the difference
between the two. Explain her the difference with examples.
Ans. The difference between URL and IP address are:
1. An IP address just specifies the location while a URL specifies location, protocol, and specific
resource
2. RL requires a DNS server while an IP address doesn’t
3. RLs are unlimited while IP addresses are limited
4. IP addresses and URLs have a one to many relationship
6. ABC company a news company wants to setup a web-site which will bring information from
diverse sources in a uniform way. What should the company build a) web server or b) Web
portal? Explain with reasons.
Ans. Web servers are computers that deliver (serves up) Web pages whereas a Web portal is a
specially designed website that brings information from diverse sources, like emails, forums
and search engines, together in a uniform way. Thus for the company the web portal would be
more preferable.
7
8. Which of the following would you use to find people over the Internet?
a. Search on Google. b. Search on Social Networking Sites.
c. Search on Blogs d. All of these
Ans. d. All of these
9. Which among the following web services is required by students for learning?
a. E-Banking b. E-Commerce
c. E-Shopping d. E-Learning
Ans. d. E-Learning
10. Which among the following statements is true with respect to E-Shopping?
a. Talking about a product in a social networking site.
b. Search for book using a search engine.
d. Download a free book available over a public domain.
e. Buy or sell products online.
Ans. e. Buy or sell products online.
11. Name the popular service used for booking a seat in railways at the comfort of your home.
a. E-Commerce b. E-Banking
c. E-Reservation d. E-Learning
Ans. c. E-Reservation
Disadvantages
1.
2.
3.
Ans.
Advantages
1. Easy Start: It is easy to start a business, as the initial cost involved is low.
2. Round the Clock Services: Allows 24x7 services.
3. H
elp Comparison: The digital middleman model allows consumers to compare products of the
same category before buying.
Disadvantages
1. You need to be very careful when shopping online. Before purchasing a product from such sites
you need to check for its authenticity. There are few fraudulent site which may get easy access
to your user id and password of your net banking account or debit card or credit card.
2. There may be hackers who might hack into your account and misuse it.
3. Since you are buying a product online, the product might not be physically same as seen in the
image. This might lead to dissatisfaction among online shoppers.
7. M
rs Sudha a retail manager at New York who is always in move and hardly gets time to meet
his friends and cousins.
a. Suggest a method by which he will be able to connect to his friends without compromising
her time.
b. Suggest at least three examples of such sites.
Ans.
a. Mrs Sudha may use the Social Networking Websites for connecting with her friends.
b. Examples: Myspace, Friendwise, Friendfinder, Yahoo! 360, Facebook, Orkut and Classmates.
Internet and Web Services 13
3
Database Management Tool
A. MCQs.
1. OpenOffice Base is a _______________ package.
a. Word Processor b. Spreadsheet
c. Graphics d. Database
Ans. d. Database
2. Which among the following is not possible in DBMS?
a. The ability to update and retrieve data. b. Recovery of Data
c. Support Concurrent Updates d. Create different charts.
Ans. d. Create different charts.
3. Which among the following is used to uniquely identify a record?
a. Primary Key b. Candidate Key
c. Alternate Key d. Degree Key
Ans. a. Primary Key
4. The candidate key that do not form the primary key is called the _____________.
a. Primary Key b. Candidate Key
c. Alternate Key d. Degree Key
Ans. c. Alternate Key
5. The DBMS that forms the part of OpenOffice package is:
a. OpenOffice Writer b. OpenOffice Calc
c. OpenOffice Impress d. OpenOffice Base
Ans. d. OpenOffice Base
6. Which of the following is the extension of OpenOffice database?
a. .base b. .dbms
c. .odb d. .dbf
Ans. c. .odb
7. It is the left pane of OpenOffice window is called the ________________:
a. Objects Pane b. Database Pane
c. OpenOffice Writer Main window d. Forms Pane
Ans. b. Database Pane
14
8. Which of the following object cannot be created in the Database Pane?
a. Tables b. Forms
c. Queries d. Fields
Ans. d. Fields
9. N
ame the object of a database that gives a windowed interface that you can create to manage or
manipulate data in a table or group of tables.
a. Tables b. Forms
c. Queries d. Reports
Ans. b. Forms
10. Which among the following is true for registered database?
a. It allows the database to be a data source for other OpenOffice packages.
b. It does not allow the database to be modified after creation.
c. It does not allow report to be created.
d. It does not allow queries to be created.
Ans. a. It allows the database to be a data source for other OpenOffice packages.
Table Teachers
Tno Name Address PhoneNo Salary
Table: Purchase
Field Name Field Type Description
PID CHAR To store the product id of the product being purchased.
DOP DATE To store the date of purchase.
QTY INT Quantity purchased.
PRICE FLOAT Price at which the product is purchased.
REMARKS VARCHAR Comments if any for the transaction
Database Queries 23
8. State any one method of executing a Query.
Ans.
a. Open the database for which you want to create the query.
b. Click on Queries object on the Database Pane and double-click on the query.
9. State the process of editing a Query.
Ans. The following steps are used for editing a Query:
1. From the Database window click on the Queries object, which in turn displays the queries in
the Objects Pane.
2. From the Objects Pane right-click on it and select the Edit option, which in turn displays the
Query in Design View.
3. You can now make any changes to the Query design here.
10. State the difference between AND criteria and OR criteria.
Ans. T he AND criteria is used when there are multiple conditions, but all need to be satisfied for the
resultant to be true. The OR criteria on the other hand is used with multiple conditions, but only
one condition needs to be satisfied for the resultant to be true.
Database Queries 25
5
Introduction to Web Page Designing Using HTML
A. MCQs.
1. Which among the following may be used to write an HTML code?
a. Microsoft Excel b. OpenOffice Base
c. Notepad d. None of these
Ans. c. Notepad
2. Double-clicking on an HTML file will execute it in _____________.
a. Internet Explorer b. Mozilla Firefox
c. Google Chrome d. default browser
Ans. d. default browser
3. Comments in HTML are given using which tag?
a. <!-- --!> b. //
c. /* */ d. None of these
Ans. a. <!-- --!>
4. To fill up the background of a web page with a colour, which attribute of the BODY tag is used?
a. BACKGROUND b. BKGRND
c. BGCOLOR d. BG
Ans. c. BGCOLOR
5. The default colour of text in a web page is _________________.
a. BLACK b. WHITE
c. RED d. BLUE
Ans. a. BLACK
6. The default colour of unvisited link is _________________.
a. GREEN b. RED
c. PURPLE d. BLUE
Ans. d. BLUE
7. T he _____________attribute of the BODY tag is used to specify the amount of space that you
leave from the top of the web page.
a. TOPMARGIN b. ABOVEMARGIN
c. TOP d. UP
Ans. a. TOPMARGIN
26
8. Empty tags do not have a _________________.
a. Angular bracket <> b. Closing tag
c. Anchor element d. all of these.
Ans. b. Closing tag
9. The Quick Key combination _________________ is used to open a web page.
a. Ctrl+P b. Alt+O
c. Ctrl+O d. none of these
Ans. c. Ctrl+O
10. Which of the following is not an attribute of the anchor tag?
a. LINK b. ALINK
c. VLINK d. XLINK
Ans. d. XLINK
11. What is the default colour of the background of a web page?
a. WHITE b. BLUE
c. GREEN d. BLACK
Ans. a. WHITE
31
8. Which of the following is not true for the <HR> tag?
a. It draws a horizontal line of certain width.
b. The default alignment of <HR> tag is CENTER.
c. The width of the horizontal rule cannot be changed.
d. The height of the horizontal rule can be changed.
Ans. c. The width of the horizontal rule cannot be changed.
9. Which of the following of the <HR> tag is used to create a horizontal rule without any shading?
a. TRANSPARENT b. SHADENO
c. NOFILL d. NOSHADE
Ans. d. NOSHADE
10. What should be the value of the ALIGN attribute that aligns both the left and right margin?
a. LEFT b. RIGHT
c. CENTER d. JUSTIFY
Ans. d. JUSTIFY
HTML stands for Hyper-Text Mark-up language. It is a computer language which is devised for
website creation. These websites can be viewed by anyone else connected to the Internet with
a browser. It was developed in the year 1990 by scientist Sir Timothy John ‘Tim’ Berners-Lee of
England.
37
8. What is the default numbering of the ordered list?
a. 1, 2, 3… b. a, b, c,…
c. i, ii, iii… d. A, B, C…
Ans. a. 1, 2, 3…
9. Which attribute of the <A> tag is used to specify a name to an Anchor?
a. HREF b. NAME
c. TYPE d. None of these
Ans. b. NAME
10. Name the attribute which you used to specify the source of an image.
a. WIDTH b. HEIGHT
c. SRC d. SOURCE
Ans. c. SRC
11. The _______________ attribute is used to specify the border colour of a table.
a. BCOLOR b. BRCLR
c. BORDERCOLOR d. BC
Ans. c. BORDERCOLOR
12. The _____________attribute of the table tag is used to specify the distance between the adjacent
cells in a table.
a. SPACE b. CS
c. CELLSPACING d. none of these
Ans. c. CELLSPACING
13. The _____________attribute of the table is used to specify the distance between the cell content
and cell boundary.
a. CELLPADDING b. CELLSPACING
c. SPACING d. CELL
Ans. a. CELLPADDING
14. Which TARGET attribute value of the anchor <A> tag is used to specify that a web page is to be
loaded in a new window?
a. _SELF b. _BLANK
c. _PARENT d. _TOP
Ans. b. _BLANK
15. If we want an image to be the hyperlink, the correct syntax is:
a. <img src=image.gif><a href=try.html>click</a>
b. <a href=try.html><img src=image.gif>click</a>
c. <a href= image.gif ><img src= try.html>click</a>
d. <img src= try.html>
Ans. b. <a href=try.html><img src=image.gif>click</a>
38 Foundation of Information Technology – X (Solution)
16. Which attribute tells how many rows a cell should span?
a. COLSPAN=n b. ROWSPAN=n
c. Both a and b d. None of these
Ans. b. ROWSPAN=n
17. What is CELLSPACING attribute of the TABLE attribute used for?
a. It is used to specify the distance between the column-heading and the first row of a column.
b. It is used to specify the distance between the cell content of two adjacent cells.
c. It is used to specify the distance between the cell content and cell boundary.
d. It is used to specify the distance between the adjacent cells in a table.
Ans. d. It is used to specify the distance between the adjacent cells in a table.
18. Which tag is used to create a title for a table?
a. <CAPTION> b. <TITLE>
c. <HEADING> d. <TABLETITLE>
Ans. a. <CAPTION>
E nsure that the background of each data cell should have the colour as specified in the
corresponding column heading.
Ans.
<TABLE>
<CAPTION>Colours</CAPTION>
<TH>RED</TH>
<TH>GREEN</TH>
Lists, Tables and Anchors in HTML 41
<TH>BLUE</TH>
<TH>ORANGE</TH>
<TH>CYAN</TH>
<TR>
<TD BGCOLOR=“RED” WIDTH=“100” HEIGHT=“50”></TD>
<TD BGCOLOR=“GREEN” WIDTH=“100” HEIGHT=“50”></TD>
<TD BGCOLOR=“BLUE” WIDTH=“100” HEIGHT=“50”></TD>
<TD BGCOLOR=“ORANGE” WIDTH=“100” HEIGHT=“50”></TD>
<TD BGCOLOR=“CYAN” WIDTH=“100” HEIGHT=“50”></TD>
</TR>
</TABLE>
MANGOES IN INDIA
Mangoes of India are well famous in the world for its sweetness, richness and flavor,
The land of India is the largest producer of mangoes and most important fruit of the
country.
46
7. Is this a well formed XML document?
<?xml version = “1.0”?>
<note>
<to age = “29”> Tove </to>
<from> John </from>
a. Yes b. No
c. Can’t say d. None of these
Ans. b.No
8. V
alidating an XML document refers to an XML document that is _____________________________.
a. well formed b. confirm to DTD
c. both a and b d. none of these
Ans. c. both a and b
9. The use of DTD in XML development is:
a. required when validating XML documents
b. no longer necessary after the XML editor has been customized
c. used to direct conversion using the XSLT processor
d. a good guide to populating a template to be filled in when generating an XML document
automatically.
Ans. a. required when validating XML documents
10. Valid XML document means
a. the document has root element
b. the document contains at least one or more root element
c. the XML document has DTD associated with it and it complies with that DTD
d. each element must nest inside any enclosing element properly
Ans. c. the XML document has DTD associated with it and it complies with that DTD
11. Which of the following XML fragments are well formed?
a. <element attribute=value>
b. <element attribute=“value”>
c. <element attribute=!value>
d. <element attribute=‘value’>
Ans. b. <element attribute=“value”>
12. XML document can be viewed in
a. word processor b. web browser
c. notepad d. all of these
Ans. d. all of these
Introduction to XML 47
13. How is an empty element defined in XML?
a. <name></name> b. <name/>
c. <name /> d. all of these
Ans. d. all of these
Introduction to XML 53
<emp>
<Name> Aditi</Name>
<Job> Designer </Job>
<Department> Marketing </Department>
<Cubicle>19T </Cubicle>
</emp>
</employee>
2. Draw the XML tree for the code given below:
<employees>
<employee sex= “male”>
<name>
<first> Harry </first>
<last> Potter </last>
</name>
</employee>
<employee sex= “female”>
<name>
<first>Linda</first>
<last> Ray </last>
</name>
</employee>
</employees>
Ans.
Attribute: “sex”
Attribute: “sex”
4. C
reate a DTD for storing book information for a library. The DTD should contain details about
each book in terms of title, author (name, nickname), no.of copies, all of which can store
character data. The no.of copies should contain two attributes named ‘inhand’ and issued
which are both mandatory.
Introduction to XML 55
Ans.
<? xml version= “1.0” ?>
<!DOCTYPE LIBRARY[
<!ELEMENT LIBRARY (BOOK+)>
<!ELEMENT BOOK (TITLE, AUTHOR+, NOC)>
<!ELEMENT AUTHOR (NAME, NICKNAME)>
<!ELEMENT TITLE (#PCDATA)>
<!ELEMENT NAME (#PCDATA)>
<!ELEMENT NICNAME (#PCDATA)>
<!ELEMENT NOC (#PCDATA)>
<! ATTLIST NOC INHAND ISSUED CDATA #REQUIRED>
]>
5. Observe the DTD below and answer the following questions:
<? xml version= “1.0” ?>
<!DOCTYPE Company[
<!ELEMENT Company (Employee+)>
<!ELEMENT Employee (FirstName, LastName, ContactNo, Email)>
<!ELEMENT FirstName (#PCDATA)>
<!ELEMENT LastName (#PCDATA)>
<!ELEMENT ContactNo (#PCDATA)>
<!ELEMENT Email (#PCDATA)>
<! ATTLIST email address CDATA #REQUIRED>
]>
a.
Name the root element of the above XML document.
b.
How many child elements are there in the above DTD? Name them.
c.
What does the ‘+’ sign after the Employee element signify?
d.
Which of the element has an attribute associated with it? Name the element and also
the attribute associated with it.
e. What is the basic difference between the keywords PCDATA and CDATA?
Ans a. Company
b. Child Element: Employee, which again contains FirstName, LastName, ContactNo and Email.
c. It signifies that the Employee occur one or more times inside the element.
d. Element: email and attribute: address
e. PCDATA stands for Parsed Character Data and XML parsers normally parse all the text in an
XML document.
DATA - (Unparsed) Character Data is used about text data that should not be parsed by the
C
XML parser.
57
8. A
hardware or a software that filters the data that enters a system when connected to a network
is called:
a. Filter b. Encoder
c. Firewall d. Decoder
Ans. c. Firewall
9. Which among the following is not a Social Networking site?
a. Facebook b. Google+
c. Twitter d. Rediffmail
Ans. d. Rediffmail
10. Which among the following refers to the act of copying copyrighted material?
a. Hacking b. Cracking
c. Piracy d. Phising
Ans. c. Piracy
The virus is the program code that attaches The worm is code that replicate itself in order
itself to application program and when to consume resources to bring it down.
application program run it runs along with it.
It has to rely on users transferring infected It can use a network to replicate itself to other
files/programs to other computer systems. computer systems without user intervention.
Infection effect may lead to deletion or Infection usually do not lead to deletion or
modification of files. Sometimes a virus also modification of files but only monopolize the
changes the location of files. CPU and memory.
The infection speed of virus is slower than Infection speed of worm is faster than virus.
worm. E.g. The code red worm affected 3 lack PCs in
just 14 Hrs.
Security Issues of IT 59
4. State any three ways through which a computer gets infected.
Ans. The three ways in which a virus can spread in a computer are:
• A virus can spread if you are using an infected media like Pen drives, CD, DVD, etc, which may
have itself got infected from some other computer.
• Certain virus may attach itself to other software thus every time you run the software, the
virus replicates by attaching itself to other software.
• Your computer may get infected when you boot your computer using an infected media.
5. What is a Boot Sector virus? Give two examples.
Ans. A
boot sector virus is a computer virus that infects a storage device’s (usually hard disk) master
boot record (MBR). Thus the infected computer is unable to boot.
Example- Brain and Michelangelo
6. How are File viruses different from Macro Viruses?
Ans. File Virus or Parasitic Virus attaches itself to an arbitrary file. Therefore whenever the host file
gets executed the virus also gets executed. Macro Viruses on the other hand uses a programming
language embedded in certain software. Thus a document having the macro virus when opened
gets the macro virus executed.
7. Write short notes on:
a. Multipartite Virus
b. Polymorphic Virus
c. Stealth Virus
Ans.
i. Multipartite viruses infect both hard disk sectors along with the executable files. That is why
it is also called multipartite or hybrid virus. These viruses has complex mode of replicating
itself making it difficult to remove. Emperor, Tequilla and Natas are some examples of these
viruses.
ii. Polymorphic viruses have the capability of changing itself after infecting a computer. Thus
copies of viruses that are present in the computer may be slightly different from each other,
which make it difficult for anti-virus software to detect and remove it. Satan Bug, Elkern and
Proud are some examples of these viruses.
iii. Stealth viruses are made in such a way that makes it almost impossible to detect. Even if
they attach itself to a program, the program may appear normal, thus remaining undetected
by any anti-virus software. Whale and Zer Bug are some examples of stealth viruses.
8. What is a Spamming? State different ways of stopping spamming.
Ans. Spamming refers to the use of electronic messaging systems to send unwanted bulk messages
(spam), especially advertising, indiscriminately. The most widely recognized form of spam
is e-mail (electronic mail) spam. However the term is also applied to similar abuses in other
media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in
blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum
spam, junk fax transmissions, social networking spam, social spam, television advertising and
file sharing spam.
60 Foundation of Information Technology – X (Solution)
S pamming remains economically viable because advertisers have very little or sometimes no
operating costs beyond the management of their mailing lists, and it is almost impossible to
hold senders accountable for their mass mailings. On the other hand it costs huge to the sender
and may sometime even get dubbed.
9. What is Spyware?
Ans. Spyware programs secretly gather information from the computer it has infected and transmit
the information to a different location. It may be used for identifying user habits and post
advertisements accordingly or sometimes even vital information like username or passwords
may be transmitted.
10. What is an Anti-Virus Software? Explain three options that you generally get with an Anti-Virus
software.
Ans. Antivirus software is used to remove viruses and other malware programs from your computer.
It uses two of these techniques to secure your computer.
• Scan files for known viruses that match with the virus definition list that is built within it.
But this requires you to continuously update your antivirus software to add new definition
to the list. Otherwise your antivirus software goes obsolete and will not be able to remove
newer viruses.
• Identifies suspicious behavior of a computer program that may had been infected.
The three options that you generally get with an Antivirus Software are:
• Fix: It cleans a file that is infected with a virus.
• Quarantine: Certain virus may be too difficult to be removed completely, this virus are
disabled and kept in a safe place so that it cannot infect other files.
• Delete: It deletes an infected file along with the virus. Since this option also deletes the
original file which got infected, it should only be used when the previous two options do not
work.
11. What does the term Backup mean? Name the different types of Backups.
Ans. B
ackup is the action of duplicating documents or databases with the goal that they will be
protected if there should arise an occurrence of equipment failure or other calamity. Backup is
typically a routine piece of the operation of huge organizations with centralized servers and also
the administrators of more diminutive business machines.
12. How is incremental backup different from differential backup?
Ans. Incremental Backup creates copies of all the files, or parts of files that have changed since
previous backups of any type (full, differential or incremental).
F or example if you did a full backup on Sunday. An incremental backup made on Monday, would
only contain files changed since Sunday, and an incremental backup on Tuesday, would only
contain files changed since Monday, and so on.
ifferential Backup on the other hand looks at which files have changed since you last did a full
D
backup. Then creates copies of all the files that are different from the ones in the full backup.
If you do a differential backup more than once, it will copy all the files, or parts of files that
Security Issues of IT 61
have changed since the last full backup, even if you already have identical copies of those files
in a previous differential backup. For restoring all the data, you will only need the the last full
backup, and the last differential backup.
13. Write short notes on:
a) Software Piracy
b) Cybercrime
Ans.
i. The activities involving unauthorized copying, reproduction, use, or manufacture of software
products is called software piracy. Most retail programs are licensed in such a way that it
may be used at just one computer or for use by only one user at any time. Whenever you
buy a software, you become a licensed user rather than an owner and therefore you are
only allowed to make copies of the program for backup purposes, but cannot give copies to
friends and colleagues, which is against the law.
ii. Cybercrime is a term which is used to refer to criminal activity performed using computers
and the Internet. This may include instigating or intimidating someone over the internet,
downloading illegal files and stealing millions of dollars from online bank accounts. Other
offences like creating and distributing viruses and/or malicious code on other computers
or posting confidential business information on the Internet are also part of cybercrime.
Conceivably the most prominent form of cybercrime is using the internet to steal personal
information from other users leading to identity theft. To do this they usually uses two
common methods phishing and pharming.
14. How is hacking different from cracking?
Ans. H
acking, is the act of stealing personal or private data, without the owner’s knowledge or
consent, it could also include other things like stealing passwords, creating a bot net, or pretty
much any act that breaches someone’s privacy, without their knowledge, or consent. Cracking
on the other hand involves editing a program’s source code, or creating a program, like a key
generator (more commonly known as a ‘keygen’), patch, or some sort of application that tricks
an application in to thinking that a particular process has occurred. For example, a key generator
and a patch for the
dobe Master Collection would trick the software in to thinking that the key entered is correct,
A
and not let it verify the key with the Adobe master server. Cracking is pretty much looking for a
back door in software, and exploiting it for malicious use or for a copyright breaching act.
T hus the difference is that a hacker is someone that uses their extensive knowledge of computer
logic and code for malicious purposes, while a cracker - looks for back doors in programs, and
exploits those back doors. Cracking is generally less harmful than hacking. Hackers are usually
involved with web related hacking, like MySQL interception, or phishing, other forms of hacking
would include things like brute force, or password lifting.
15. What is the significance of “Digital Certificate”?
Ans. A digital certificate is used to verify that a user sending a message is who he or she claims to
be, and to provide the receiver with the means to encode a reply. This is done over the Internet
using the public key infrastructure (PKI).
62 Foundation of Information Technology – X (Solution)
16. What is data encryption?
Ans. Data Encryption refers to scrambling information and utilizing it to secure data that is constantly
hung on a machine, replicated onto CDs or DVDs or transmitted over a system. It utilizes
innovations, for example, Virtual Private Networks(VPNs) and secure socket layers.
Security Issues of IT 63
2. Give any two shortcomings of online purchase.
i. What is encryption of data?
ii. Name one antivirus software/tool.
Ans. In case you have a spyware, your bank account details may be compromised.
1. The site may not be authentic and there may be Phising attack.
i. D
ata Encryption refers to scrambling information and utilizing it to secure data that is
constantly hung on a machine, replicated onto CDs or DVDs or transmitted over a system.
It utilizes innovations, for example, Virtual Private Networks(VPNs) and secure socket
layers.
ii. QuickHeal
65
Ans. d. It cannot provide access to specialist care at distant geographic areas.
7. Which among the following is the national portal of India?
a. india.gov.in b. nationindia.gov.in
c. india.net.in d. india.nic.in
Ans. a. india.gov.in
8. What is the full form of DeitY?
a. Department of Electronics and Indian Technology
b. Development of Electronics and Information Technology
c. Digital Electronics and information Technology
d. Department of Electronics & Information Technology
Ans. d. Department of Electronics & Information Technology
9. Knowledge Economy combines knowledge and education into a _________________.
a. business Product b. productive Asset
c. either a or b d. none of these
Ans. c. either a or b
10. ______________________ refers to the disparity of classification of person according to their
knowledge of ICT and without it.
a. Digital Divide b. Digital Disparity
c. Developmental Delay d. Digital Unity
Ans. a. Digital Divide
Benefits of ICT 67
4. What is E-Health? What are areas in which E-Health encompasses?
Ans. The transfer of health-care resources by electronic means is termed as E-health.
The areas in which E-Health encompasses are:
• Health Information: The Internet and telecommunications plays a great role in delivering
health information to health professionals and health consumers.
• Education and Training: The education and training of health workers to improve public
health services using the power of IT and e-commerce.
• Health Systems Management: Usage of e-commerce and e-business practices in health
systems management.
5. H
ow does ICT help the government in providing health care services? How does such services
help the common man?
Ans.
T he ageing of the population in general has resulted in number of citizens with chronic
diseases increasing, especially among elderly people throughout the world. Coupled with not
proportional amount health care services has made health a major issue for developing nations.
The challenge is to keep both the well-being of the citizens and the public health care systems
proper. Here where
ICT comes into the picture to provide health care solutions that solve much of the problems.
It helps the common man by:
1. It allows methods to access electronic medical records, and the ability to access information
about alternative approaches to medical treatment.
2. Saves on time one of the major constraints of conventional health care services.
3. It improves patient safety – a complete overview of clinical and medication history helps to
avoid potential errors and complications.
6. Give two advantages and disadvantages of e-health.
Ans.
Advantages
• It allows methods to access electronic medical records, and the ability to access information
about alternative approaches to medical treatment.
• Saves on time one of the major constraints of conventional health care services.
Disadvantages
• Too much of information, might in most situation, lead to confusion.
• Since physical presence of the health care consumers is mostly absent, they do not benefit
from the clinical experience of the physician.
Benefits of ICT 69
2. T he primary objective of e-health care is to provide different services related to health to
different people, even to the most remote areas. State three advantages of using e-health care
services. Also state three drawbacks of using such services.
Ans.
Advantages of E-health care services
• It allows methods to access electronic medical records, and the ability to access information
about alternative approaches to medical treatment.
• Saves on time one of the major constraints of conventional health care services.
• It improves patient safety – a complete overview of clinical and medication history helps to
avoid potential errors and complications.
Disadvantages of E-health care services
• Too much of information, might in most situation, lead to confusion.
• Since physical presence of the health care consumers is mostly absent, they do not benefit
from the clinical experience of the physician.
• First time users may sometimes find it difficult to access the health care services.
3. O
ne of the major advantage of using ICT in providing government services to the mass is
e-governance. The efficacy of the administration and service delivery has drastically improved
by e-governance.
a. What is e-governance?
b. State at least three ways how it helps common people.
Ans.
a. E-governance is the application of ICT for transferring of various government services to the
citizens of a country. The services are 24x7 and not bounded by any geographical region.
b.
• The efficacy of the administration and service delivery has drastically improved by
E-Governance.
• Reduced waiting time is one of the benefits of e-governance.
• Citizens that benefit from e-governance does at a minimal cost or no cost at all.
4. I n traditional classrooms, it is often important for students to adopt a pace that suits the
classroom, so that no one lags behind others and no one gets too far ahead.
a. What is the alternative to traditional classrooms that takes ICT as its major tool?
b. State three advantages and disadvantages of using such a medium.
Ans.
a. Virtual Schools and E-learning are alternative to traditional classrooms.
Benefits of ICT 71