Ans. T his is to state that the table should be drawn with a border thickness of 4 pixels, having colour of the border as red, with the width and height of the table as 600 and 200 respectively. 10. Write the complete tag to create a table with the following contents.
E nsure that the background of each data cell should have the colour as specified in the corresponding column heading.
Ans. Colours RED | GREEN | Lists, Tables and Anchors in HTML
41
BLUE | ORANGE | CYAN | | | | | |
Application Oriented Questions 1. Observe the following web page and write the HTML code to generate it. Observe the following web page and write the HTML code to generate it. MANGOES IN INDIA Mangoes of India are well famous in the world for its sweetness, richness and flavor, The land of India is the largest producer of mangoes and most important fruit of the country.
Most popular types of mangoes in India are: □ Alphonsos □ Badami □ Chausa □ Dasheri Some other famous varieties of mango includes: o o o o o 42
Bombay Green Amrapali Kishenbhog Mankurad,Pairi Fazli.
Foundation of Information Technology – X (Solution)
Note the following points while generating the web page: • Title of the page is “Indian Mangoes”. • Font style for the page is Arial. • Heading of the page is blue. • Image used is mangoes.png. Ans. <TITLE>Indian Mangoes MANGOES IN INDIA
Mangoes of India are well famous in the world for its sweetness, richness and flavor, the land of India is the largest producer of mangoes and most important fruit of the country.
Most popular types of mangoes in India are:
- Alphonsos
- Badami
- Chausa
- Dasheri
Some other famous varieties of mango includes:
- Bombay Green
- Amrapali
- Kishenbhog
- Mankurad,Pairi
- Fazli.
Lists, Tables and Anchors in HTML
43
2. Observe the following web page and write the HTML code to generate it.
Note the following points while generating the web page: • Title of page is “Global Warming” • Link colour is green • Font style for the page is Arial • Heading of the page is blue • Image used is “warming.png” • Table border is 2px and border colour is red • Use links as: o For Greenhouse gases as one.html o For Particulates and soot as two.html o For Solar activity as three.html • E-mail id for bottom message is [email protected] Ans. <TITLE>Global Warming Global Warming
44
Foundation of Information Technology – X (Solution)
Global warming is the observed century-scale rise in the average temperature of Earth’s climate system.
Since the early 20th century, the global air and sea surface temperature has increased about 0.8 ° C (1.4 ° F), with about two-third of the increase occurring since 1980. Initial cause of temperature changes:
Observed and expected environmental effects Natural systems | Ecological systems | Long-term effects | Large-scale and abrupt impacts |
For more details
Lists, Tables and Anchors in HTML
45
8 Introduction to XML A. MCQs. 1. Attributes in XML should be enclosed within ________________. a. single quotes b. double quotes c. both a and b d. none of these Ans. c. both a and b 2. Which among the following is not applicable in XML? a. Attributes cannot contain multiple values. b. Tags are not case sensitive. c. Attributes cannot contain tree structures. d. There should always be a root element. Ans. b. Tags are not case sensitive. 3. The first line in a XML document is called a ________________. a. preface b. prologue c. starter d. prefix Ans. b. prologue 4. The entity reference to define an apostrophe is ________________. a. &phe b. & trophe c. &apos d. & apostrophe Ans. c. &apos 5. Which among the following is used to insert a comment in XML? a. b. // c. /* */ d. Ans. a. 6. Which among the following is not true for a Well Formed XML document? a. XML documents must have a root element. b. XML elements must have a closing tag c. XML tags are case sensitive d. XML documents should always have comments. Ans. d. XML documents should always have comments.
46
7. Is this a well formed XML document? <note> Tove John a. Yes c. Can’t say
b. No d. None of these
Ans. b.No 8. V alidating an XML document refers to an XML document that is _____________________________. a. well formed b. confirm to DTD c. both a and b d. none of these Ans. c. both a and b 9. The use of DTD in XML development is: a. required when validating XML documents b. no longer necessary after the XML editor has been customized c. used to direct conversion using the XSLT processor d. a good guide to populating a template to be filled in when generating an XML document automatically. Ans. a. required when validating XML documents 10. Valid XML document means a. the document has root element b. the document contains at least one or more root element c. the XML document has DTD associated with it and it complies with that DTD d. each element must nest inside any enclosing element properly Ans. c. the XML document has DTD associated with it and it complies with that DTD 11. Which of the following XML fragments are well formed? a. <element attribute=value> b. <element attribute=“value”> c. <element attribute=!value> d. <element attribute=‘value’> Ans. b. <element attribute=“value”> 12. XML document can be viewed in a. word processor c. notepad
b. web browser d. all of these
Ans. d. all of these
Introduction to XML
47
13. How is an empty element defined in XML? a. b. c. d. all of these Ans. d. all of these
B. Fill in the blanks. 1. Every closing tag of an XML document is Prefixed with / (slash). 2. The root element encloses all other elements in XML. 3. Empty elements are starting and closing tags without any content. 4. XML attributes are used to provide additional information about elements. 5. XML attributes should always be enclosed within quotes. 6. An XML parser is the component that deciphers the XML code. 7. Validator is a software that is used to check the syntax of a XML document. 8. Comments are remarks that are not part of the code but a part of documentation. 9. The entity reference for the “greater than >” symbol is >. 10. A tag within a tag is called a nested tag.
C. True (T) or False (F). 1. XML like HTML is not case sensitive.-F 2. XML can be utilized to store information.-T 3. It is possible to create your own tags in XML.-T 4. You may have empty tags in XML.-T 5. Every XML document may not have a root element.-F 6. <message /> is a valid example of an empty tag.-T 7. You may not enclose values for attributes of tags in quotes.-F 8. You may have multiple values for an attribute.-F 9. The first line is the XML declaration is called the prolog.-T 10. It is not possible to provide comments in XML documents.-F
D. Answer the following. 1. What is XML? Ans. XML stands for eXtensible Markup Language (XML) which is a markup language that allows encoding of documents using a predefined set of rules which is both human-readable and machine-readable. 2. State three characteristics of XML. Ans. The three charceteristics of HTML are: 48
Foundation of Information Technology – X (Solution)
1. XML is extensible. It permits the client to make his own tags and record structure. 2. XML can be utilized to store information. Applications could be composed to store and recover data. 3. XML may be utilized to trade information. 3. State the differences between HTML and XML. Ans. Difference between HTML and XML: HTML HTML is used to display data and to focus on formatting of data. HTML tags are predefined. HTML tags may or may not have closing tags. (Container tags and Empty tags) HTML tags are not case sensitive.
XML XML is used to describe data and focus on what data is. XML tags are not predefined. It is possible to create and define new tags as per your needs. XML tags must have a closing tag. (only container tags are allowed) XML tags are case sensitive.
4. What do you understand by the term XML element? Ans. XML elements are tags that forms a XML document. There are no predefined tags in XML unlike HTML. You need to define your own tags in XML. 5. “XML tags are case sensitive” explain the comment with the help of an example. Ans. XML tags are case sensitive unlike HTML tags which are not case sensitive. For example in HTML the tag and is one and the same. But in XML such tags are treated separately. Thus the tag <Message> is different from the tag <MESSAGE>. Also note that the opening and closing tags must be written with the same case. For example:
<Message>This is incorrect
<MESSAGE>This is correct
6. Explain with a help of an example how root elements are placed in a XML document. Ans. XML documents must contain one element that is the parent of all other elements. This element is called the root element. The root element encloses all other elements in XML. All other elements inside the root elements form the child element. The child element may again contain subchild elements and subsequently more nested elements may be inserted. The level of nesting may be extended upto any level. The structure of the XML file should look like this:
<subchild>.....
F or example in case you need to store information of students (i.e., first name and last name) of a certain school using an XML document it should look like this: Introduction to XML
49
<school> <student>
<serial> 1
Shaahn
Kohli
<student>
<serial> 2
Subham
Karki
<student>
<serial> 3
Rohit
Agarwal
Y ou can see in the above example that the root element declared out here is <school> then comes the child element <student> which in turn stores the and of the student in the tags.
7. What are empty XML elements? Give an example. Ans. An empty XML element document that is used to create a tag without any content.
F or example if the <message> tag is to be specified without any content. It is valid to write the tags as:
<message> It can be written like this as well:
<message /> This sort of element syntax is called self-closing.
8. State the naming rules of XML elements. Ans. XML elements must follow these naming rules: • Names can contain letters, numbers but no special characters. Thus <state1>, <sta1te>, and are valid but <state@>, <sta%te>, and are invalid. • Names cannot start with a number. Thus <1state> is invalid. • Names cannot contain spaces. Thus and are invalid tags. • Any name can be used, no words are reserved. 50
Foundation of Information Technology – X (Solution)
9. What are attributes in XML? Ans. XML attributes are used to describe XML elements, or to provide additional information about elements. As you have already seen that in HTML, attributes provide additional information about elements. For example:
Y ou can see that the BGCOLOR attribute changes the background colour of the web page to GREEN.
Y ou can even create your own attributes in XML. The attribute values in XML must always be quoted, which may be either single or double quotes. For example in XML a person’s sex, can be written as:
or written as:
10. What is a XML prolog? Ans. A XML Prolog is the section at the beginning of an XML document which includes everything that appears before the document’s root element. The XML declaration, the DOCTYPE and any processing instructions or comments may all be a part of it. Depending on your needs, you can choose to include both, either, or neither of these items in your XML document. 11. What are entity references? Ans. A n entity reference is an alternative name for a series of characters. You can use an entity in the &name; format, where name is the name of the entity. There are some predefined entities in XML, bfurthermore you can declare entities in a DTD (Document Type Definition). There are 5 predefined entity references in XML: <
<
less than
>
>
greater than
&
&
ampersand
'
‘
apostrophe
"
“
quotation mark
12. What is comments used for? How are comments provided in a XML document? Ans. Comments are lines which are used for documentation and is completely ignored by the browser for interpretation always begins with 13. What is DTD? What are the two ways to define DTD? Ans. A Document Type Definition (DTD) is a file that defines the schema or structure of a document encoded in XML. A DTD can be declared inline inside an XML document, or as an external reference. 14. State the difference between SYSTEM and PUBLIC as used in DTD. Ans. T he SYSTEM keyword is used when the XML and DTD resides in the same machine. The PUBLIC keyword is used when the DTD file is in the public domain. Introduction to XML
51
15. State the significance of +, * and ? symbols used after child elements in DTD. Ans. The + sign after a child element indicates that the child element occurs one or more times inside the element.
T he * sign after a child element indicates that the child element occurs zero or more times inside the element.
T he ? sign after a child element indicates that the child element occurs zero or one time inside the element.
16. State the different attribute values that you can provide along with their usage. Ans. The attribute list declaration ensures that the XML document contains valid attribute list for an element. It has the general syntax: • element-name is the name of the element. • attribute-name is the name of the attribute. • attribute-type is the type of the attribute. Some common types used are: Common Attribute Type CDATA ID NMTOKEN ENTITY
Meaning The value is character data. The value is a unique ID. The value is a valid XML name. The value is an entity.
• attribute-value may be one of the following: Value value #REQUIRED #IMPLIED #FIXED value
Explanation It is used to refer assign the default value of the attribute. It is used to indicate that it is compulsory to give the attribute. It is used to indicate that the attribute is optional. It is used to specify the fixed value for the attribute.
17. What does “Well Formed XML document” mean? Ans. XML documents that abide by the syntax rules of XML documents are called “Well Formed XML document”. The syntax rules for XML are: • XML documents must have a root element • XML elements must have a closing tag • XML tags are case sensitive • XML elements must be properly nested • XML attribute values must be quoted 52
Foundation of Information Technology – X (Solution)
18. How do you validate a XML document? Ans. To validate an XML document a XML validator software is used. A XML validator is a software that is used to check the syntax of your XML document. 19. What is an XML Parser? Ans. A n XML parser provides vital information to the program on how to read the file. It is built in within the web browser.
n XML parser is the component that deciphers the XML code. Without a parser, your code A cannot be understood. Computers require instruction. An XML parser provides vital information to the program on how to read the file. Parsers come in multiple formats and styles. They can be freestanding software, libraries, modules and classes.
20. How do you view XML documents in a web browser? Ans. It is possible for raw XML files to be viewed in all major browsers. But XML files are not displayed as HTML pages but with colour-coded root and child elements. A plus (+) or minus sign (-) to the left of the elements can be clicked to expand or collapse the element structure. To view the raw XML source (without the + and - signs), select “View Page Source” or “View Source” from the browser menu.
Y ou may double click on the XML document through My Computer ( or Computer as in Windows 7) to open it in the default browser.
Application Oriented Questions 1. X ML document structure can be divided in which two parts? What is meant by valid XML document (write three points)? Write the code to create an XML document to present the following data: Name Job Department Cubicle Srishti Programmer Engineer 5E Aditi Designer Marketing 19T Ans. The two parts of an XML document are XML Tree and DTD. A Valid XML document abides by the following rules: 1. XML documents must have a root element 2. XML elements must have a closing tag 3. XML tags are case sensitive <employees>
<emp>
Srishti
<Job>Programmer
Engineer
5E
Introduction to XML
53
<emp>
Aditi
<Job> Designer
Marketing
19T
2. Draw the XML tree for the code given below: <employees> <employee sex= “male”> Harry Potter <employee sex= “female”> Linda Ray Ans.
Attribute: “sex”
54
Foundation of Information Technology – X (Solution)
3. Draw the XML tree for the code given below: 100 <Middle>150 <Senior>150
200 <Middle>135 <Senior>1500
Ans.
Attribute: “sex”
4. C reate a DTD for storing book information for a library. The DTD should contain details about each book in terms of title, author (name, nickname), no.of copies, all of which can store character data. The no.of copies should contain two attributes named ‘inhand’ and issued which are both mandatory.
Introduction to XML
55
Ans. ]> 5. Observe the DTD below and answer the following questions: ]> a. b. c. d.
Name the root element of the above XML document. How many child elements are there in the above DTD? Name them. What does the ‘+’ sign after the Employee element signify? Which of the element has an attribute associated with it? Name the element and also the attribute associated with it. e. What is the basic difference between the keywords PCDATA and CDATA? Ans a. Company b. Child Element: Employee, which again contains FirstName, LastName, ContactNo and Email. c. It signifies that the Employee occur one or more times inside the element. d. Element: email and attribute: address e. PCDATA stands for Parsed Character Data and XML parsers normally parse all the text in an XML document.
DATA - (Unparsed) Character Data is used about text data that should not be parsed by the C XML parser. 56
Foundation of Information Technology – X (Solution)
9 Security Issues of IT A. MCQs. 1. Programmers that break into secure systems for malicious purpose are a. Crackers b. Hackers c. Breakers d. Burglars Ans. b. Hackers 2. A good way to safeguard access to your computers is to ________________ protect it. a. deadbolt b. copyright c. safemode d. password Ans. d. password 3. The electronic equivalent of junk mail is known as a. adware b. cyber fraud c. spam d. packets Ans. c. spam 4. Copy of data that can be used to restore and recover data is ________________. a. the copied data b. backup c. restoration data d. none of these Ans. b. backup 5. A program designed to replicate and eat up a computer’s storage is called a. Virus b. Spam c. Worm d. Mail Ans. c. Worm 6. A digital document issued to a site by a certification authority of internet a. e-code b. digital certificate c. digital signature d. digital id Ans. b. digital certificate 7. To avoid problems while working with internet you should follow this precaution: a. Install antivirus on your computer b. Take the backup of your files regularly c. Do not click on unknown links d. All of these Ans. d. All of these 57
8. A hardware or a software that filters the data that enters a system when connected to a network is called: a. Filter b. Encoder c. Firewall d. Decoder Ans. c. Firewall 9. Which among the following is not a Social Networking site? a. Facebook b. Google+ c. Twitter d. Rediffmail Ans. d. Rediffmail 10. Which among the following refers to the act of copying copyrighted material? a. Hacking b. Cracking c. Piracy d. Phising Ans. c. Piracy
B. Fill in the blanks. 1. Malware is the general term to refer to infectious software such as virus, worm, spyware, etc. 2. Trojans is a program that appears harmless but actually performs malicious functions. 3. S pyware is a software that is downloaded onto your computer to track your activities without your knowledge. 4. Anti-Virus protects a server, a network and an individual PC from attack by viruses from other systems. 5. Both Pharming and Phising makes an imposter site look like a genuine site. 6. S hareware is software that is distributed free of cost usually for evaluation but requires to pay in case it is in continued use after a specific period. 7. Differential backup copies all the files or data that has been changed since the last full backup. 8. I ncremental backup allows you to copy only those files which have been altered since the last full backup. 9. B ackup is the act of duplicating documents or databases with the goal that they will be protected if there should arise an occurrence of equipment failure or other calamity. 10. Quarantine refers to the act of moving infected files to a safe location that is managed by the antivirus software.
C. True (T) or False (F). 1. Spyware is software that spies on a user’s activities on computer and reports it.-T 2. Backup is duplication of data for restoring purpose at a later time.-T 3. To avoid spam never click on links that come from someone you do not know.-T 4. H acker is a person who breaks security with mal-intention to start what we have stored on our computers.-F 58
Foundation of Information Technology – X (Solution)
5. Local Backups allows various websites to backup your memory.-F 6. Browser Hijacker is a malicious program that hijacks your browser.-T 7. P hising refers to the use of electronic messaging systems to send unwanted bulk messages (spam), especially advertising, indiscriminately.-F 8. S pyware programs secretly gather information from the computer it has infected and transmit the information to a different location.-T 9. Mail worms are embedded as an e-mail attachment.-T 10. Polymorphic Viruses are made in such a way that makes it almost impossible to detect.-T
D. Answer the following. 1. State two reasons for having security in a Computer System. Ans. The reasons for computer security are: i. It is used to ensure data protections. ii. It is used to ensure that the computer performs well and gives accessibility to only authorised persons at any point of time. 2. What is a Virus? Name any two viruses. Ans. V irus is a program, which is intended to disrupt the normal functioning of the computer system. Example of viruses-Scott’s Valley, Seven Dust. 3. State the difference between Worms and Trojans. Ans. Virus
Worms
The virus is the program code that attaches The worm is code that replicate itself in order itself to application program and when to consume resources to bring it down. application program run it runs along with it. It inserts itself into a file or executable program. It exploits a weakness in an application or operating system by replicating itself. It has to rely on users transferring infected It can use a network to replicate itself to other files/programs to other computer systems. computer systems without user intervention. Infection effect may lead to deletion or Infection usually do not lead to deletion or modification of files. Sometimes a virus also modification of files but only monopolize the changes the location of files. CPU and memory. The infection speed of virus is slower than Infection speed of worm is faster than virus. worm. E.g. The code red worm affected 3 lack PCs in just 14 Hrs.
Security Issues of IT
59
4. State any three ways through which a computer gets infected. Ans. The three ways in which a virus can spread in a computer are: • A virus can spread if you are using an infected media like Pen drives, CD, DVD, etc, which may have itself got infected from some other computer. • Certain virus may attach itself to other software thus every time you run the software, the virus replicates by attaching itself to other software. • Your computer may get infected when you boot your computer using an infected media. 5. What is a Boot Sector virus? Give two examples. Ans. A boot sector virus is a computer virus that infects a storage device’s (usually hard disk) master boot record (MBR). Thus the infected computer is unable to boot. Example- Brain and Michelangelo 6. How are File viruses different from Macro Viruses? Ans. File Virus or Parasitic Virus attaches itself to an arbitrary file. Therefore whenever the host file gets executed the virus also gets executed. Macro Viruses on the other hand uses a programming language embedded in certain software. Thus a document having the macro virus when opened gets the macro virus executed. 7. Write short notes on: a. Multipartite Virus b. Polymorphic Virus c. Stealth Virus Ans. i. Multipartite viruses infect both hard disk sectors along with the executable files. That is why it is also called multipartite or hybrid virus. These viruses has complex mode of replicating itself making it difficult to remove. Emperor, Tequilla and Natas are some examples of these viruses. ii. Polymorphic viruses have the capability of changing itself after infecting a computer. Thus copies of viruses that are present in the computer may be slightly different from each other, which make it difficult for anti-virus software to detect and remove it. Satan Bug, Elkern and Proud are some examples of these viruses. iii. Stealth viruses are made in such a way that makes it almost impossible to detect. Even if they attach itself to a program, the program may appear normal, thus remaining undetected by any anti-virus software. Whale and Zer Bug are some examples of stealth viruses. 8. What is a Spamming? State different ways of stopping spamming. Ans. Spamming refers to the use of electronic messaging systems to send unwanted bulk messages (spam), especially advertising, indiscriminately. The most widely recognized form of spam is e-mail (electronic mail) spam. However the term is also applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, junk fax transmissions, social networking spam, social spam, television advertising and file sharing spam. 60
Foundation of Information Technology – X (Solution)
S pamming remains economically viable because advertisers have very little or sometimes no operating costs beyond the management of their mailing lists, and it is almost impossible to hold senders accountable for their mass mailings. On the other hand it costs huge to the sender and may sometime even get dubbed.
9. What is Spyware? Ans. Spyware programs secretly gather information from the computer it has infected and transmit the information to a different location. It may be used for identifying user habits and post advertisements accordingly or sometimes even vital information like username or passwords may be transmitted. 10. What is an Anti-Virus Software? Explain three options that you generally get with an Anti-Virus software. Ans. Antivirus software is used to remove viruses and other malware programs from your computer. It uses two of these techniques to secure your computer. • Scan files for known viruses that match with the virus definition list that is built within it. But this requires you to continuously update your antivirus software to add new definition to the list. Otherwise your antivirus software goes obsolete and will not be able to remove newer viruses. • Identifies suspicious behavior of a computer program that may had been infected.
The three options that you generally get with an Antivirus Software are:
• Fix: It cleans a file that is infected with a virus. • Quarantine: Certain virus may be too difficult to be removed completely, this virus are disabled and kept in a safe place so that it cannot infect other files. • Delete: It deletes an infected file along with the virus. Since this option also deletes the original file which got infected, it should only be used when the previous two options do not work. 11. What does the term Backup mean? Name the different types of Backups. Ans. B ackup is the action of duplicating documents or databases with the goal that they will be protected if there should arise an occurrence of equipment failure or other calamity. Backup is typically a routine piece of the operation of huge organizations with centralized servers and also the administrators of more diminutive business machines. 12. How is incremental backup different from differential backup? Ans. Incremental Backup creates copies of all the files, or parts of files that have changed since previous backups of any type (full, differential or incremental).
F or example if you did a full backup on Sunday. An incremental backup made on Monday, would only contain files changed since Sunday, and an incremental backup on Tuesday, would only contain files changed since Monday, and so on.
ifferential Backup on the other hand looks at which files have changed since you last did a full D backup. Then creates copies of all the files that are different from the ones in the full backup. If you do a differential backup more than once, it will copy all the files, or parts of files that Security Issues of IT
61
have changed since the last full backup, even if you already have identical copies of those files in a previous differential backup. For restoring all the data, you will only need the the last full backup, and the last differential backup. 13. Write short notes on: a) Software Piracy b) Cybercrime Ans. i. The activities involving unauthorized copying, reproduction, use, or manufacture of software products is called software piracy. Most retail programs are licensed in such a way that it may be used at just one computer or for use by only one user at any time. Whenever you buy a software, you become a licensed user rather than an owner and therefore you are only allowed to make copies of the program for backup purposes, but cannot give copies to friends and colleagues, which is against the law. ii. Cybercrime is a term which is used to refer to criminal activity performed using computers and the Internet. This may include instigating or intimidating someone over the internet, downloading illegal files and stealing millions of dollars from online bank accounts. Other offences like creating and distributing viruses and/or malicious code on other computers or posting confidential business information on the Internet are also part of cybercrime. Conceivably the most prominent form of cybercrime is using the internet to steal personal information from other users leading to identity theft. To do this they usually uses two common methods phishing and pharming. 14. How is hacking different from cracking? Ans. H acking, is the act of stealing personal or private data, without the owner’s knowledge or consent, it could also include other things like stealing passwords, creating a bot net, or pretty much any act that breaches someone’s privacy, without their knowledge, or consent. Cracking on the other hand involves editing a program’s source code, or creating a program, like a key generator (more commonly known as a ‘keygen’), patch, or some sort of application that tricks an application in to thinking that a particular process has occurred. For example, a key generator and a patch for the
dobe Master Collection would trick the software in to thinking that the key entered is correct, A and not let it verify the key with the Adobe master server. Cracking is pretty much looking for a back door in software, and exploiting it for malicious use or for a copyright breaching act.
T hus the difference is that a hacker is someone that uses their extensive knowledge of computer logic and code for malicious purposes, while a cracker - looks for back doors in programs, and exploits those back doors. Cracking is generally less harmful than hacking. Hackers are usually involved with web related hacking, like MySQL interception, or phishing, other forms of hacking would include things like brute force, or password lifting.
15. What is the significance of “Digital Certificate”? Ans. A digital certificate is used to verify that a user sending a message is who he or she claims to be, and to provide the receiver with the means to encode a reply. This is done over the Internet using the public key infrastructure (PKI). 62
Foundation of Information Technology – X (Solution)
16. What is data encryption? Ans. Data Encryption refers to scrambling information and utilizing it to secure data that is constantly hung on a machine, replicated onto CDs or DVDs or transmitted over a system. It utilizes innovations, for example, Virtual Private Networks(VPNs) and secure socket layers.
Application Oriented Questions 1. S hrinivasan is working for an IT firm where he needs to backup his data of around 200MB to 400MB at the end of each day. Each day backup needs to be archived separately for future reference. Suggest any two economic data backup devices, which he can use for this purpose. i. Differentiate between hacker and cracker with reference to their intention and motive. ii. Name one specific software tool for each of the following categories: a. Antivirus b. Data recovery tool c. Online backup tool d. Text editor Ans. He may either use a portable external hard disk or a pen drive to take backup. i. Hacking, is the act of stealing personal or private data, without the owner’s knowledge or consent, it could also include other things like stealing passwords, creating a bot net, or pretty much any act that breaches someone’s privacy, without their knowledge, or consent. Cracking on the other hand involves editing a program’s source code, or creating a program, like a key generator (more commonly known as a ‘keygen’), patch, or some sort of application that tricks an application in to thinking that a particular process has occurred. For example, a key generator and a patch for the
Adobe Master Collection would trick the software in to thinking that the key entered is correct, and not let it verify the key with the Adobe master server. Cracking is pretty much looking for a back door in software, and exploiting it for malicious use or for a copyright breaching act.
Thus the difference is that a hacker is someone that uses their extensive knowledge of computer logic and code for malicious purposes, while a cracker - looks for back doors in programs, and exploits those back doors. Cracking is generally less harmful than hacking. Hackers are usually involved with web related hacking, like MySQL interception, or phishing, other forms of hacking would include things like brute force, or password lifting.
ii. a. QuickHeal b. Hyper V Recovery Manager from Microsoft c. Google Drive d. Notepad
Security Issues of IT
63
2. Give any two shortcomings of online purchase. i. What is encryption of data? ii. Name one antivirus software/tool. Ans. In case you have a spyware, your bank account details may be compromised. 1. The site may not be authentic and there may be Phising attack.
64
i. D ata Encryption refers to scrambling information and utilizing it to secure data that is constantly hung on a machine, replicated onto CDs or DVDs or transmitted over a system. It utilizes innovations, for example, Virtual Private Networks(VPNs) and secure socket layers.
ii. QuickHeal
Foundation of Information Technology – X (Solution)
10 Benefits of ICT A. MCQs. 1. The process of using electronic media for learning is called ________________. a. E-learning b. Media-Learning c. Learning d. Internet Ans. a. E-learning 2. Which among the following is not a characteristics of E-learning? a. Learners have the option to choose learning materials that meets their level of knowledge and interest. b. Learners do not have the flexibility to choose their own time or schedule. c. Learners have the flexibility to study anywhere they have access to a computer and Internet connection d. Self-paced learning modules allow learners to work at their own pace. Ans. b. Learners do not have the flexibility to choose their own time or schedule. 3. Which among the following e-learning sites is most suitable for web designing? a. www.khanacademy.org b. http://ocw.mit.edu c. www.w3schools.com d. www.math-bridge.org Ans. c. www.w3schools.com 4. Which among the following is connected to e-health? a. Health Information b. Education and Training c. Health Systems Management d. All of these Ans. d. All of these 5. A subsidiary of United Nations(UN) whose objective is to look after international health. a. CMS b. eHospital c. eHealth d. WHO Ans. d. WHO 6. Which among the following is not the characteristics of ehealth? a. It allows methods to access electronic medical records, and the ability to access information about alternative approaches to medical treatment. b. Saves on time one of the major constraints of conventional health care services. c. It improves patient safety – a complete overview of clinical and medication history helps to avoid potential errors and complications. d. It cannot provide access to specialist care at distant geographic areas. 65
Ans. d. It cannot provide access to specialist care at distant geographic areas. 7. Which among the following is the national portal of India? a. india.gov.in b. nationindia.gov.in c. india.net.in d. india.nic.in Ans. a. india.gov.in 8. What is the full form of DeitY? a. Department of Electronics and Indian Technology b. Development of Electronics and Information Technology c. Digital Electronics and information Technology d. Department of Electronics & Information Technology Ans. d. Department of Electronics & Information Technology 9. Knowledge Economy combines knowledge and education into a _________________. a. business Product b. productive Asset c. either a or b d. none of these Ans. c. either a or b 10. ______________________ refers to the disparity of classification of person according to their knowledge of ICT and without it. a. Digital Divide b. Digital Disparity c. Developmental Delay d. Digital Unity Ans. a. Digital Divide
B. Fill in the blanks. 1. In e-learning self-paced learning modules allow learners to work at their own pace. 2. E Health Points are units owned and operated by Healthpoint Services India (HSI) that provide families in rural villages about various health issues. 3. A health insurance plan sold over the internet is called eHealthInsurance. 4. U sing ICT for making government services to every corner of the country 24x7 is called e-governance. 5. Knowledge Economy refers to the combining of knowledge and education as a product. 6. Virtual schools are also called Cyber schools. 7. A knowledge based society refers to the type of society that is needed to compete and succeed in the changing economic and political dynamics of the modern world. 8. Infomania refers to those individuals that have compulsive desire to check or accumulate news and information. 9. Digital Unity refers to the collaboration of people at different geographical location to unite together 10. People living in Remote areas do not get the benefits of e-governance because of the lack of infrastructure. 66
Foundation of Information Technology – X (Solution)
C. True (T) or False (F). 1. E -governance has increased the transparency of the government by putting an end in corruption by removing the middle-men and touts play.-T 2. E-governance services are available online and helpful for people having no internet connectivity.-F 3. L ack of literacy resulted in lack of awareness, which prevents people from benefitting from e-governance.-T 4. E -health allows methods to access electronic medical records and the ability to access information about alternative approaches to medical treatment.-T 5. WHO in general looks after the finance in United Nations.-F 6. T he E Health Point concept builds upon and combines proven models to achieve unique synergies and efficiencies.-T 7. In e-learning the learners do not choose learning materials.-F 8. In e-learning, the user can choose their own flexible timings.-T 9. W3Schools is an e-learning sites that has a variety of video lessons for free.-F 10. E-learning gives the flexibility to learn as par his own time.-T
D. Answer the following. 1. How do you think ICT has helped in the field of education? Ans. In recent years there has been a upsurge in the interest of how ICT can best be harnessed to improve the efficiency and effectiveness of education at all levels and in both formal and nonformal settings. Even though, ICT remain at its infancy in most developing nations, where books or printed media remains the cheapest, most accessible and therefore most dominant delivery mechanism. Thus developing countries, like India combine the use of print, recorded audio and video, broadcast radio and television, and audio-conferencing technologies to cater to the need of education. 2. What is e-learning? Mention names of two sites that provide e-learning for free. Ans. Learning that occurs through electronic media, popularly over the Internet is called E-learning. Websites: www.e-learningforkids.org and ocw.umb.edu 3. Give two advantages and disadvantages of e-learning. Ans. Advantages of e-learning: • Learners have the option to choose learning materials that meets their level of knowledge and interest. • Learners have the flexibility to choose their own time or schedule. Disadvantages of e-learning: • It has been that learners with low motivation or bad study habits may fall behind. • Learners who are more used to with traditional teachers may get lost or confused about course activities and deadlines. Benefits of ICT
67
4. What is E-Health? What are areas in which E-Health encompasses? Ans. The transfer of health-care resources by electronic means is termed as E-health. The areas in which E-Health encompasses are: • Health Information: The Internet and telecommunications plays a great role in delivering health information to health professionals and health consumers. • Education and Training: The education and training of health workers to improve public health services using the power of IT and e-commerce. • Health Systems Management: Usage of e-commerce and e-business practices in health systems management. 5. H ow does ICT help the government in providing health care services? How does such services help the common man? Ans.
T he ageing of the population in general has resulted in number of citizens with chronic diseases increasing, especially among elderly people throughout the world. Coupled with not proportional amount health care services has made health a major issue for developing nations. The challenge is to keep both the well-being of the citizens and the public health care systems proper. Here where
ICT comes into the picture to provide health care solutions that solve much of the problems. It helps the common man by: 1. It allows methods to access electronic medical records, and the ability to access information about alternative approaches to medical treatment. 2. Saves on time one of the major constraints of conventional health care services. 3. It improves patient safety – a complete overview of clinical and medication history helps to avoid potential errors and complications.
6. Give two advantages and disadvantages of e-health. Ans. Advantages • It allows methods to access electronic medical records, and the ability to access information about alternative approaches to medical treatment. • Saves on time one of the major constraints of conventional health care services. Disadvantages • Too much of information, might in most situation, lead to confusion. • Since physical presence of the health care consumers is mostly absent, they do not benefit from the clinical experience of the physician.
68
Foundation of Information Technology – X (Solution)
7. What is e-governance? Name three sites that provides e-governance. Ans. E-governance is the application of ICT for transferring of various government services to the citizens of a country. The services are 24x7 and not bounded by any geographical region. Sites: • india.gov.in • deity.gov.in • passportindia.gov.in 8. State two advantages and disadvantages of e-governance. Ans. Advantages of E-governance • The efficacy of the administration and service delivery has drastically improved by E-governance. • Reduced waiting time is one of the benefits of e-governance. Disadvantages of E-governance • People living in remote areas do not get the benefits of e-governance because of the lack of infrastructure. • Completely computerization of all services is yet to be completed and therefore manual methods are still prevalent. 9. What is Knowledge Economy? Ans. K nowledge Economy is the combining the knowledge and education based on creating, evaluating, and trading knowledge. Thus making it a business product and a productive asset. 10. State three ways in which ICT has affected our society. Ans. The three ways in which ICT has changed our society are: • Knowledge Based Society • Digital Unity • Digital Divide
Application Oriented Questions 1. M r Surendra is a Medical Representative in Zev Pharmaceuticals. He usually has to make heavy travelling meeting different doctors and recommending them various medicines. As such he hardly has much time left for leisure. He loves studies, particularly Chemistry. He had studied Chemistry during his graduation and left studies after he joined as a Medical Representative. He wants to pursue his studies in Chemistry. a. What would you suggest him so that he can pursue his studies, without affecting his current job profile? b. Mention few resources for the above solution. Ans. a. He can go for any online E-Learning Course. b. MIT site and IGNOU site Benefits of ICT
69
2. T he primary objective of e-health care is to provide different services related to health to different people, even to the most remote areas. State three advantages of using e-health care services. Also state three drawbacks of using such services. Ans. Advantages of E-health care services • It allows methods to access electronic medical records, and the ability to access information about alternative approaches to medical treatment. • Saves on time one of the major constraints of conventional health care services. • It improves patient safety – a complete overview of clinical and medication history helps to avoid potential errors and complications. Disadvantages of E-health care services • Too much of information, might in most situation, lead to confusion. • Since physical presence of the health care consumers is mostly absent, they do not benefit from the clinical experience of the physician. • First time users may sometimes find it difficult to access the health care services. 3. O ne of the major advantage of using ICT in providing government services to the mass is e-governance. The efficacy of the administration and service delivery has drastically improved by e-governance. a. What is e-governance? b. State at least three ways how it helps common people. Ans. a. E-governance is the application of ICT for transferring of various government services to the citizens of a country. The services are 24x7 and not bounded by any geographical region. b. • The efficacy of the administration and service delivery has drastically improved by E-Governance. • Reduced waiting time is one of the benefits of e-governance. • Citizens that benefit from e-governance does at a minimal cost or no cost at all. 4. I n traditional classrooms, it is often important for students to adopt a pace that suits the classroom, so that no one lags behind others and no one gets too far ahead. a. What is the alternative to traditional classrooms that takes ICT as its major tool? b. State three advantages and disadvantages of using such a medium. Ans. a. Virtual Schools and E-learning are alternative to traditional classrooms.
70
Foundation of Information Technology – X (Solution)
b. Advantages: 1. In many cases, virtual schools allow families and educators to evaluate a student and provide a customized education geared towards helping the student learn and develop. 2. Each child has unique educational strengths, weakness, needs and preferences, and virtual schooling allows families and educators to address these differences. 3. Adopting an average pace is often important, in such cases, to keeping the flow of learning consistent and preventing students from becoming bored and frustrated. Disadvantages: 1. Virtual schools also lack the structure found in traditional schools. 2. They also have difficulties adapting to paper and pencil tests and assignments. 3. They also miss out on personal instruction from teachers as well as classroom discussion Also, unlike brick and mortar schools, students are not under the constant supervision of a teacher.
Benefits of ICT
71
More Documents from "Dev Ladhani"