UNIT 2- CYBER SECURITY & OPERATING SYSTEM


Cyber Security

1 What is network? What are its goals and applications?
Ans: A computer network is a system in which computers are connected to share information and resources.
Goals of network:
1. Resource sharing: The aim to make all programs, data and peripherals available to anyone on the
network irrespective of the physical location of the resources and the users.
2. Reliability: A file can have copies on two or more machines, so if one of them is unavailable due to
hardware or software crash, the other copies could be used. E.G.: Railway reservation, Airways
reservation etc.
3. Cost Factor: Personal computers have better price/performance ratio as the important data are stored
on file server machine available for sharing.
ü Application of network:
1. Access the remote database: User can access to remote database sitting at his home to make
reservation for airplanes, trains hotels and so on anywhere in the world with instant confirmation.
2. Communication facilities: Using Network, user can share text, images, digitized voice or movie to any users anywhere in the world.
3. Cost deduction: Using computer network communication system, amount required for travelling of
user or data from one location to another can be reduced to very less and also saves energy for the same.


1. Define a network. What is its need?
Ans: ü A computer network is a system in which computers are connected to share information and resources.
ü Computer networks help users on the network to share the resources and in communication.
2 Write two advantages and disadvantages of networks.
Ans: ü Advantages:
1. Data or information can be shared among the user.
2. Fast communication can be achieved
ü Disadvantages:
1. Expensive to install network.
2. Sophisticated Hardware and Software technology is required.

3 What is communication channel? Name the basic type of communication channels available.
Ans: ü Communication channels mean the connecting cables that link various workstations.
ü There are 3 basic types of cables:
1. Twisted Pair cables
2. Coaxial cables
3. Fiber-optic cables

4 What is MAC address?
Ans: A Media Access Control address (MAC address) is a unique identifier assigned to most network adapters or network interface cards (NICs) by the manufacturer for identification, and used in the Media Access Control protocol sublayer.
5 What is IP address?
Ans: A unique number consisting of 4 parts separated by dots, e.g. 165.113.245.2 Every machine that is on the internet has a unique IP number- if a machine does not have an IP number; it is not really on the internet.
6 What is a domain name? How is it alternatively known?
Ans: ü The unique name that identifiers an internet site.
ü Domain names always have 2 or more parts, separated by dots. The part on the left is the most specific, and the part on the right is the most general. E.g.:matisse.net

7 What are the various types of networks?
Ans: Network can be classified on the basis of their size, complexity and geographical spread. On the basis of geographical spread it can be classified as Local Area Network, Metropolitan Area Network and Wide Area Network.

8 What is the difference between MAN and WAN?
Ans: ü A metropolitan area network (MAN) is a large computer network that usually spans a city or large campus.
ü WAN is a network that covers an area larger than a single building or campus such as across the cities or
countries.
9 What is meant by topology? Name some popular topologies.
Ans: Network Topology is defined as the interconnection of the various elements (link, nodes, etc.) of a computer
network. In computer networking, topology refers to the layout of connected devices.
ü Bus topology
ü Star topology
ü Ring topology
ü Tree topology
ü Mesh topology
10 What are the factors that must be considered before making a choice for the topology?
Ans: Cost of Expenses required for implementation of network, Reliability of a particular topology and flexibility of system for future adjustment; are the various factors that must be considered before making a choice for the topology.
11 Discuss and compare various types of networks.
Ans: ü A computer network is a system in which computers are connected to share information and resources.
There are four types of networks :
a) LAN (Local Area Network) – A group of computers that shares a common connection and is usually in a small
area or even in the same building. For example, it can be an office or a home network. It is usually connected by
Ethernet cables and has high speed connections. If it was a wireless setup, it would be called a WLAN, which would
have a lower connection speed.
b) MAN (Metropolitan Area Network) –This is a larger network that connects computer users in a particular
geographic area or region. For example, a large university may have a network so large that it may be classified as a
MAN. The MAN network usually exists to provide connectivity to local ISPs, cable TV, or large corporations. It is far
larger than a LAN and smaller than a WAN. Also, large cities like London and Sydney, Australia, have metropolitan
area networks.
c) WAN (Wide Area Network) – This is the largest network and can inter-connect networks throughout the world
because it is not restricted to a geographical location. The Internet is an example of a worldwide public WAN. Most
WANs exist to connect LANs that are not in the same geographical area. This technology is high speed and very
expensive to setup.
d) PAN (Personal Area Network) – PAN is a computer network organized around an individual person. Personal
area networks typically involve a mobile computer, a cell phone and/or a handheld computing device such as a PDA.
You can use these networks to transfer files including email and calendar appointments, digital photos and music.

What are common threats to network security?
Ans: The various threats to network security are as follows:
1. Intrusion Problems/Access Attacks: This occurs when an unauthorized user attempts to protected
sensitive/confidential information. It may be following types:
Snooping: It refers to unauthorized access to someone else’s data, email or computer activity.
Eavesdropping: It refers to unauthorized listening/ intercepting someone else’s private
communication/data/information.
2. Denial-of-services attacks: DoS are those attacks that prevent the legal user of system from accessing or
using the resources, information or capabilities of the system. It may be of following types:
Denial of access to information: Such attacks cause deletion or changing of important
information to non readable format.
Denial of Access to Applications: Such attacks make the applications unusable or unavailable
for legal user of the system.
Denial of Access to Communications: Such attacks includes cutting of communication wire,

jamming radio communications, flooding a system with junk mail.
14 What are Denial of service attacks?
Ans: Denial-of-services attacks: DoS are those attacks that prevent the legal user of system from accessing or using the
resources, information or capabilities of the system. It may be of following types:
Denial of access to information: Such attacks cause deletion or changing of important
information to non readable format.
Denial of Access to Applications: Such attacks make the applications unusable or unavailable
for legal user of the system.
Denial of Access to Communications: Such attacks includes cutting of communication wire,
jamming radio communications, flooding a system with junk mail.
15 How can you prevent/counter threats to network security?
Ans: Threats of network security can be prevented by using various techniques:
1. Authorization: in this case user is asked to enter an authorized login-id. If user is able to provide legal loginid
then he/she is considered as authorized user.
2. Authentication: in this case user is asked to enter a legal password. If user is able to provide legal password
then he/she is considered as authenticate user.
3. Firewall: Firewall is a mechanism to prevent unauthorized internet user to access private network
connected to internet.
4. Intrusion Detection: This is a monitoring system which detects unauthorized access of data or resources of
the network.


Basics of Operating System


Q1. What is an Operating System? What are its functions?
Ans. An Operating System is a program which acts as an interface between a user and the hardware.
Its functions are:
·         Program Execution
·         Handling Input/Output Operations
·         Manipulation of file system
·         Error  Detection and Handling
·         Resource Allocation
·         Accounting
·         Information and Resource Sharing
Q2. What purpose does the operating system serve to the computer and the user?
Ans. The operating system narrows the gap between the user and the computer by receiving and interpreting user’s request and then getting the required work done through the hardware.
Q3. Explain the Functions of Operating System:
Ans. The functions of Operating system are as follows:
·         Processor Management : The Processor Management function of an OS allocates an important computer resource CPU to various running programs or applications.  A running program or application is also called a process. This function of an OS prepares, schedules, controls and monitors jobs or processes submitted for execution to ensure the most efficient processing. A job is a collection of one or more related programs and their data.
·         Memory Management: The memory management function of an Operating System manages another crucial resource of computer- the computer memory. This function allocates memory to the running processes and de-allocates memory from the process, when it gets completed.
·         File Management: The file management function of an OS governs the permanent storage and retrieval of data from/to an external storage device. It ensures the proper saving of data at the appropriate location. It is also responsible for the retrieval of data from the storage device.
·         Device Management:-This function of an operating system is responsible for proper handling of input and output devices. This function ensures smooth reading of data from the input devices and sending the data to correct output device.
·         User Interface: The OS establishes a standard means of communication between users and their computer systems. It does this by providing a user interface and a standard set of commands that control the hardware.
Q4. Explain the Types of Operating Systems.
Ans. There are different types of OSs available  , which require different types of hardware to run upon.
The operating systems are of mainly following types:-
1)      Single User OS: This OS is single user operating system, so only one user can be supported by it any point of time. There can be two subcategories of this OS type:
a)      Single Task OS : This OS supports/runs single application at a time e.g.,  OS for mobile, MS-DOS etc.
b)      Single User, Multitasking OS : This OS supports one user but can deal with multiple applications running at a time e.g., simultaneously running Word document, a video, Internet browsing, Listening to music etc.
Example of this OS type are: Windows Vista, Window 7/8 , Linux , MacOS Leopard etc.    
2)      Multiprogram OS: Unlike single program OS, this is multi-user OS. It supports multiprogramming i.e., more than one user can be supported by it, therefore, more than one user programs are loaded and active in the main store at the same time. These active programs are executed using some techniques one by one.

Examples are : UNIX, LINUX, IBM AS400 etc

3)      Time Sharing OS: This OS uses the time sharing technique. Each active user program is given a fair share of CPU time, if the time elapses or an I/O operation is requested, CPU shifts over to the next job waiting and the previous program is put to wait (in case time over) or handed over to I/O manager( in case I/O request is made). This active programs are scheduled for execution using certain job scheduling technique.
Examples are: BSD UNIX, NOS/VE, GEnie etc.

4)      Real Time OS(RTOS) : In real time OS, the jobs have fixed deadlines and the jobs have to be complete its jobs within their deadlines. The system performance is measured by its ability to complete its jobs within the specified deadlines.
Examples are: LynxOS, OSE, RT Linux etc.

5)      Multiprocessing OS:- Multiprocessing OS is capable of handling more than one processors as the jobs have to be executed on more than one processor. ( CPU is generally termed as processor). The multiprocessing OS should be capable of loadsharing  in case of identical processors so that the system’s efficiency improves. In case of unidentical processors, the multiprocessing OS should be able to control the super(main) processor and in turn control the working of slave processors.
Examples include: Unix, Linux, Windows NT etc.

6)      Distributed OS:- This type of OS is designed to share its work load over multiple servers( mostly at multiple locations). Thus a distributed OS has a decentralized architecture. A distributed OS shares data and resources among its multiple servers to get maximum efficiency.

Examples include: Unix , Linux , DCE, X/open.

CLICK HERE TO DOWNLOAD OPERATING SYSTEM PDF


Word Processing
1. What is Word Processing? Give two examples.
Ans. Word processing is a term used in computer education for typing, editing, saving it for future reference and printing any kind of text-letters, memos, articles, reports and even books.
Examples: Microsoft Word and OpenOffice Writer

2. Name any three features of a Word Processor.
Ans. Three features of a Word Processor are:
1. Inserting Text: This is the very basis of a word processor that allows you to insert text anywhere in  the document.
2. Deleting Text: It allows you to remove characters, words, lines, or pages at the same ease that you would cross them out on paper.
3. Copy/Cut and Paste: This feature allows you to make a duplicate (Copy) or move (Cut) a section of text from one place of a document to another (Paste).

3. State the significance of a Document area in OpenOffice Writer window.
Ans. The white rectangular area at the middle of the window is the document area, where you can type a document, edit or format it. The blinking vertical line in the upper left corner of the
document area is the cursor.

4. State the difference between Subscript and Superscript.
Ans. Superscript and subscript refer to the characters that are positioned slightly higher or slightly lower than the text on the line respectively.
H2O              (a+b)2
Subscript                     Superscript


5. What are the different possible line spacing in Writer?
Ans. The different possible line spacing in Writer are:
• Single
• 1.5 Lines
• Double
• Proportional
• At Least
• Leading
• Fixed

6. What are different possible “case” you can change a text into?
Ans. The different possible “case” you can change a text into are:
a. Sentence Case              b. Lowercase                                  c. Uppercase
d. Capitalize Each Word (also called the Title Case)           e. Toggle Case


7. State the difference between font face and font.
Ans. Typeface/Font Face is the design of a set of characters, including letters, numbers, symbols and punctuation marks. Font on the other hand is a specific form of typeface and is a typeface of one size and style.

8. What is the significance of the “Undo” and “Redo” feature in Writer?
Ans. The Undo feature of Writer is used to reverse the last action in Writer on the other hand Redo feature of Writer is used to repeat the last action performed.

9. State the steps involved in copying a text from one part of the document to another. Ans. To copy a text, the following steps are involved:
1. Select the text you want to move.
2. Click on the Copy button of the Clipboard group of the Home Tab.
3. Place the cursor where you want the text to be inserted.
4. Click on the Paste button of the Clipboard group of the Home Tab.



10. What is a Table? Give the steps involved in inserting a table in your document.
 Ans. Tables in Word are used to show tabular data in the form of rows and columns.
The steps involved in inserting a table in a document are:
1. Bring the cursor or insertion point to a position in the document where you want to insert a table.
2. On the Insert Tab, in the Tables group, click Table, which in turn will display a list of options to insert a table.

3. From this list under Insert Table, drag to select the number of rows and columns that you want.




Popular posts from this blog

COMPUTER APPLICATION