Professional Documents
Culture Documents
Mid Term Introduction To Computers
Mid Term Introduction To Computers
Instructions:
MUST write your Name, KASBIT Student ID.
Attempt the Mid-term exam paper by typing on MS-Word.
Merge this file and your attempted Mid-term exam paper into ONE Single File and
convert this file into Pdf.
Name the pdf file as e.g. ID-XXXXX Mid-term exam.
You must press the submit button in the LMS after uploading your attempted
Mid-term paper.
Upload your ONE Single pdf File of Mid Term Exam on LMS before the due date
and time (By email not permitted).
You must take reference from Internet to give a detailed answer. Also mention
web pages referred after attempting each question.
Late submission NOT Permitted.
All the students are supposed to concentrate on the assignment on an individual basis.
If the submitted document speaks of any copying, duplication or plagiarism, it shall
stand cancelled.
================================================================
Q1) Define E-Comerce and also explain its types. (4 Marks)
Ans1)
Ecommerce definition
Types of ecommerce
B2B (Business-to-Business)
Companies doing business with each other such as manufacturers selling to
distributors and wholesalers selling to retailers. Pricing is based on quantity of order
and is often negotiable.
B2C (Business-to-Consumer)
Businesses selling to the general public typically through catalogs utilizing shopping
cart software. By dollar volume, B2B takes the prize, however B2C is really what the
average Joe has in mind with regards to ecommerce as a whole.
Having a hard time finding a book? Need to purchase a custom, high-end computer
system? How about a first class, all-inclusive trip to a tropical island? With the advent
ecommerce, all three things can be purchased literally in minutes without human
interaction. Oh how far we've come!
C2B (Consumer-to-Business)
A consumer posts his project with a set budget online and within hours companies
review the consumer's requirements and bid on the project. The consumer reviews
the bids and selects the company that will complete the project. Elance empowers
consumers around the world by providing the meeting ground and platform for such
transactions.
C2C (Consumer-to-Consumer)
There are many sites offering free classifieds, auctions, and forums where
individuals can buy and sell thanks to online payment systems like PayPal where
people can send and receive money online with ease. eBay's auction service is a
great example of where person-to-person transactions take place everyday since
1995.
Reference:Digismith
Q2) What is a trojan horse? Also explain the impact of trojan horses on your
Computer. (4 Marks)
Ans.2
Trojan horse
A Trojan horse, or Trojan, is a type of malicious code or software that looks
legitimate but can take control of your computer. A Trojan is designed to damage,
disrupt, steal, or in general inflict some other harmful action on your data or network.
You might think you’ve received an email from someone you know and click on what
looks like a legitimate attachment. But you’ve been fooled. The email is from a
cybercriminal, and the file you clicked on and downloaded and opened has gone on
to install malware on your device.
Here’s a look at some of the most common types of Trojan malware, including their
names and what they do on your computer:
Backdoor Trojan
This Trojan can create a “backdoor” on your computer. It lets an attacker access
your computer and control it. Your data can be downloaded by a third party and
stolen. Or more malware can be uploaded to your device. When you execute the
program, the malware can spread to other files and damage your computer.
This Trojan performs DDoS attacks. The idea is to take down a network by flooding it
with traffic. That traffic comes from your infected computer and others.
Downloader Trojan
This Trojan targets your already-infected computer. It downloads and installs new
versions of malicious programs. These can include Trojans and adware.
Fake AV Trojan
This Trojan behaves like antivirus software, but demands money from you to detect
and remove threats, whether they’re real or fake.
Game-thief Trojan
The losers here may be online gamers. This Trojan seeks to steal their account
information.
Infostealer Trojan
Mailfinder Trojan
This Trojan seeks to steal the email addresses you’ve accumulated on your device.
Ransom Trojan
This Trojan seeks a ransom to undo damage it has done to your computer. This can
include blocking your data or impairing your computer’s performance.
This Trojan can give an attacker full control over your computer via a remote network
connection. Its uses include stealing your information or spying on you.
Rootkit Trojan
A rootkit aims to hide or obscure an object on your infected computer. The idea? To
extend the time a malicious program runs on your device.
SMS Trojan
This type of Trojan infects your mobile device and can send and intercept text
messages. Texts to premium-rate numbers can drive up your phone costs.
Trojan banker
This Trojan takes aim at your financial accounts. It’s designed to steal your account
information for all the things you do online. That includes banking, credit card, and
bill pay data.
Trojan IM
This Trojan targets instant messaging. It steals your logins and passwords on IM
platforms. That’s just a sample. There are a lot more.
Reference:Written by Alison Grace Johansen for NortonLifeLock
Q3) Define Operating systems. Also explain the types and functions of operating
systems. (4 Marks)
Ans.3
Operating systems
An Operating System performs all the basic tasks like managing file, process, and
memory. Thus operating system acts as manager of all the resources, i.e. resource
manager. Thus operating system becomes an interface between user and machine.
Job accounting
Operating system Keeps track of time and resources used by various tasks and users, this
information can be used to track resource usage for a particular user or group of user.
Processor Management
In a multi programming environment, the OS decides the order in which processes
have access to the processor, and how much processing time each process has.
This function of OS is called process scheduling. An Operating System performs the
following activities for processor management
Device Management
An OS manages device communication via their respective drivers. It performs the
following activities for device management.
File Management
An Operating System carries out the following file management activities..
Search Operators are commands that help you filter and refine search engine
results. For example, using the search operator “site:” allows you to only see results
from one website in search engine results.
Most search engines support the same search operators, but they also have their
own unique operators. Other data-rich applications such as Twitter and email apps
like Apple’s Mail app also support various search operators.
Operator Description
Get results from certain sites or domains.
site:
Examples: olympics site:nbc.com and olympics site:.gov
Find pages that link to a certain page.
link: Example: link:youtube.com
Find sites that are similar to a web address you already know.
related: Example: related:time.com
When you use a dash before a word or site, it excludes sites with that info from your resu
- words with multiple meanings, like Jaguar the car brand and jaguar the animal.
Examples: jaguar speed -car or pandas -site:wikipedia.org
When you put a word or phrase in quotes, the results will only include pages with the sam
" order as the ones inside the quotes. Only use this if you’re looking for an exact word or ph
exclude many helpful results by mistake.
Example: "imagine all the people"
Search operators are powerful and can save searchers a lot of time, especially since
most operators can be used together.
1. links:
2. site:
3. –
By looking at the results, you can see there are about 46,000 indexed pages that
match your criteria. You can use advanced search methods like this to research your
website or to research competitors.
Search operators are powerful, but can be particular. When using search operators,
do not include a space after any colons. A search for site:nytimes.com will work,
but site: nytimes.com won’t be accurate because of the extra space.
Reference:RavenTools
Q5) Give a brief descriptions of various E-book readers available in the market.
(2 Marks)
Ans:5
VARIOUS TYPES OF DIGITAL E-BOOK READERS
The concept of using a digital book reader instead of the traditional printed book
format made its appearance in the industry several years ago—the Franklin e-
BookMan was released in 1999. But the idea didn't catch on until recent years, when
a wide variety of improved eReaders and tablet devices hit the market. These new-
age e-book readers, being both convenient and cost-effective, have managed to
carve out a significant niche in the publishing market. Added to this, the rising
popularity of smartphones, which allow for easy installation of book reader
applications, has further revolutionized the e-reading industry.
Amazon Kindle: Amazon is one of the leaders in e-book readers. Its latest
offering is its 4th-generation model (introduced late 2011) that comes with a 5-way
controller and Wi-Fi. The Kindle's success lies in its long battery life, its e-ink screen
(claimed to cause less eye strain) and its ability to read MOBI, PRC files as well as
PDF and TXT documents
Barnes & Noble Nook: Barnes & Noble's e-book readers include the Nook,
Nook color and Nook Simple Touch, all which run on the Android operating system.
It offers easy downloading via the Barnes & Noble Store. Its only drawback is its
inability to support Word or PDF files
BeBook Neo: The BeBook Neo e-book reader, manufactured by Endless Ideas
BV, a Dutch manufacturer of home and office electronics products, comes with an
open-market technology, comfortable design and long battery life to make reading
enjoyable. The Neo also offers up to 16GB storage and Wacom touch screen
technology
Kobo e-reader: The Kobo e-reader supports EPUB, PDF and Adobe DRM
formats and comes with 100 free books to get you started. On the flip side, it doesn't
have Wi-Fi or 3G to upload content
Sony Reader: Sony's latest model is the Reader Wi-Fi, a new design that
allows direct download from public libraries that support wireless technology. It
supports a wide range of formats including EPUB (with or without Adobe DRM), PDF
(with or without Adobe DRM), TXT, RTF, DOC, JPG, PNG, GIF, BMP, MP3 and AAC
Q6) Define top level domain. What is the purpose of top level domains? Also give
some examples. (2 Marks)
Ans.6
Top Level Domain
At their essence, a TLD, also known as a domain extension, is what follows the
domain name in a query. The .com in google.com is the top-level domain. These
extensions were proposed as methods to help further distinguish and categorize
domains. In the early days of the internet, the system was much more rigidly
categorized according to these TLDs.
.com – Short for commercial, dot-coms are the most popular top-level
domain in use today. As their names imply, they were initially intended to
distinguish commercial organizations. The first three .coms were:
o Symbolics.com
o BBN.com
o Thnk.com
In the early days, .coms were restricted to commercial entities, but by the 90’s these
restrictions were lifted, opening the registration floodgates. As the internet continued
to grow in use and popularity, dot-coms quickly became the most commonly used
top-level domain.
.net – Short for network, dot-nets were made for network technology
companies like infrastructure companies or internet service providers (ISPs).
When they were first introduced, only one domain used the dot-net TLD,
Nordu.net, which connected Nordic national research and educational
networks. Similar to .coms, the restrictions on .net was not rigidly imposed,
which led it to eventually morph into a “general purpose namespace.”
.edu – As you likely know, .edu is a top-level domain meant for American
educational institutions, such as colleges or secondary schools. The first three
.edus were:
o University of California Berkeley – Berkeley.edu
o Carnegie Mellon University – Cmu.edu
o Purdue University – Purdue.edu
Unlike dot-nets or dot-coms, the dot-edu TLD restriction has been rigidly upheld,
meaning you have to be an accredited and registered educational body. While it
used to be simply four-year post-secondary institutions, it is now limited to accredited
American postsecondary educational institutions.
.mil – Created and used by the American military. Dot-mils are top-level
domain extensions that are restricted to U.S. military branches:
o United States Army
o United States Navy
o United States Marine Corps
o United States Air Force
o United States Coast Guard
As a note, countries outside of America that wish to use .mil, first have to use their
country code to distinguish them from the American military branches.
.gov – Short for the government, dot-govs, similar to dot-mils, are restricted
to American federal governmental agencies and personal use. Dot-govs are
used by federal governmental agencies, programs, cities, states, counties,
and towns.