Professional Documents
Culture Documents
Prepared By: "HABIB ULLAH" Email:: Cell # 0342-1918726
Prepared By: "HABIB ULLAH" Email:: Cell # 0342-1918726
UNIT: 01
NETWORKING
A collection of two or more than two computers that are linked together through
communication medium (wired or wireless) in order to share computer resources and
information is called a computer Network or simply a network, it can be used for simple
task like sharing a printer, scanner, software games etc….
Network are commonly classified into three types according to the geographical
boundaries these classifications are:
Ans: Modem is a popular communication device which is normally used for internet
communication. Modem is the combination of the two words Modulation and
Demodulation.
INTERNET MODEM:
EXTERNAL MODEM:
WIRELESS MODEM:
A) Fiber-Optic cable:
Fiber optic cable is one of the most advanced and expensive type of
communication medium and expensive type of thin glass fibers which are slightly
thicker than a human hair. These fibers are contains in a protective tube suitable for any
environment. Fiber optic cables allow transmission over slightly distance and it very
higher very less chances of data losses.
C) Bluetooth:
SHORT QUESTIONS:
Differentiate between
the following Client and
Server:
A device that sends or transmits the data over network is called Sender.
WAN spread over area larger than that of MAN i.e. across cities or
continents. A WAN can have many LANs and MANs connected to it.
Transmission Medium:
A transmission medium is a path used to send and receive data from the
communication device. It may be wired or wireless.
The wired path over which transmission of data takes place is called physical
transmission media. Its types are: -
Coaxial Cable:
The devices which are required to make up a network are called network components.
Implementation is simple.
Low cost.
UNIT: 02
COMPUTER SECURITY
Q.1 Fill in the blanks.
i. ____________________________ is the protection against threats.
(Security)
ii. ____________________________infect other computers through computer network.
(Worms)
iii. __________________________ is a program which delivers ads to your computer.
(Adware)
iv. __________________________ are the evil genius computer program.
(Hackers)
v. __________________________program protect your computer against virus attack.
(Anti-Virus)
Q.2 Choose the correct answer.
i. In computer security, a possible damage, loss or crime that may harm your
computer is:
a) Load shedding b) Flood c) Hacking d) Threat
ii. The most common type of security threat is:
a) Virus b) Worm c) Adware
iv. ______________________is a program which delivers ads to your computer.
a) Virus b) Worm c) Adware d) Anti Virus software
v. A threat that uses computer networks to replicate itself:
a) Virus b) Worm c) Adware d) None of the above
Q.3 Write “T” for true and “F” for false.
i. Threats are harmless. (F)
ii. There is no difference between computer virus and worm. (F)
iii. Computer virus is hardware. (F)
iv. AVG is a computer virus. (F)
v. Symantec is the name of Antivirus program. (T)
Q.4 Define computer security threats. Threats write briefly about virus.
ANS: COMPUTER SECURITY THREATS:
In computer security, a threat is a possible danger, loss or crime that may cause
possible harm.
VIRUS:
The most common type of security threat is computer virus. A computer virus is
a small program that inserts ad replicates itself in the computer without your
knowledge and takes over the control of the computer system computer virus system.
Computer viruses are usually man-made.
SHORT QUESTIONS:
Differentiate between
the following
authorization.
o. An adware automatically plays or downloads advertisements on the
computer from internet.
Flash drive and floppy drives:
Flash drives are modern way of transmitting data from one PC to another.
Floppy drives are old technology having very less capacity.
A virus is a malicious program that infects computer program and make changes
in program code.
Email attachments:
An email attachment is a computer file sent along with an email message.
Infected flash drives:
Infected flash drives carry malicious program in it. When a user plug in the
infected flash drives in computer, it spread the virus in the computer and infects
the data.
Symantec:
Symantec Corporation is the manufacturer of security software for computers.
AVG:
AVG has made innovation in the industry in software development, threat
detection, threat prevention and risk analysis.
What do you understand by computer security?
Computer security is the field of Information Technology which deals with data
protection.
Write a short note on security threats.
Security threats are the possible ways in which the vulnerability of the computer
security system can be exploited by the malignant users or software.
Who is a hacker?
Hacker is programmer who uses his expertise for malicious purpose. A hacker
gains unauthorized access to a computer system. The purpose is to steal data
“Long Questions”
What are the ways to protect your computer from virus attacks?