UNIT 2- CYBER SECURITY & OPERATING SYSTEM
Cyber Security
CLICK HERE TO DOWNLOAD Cyber Security
Fill in the blank for Unit 1 & 2
CLICK HERE TO DOWNLOAD ASSIGNMENT 4
CLICK HERE TO DOWNLOAD ASSIGNMENT 5
स्वच्छता सेवा दिवस
CLICK HERE TO DOWNLOAD WORD PROCESSING
CLICK HERE TO DOWNLOAD ASSIGNMENT 3
CLICK HERE TO DOWNLOAD OPERATING SYSTEM PDF
Fill in the blank for Unit 1 & 2
CLICK HERE TO DOWNLOAD ASSIGNMENT 4
CLICK HERE TO DOWNLOAD ASSIGNMENT 5
स्वच्छता सेवा दिवस
CLICK HERE TO DOWNLOAD WORD PROCESSING
CLICK HERE TO DOWNLOAD ASSIGNMENT 3
WORD PROCESSING
OPERATING SYSTEM PDF FILECLICK HERE TO DOWNLOAD OPERATING SYSTEM PDF
1
What is network? What are its goals and applications?
Ans:
A computer network is a system in which computers are connected to
share information and resources.
Goals of
network:
1.
Resource sharing: The aim to
make all programs, data and peripherals available to anyone on the
network irrespective of the physical location of the resources and the
users.
2.
Reliability: A file can
have copies on two or more machines, so if one of them is unavailable due to
hardware or software crash, the other copies could be used. E.G.:
Railway reservation, Airways
reservation etc.
3.
Cost Factor: Personal
computers have better price/performance ratio as the important data are stored
on file server machine available for sharing.
ü Application
of network:
1.
Access the remote database: User can access to remote database sitting at his home to make
reservation for airplanes, trains hotels and so on anywhere in the
world with instant confirmation.
2.
Communication facilities: Using
Network, user can share text, images, digitized voice or movie to any users
anywhere in the world.
3.
Cost deduction: Using
computer network communication system, amount required for travelling of
user or data from one location to another can be reduced to very less
and also saves energy for the same.
1.
Define a network. What is its need?
Ans:
ü A computer network
is a system in which computers are connected to share information and
resources.
ü Computer networks help users on the
network to share the resources and in communication.
2
Write two advantages and disadvantages of networks.
Ans:
ü Advantages:
1.
Data or information can be shared among
the user.
2.
Fast communication can be achieved
ü Disadvantages:
1. Expensive to install network.
2. Sophisticated Hardware and Software technology is required.
3
What is communication channel? Name the basic type of communication channels
available.
Ans:
ü Communication
channels mean the connecting cables that link various workstations.
ü There are 3 basic types of cables:
1. Twisted Pair cables
2. Coaxial cables
3. Fiber-optic cables
4
What is MAC address?
Ans:
A Media Access
Control address (MAC address) is a unique identifier assigned to most network
adapters or network interface cards (NICs) by the manufacturer for identification,
and used in the Media Access Control protocol sublayer.
5
What is IP address?
Ans:
A unique number
consisting of 4 parts separated by dots, e.g. 165.113.245.2 Every machine that
is on the internet has a unique IP number- if a machine does not have an IP
number; it is not really on the internet.
6
What is a domain name? How is it alternatively known?
Ans:
ü The unique name
that identifiers an internet site.
ü Domain names always have 2 or more parts,
separated by dots. The part on the left is the most specific, and the part on
the right is the most general. E.g.:matisse.net
7
What are the various types of networks?
Ans:
Network can be
classified on the basis of their size, complexity and geographical spread. On
the basis of geographical spread it can be classified as Local Area Network,
Metropolitan Area Network and Wide Area Network.
8
What is the difference between MAN and WAN?
Ans:
ü A metropolitan area
network (MAN) is a large computer network that usually spans a city or large
campus.
ü WAN is a network that covers an area
larger than a single building or campus such as across the cities or
countries.
9
What is meant by topology? Name some popular topologies.
Ans:
Network Topology is
defined as the interconnection of the various elements (link, nodes, etc.) of a
computer
network. In computer networking, topology refers to the layout of
connected devices.
ü Bus topology
ü Star topology
ü Ring topology
ü Tree topology
ü Mesh topology
10
What are the factors that must be considered before making a choice for the
topology?
Ans:
Cost of Expenses
required for implementation of network, Reliability of a particular topology
and flexibility of system for future adjustment; are the various factors that
must be considered before making a choice for the topology.
11
Discuss and compare various types of networks.
Ans:
ü A computer network
is a system in which computers are connected to share information and
resources.
There are four types of networks :
a)
LAN (Local Area Network) – A group
of computers that shares a common connection and is usually in a small
area or even in the same building. For example, it can be an office or
a home network. It is usually connected by
Ethernet cables and has high speed connections. If it was a wireless
setup, it would be called a WLAN, which would
have a lower connection speed.
b)
MAN (Metropolitan Area Network) –This is a larger network that connects computer users in a particular
geographic area or region. For example, a large university may have a
network so large that it may be classified as a
MAN. The MAN network usually exists to provide connectivity to local
ISPs, cable TV, or large corporations. It is far
larger than a LAN and smaller than a WAN. Also, large cities like
London and Sydney, Australia, have metropolitan
area networks.
c)
WAN (Wide Area Network) – This is
the largest network and can inter-connect networks throughout the world
because it is not restricted to a geographical location. The Internet
is an example of a worldwide public WAN. Most
WANs exist to connect LANs that are not in the same geographical area.
This technology is high speed and very
expensive to setup.
d)
PAN (Personal Area Network) – PAN is a computer network organized around an individual person.
Personal
area networks typically involve a mobile computer, a cell phone and/or
a handheld computing device such as a PDA.
You can use
these networks to transfer files including email and calendar appointments,
digital photos and music.
What
are common threats to network security?
Ans:
The various threats
to network security are as follows:
1.
Intrusion Problems/Access Attacks: This occurs when an unauthorized user attempts to protected
sensitive/confidential information. It may be following types:
Snooping: It refers to unauthorized access to
someone else’s data, email or computer activity.
Eavesdropping: It refers to unauthorized listening/
intercepting someone else’s private
communication/data/information.
2.
Denial-of-services attacks: DoS are those attacks that prevent the legal user of system from
accessing or
using the resources, information or capabilities of the system. It may
be of following types:
Denial of access to
information: Such
attacks cause deletion or changing of important
information to non readable format.
Denial of Access to
Applications: Such
attacks make the applications unusable or unavailable
for legal user of the system.
Denial
of Access to Communications: Such attacks includes cutting of communication wire,
jamming radio communications, flooding a system with junk mail.
14
What are Denial of service attacks?
Ans:
Denial-of-services attacks: DoS are those attacks that prevent the legal user of system from
accessing or using the
resources, information or capabilities of the system. It may be of
following types:
Denial of access to
information: Such
attacks cause deletion or changing of important
information to non readable format.
Denial of Access to
Applications: Such
attacks make the applications unusable or unavailable
for legal user of the system.
Denial of Access to
Communications: Such
attacks includes cutting of communication wire,
jamming radio communications, flooding a system with junk mail.
15
How can you prevent/counter threats to network security?
Ans:
Threats of network
security can be prevented by using various techniques:
1.
Authorization: in this
case user is asked to enter an authorized login-id. If user is able to provide
legal loginid
then he/she is considered as authorized user.
2.
Authentication: in this
case user is asked to enter a legal password. If user is able to provide legal
password
then he/she is considered as authenticate user.
3.
Firewall: Firewall is a
mechanism to prevent unauthorized internet user to access private network
connected to internet.
4.
Intrusion Detection: This is a
monitoring system which detects unauthorized access of data or resources of
the
network.
Basics of
Operating System
Q1. What
is an Operating System? What are its functions?
Ans. An
Operating System is a program which acts as an interface between a user and the
hardware.
Its
functions are:
·
Program
Execution
·
Handling
Input/Output Operations
·
Manipulation
of file system
·
Error Detection and Handling
·
Resource
Allocation
·
Accounting
·
Information
and Resource Sharing
Q2. What
purpose does the operating system serve to the computer and the user?
Ans. The
operating system narrows the gap between the user and the computer by receiving
and interpreting user’s request and then getting the required work done through
the hardware.
Q3. Explain
the Functions of Operating System:
Ans. The
functions of Operating system are as follows:
·
Processor Management : The Processor Management function of an OS allocates an important
computer resource CPU to various running programs or applications. A running program or application is also
called a process. This function of an OS prepares, schedules, controls and
monitors jobs or processes submitted for execution to ensure the most efficient
processing. A job is a collection of one or more related programs and their
data.
·
Memory Management: The memory management function of an Operating System manages another
crucial resource of computer- the computer memory. This function allocates
memory to the running processes and de-allocates memory from the process, when
it gets completed.
·
File Management:
The file management function of an OS governs the permanent storage and
retrieval of data from/to an external storage device. It ensures the proper
saving of data at the appropriate location. It is also responsible for the
retrieval of data from the storage device.
·
Device Management:-This function of an operating system is responsible for proper handling
of input and output devices. This function ensures smooth reading of data from
the input devices and sending the data to correct output device.
·
User Interface:
The OS establishes a standard means of communication between users and their
computer systems. It does this by providing a user interface and a standard set
of commands that control the hardware.
Q4. Explain
the Types of Operating Systems.
Ans. There
are different types of OSs available ,
which require different types of hardware to run upon.
The
operating systems are of mainly following types:-
1) Single User OS: This OS is single user operating
system, so only one user can be supported by it any point of time. There can be
two subcategories of this OS type:
a) Single Task OS : This OS supports/runs single
application at a time e.g., OS for
mobile, MS-DOS etc.
b) Single User, Multitasking OS : This OS supports one user but can
deal with multiple applications running at a time e.g., simultaneously running
Word document, a video, Internet browsing, Listening to music etc.
Example of this OS type are: Windows Vista, Window 7/8 ,
Linux , MacOS Leopard etc.
2) Multiprogram OS: Unlike single program OS, this is
multi-user OS. It supports multiprogramming i.e., more than one user can be
supported by it, therefore, more than one user programs are loaded and active
in the main store at the same time. These active programs are executed using
some techniques one by one.
Examples are : UNIX,
LINUX, IBM AS400 etc
3) Time Sharing OS: This OS uses the time sharing
technique. Each active user program is given a fair share of CPU time, if the
time elapses or an I/O operation is requested, CPU shifts over to the next job
waiting and the previous program is put to wait (in case time over) or handed
over to I/O manager( in case I/O request is made). This active programs are
scheduled for execution using certain job scheduling technique.
Examples are: BSD
UNIX, NOS/VE, GEnie etc.
4) Real Time OS(RTOS) : In real time OS, the jobs have
fixed deadlines and the jobs have to be complete its jobs within their
deadlines. The system performance is measured by its ability to complete its
jobs within the specified deadlines.
Examples are: LynxOS,
OSE, RT Linux etc.
5) Multiprocessing OS:- Multiprocessing OS is capable of
handling more than one processors as the jobs have to be executed on more than
one processor. ( CPU is generally termed as processor). The multiprocessing OS
should be capable of loadsharing in case of identical processors so that the
system’s efficiency improves. In case of unidentical processors, the
multiprocessing OS should be able to control the super(main) processor and in
turn control the working of slave processors.
Examples include: Unix,
Linux, Windows NT etc.
6) Distributed OS:- This type of OS is designed to
share its work load over multiple servers( mostly at multiple locations). Thus
a distributed OS has a decentralized architecture. A distributed OS shares data
and resources among its multiple servers to get maximum efficiency.
Examples include: Unix , Linux , DCE,
X/open.
CLICK HERE TO DOWNLOAD OPERATING SYSTEM PDF
Word Processing
1. What is Word Processing? Give two examples.
Ans. Word processing is a term used in computer education for typing,
editing, saving it for future reference and printing any kind of text-letters,
memos, articles, reports and even books.
Examples: Microsoft Word and OpenOffice Writer
2. Name any three features of a Word Processor.
Ans. Three features of a Word Processor are:
1. Inserting Text: This is the very basis of a word processor that
allows you to insert text anywhere in the
document.
2. Deleting Text: It allows you to remove characters, words,
lines, or pages at the same ease that you would cross them out on paper.
3. Copy/Cut and Paste: This feature allows you to make a duplicate (Copy)
or move (Cut) a section of text from one place of a document to another
(Paste).
3. State the significance of a Document area in
OpenOffice Writer window.
Ans. The white rectangular area at the middle of the window is the
document area, where you can type a document, edit or format it. The blinking
vertical line in the upper left corner of the
document
area is the cursor.
4. State the difference between Subscript and
Superscript.
Ans. Superscript and subscript refer to the characters that are positioned
slightly higher or slightly lower than the text on the line respectively.
H2O (a+b)2
Subscript
Superscript
5. What are the different possible line spacing in
Writer?
Ans. The different possible line spacing in Writer are:
• Single
• 1.5 Lines
• Double
• Proportional
• At Least
• Leading
•
Fixed
6. What are different possible “case” you can
change a text into?
Ans. The different possible “case” you can change a text into are:
a. Sentence Case b.
Lowercase c. Uppercase
d.
Capitalize Each Word (also called the Title Case) e. Toggle Case
7. State the difference between font face and font.
Ans. Typeface/Font Face is the design of a set of characters, including
letters, numbers, symbols and punctuation marks. Font on the other hand is a
specific form of typeface and is a typeface of one size and style.
8. What is the significance of the “Undo” and “Redo”
feature in Writer?
Ans. The Undo feature of Writer is used to reverse the last action in
Writer on the other hand Redo feature of Writer is used to repeat the last
action performed.
9. State the steps involved
in copying a text from one part of the document to another. Ans. To copy a text, the
following steps are involved:
1. Select the text you want to
move.
2. Click on the Copy button of the Clipboard
group
of the Home Tab.
3. Place the cursor where you
want the text to be inserted.
4. Click on the Paste button of the Clipboard group of the Home Tab.
10. What is a Table? Give
the steps involved in inserting a table in your document.
Ans. Tables in Word are used to show tabular
data in the form of rows and columns.
The
steps involved in inserting a table in a document are:
1. Bring the cursor or
insertion point to a position in the document where you want to insert a table.
2. On the Insert Tab, in the Tables group,
click Table, which in turn will display a list
of options to insert a table.
3. From this list
under Insert
Table, drag to
select the number of rows and columns that you want.