Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

Online Mid Term Examination Fall-Evening 2020

Student ID: _____16279(Owais) Date: 3/November/2020


__________ JJJJJUNEJune=________________
Course Title: Introduction to Computers Course Code: MIS-302

Program: BBA (2Y) Teacher Name: Aamir Hussain

Semester: I(A), II(A), III(A) Marks: 20

Instructions:
 MUST write your Name, KASBIT Student ID.
 Attempt the Mid-term exam paper by typing on MS-Word.
 Merge this file and your attempted Mid-term exam paper into ONE Single File and
convert this file into Pdf.
 Name the pdf file as e.g. ID-XXXXX Mid-term exam.
 You must press the submit button in the LMS after uploading your attempted
Mid-term paper.
 Upload your ONE Single pdf File of Mid Term Exam on LMS before the due date
and time (By email not permitted).
 You must take reference from Internet to give a detailed answer. Also mention
web pages referred after attempting each question.
 Late submission NOT Permitted.
 All the students are supposed to concentrate on the assignment on an individual basis.
If the submitted document speaks of any copying, duplication or plagiarism, it shall
stand cancelled.
================================================================
Q1) Define E-Comerce and also explain its types. (4 Marks)
Ans1)
Ecommerce definition

Ecommerce (e-commerce) or electronic commerce, a subset of ebusiness, is the


purchasing, selling, and exchanging of goods and services over computer networks
(such as the Internet) through which transactions or terms of sale are performed
electronically. Contrary to popular belief, ecommerce is not just on the Web. In fact,
ecommerce was alive and well in business to business transactions before the Web
back in the 70s via EDI (Electronic Data Interchange) through VANs (Value-Added
Networks). Ecommerce can be broken into four main categories: B2B, B2C, C2B,
and C2C.

Types of ecommerce

B2B (Business-to-Business)
Companies doing business with each other such as manufacturers selling to
distributors and wholesalers selling to retailers. Pricing is based on quantity of order
and is often negotiable.

B2C (Business-to-Consumer)

Businesses selling to the general public typically through catalogs utilizing shopping
cart software. By dollar volume, B2B takes the prize, however B2C is really what the
average Joe has in mind with regards to ecommerce as a whole.

Having a hard time finding a book? Need to purchase a custom, high-end computer
system? How about a first class, all-inclusive trip to a tropical island? With the advent
ecommerce, all three things can be purchased literally in minutes without human
interaction. Oh how far we've come!

C2B (Consumer-to-Business)

A consumer posts his project with a set budget online and within hours companies
review the consumer's requirements and bid on the project. The consumer reviews
the bids and selects the company that will complete the project. Elance empowers
consumers around the world by providing the meeting ground and platform for such
transactions.

C2C (Consumer-to-Consumer)

There are many sites offering free classifieds, auctions, and forums where
individuals can buy and sell thanks to online payment systems like PayPal where
people can send and receive money online with ease. eBay's auction service is a
great example of where person-to-person transactions take place everyday since
1995.

Reference:Digismith
Q2) What is a trojan horse? Also explain the impact of trojan horses on your
Computer. (4 Marks)
Ans.2

Trojan horse
A Trojan horse, or Trojan, is a type of malicious code or software that looks
legitimate but can take control of your computer. A Trojan is designed to damage,
disrupt, steal, or in general inflict some other harmful action on your data or network.

Impact of Trojan horses on your Computer

You might think you’ve received an email from someone you know and click on what
looks like a legitimate attachment. But you’ve been fooled. The email is from a
cybercriminal, and the file you clicked on and downloaded and opened has gone on
to install malware on your device.

Common types of Trojan malware, from A to Z

Here’s a look at some of the most common types of Trojan malware, including their
names and what they do on your computer:

Backdoor Trojan

This Trojan can create a “backdoor” on your computer. It lets an attacker access
your computer and control it. Your data can be downloaded by a third party and
stolen. Or more malware can be uploaded to your device. When you execute the
program, the malware can spread to other files and damage your computer.

Distributed Denial of Service (DDoS) attack Trojan

This Trojan performs DDoS attacks. The idea is to take down a network by flooding it
with traffic. That traffic comes from your infected computer and others.

Downloader Trojan

This Trojan targets your already-infected computer. It downloads and installs new
versions of malicious programs. These can include Trojans and adware.

Fake AV Trojan

This Trojan behaves like antivirus software, but demands money from you to detect
and remove threats, whether they’re real or fake.
Game-thief Trojan
The losers here may be online gamers. This Trojan seeks to steal their account
information.

Infostealer Trojan

As it sounds, this Trojan is after data on your infected computer.

Mailfinder Trojan

This Trojan seeks to steal the email addresses you’ve accumulated on your device.

Ransom Trojan

This Trojan seeks a ransom to undo damage it has done to your computer. This can
include blocking your data or impairing your computer’s performance.

Remote Access Trojan

This Trojan can give an attacker full control over your computer via a remote network
connection. Its uses include stealing your information or spying on you.

Rootkit Trojan

A rootkit aims to hide or obscure an object on your infected computer. The idea? To
extend the time a malicious program runs on your device.

SMS Trojan

This type of Trojan infects your mobile device and can send and intercept text
messages. Texts to premium-rate numbers can drive up your phone costs.

Trojan banker

This Trojan takes aim at your financial accounts. It’s designed to steal your account
information for all the things you do online. That includes banking, credit card, and
bill pay data.

Trojan IM

This Trojan targets instant messaging. It steals your logins and passwords on IM
platforms. That’s just a sample. There are a lot more.
Reference:Written by Alison Grace Johansen for NortonLifeLock
Q3) Define Operating systems. Also explain the types and functions of operating
systems. (4 Marks)

Ans.3
Operating systems
An Operating System performs all the basic tasks like managing file, process, and
memory. Thus operating system acts as manager of all the resources, i.e. resource
manager. Thus operating system becomes an interface between user and machine.

Types of Operating Systems

Batch Operating System


This type of operating system does not interact with the computer directly. There is
an operator which takes similar jobs having same requirement and group them into
batches. It is the responsibility of operator to sort the jobs with similar needs.

Examples of Batch based Operating System: Payroll System, Bank Statements


etc.

Time-Sharing Operating Systems


Each task is given some time to execute, so that all the tasks work smoothly. Each
user gets time of CPU as they use single system. These systems are also known as
Multitasking Systems. The task can be from single user or from different users also.
The time that each task gets to execute is called quantum. After this time interval is
over OS switches over to next task.

Examples of Time-Sharing OSs are: Multics, Unix etc

Distributed Operating System


These types of operating system is a recent advancement in the world of computer
technology and are being widely accepted all-over the world and, that too, with a
great pace. Various autonomous interconnected computers communicate each other
using a shared communication network. Independent systems possess their own
memory unit and CPU. These are referred as loosely coupled systems or
distributed systems. These system’s processors differ in size and function. The
major benefit of working with these types of operating system is that it is always
possible that one user can access the files or software which are not actually present
on his system but on some other system connected within this network i.e., remote
access is enabled within the devices connected in that network.

Examples of Distributed Operating System are- LOCUS etc.


Network Operating System
These systems run on a server and provide the capability to manage data, users,
groups, security, applications, and other networking functions. These type of
operating systems allow shared access of files, printers, security, applications, and
other networking functions over a small private network. One more important aspect
of Network Operating Systems is that all the users are well aware of the underlying
configuration, of all other users within the network, their individual connections etc.
and that’s why these computers are popularly known as tightly coupled systems.

Examples of Network Operating System are: Microsoft Windows Server 2003,


Microsoft Windows Server 2008, UNIX, Linux, Mac OS X, Novell NetWare, and BSD
etc.

Real-Time Operating System


These types of OSs serves the real-time systems. The time interval required to
process and respond to inputs is very small. This time interval is called response time.
Real-time systems are used when there are time requirements are very strict like
missile systems, air traffic control systems, robots etc.

Examples of Real-Time Operating Systems are: Scientific experiments, medical


imaging systems, industrial control systems, weapon systems, robots, air traffic
control systems, etc.

Function of Operating System


Security
The operating system uses password protection to protect user data and similar other
techniques. it also prevents unauthorized access to programs and user data.

Control over system performance


Monitors overall system health to help improve performance. records the response time
between service requests and system response to have a complete view of the system health.
This can help improve performance by providing important information needed to
troubleshoot problems.

Job accounting
Operating system Keeps track of time and resources used by various tasks and users, this
information can be used to track resource usage for a particular user or group of user.

Error detecting aids


Operating system constantly monitors the system to detect errors and avoid the
malfunctioning of computer system.

Coordination between other software and users


Operating systems also coordinate and assign interpreters, compilers, assemblers
and other software to the various users of the computer systems.
Memory Management
The operating system manages the Primary Memory or Main Memory. Main memory
is made up of a large array of bytes or words where each byte or word is assigned a
certain address.

Processor Management
In a multi programming environment, the OS decides the order in which processes
have access to the processor, and how much processing time each process has.
This function of OS is called process scheduling. An Operating System performs the
following activities for processor management

Device Management
An OS manages device communication via their respective drivers. It performs the
following activities for device management.

File Management
An Operating System carries out the following file management activities..

Reference Article Tags :


GATE CS ,Operating Systems, School Programming, CBSE - Class 11,school-programming
Q4) Discuss in detail about various operators which can be used while using the
search engines and the purpose of using that operator. (4 Marks)
Ans.4
Search Operators

Search Operators are commands that help you filter and refine search engine
results. For example, using the search operator “site:” allows you to only see results
from one website in search engine results.

Most search engines support the same search operators, but they also have their
own unique operators. Other data-rich applications such as Twitter and email apps
like Apple’s Mail app also support various search operators.

A few common Google search operators include:

Operator Description
Get results from certain sites or domains.
site:
Examples: olympics site:nbc.com and olympics site:.gov
Find pages that link to a certain page.
link: Example: link:youtube.com

Find sites that are similar to a web address you already know.
related: Example: related:time.com

When you use a dash before a word or site, it excludes sites with that info from your resu
- words with multiple meanings, like Jaguar the car brand and jaguar the animal.
Examples: jaguar speed -car or pandas -site:wikipedia.org

When you put a word or phrase in quotes, the results will only include pages with the sam
" order as the ones inside the quotes. Only use this if you’re looking for an exact word or ph
exclude many helpful results by mistake.
Example: "imagine all the people"

OR Find pages that might use one of several words.


Example: marathon OR race

Search operators are powerful and can save searchers a lot of time, especially since
most operators can be used together.

Notice this search uses a combination of three search operators:

1. links:
2. site:
3. –
By looking at the results, you can see there are about 46,000 indexed pages that
match your criteria. You can use advanced search methods like this to research your
website or to research competitors.

Search operators are powerful, but can be particular. When using search operators,
do not include a space after any colons. A search for site:nytimes.com will work,
but site: nytimes.com won’t be accurate because of the extra space.

Search Operator Resources


1.Google Search Operators
2.Google Advanced Search
3.Bing Advanced Search Options
4.8 Google Advanced Search Operators for SEO
5.25 Killer Combos for Google’s Site: Operator

Reference:RavenTools

Q5) Give a brief descriptions of various E-book readers available in the market.
(2 Marks)
Ans:5
VARIOUS TYPES OF DIGITAL E-BOOK READERS
The concept of using a digital book reader instead of the traditional printed book
format made its appearance in the industry several years ago—the Franklin e-
BookMan was released in 1999. But the idea didn't catch on until recent years, when
a wide variety of improved eReaders and tablet devices hit the market. These new-
age e-book readers, being both convenient and cost-effective, have managed to
carve out a significant niche in the publishing market. Added to this, the rising
popularity of smartphones, which allow for easy installation of book reader
applications, has further revolutionized the e-reading industry.

Digital book readers that have revolutionized e-reading:

Dedicated e-book readers

Amazon Kindle: Amazon is one of the leaders in e-book readers. Its latest
offering is its 4th-generation model (introduced late 2011) that comes with a 5-way
controller and Wi-Fi. The Kindle's success lies in its long battery life, its e-ink screen
(claimed to cause less eye strain) and its ability to read MOBI, PRC files as well as
PDF and TXT documents
Barnes & Noble Nook: Barnes & Noble's e-book readers include the Nook,
Nook color and Nook Simple Touch, all which run on the Android operating system.
It offers easy downloading via the Barnes & Noble Store. Its only drawback is its
inability to support Word or PDF files
BeBook Neo: The BeBook Neo e-book reader, manufactured by Endless Ideas
BV, a Dutch manufacturer of home and office electronics products, comes with an
open-market technology, comfortable design and long battery life to make reading
enjoyable. The Neo also offers up to 16GB storage and Wacom touch screen
technology
Kobo e-reader: The Kobo e-reader supports EPUB, PDF and Adobe DRM
formats and comes with 100 free books to get you started. On the flip side, it doesn't
have Wi-Fi or 3G to upload content
Sony Reader: Sony's latest model is the Reader Wi-Fi, a new design that
allows direct download from public libraries that support wireless technology. It
supports a wide range of formats including EPUB (with or without Adobe DRM), PDF
(with or without Adobe DRM), TXT, RTF, DOC, JPG, PNG, GIF, BMP, MP3 and AAC
Q6) Define top level domain. What is the purpose of top level domains? Also give
some examples. (2 Marks)
Ans.6
Top Level Domain
At their essence, a TLD, also known as a domain extension, is what follows the
domain name in a query. The .com in google.com is the top-level domain. These
extensions were proposed as methods to help further distinguish and categorize
domains. In the early days of the internet, the system was much more rigidly
categorized according to these TLDs.

Purpose & Types


A top-level domain was intended to help classify a feature of a website, such as its
purpose, the owner, or the geographical origin. It also multiplied the number of
available domain names, since cars.com is not the same as cars.org. To this effect,
six original top-level domain names were created. Now that you understand what
domain name extensions are, and know how they work, here are some of the most
common options available:

 .com – Short for commercial, dot-coms are the most popular top-level
domain in use today. As their names imply, they were initially intended to
distinguish commercial organizations. The first three .coms were:
o Symbolics.com
o BBN.com
o Thnk.com

In the early days, .coms were restricted to commercial entities, but by the 90’s these
restrictions were lifted, opening the registration floodgates. As the internet continued
to grow in use and popularity, dot-coms quickly became the most commonly used
top-level domain.

 .net – Short for network, dot-nets were made for network technology
companies like infrastructure companies or internet service providers (ISPs).
When they were first introduced, only one domain used the dot-net TLD,
Nordu.net, which connected Nordic national research and educational
networks. Similar to .coms, the restrictions on .net was not rigidly imposed,
which led it to eventually morph into a “general purpose namespace.”

 .edu – As you likely know, .edu is a top-level domain meant for American
educational institutions, such as colleges or secondary schools. The first three
.edus were:
o University of California Berkeley – Berkeley.edu
o Carnegie Mellon University – Cmu.edu
o Purdue University – Purdue.edu
Unlike dot-nets or dot-coms, the dot-edu TLD restriction has been rigidly upheld,
meaning you have to be an accredited and registered educational body. While it
used to be simply four-year post-secondary institutions, it is now limited to accredited
American postsecondary educational institutions.

 .org – Originally created for organizations which served as nonprofits, with


the first being the Mitre Corporation at Mitre.org. This too became a general
namespace TLD used by both nonprofit and for-profit organizations.

 .mil – Created and used by the American military. Dot-mils are top-level
domain extensions that are restricted to U.S. military branches:
o United States Army
o United States Navy
o United States Marine Corps
o United States Air Force
o United States Coast Guard

As a note, countries outside of America that wish to use .mil, first have to use their
country code to distinguish them from the American military branches.

 .gov – Short for the government, dot-govs, similar to dot-mils, are restricted
to American federal governmental agencies and personal use. Dot-govs are
used by federal governmental agencies, programs, cities, states, counties,
and towns.

Reference: By Kristin Crabb

You might also like