Wednesday, June 5, 2013

Std - 8 - Chapter - 1

1.
What is a computer network?

A computer network is a collection of computers and peripheral devices connected by communication links.
2.
What is a workstation?

Workstation is a computer that is connected to a network.
3.
What are the basic types of topologies?

Star, Ring and Bus are the basic types of topologies.
4.
Write full forms of the following

a)      LAN – Local Area Network
b)      WAN – Wide Area Network
c)      MAN – Metropolitan Area Network
d)      PAN – Personal Area Network
e)      CAN – Campus Area Network
f)       NIC – Network Interface Card
g)      TCP/IP – Transmission Control Protocol / Internet Protocol
h)      HTTP – Hyper Text Transfer Protocol
5.
What is a Node?

A node is a computer or any other devices on a network that communicates with other devices.
6.
What is a topology?

The art of connecting different computers in a network is known as topology.
7.
Describe a network and networking in your own words?

A network is a group of devices connected with one another.  Networking refers to the inter-connection of various devices to share their resources.
8.
Differentiate between LAN and WAN.

LAN (Local Area Network) is a computer network covering a small geographic area, like a home, office, schools, or group of buildings.
WAN (Wide Area Network) is a computer network that covers a broad area (e.g., any network whose communications links cross metropolitan, regional, or national boundaries over a long distance.

High Speed
Low Speed

Network in an organization can be a LAN
Internet is a good example of a WAN
9.
Write short note on the hardware parts required to establish a network.

Network hardware includes the physical components that are used to create a network.
Cables: Cables are the wires that connect computers and resources on a network.
Connectors: A connector is a device that joins two computers or networks together.
NIC: Network Interface Card is a device that joins a cable to a computer.
10.
Write Three benefits of a network.

Ease of Access: Storing information on one or two central computers makes it easy for people to work with and manage their files.
Work From Home: The network has dedicated computers that allow people to connect to the company’s network at home using a modem.
Share Resources: Computers connected to a network can share equipments and devices including printers and hard drives.
11.
Write advantages and disadvantages of the following:

a)      Ring Topology
Advantages:
The ring works well where there is no central-site computer system.
It is more reliable than a star network.

Disadvantages:
Requires more complicated control software.
Failure of one node results into the failure of the entire network.
b)      Star Topology
Advantages:
Star topology has minimal line cost.
If any of the local computers fails, the remaining portion of the network is unaffected.
Disadvantages:
The system crucially depends on the central switch.
If it fails, the entire network goes down.
c)      Bus Topology
Advantages:
It is quite easy to set up.
Failure of one node does not affect the rest of the network.
Disadvantages:
It offers limited flexibility for change.
A signal on the bust must be strong enough to reach the receiver.


Additional Questions
1.
What is a File Server?

A file server is a computer connected to the network, which serves or distributes files to the network users.
2.
Explain Wi-Fi?

Wi-Fi (Wireless Fidelity) technology is the wireless computer network that allows users to connect to the Internet without wires or cables.
3.
What is an Enterprise Network?

When a single company owns and controls a wide area network, it is often called as an Enterprise Network.
4.
What is HTTP?

Hyper Text Transfer Protocol (HTTP) is a set of rules for transferring files (text, graphic images, sound, video, and other multimedia files) on the World Wide Web.
5.
What do you mean by a network protocol?

A network protocol defines rules for communication between network devices.  E.g.: HTTP, FTP, TCP/IP


Monday, February 4, 2013

Std - 8 - Chapter 8

1.
What do you mean by privacy?

Privacy is unethical to infringe in the privacy of other people without the consent of the person.
2.
Define the term ethics.

Ethics and beliefs are rules.  These rules state what is right and what is wrong.
3.
Name the different forms of piracy.

End-User Piracy, Internet Piracy, Pre-Installed Software Piracy, Counterfeiting, Online Auction Piracy are the various forms of piracy.
4.
What are the limitations of pirated software?

·         No warranty protection
·         Contain viruses
5.
What does a copyright symbol indicate?

Copyright means All Rights Reserved.  This symbol shows the sole property of the owner.  It is unlawful and unethical to use them without the permission of the owner.
6.
Explain the importance of ethics.

·         Satisfying Basic Human Needs
·         Creating Credibility
·         Uniting People and Leadership
·         Improving Decision Making
·         Long Term Gains
·         Securing the Society
7.
What are intellectual property rights?

The rights related to literary or artistic work, inventions, discoveries, etc. are called Intellectual Property Rights.
8.
What is software piracy?

Software piracy is the illegal reproduction and distribution of software applications.
9.
Explain software breaches in computer.

Hardware breaches: can be both intentional and accidental.  Cables, modems, phone lines are often vulnerable to security breaches.
Software breaches: include computer viruses, password cracking.
Network breaches: are used to transmit data and information, they may be trapped by unethical people to access information about a company.
Natural disasters: like hurricanes, earthquakes, floods are security breaches.
Computer security controls are established and implemented to reduce security breaches.
10.
What is the difference between hacker and cracker?

A hacker is a person who breaks into a computer system to get illegal access to the information stored there.  Hacker may not cause any harm to the system or organization.
A cracker is a person who breaks into a computer system just like a hacker, with the intention to steal passwords, files or programs for unauthorized use.  They may sell the information to some other people for money.
11.
What do you mean by referencing?

If some material is downloaded, we must acknowledge the author sincerely.  This is called referencing.

for extra reading:  http://www.managementstudyguide.com/importance-of-ethics.htm

Std - 8 - Chapter 7


1.
What is the importance of ethics in e-commerce?

There are many aspects of ethics that can affect electronic commerce systems, but perhaps the most notable and worrying to both consumers and developers is that of trust.
2.
What are newsgroups?

The places on Internet where you can exchange your views and ideas on different subjects with other people are called Newsgroups.
3.
List some e-commerce websites.

amazon.com, ebay.com, electricpages.in, indiatimes.com, bookselleronline.com, fabmart.com
4.
Mention some websites which provide online news facility.

ndtv.com, Hindustantimes.com, kidnews.com, mathrubhumi.com, malayalamanorama.com etc.
5.
What do you mean by Business to Consumer e-commerce?

Business to Consumer refers to a company which establishes website for its products and services.
6.
What do you mean by Business to Business e-commerce?

Business to Business refers to a company selling or buying products or services from/to other companies.
7.
Explain the term Social Networking.

Social Networking websites function like an online community of Internet users.  They provide a virtual community in which the members with common interests in hobbies, religion, or politics may communicate with each other.  Facebook, Orkut, and LinkedIn are some examples of Social Networking.
8.
Explain the term Blog.

A blog is a type of website, usually maintained by an individual.  It contains regular entries of commentary, descriptions of events, or other material such as graphics or videos.  Blog also, means “to maintain or add contents to a blog”.
9.
What is video conferencing? Where is it used?

Video conferencing provides face to face conversation with different people who are at different locations.  This is widely used in big companies, TV Shows, chatting etc.
10.
Write the steps to buy a product online.

a)      Open any e-commerce site.
b)      Enter the product name in search box and press enter key.
c)       Double click the product you are interested from the list.
d)      Click on “Add to Cart”
e)      Click on “Proceed to checkout”
f)       Enter the email address and password then provide your shipping address.
g)      Select the payment options and enter your card’s details.
11.
What do you mean by term e-commerce? Write some advantages of e-commerce.

E-commerce means buying and selling any product online using internet technologies. 
Advantages:
a)      You do not need to go to showrooms or shops.
b)      You do not need to carry cash from home to shop with a fear of losing it.
c)       There are no geographical or time barriers.
d)      Even small companies can go global.
e)      You can save time, money and effort.

Std - 8 - Chapter 6


1.
What is Adobe Flash CS3 Professional?

Adobe Flash CS3 software is used to create animations, games, cartoons, text, graphics, design movies on the web and other special effects without using programming skills.
2.
How do you group and ungroup objects?

To group objects:
a)      Draw all the shapes and select all of them using Selection Tool.
b)      Click on the Modify menu and click Group.
To ungroup objects: select an object and click Modify menu and click Ungroup.
3.
How do you insert a key frame?

a)      Click on the frame below the number where you want to insert a Key frame.
b)      Click on the Insert menu -> Timeline.
c)       Select Frame or Key frame.
4.
What is a symbol?  Write the steps to create a symbol.

A symbol is an object created in Flash.  Graphics, Buttons and Movie clips are the three types of symbols. 
To create symbol:
a)      Click Modify menu -> Convert to Symbol option.
b)      Type the name and choose the Type: Graphic, Button or Movie Clip.
5.
Write steps to use paint bucket tool.

a)      Draw the shape and click at Paint Bucket Tool.
b)      Choose colour from the Property Inspector.
c)       Click on the shape you want to fill.
6.
Write steps to create motion tween animation.

a)      Draw a shape.
b)      Right-Click the frame till where you want the animation to continue.
c)       Click the first frame and select the Tween as Motion from the Property Inspector.
d)      Select the inserted Key frame.
e)      Set the position of the object by dragging it wherever you want.
7.
What is the use of time line panel in Flash?

Timeline is made up of Frames and Layers.  It controls file content over time.  It compiles the movie reel, sequencing the scene to be played.
8.
Explain the three types of animations in Flash?

a)      Motion Tween: can be referred to an object that travels from one point to another and involves no change of shape over time.
b)      Shape Tween: means an object that involves change of the shape over the period of time.  We can also tween the location, size, and colour of shapes.  Shape Tween does not work on symbols.
c)       Frame by Frame animation: means creation of an object for each frame, so as to produce an animation sequence.  This type of animation is used in real movies.
9.
What does animation refers to?

Animation refers to a series of images linked together through a loop to create an illusion of movement.
10.
What is a Key Frame?

A Key Frame is a frame in which you define a change in the object for an animation.

Std 7 - Chapter - 7 More on Internet

Chapter - 7 More on Internet 1. What is World Wide Web? The World Wide Web (abbreviated as WWW...