1. What is communication? From which word is it derived?
Communication
is the process of exchanging information, ideas, or messages between
individuals or systems. It is derived from the Latin word
"communicare," which means "to share."
2. Define telecommunication.
Telecommunication
is the exchange of information over long distances using electronic means such
as telephones, radios, or satellites.
3. Define transceiver.
A transceiver
is a device that can transmit and receive signals, such as those used in radios
and telecommunications.
4. Define wireless.
Wireless refers
to the method of communication that uses electromagnetic waves to transmit data
without the use of physical cables.
5. What is data communication?
Data
communication is the process of transferring data or information between
devices or systems through a communication medium.
6. List the elements of data communication.
The elements of
data communication are:
- Sender
- Receiver
- Message
- Medium
- Protocol
7. What is data transmission mode?
Data
transmission mode refers to the direction in which data flows between two
devices during communication.
8. List different types of data communication.
The types of
data communication are:
- Simplex
- Half-duplex
- Full-duplex
9. Define differences between guided and unguided media.
- Guided Media: Communication occurs through
physical mediums like cables (e.g., twisted-pair, coaxial, fiber-optic
cables).
- Unguided Media: Communication occurs through
wireless means, such as radio waves or satellites.
10. Differences between simplex mode and duplex mode.
- Simplex Mode: Data flows in one direction only
(e.g., TV broadcasting).
- Duplex Mode: Data flows in both directions
(e.g., telephone communication).
11. Define computer network and justify how it reduces
operation cost.
A computer
network is a group of interconnected computers that share resources and data.
It reduces operational costs by enabling resource sharing, reducing hardware
costs, and improving collaboration.
12. What are the advantages of a computer network?
The advantages
are:
- Resource sharing
- Data accessibility
- Enhanced communication
- Cost efficiency
13. What are the disadvantages of a computer network?
The
disadvantages are:
- Security issues
- High setup cost
- Dependency on the server
- Maintenance complexity
14. What is Local Area Network (LAN)? Write its
importance.
A Local Area
Network (LAN) is a network that connects computers in a small geographical
area, like an office or school.
Importance: It facilitates resource sharing, file sharing, and
centralized data management within a local area.
15. What is Metropolitan Area Network (MAN)? Write its
features.
A Metropolitan
Area Network (MAN) is a network that spans a city or a large campus.
Features:
- Covers larger areas than LAN.
- Provides high-speed connectivity.
- Connects multiple LANs.
16. What is Wide Area Network (WAN)? Mention its
characteristics.
A Wide Area
Network (WAN) is a network that connects devices over large geographical areas,
like cities or countries.
Characteristics:
- Long-distance communication.
- Uses leased telecommunication
lines.
- Supports large-scale data
exchange.
17. List the different services provided by a computer
network.
- File sharing
- Resource sharing
- Internet access
- Email communication
18. What is networking architecture or model?
Networking
architecture or model defines the structure and layout of a network, including
how devices communicate and share resources.
19. What are the types of networking architecture?
The types of
networking architecture are:
- Peer-to-peer architecture
- Client-server architecture
20. What is a protocol? List any four types of common
protocols.
A protocol is a
set of rules that govern data communication between devices.
Four common protocols:
- HTTP
- FTP
- SMTP
- TCP/IP
21. Explain about star topology.
Star topology
is a network setup where all devices are connected to a central hub or switch.
Advantages:
- Easy to install and manage.
- Faults in one device do not affect
others.
Disadvantages: - Failure of the central hub affects
the whole network.
- Requires more cables compared to
other topologies.
22. Explain about bus topology.
Bus topology is
a network setup where all devices are connected to a single central cable,
called the backbone.
Advantages:
- Easy to set up.
- Requires less cable.
Disadvantages: - Difficult to troubleshoot.
- A fault in the backbone can
disrupt the entire network.
23. Explain about ring topology.
Ring topology
is a network configuration where devices are connected in a circular chain.
Advantages:
- Data flows in a single direction,
reducing collisions.
- Suitable for small networks.
Disadvantages: - Failure of one device can disrupt
the whole network.
- Adding or removing devices is
difficult.
24. List any four services of the internet.
- Email
- Web browsing
- File transfer
- Online banking
25. List the different hardware components required for
connecting to the internet.
- Modem
- Router
- Network Interface Card (NIC)
- Ethernet cables
26. Define the term "internet" and write its
importance in today’s world.
The internet is
a global network of interconnected computers that enables sharing of
information and resources.
Importance:
- Facilitates communication.
- Provides access to vast
information.
- Supports online education and
e-commerce.
27. What is network topology?
Network
topology refers to the physical or logical arrangement of devices in a network.
28. Define the term "message."
A message is
the information or data that is transmitted from the sender to the receiver in
a communication process.
29. Define the term "sender."
A sender is the
device or individual that initiates communication by transmitting data or
messages.
30. Define the term "receiver."
A receiver is
the device or individual that accepts and processes the transmitted message or
data.
31. What is a medium?
A medium is the
physical or wireless channel used to transmit data between a sender and a
receiver.
32. What is an encoder?
An encoder is a
device or program that converts data into a specific format for efficient
transmission.
33. What is a decoder?
A decoder is a
device or program that converts encoded data back into its original format for
processing.
34. Define half-duplex mode.
Half-duplex
mode is a communication mode where data flows in both directions but only one
direction at a time.
35. Define full duplex mode.
Full duplex
mode is a communication mode where data flows in both directions
simultaneously.
36. What is transmission media? What are the types of it?
Transmission
media is the physical or wireless channel through which data is transmitted.
Types:
- Guided media (e.g., twisted-pair
cable, coaxial cable).
- Unguided media (e.g., radio waves,
microwaves).
37. Define websites.
Websites are
collections of interlinked web pages hosted on a server, accessed through the
internet.
38. Define URL. List its types.
A URL (Uniform
Resource Locator) is the address used to access a specific resource on the
internet.
Types:
- Absolute URL
- Relative URL
39. What is a web browser? Name any two common browser
software.
A web browser
is software that allows users to access and view websites.
Examples:
- Google Chrome
- Mozilla Firefox
40. Define uploading and downloading.
- Uploading: Transferring data from a local
device to a server or the internet.
- Downloading: Retrieving data from a server or
the internet to a local device.
41. Define ISP. Write any two popular ISPs of Nepal.
An ISP
(Internet Service Provider) is a company that provides internet access to
users.
Popular ISPs in Nepal:
- Nepal Telecom
- WorldLink Communications
42. What is a search engine? Write any two popular search
engines.
A search engine
is software that allows users to find information on the internet by entering
keywords.
Examples:
- Google
- Bing
43. Define ARPA.
ARPA (Advanced
Research Projects Agency) is a U.S. government agency responsible for the
development of early networking technologies, including ARPANET, which was the
foundation of the modern internet.
44. Define intranet.
An intranet is
a private network used within an organization to share information and
resources securely.
45. Define e-fax.
E-fax is the
electronic transmission of documents over the internet, functioning as a
digital alternative to traditional fax machines.
46. What are the differences between e-mail and e-fax?
- E-mail: Used for sending text-based
messages and files over the internet.
- E-fax: Used for sending scanned
documents electronically, replicating a fax machine's function.
47. What is Domain Name System?
The Domain Name
System (DNS) is a system that translates human-readable domain names (e.g., www.google.com) into IP addresses understood
by computers.
48. What is e-commerce?
E-commerce is
the buying and selling of goods or services over the internet.
49. Define bridge.
A bridge is a
network device that connects two or more local area networks (LANs) to enable
communication between them.
50. Define WWW.
The World Wide
Web (WWW) is a system of interlinked web pages and multimedia content
accessible via the internet using a web browser.
51. Define video conferencing.
Video
conferencing is a technology that allows people in different locations to
communicate in real time using video and audio.
52. Define Telnet.
Telnet is a
network protocol used to access remote computers over a network, typically for
managing and controlling servers.
53. Define repeater.
A repeater is a
network device that amplifies and retransmits signals to extend the range of a
communication network.
54. Define router.
A router is a
network device that connects multiple networks and directs data packets to
their destination.
55. Difference between switch and hub.
- Switch: Sends data to a specific device
in the network.
- Hub: Broadcasts data to all devices in
the network.
56. Difference between router and switch.
- Router: Connects multiple networks and
manages traffic between them.
- Switch: Connects devices within the same
network.
57. List the different software components required for
connecting to the internet.
- Operating system with network
drivers
- Web browser
- Email client
- Antivirus software
58. What are the three methods of connectors for
fiber-optic cables?
- SC (Subscriber Connector)
- LC (Lucent Connector)
- ST (Straight Tip Connector)
59. Define media connectors. Write its types.
Media
connectors are devices used to connect network cables to computers or other
networking devices.
Types:
- RJ45
- Fiber-optic connectors
60. Define gateway.
A gateway is a
network device that acts as a bridge between two different networks, often with
different protocols.
61. What does the abbreviation "LAN" stand for
in computers?
LAN stands for Local
Area Network.
62. Explain about unbounded media.
Unbounded media
refers to wireless communication media that use electromagnetic waves to
transmit data without physical cables.
Examples: Radio waves, microwaves, infrared.
63. Define network protocol.
A network
protocol is a set of rules and standards that govern how data is transmitted
and received over a network.
64. What is a network interface card (NIC)?
A Network
Interface Card (NIC) is a hardware component that connects a computer to a
network and allows it to communicate with other devices.
65. Mention differences between client/server
architecture and peer-to-peer architecture.
- Client/Server Architecture: A central server provides
resources to multiple clients.
- Peer-to-Peer Architecture: All devices have equal roles and
share resources directly.
66. "Internet is called the network of
networks." Justify.
The internet is
called the "network of networks" because it interconnects millions of
private, public, academic, business, and government networks worldwide.
67. Draw and briefly explain about client-server network.
A client-server
network consists of a central server that provides resources and services to
multiple client computers. The server manages requests and ensures security. (Illustration
required separately.)
68. Give reasons that "Computer networks reduce
operational costs."
Computer
networks reduce operational costs by:
- Enabling resource sharing (e.g.,
printers).
- Reducing data duplication.
- Allowing centralized management.
69. Difference between bounded and unbounded media.
- Bounded Media: Uses physical cables (e.g.,
twisted-pair, coaxial).
- Unbounded Media: Uses wireless signals (e.g.,
radio waves, infrared).
70. Difference between LAN and WAN.
- LAN: Covers a small geographical area
like an office or school.
- WAN: Covers large geographical areas
like cities or countries.
71. What is communication?
Communication
is the process of exchanging information between two or more individuals or
systems.
72. What is telecommunication?
Telecommunication
is the transmission of information over long distances using electronic means
like telephones or satellites.
73. Examples of communication?
- Email
- Phone calls
- Face-to-face conversations
74. Define data communication.
Data
communication is the exchange of data between devices or systems using a
communication medium.
75. Elements of data communication?
- Sender
- Receiver
- Message
- Medium
- Protocol
76. What is data/message?
A message is
the data or information that is transmitted from the sender to the receiver in
a communication process.
77. What is sender?
A sender is the
device or person that initiates communication by sending data or messages.
78. Define medium.
A medium is the
channel through which data is transmitted from the sender to the receiver.
79. Define receiver.
A receiver is
the device or person that receives and processes the transmitted message or
data.
80. Define protocols.
Protocols are a
set of rules that define how data is transmitted, received, and processed
between devices in a network.
81. What is data transmission?
Data
transmission is the process of sending and receiving data between devices over
a communication medium.
82. Types of data transmission?
- Analog transmission
- Digital transmission
83. What is simplex mode?
Simplex mode is
a communication mode where data flows in one direction only, such as in a TV
broadcast.
84. What is duplex mode?
Duplex mode is
a communication mode where data flows in both directions simultaneously or
alternately.
85. Types of duplex mode?
- Half-duplex
- Full-duplex
86. What is half-duplex mode?
Half-duplex
mode allows data to flow in both directions, but only one direction at a time.
87. What is full-duplex mode?
Full-duplex
mode allows data to flow in both directions simultaneously.
88. Difference between simplex mode and duplex mode of
communication?
- Simplex Mode: Data flows in one direction only.
- Duplex Mode: Data flows in both directions,
either alternately or simultaneously.
89. What is an analog signal?
An analog
signal is a continuous signal that varies over time and represents information
in a waveform, such as sound waves.
90. What is a digital signal?
A digital
signal is a discrete signal that represents information using binary code (0s
and 1s).
91. What is modem?
A modem
(modulator-demodulator) is a device that converts digital signals to analog
signals and vice versa for data transmission over communication lines.
92. What is bit?
A bit (binary
digit) is the smallest unit of data in computing, represented as either 0 or 1.
93. What is bandwidth?
Bandwidth is
the maximum amount of data that can be transmitted over a communication medium
in a given time, measured in bits per second (bps).
94. What is communication media?
Communication
media are the channels used to transmit data between devices, either through
physical cables or wireless signals.
95. Types of communication media?
- Guided media (e.g., twisted-pair
cable, fiber-optic cable).
- Unguided media (e.g., radio waves,
microwaves).
96. What is wired media?
Wired media
refers to communication channels that use physical cables to transmit data,
such as twisted-pair and coaxial cables.
97. What is wireless media?
Wireless media
refers to communication channels that use electromagnetic waves to transmit
data without cables, such as radio waves and microwaves.
98. Define twisted-pair cable.
A twisted-pair
cable consists of pairs of insulated copper wires twisted together to reduce
interference and transmit data.
99. Define coaxial cable.
A coaxial cable
is a type of cable with a central conductor surrounded by an insulating layer,
a metallic shield, and an outer protective layer, used for high-frequency data
transmission.
100. What is fiber-optic cable?
A fiber-optic
cable is a communication medium that uses thin strands of glass or plastic to
transmit data as light signals, offering high speed and low interference.
101. What is a microwave system?
A microwave
system uses high-frequency radio waves to transmit data wirelessly over long
distances.
102. What is a radio wave system?
A radio wave
system uses electromagnetic waves in the radio frequency range to transmit data
wirelessly.
103. What is satellite communication?
Satellite
communication involves transmitting data via satellites in Earth's orbit,
enabling long-distance wireless communication.
104. Define infrared transmission.
Infrared
transmission is a wireless communication method that uses infrared light waves
to transmit data over short distances.
105. What is laser transmission?
Laser
transmission uses focused beams of light to transmit data wirelessly over long
distances with high speed and accuracy.
106. What is Wi-Fi technology?
Wi-Fi (Wireless
Fidelity) is a wireless networking technology that allows devices to connect to
the internet or communicate with each other using radio waves.
107. What is guided media?
Guided media
refers to communication channels that use physical cables, such as
twisted-pair, coaxial, and fiber-optic cables, to transmit data.
108. Define unguided media.
Unguided media
refers to communication channels that use wireless methods, such as radio
waves, microwaves, and infrared, to transmit data.
109. Difference between guided media and unguided media?
- Guided Media: Uses physical cables for data
transmission.
- Unguided Media: Uses wireless methods like radio
waves.
110. Define computer network.
A computer
network is a group of interconnected computers that share resources, data, and
services.
111. Some services provided by the computer network?
- File sharing
- Internet access
- Email communication
- Resource sharing (e.g., printers)
112. Terms used in computer networks?
- Node
- Router
- Protocol
- Bandwidth
113. Advantages of computer network?
- Resource sharing
- Cost efficiency
- Improved communication
- Data accessibility
114. Disadvantages of computer network?
- Security risks
- Maintenance complexity
- High setup cost
- Dependency on the server
115. Write components of a computer network.
- Network Interface Card (NIC)
- Router
- Switch
- Cables or wireless medium
116. What is hardware?
Hardware refers
to the physical components of a computer system, such as the CPU, monitor,
keyboard, and mouse.
117. What is a hub?
A hub is a
network device that connects multiple devices in a network and broadcasts data
to all connected devices.
118. What is a switch?
A switch is a
network device that connects multiple devices in a network and directs data to
the specific device it is intended for.
119. What is a router?
A router is a
network device that connects multiple networks and manages the flow of data
between them.
120. What is a bridge?
A bridge is a
network device that connects two or more local area networks (LANs) to work as
a single network.
121. What is a gateway?
A gateway is a
network device that connects two different networks, often with different
protocols, enabling communication between them.
122. What is a repeater?
A repeater is a
network device that amplifies and retransmits signals to extend the range of a
network.
123. What is network operating software?
Network operating
software is software that manages and controls network resources, such as file
sharing, device management, and user access.
124. What is a communication protocol?
A communication
protocol is a set of rules that govern how data is transmitted and received
over a network.
125. What is a device driver?
A device driver
is software that allows the operating system to communicate with hardware
devices.
126. Define LAN.
LAN (Local Area
Network) is a network that connects computers within a small geographical area,
such as an office or school.
127. Define MAN.
MAN
(Metropolitan Area Network) is a network that spans a city or large campus,
connecting multiple LANs.
128. Define WAN.
WAN (Wide Area
Network) is a network that connects devices over large geographical areas, such
as countries or continents.
129. What is network architecture?
Network
architecture defines the design and structure of a network, including how
devices communicate and share resources.
130. Define centralized network.
A centralized
network is a network where all resources and data are managed by a central
server.
131. Define network topologies.
Network
topologies refer to the physical or logical arrangement of devices in a
network.
132. Define bus or linear topology.
Bus topology is
a network setup where all devices are connected to a single central cable,
called the backbone.
133. Define star topology.
Star topology
is a network setup where all devices are connected to a central hub or switch.
134. Define ring topology.
Ring topology
is a network setup where devices are connected in a circular chain, with each
device linked to its neighboring devices.
135. Define internet.
The internet is
a global network of interconnected computers that allows users to share
information and access online resources.
136. Services of the internet.
- Email
- Web browsing
- Online banking
- Social networking
137. What is WWW?
The World Wide
Web (WWW) is a system of interlinked web pages and multimedia content
accessible through the internet.
138. What is electronic mail?
Electronic mail
(email) is a method of sending and receiving messages and files over the
internet.
139. Advantages of email.
- Fast and efficient communication
- Cost-effective
- Allows attachment of files
- Accessible anywhere with an
internet connection
140. What is e-mail fraud?
Email fraud is
a type of cybercrime where fraudulent emails are sent to deceive recipients
into providing personal or financial information.
141. What is e-fax?
E-fax is the
process of sending and receiving fax messages through email or the internet
instead of traditional fax machines.
142. Difference between e-fax and e-mail.
- E-fax: Used for transmitting scanned
documents electronically, replicating traditional faxing.
- E-mail: Used for sending text-based
messages and attachments over the internet.
143. What is IRC?
IRC (Internet
Relay Chat) is a protocol for real-time text messaging and communication over
the internet.
144. What is video conferencing?
Video
conferencing is a technology that enables real-time audio and video
communication between individuals or groups in different locations.
145. Define File Transfer Protocol (FTP).
FTP (File
Transfer Protocol) is a standard protocol used for transferring files between
computers on a network.
146. Define newsgroups (Usenet).
Newsgroups,
also known as Usenet, are online discussion forums where users can share and
discuss information on specific topics.
147. What is online banking?
Online banking
is a service that allows customers to perform financial transactions through
the internet using a bank's secure platform.
148. Features of online banking.
- Account management
- Fund transfers
- Bill payments
- Loan applications
149. What is a search engine?
A search engine
is software that helps users find specific information on the internet by entering
keywords or phrases.
150. Write the popular search engines.
- Google
- Bing
- Yahoo
Notes Prepared By : Aastha Shrees, Sudarshan Thapa, SEE Batch 2081 ( Brilliant United Academy)
Ethical And Social Issues in ICT
1. What is
cyber ethics?
Cyber ethics
refers to rules and principles guiding ethical behavior and responsible use of
computers and internet technologies.
2. What is
computer ethics?
Computer ethics
refers to moral guidelines and standards for using computers, software, and
data in a responsible manner.
3. Write any
four commandments of computer ethics.
- Do not harm others using
computers.
- Do not steal data.
- Respect privacy.
- Do not spread malware.
4. What is
digital citizenship?
Digital
citizenship refers to responsible and safe participation in the digital world,
respecting others' rights and following online ethics.
5. Write any
four elements of digital citizenship.
- Digital etiquette.
- Digital literacy.
- Digital safety.
- Respect for intellectual property
rights.
6. Define
digital footprint.
A digital
footprint refers to the trail of data created when users browse, post, or
interact on digital platforms.
7. What are the
main classifications of digital footprints?
Digital
footprints are classified as active footprints (intentional actions like
posting) and passive footprints (unintentional data like browsing
history).
8. Write the
managing or protecting digital footprints.
Managing
digital footprints refers to controlling online activities, securing privacy
settings, deleting unused accounts, and avoiding oversharing sensitive
information.
9. What is
cyberbullying?
Cyberbullying
refers to using online platforms to harm, harass, or embarrass others through
negative comments, threats, or false content.
10. What are
the objectives of ICT?
Objectives of
ICT include improving communication, enhancing education, creating job
opportunities, and ensuring access to global information resources.
11. What is IT
policy?
IT policy
refers to guidelines and rules promoting proper, ethical, and secure use of
information and communication technologies (ICT).
12. Write any
five ways to manage digital footprints.
- Use privacy settings.
- Avoid sharing sensitive data.
- Delete unused accounts.
- Monitor online activities.
- Use strong passwords.
13. What is the
major vision of IT policy of Nepal?
The major
vision of Nepal's IT policy is transforming Nepal into a knowledge-based
society by utilizing information technology effectively.
14. What is the
mission of the IT policy of Nepal?
The mission of
IT policy refers to ensuring access to technology, promoting digital literacy,
and supporting innovation for national development.
15. What is
electronic transaction? When was the electronic transaction act introduced in
Nepal?
Electronic
transaction refers to online buying, selling, or data exchange. The Electronic
Transaction Act was introduced in Nepal in 2004.
16. What is
meant by malicious apps?
Malicious apps
refer to software intentionally designed to harm devices, steal data, or
disrupt system operations and functionality.
17. What is
social media?
Social media
refers to platforms like Facebook and Instagram that allow users to share,
communicate, and interact digitally.
18. What kind
of attack is social scams and phishing attacks?
Social scams
and phishing attacks refer to deceptive methods tricking users into revealing
personal information, like passwords or credit card details.
19. What is
malware?
Malware refers
to malicious software, such as viruses or spyware, designed to disrupt, damage,
or steal data from systems.
20. What is
hacking?
Hacking refers
to gaining unauthorized access to a system or network to steal, modify, or
disrupt data or services.
21. Write any
two examples of computer ethics.
Examples of
computer ethics are respecting others’ privacy and avoiding software piracy by
not using unlicensed software.
22. Why is
ethics important in information technology?
Ethics in IT
refers to ensuring responsible use of technology, protecting privacy, avoiding
misuse, and respecting intellectual property rights.
23. What is the
purpose of hacking?
The purpose of
hacking refers to either malicious intent (stealing data) or ethical goals
(finding system weaknesses to improve security).
24. List any
four places where cyberbullying occurs.
Cyberbullying
occurs on social media, messaging apps, online gaming platforms, and emails,
where people misuse technology to harm others.
25. Briefly
explain cyber law. Why is it needed?
Cyber law
refers to legal rules governing online activities. It is needed to prevent
cybercrimes and protect user privacy.
26. Explain any
two threats in social media.
- Cyberbullying: Harassment online.
- Phishing: Tricking users to steal sensitive
data like passwords or financial information.
27. What is the
full form of ICT?
ICT refers to Information
and Communication Technology.
28. What is the
full form of SME?
SME refers to Small
and Medium Enterprise.
29. What is the
full form of ISP?
ISP refers to Internet
Service Provider.
30. What is the
full form of SMO?
SMO refers to Social
Media Optimization.
31. Write the
full form of the following:
i. ETA:
Electronic Transaction Act
ii. MITC: Ministry of Information Technology and Communication
iii. DOS: Denial of Service
32. What is
social engineering?
Social
engineering refers to tricking people into revealing confidential information
by exploiting their trust and lack of awareness.
33. What do you
mean by social scams and phishing attacks?
Social scams
and phishing attacks refer to fraudulent activities that trick users into
sharing sensitive information like passwords or financial details.
34. Define fake
accounts.
Fake accounts
refer to online profiles created with false identities, often used for scams,
impersonation, or spreading misinformation.
35. Define
malware attack and hacks.
A malware
attack refers to harmful software disrupting systems, while hacks refer to
unauthorized access to steal or manipulate data.
36. Write the
opportunities in social media.
Social media
opportunities refer to connecting people, sharing knowledge, promoting
businesses, learning skills, and spreading information quickly to a wide
audience.
37. Define
copyright law.
Copyright law
refers to legal protection for creators’ original work, ensuring it is not
copied, reproduced, or used without permission.
38. Define
trademark law.
Trademark law
refers to the protection of brand names, logos, and symbols, ensuring
businesses retain unique identity and ownership.
39. Define
digital signature law.
Digital
signature law refers to rules governing secure and valid electronic signatures
for verifying identity in online transactions.
40. Share your
thoughts about cyberbullying.
Cyberbullying
refers to online harassment that harms others emotionally. It must stop through
awareness, ethical use, and stricter rules.
41. Define IT
policy 2022 in short.
IT policy 2022
refers to a framework aimed at promoting digital literacy, innovation,
technology access, and national development through ICT.
42. What is the
Electric Transaction Act?
The Electric
Transaction Act refers to legal provisions ensuring secure, reliable, and
trusted digital transactions and e-commerce practices.
43. Write the
cyber ethics domains it mainly deals with.
Cyber ethics
domains refer to privacy protection, intellectual property rights, prevention
of hacking, responsible social media use, and data security.
44. Describe
do's and don'ts of cyber ethics in a table.
Do's |
Don'ts |
Respect
privacy. |
Don’t steal
data. |
Use licensed
software. |
Don’t spread
malware. |
Follow
copyright rules. |
Don’t hack
systems. |
Report
cybercrimes. |
Don’t engage
in cyberbullying. |
45. Define
telecommunication law.
Telecommunication
law refers to regulations ensuring fair use of communication technologies like
phones, the internet, and other digital platforms.
46. Define data
protection and privacy law.
Data protection
and privacy law refers to rules ensuring personal data is collected, stored,
and used securely and ethically.
47. When was
cyber law started in Nepal?
Cyber law in
Nepal refers to the legal framework introduced in 2004 through the Electronic
Transaction Act to regulate digital activities.
48. What is the
full form of CCA?
CCA refers to Certified
Computer Administrator.
49. Define
technical terms.
Technical terms
refer to specific words or phrases related to technology, such as “IP address,”
“server,” or “encryption.”
50. What are
the moral issues that deal with the use of ICT?
Moral issues in
ICT refer to privacy concerns, copyright violations, data misuse, and ethical
behavior while using technology and online platforms.
51. What is the
policy formulated for the overall development of ICT and secure society?
The IT policy
refers to a framework promoting ICT development for economic growth, digital
literacy, and creating a secure online society.
52. What is an
online platform that enables people to build a social network?
An online
platform like Facebook or Instagram refers to websites or apps used to create
and maintain social connections digitally.
53. Who is the
person who gains unauthorized access to an information system and uses it for
personal benefits?
A hacker refers
to someone who gains unauthorized access to systems to steal, modify, or misuse
sensitive information.
54. Write any
two tips to maintain digital reputation.
- Be mindful of what you post
online.
- Regularly review and update your
privacy settings on social media platforms.
55. What is the
difference between cyber law and cybercrime?
Cyber law
refers to rules governing online behavior, while cybercrime refers to illegal
activities like hacking, phishing, or spreading viruses.
56. How many
members are needed to represent the private sector?
Three members
refer to the representatives from the private sector in Nepal’s IT council for
ICT development.
57. Define
digital access.
Digital access
refers to the ability of individuals to use technology and the internet for
communication, learning, and work purposes.
58. What is
digital commerce?
Digital
commerce refers to the buying and selling of goods or services using online
platforms like websites and mobile apps.
59. What is
digital communication?
Digital
communication refers to exchanging information electronically through emails,
messages, video calls, or social media platforms.
60. Define
digital literacy.
Digital
literacy refers to the ability to use technology effectively, responsibly, and
safely for communication, learning, and problem-solving.
61. Define
digital etiquette.
Digital
etiquette refers to the proper and respectful behavior when communicating or
interacting online with others.
62. What is digital
law and digital security?
Digital law
refers to rules for ethical use of technology, while digital security refers to
measures for protecting data and systems.
63. Define
digital health and wellness.
Digital health
and wellness refers to using technology in a balanced way to protect physical
and mental health, like reducing screen time.
64. Write the
ways to become a good digital citizen.
Becoming a good
digital citizen refers to respecting others’ privacy, avoiding cyberbullying,
using technology responsibly, and following online ethics.
65. What is
meant by a digital citizen?
A digital
citizen refers to someone who uses technology responsibly, ethically, and
safely in the digital environment.
66. Write any
four objectives of the electronic transaction act 2003.
- Ensure secure transactions.
- Promote e-commerce.
- Prevent cybercrimes.
- Protect digital users’ rights.
67. Write any
two objectives of the IT policy of Nepal.
- To promote digital literacy.
- To create employment opportunities
in the ICT sector.
68. List any
two problems of IT policy.
- Lack of infrastructure in rural
areas.
- Limited awareness about IT
policies among people.
69. What are
the four examples of cybercrime?
Examples of
cybercrime are hacking, spreading viruses, identity theft, and online scams
like phishing or fraud.
70. What is the
difference between the do's and don'ts of cyber ethics?
Do’s refer to
responsible actions like respecting privacy, while don’ts refer to harmful
actions like hacking or cyberbullying.
71. Define
engineering.
Engineering
refers to the application of science and technology to design, build, and solve
practical problems effectively.
72. Define
human error.
Human error
refers to mistakes made by people, often leading to system failures, data
breaches, or cybersecurity issues.
73. Define
phishing.
Phishing refers
to a cyberattack where attackers trick users into sharing sensitive information
like passwords through fake emails or websites.
Computer Security
1. What is
computer security?
Computer
security refers to measures and practices for protecting computers, networks,
and data from unauthorized access or damage.
2. What are the
factors of computer security?
Factors of computer
security include confidentiality, integrity, availability, authentication,
access control, and regular system updates.
3. How many
reasons to use and keep the computer safely? Give some reasons.
Keeping
computers safe protects personal data, prevents malware attacks, ensures system
reliability, and supports secure online activities.
4. What do you
mean by information security?
Information
security refers to protecting digital or physical data from unauthorized
access, use, or theft through proper security measures.
5. How can the
information be protected?
Information can
be protected by encryption, using strong passwords, limiting access, regular
updates, and antivirus software.
6. Define
security threats.
Security
threats refer to potential dangers like viruses, phishing, malware, and hacking
that compromise computer and network systems.
7. What is
hacking?
Hacking refers
to unauthorized access to computer systems or networks to steal, modify, or
misuse information.
8. What are the
types of security threats?
Types of
security threats include malware, phishing, spyware, ransomware, and
Distributed Denial of Service (DDoS) attacks.
9. Define
phishing.
Phishing refers
to tricking users into revealing sensitive information like passwords through
fake emails or websites.
10. What is
meant by rootkit attack?
A rootkit
attack refers to software that hides in a system to gain unauthorized access
and control over the computer.
11. Write the
types of rootkits.
Types of
rootkits include kernel-level rootkits, application-level rootkits,
hardware-based rootkits, and firmware rootkits.
12. What is a
keylogger?
A keylogger
refers to software or hardware that secretly records a user’s keystrokes to
steal sensitive information.
13. How can you
detect keyloggers?
Keyloggers can
be detected by using updated antivirus software, monitoring unusual system
activity, and inspecting installed programs.
14. What do you
mean by botnet attack?
A botnet attack
refers to a network of infected computers used by attackers to perform
large-scale malicious activities.
15. Write down
the prevention of botnets with cybersecurity controls.
Prevent botnets
by updating software, using firewalls, installing antivirus, and avoiding
suspicious links or downloads.
16. Define
hacker.
A hacker refers
to a person who gains unauthorized access to systems to steal, modify, or
misuse data or resources.
17. Make a list
of classified types of hackers.
Types of
hackers include:
- White Hat (Ethical Hackers).
- Black Hat (Malicious Hackers).
- Grey Hat (Mix of Both).
18. What is a
cracker?
A cracker
refers to a person who breaks into systems or software for malicious purposes,
often to steal or destroy data.
19. Define
cracking.
Cracking refers
to breaking software protections like passwords or licenses to gain
unauthorized access or misuse software.
20. What is
computer ethics? Write any two of them.
Computer ethics
refers to rules for responsible computer use.
- Respect others’ privacy.
- Avoid illegal software copying.
21. Define
hardware security.
Hardware
security refers to protecting physical computer components like CPUs, storage
devices, and servers from theft or damage.
22. What is
data and information security?
Data and information
security refer to protecting data and information from unauthorized access,
alteration, or destruction.
23. What is
backup?
A backup refers
to creating a copy of data to restore it in case of loss due to system failure
or cyberattack.
24. Why is backup
vital to computer security systems?
Backup is vital
for recovering lost data, ensuring business continuity, and protecting against
ransomware attacks or accidental deletion.
25. What is a
password?
A password
refers to a secret combination of characters used to authenticate and secure
access to a system or account.
26. Why is a
password used in a computer?
A password is
used to restrict unauthorized access and protect data in computers, accounts,
or online services.
27. Define
encryption and decryption.
Encryption
refers to converting data into an unreadable format, while decryption refers to
converting encrypted data back to its original form.
28. What are
malicious codes?
Malicious codes
refer to harmful programs like viruses, worms, and spyware that disrupt or
damage computer systems.
29. Define
firewall with examples.
A firewall
refers to a security device or software that blocks unauthorized access to
networks, like Windows Firewall or Cisco ASA.
30. What is
biometric verification?
Biometric
verification refers to using physical characteristics like fingerprints, facial
recognition, or voice to authenticate users securely.
31. What is
software security?
Software
security refers to measures to protect applications from threats like malware,
hacking, and unauthorized access.
32. Write any
four measures of hardware security.
- Use locks for hardware.
- Implement CCTV surveillance.
- Secure physical access.
- Protect hardware from
environmental hazards.
33. What is a
power protection device? Write its role in computer security.
A power
protection device refers to tools like UPS or surge protectors that prevent
damage to systems during power fluctuations.
34. Why is it
important to protect computer systems from dust?
Protecting from
dust prevents overheating, improves system efficiency, and avoids damage to
sensitive components like fans and processors.
35. What is
antivirus software? Write four examples.
Antivirus
software refers to programs that detect and remove malware. Examples: Norton,
Avast, McAfee, Kaspersky.
36. Define worm
with an example.
A worm refers
to a self-replicating malware that spreads across networks. Example: Mydoom.
37. What is
spyware and adware?
Spyware refers
to software that secretly gathers user data. Adware refers to software that
displays unwanted advertisements on systems.
38. Define
ransomware. How can you protect from ransomware on social media?
Ransomware
refers to malware that locks data for a ransom. Protect by avoiding unknown
links, updating antivirus, and enabling backups.
39. Write any
four uses of biometrics.
- Secure login.
- Attendance systems.
- Mobile phone unlocking.
- Restricted area access.
40. Define
keylogger. What are the processes to detect it?
A keylogger
refers to software that records keystrokes. Detect by using antivirus,
monitoring system behavior, and inspecting installed programs.
41. What is a
botnet attack? Write any four ways to prevent botnets with cybersecurity
controls.
A botnet attack
refers to using infected devices for malicious activities. Prevent with
firewalls, antivirus, strong passwords, and updates.
42. Why are
power protection devices needed in computers? Name any four such devices.
Power
protection devices prevent damage from power surges. Examples: UPS, voltage
stabilizer, surge protector, spike guard.
43. Write the
common rules for making a strong password.
Rules include
using a mix of uppercase, lowercase, numbers, and symbols; avoiding common
words; and updating passwords regularly.
44. Write the
importance of information security.
Information
security refers to protecting data from unauthorized access, ensuring
confidentiality, integrity, and availability of sensitive information.
45. Differentiate
between encryption and decryption.
Encryption
refers to converting data into a secure format. Decryption refers to converting
encrypted data back into readable form.
46. Define
Scandisk.
Scandisk refers
to a Windows utility that checks and fixes errors on hard drives, improving
system performance and reliability.
47. What do you
mean by defragmentation?
Defragmentation
refers to reorganizing scattered data on a disk to improve storage efficiency
and system performance.
48. What is
biometric? Write some common uses of it.
Biometric
refers to authentication using physical traits like fingerprints. Uses: mobile
unlocking, attendance, banking, and security access.
49. Differentiate
between ethical hacker and cracker.
Ethical hacker
refers to authorized individuals finding security flaws. Cracker refers to
malicious hackers breaking systems illegally.
50. Write any
four differences between authentication and authorization in computer security.
- Authentication: Verifies identity; Authorization:
Grants access.
- Authentication: Uses passwords; Authorization:
Uses roles.
- Authentication: Happens first; Authorization:
Happens after authentication.
- Authentication: Confirms users; Authorization:
Confirms permissions.
51. What is
CCTV? How can we get benefits from CCTV?
CCTV refers to
closed-circuit television used for monitoring. Benefits include preventing
theft, improving security, and gathering evidence.
52. List any
one major factor which causes infection of our computer system.
Downloading
files from untrusted sources refers to a major factor causing infections like
malware or viruses in systems.
53. Define fire
extinguisher.
A fire
extinguisher refers to a safety device used to control or put out small fires,
including electrical and hardware-related fires.
54. Write the
full form of CPAV.
CPAV refers to Central
Point Antivirus.
55. Write any
two differences between Volt Guard and Spike Guard.
- Volt guard protects from voltage
fluctuations. Spike guard protects from power surges.
- Volt guard stabilizes current.
Spike guard blocks excess current.
56. What is the
full form of UPS?
UPS refers to Uninterruptible
Power Supply.
57. When was
the first CCTV system started?
The first CCTV
system refers to the system installed in 1942 by Siemens AG in Germany for
military testing.
58. What do you
mean by Hard Lock Key?
Hard lock key
refers to a hardware device that prevents software from unauthorized use,
ensuring copyright protection.
59. What are
the software security mechanisms?
Software
security mechanisms refer to firewalls, antivirus programs, intrusion detection
systems, encryption, and multi-factor authentication.
60. Define
insurance. How can people get benefits from it?
Insurance
refers to financial protection against losses. Benefits include covering costs
from theft, fire, or cyber incidents.
61. What are
the disadvantages of CCTV?
Disadvantages
include privacy invasion, high installation costs, and vulnerability to hacking
or tampering by attackers.
62. What is a
password policy? Write any two important criteria for creating a strong
password.
Password policy
refers to rules for secure passwords. Criteria: Use mixed characters, avoid
common words, and change passwords regularly.
63. What is
system hacking?
System hacking
refers to gaining unauthorized access to a system to modify, steal, or destroy
data.
64. Define
viruses. What are the popular computer viruses?
Viruses refer
to malicious programs replicating in systems. Examples: Melissa, WannaCry,
ILOVEYOU, and Trojan Horse.
Notes
Prepared By : Nishana Ghatri Magar, Susan Somai SEE Batch 2081 ( Brilliant United Academy)
Computer Security
1. What is
computer security?
Computer
security refers to measures and practices for protecting computers, networks,
and data from unauthorized access or damage.
2. What are the
factors of computer security?
Factors of computer
security include confidentiality, integrity, availability, authentication,
access control, and regular system updates.
3. How many
reasons to use and keep the computer safely? Give some reasons.
Keeping
computers safe protects personal data, prevents malware attacks, ensures system
reliability, and supports secure online activities.
4. What do you
mean by information security?
Information
security refers to protecting digital or physical data from unauthorized
access, use, or theft through proper security measures.
5. How can the
information be protected?
Information can
be protected by encryption, using strong passwords, limiting access, regular
updates, and antivirus software.
6. Define
security threats.
Security
threats refer to potential dangers like viruses, phishing, malware, and hacking
that compromise computer and network systems.
7. What is
hacking?
Hacking refers
to unauthorized access to computer systems or networks to steal, modify, or
misuse information.
8. What are the
types of security threats?
Types of
security threats include malware, phishing, spyware, ransomware, and
Distributed Denial of Service (DDoS) attacks.
9. Define
phishing.
Phishing refers
to tricking users into revealing sensitive information like passwords through
fake emails or websites.
10. What is
meant by rootkit attack?
A rootkit
attack refers to software that hides in a system to gain unauthorized access
and control over the computer.
11. Write the
types of rootkits.
Types of
rootkits include kernel-level rootkits, application-level rootkits,
hardware-based rootkits, and firmware rootkits.
12. What is a
keylogger?
A keylogger
refers to software or hardware that secretly records a user’s keystrokes to
steal sensitive information.
13. How can you
detect keyloggers?
Keyloggers can
be detected by using updated antivirus software, monitoring unusual system
activity, and inspecting installed programs.
14. What do you
mean by botnet attack?
A botnet attack
refers to a network of infected computers used by attackers to perform
large-scale malicious activities.
15. Write down
the prevention of botnets with cybersecurity controls.
Prevent botnets
by updating software, using firewalls, installing antivirus, and avoiding
suspicious links or downloads.
16. Define
hacker.
A hacker refers
to a person who gains unauthorized access to systems to steal, modify, or
misuse data or resources.
17. Make a list
of classified types of hackers.
Types of
hackers include:
- White Hat (Ethical Hackers).
- Black Hat (Malicious Hackers).
- Grey Hat (Mix of Both).
18. What is a
cracker?
A cracker
refers to a person who breaks into systems or software for malicious purposes,
often to steal or destroy data.
19. Define
cracking.
Cracking refers
to breaking software protections like passwords or licenses to gain
unauthorized access or misuse software.
20. What is
computer ethics? Write any two of them.
Computer ethics
refers to rules for responsible computer use.
- Respect others’ privacy.
- Avoid illegal software copying.
21. Define
hardware security.
Hardware
security refers to protecting physical computer components like CPUs, storage
devices, and servers from theft or damage.
22. What is
data and information security?
Data and information
security refer to protecting data and information from unauthorized access,
alteration, or destruction.
23. What is
backup?
A backup refers
to creating a copy of data to restore it in case of loss due to system failure
or cyberattack.
24. Why is backup
vital to computer security systems?
Backup is vital
for recovering lost data, ensuring business continuity, and protecting against
ransomware attacks or accidental deletion.
25. What is a
password?
A password
refers to a secret combination of characters used to authenticate and secure
access to a system or account.
26. Why is a
password used in a computer?
A password is
used to restrict unauthorized access and protect data in computers, accounts,
or online services.
27. Define
encryption and decryption.
Encryption
refers to converting data into an unreadable format, while decryption refers to
converting encrypted data back to its original form.
28. What are
malicious codes?
Malicious codes
refer to harmful programs like viruses, worms, and spyware that disrupt or
damage computer systems.
29. Define
firewall with examples.
A firewall
refers to a security device or software that blocks unauthorized access to
networks, like Windows Firewall or Cisco ASA.
30. What is
biometric verification?
Biometric
verification refers to using physical characteristics like fingerprints, facial
recognition, or voice to authenticate users securely.
31. What is
software security?
Software
security refers to measures to protect applications from threats like malware,
hacking, and unauthorized access.
32. Write any
four measures of hardware security.
- Use locks for hardware.
- Implement CCTV surveillance.
- Secure physical access.
- Protect hardware from
environmental hazards.
33. What is a
power protection device? Write its role in computer security.
A power
protection device refers to tools like UPS or surge protectors that prevent
damage to systems during power fluctuations.
34. Why is it
important to protect computer systems from dust?
Protecting from
dust prevents overheating, improves system efficiency, and avoids damage to
sensitive components like fans and processors.
35. What is
antivirus software? Write four examples.
Antivirus
software refers to programs that detect and remove malware. Examples: Norton,
Avast, McAfee, Kaspersky.
36. Define worm
with an example.
A worm refers
to a self-replicating malware that spreads across networks. Example: Mydoom.
37. What is
spyware and adware?
Spyware refers
to software that secretly gathers user data. Adware refers to software that
displays unwanted advertisements on systems.
38. Define
ransomware. How can you protect from ransomware on social media?
Ransomware
refers to malware that locks data for a ransom. Protect by avoiding unknown
links, updating antivirus, and enabling backups.
39. Write any
four uses of biometrics.
- Secure login.
- Attendance systems.
- Mobile phone unlocking.
- Restricted area access.
40. Define
keylogger. What are the processes to detect it?
A keylogger
refers to software that records keystrokes. Detect by using antivirus,
monitoring system behavior, and inspecting installed programs.
41. What is a
botnet attack? Write any four ways to prevent botnets with cybersecurity
controls.
A botnet attack
refers to using infected devices for malicious activities. Prevent with
firewalls, antivirus, strong passwords, and updates.
42. Why are
power protection devices needed in computers? Name any four such devices.
Power
protection devices prevent damage from power surges. Examples: UPS, voltage
stabilizer, surge protector, spike guard.
43. Write the
common rules for making a strong password.
Rules include
using a mix of uppercase, lowercase, numbers, and symbols; avoiding common
words; and updating passwords regularly.
44. Write the
importance of information security.
Information
security refers to protecting data from unauthorized access, ensuring
confidentiality, integrity, and availability of sensitive information.
45. Differentiate
between encryption and decryption.
Encryption
refers to converting data into a secure format. Decryption refers to converting
encrypted data back into readable form.
46. Define
Scandisk.
Scandisk refers
to a Windows utility that checks and fixes errors on hard drives, improving
system performance and reliability.
47. What do you
mean by defragmentation?
Defragmentation
refers to reorganizing scattered data on a disk to improve storage efficiency
and system performance.
48. What is
biometric? Write some common uses of it.
Biometric
refers to authentication using physical traits like fingerprints. Uses: mobile
unlocking, attendance, banking, and security access.
49. Differentiate
between ethical hacker and cracker.
Ethical hacker
refers to authorized individuals finding security flaws. Cracker refers to
malicious hackers breaking systems illegally.
50. Write any
four differences between authentication and authorization in computer security.
- Authentication: Verifies identity; Authorization:
Grants access.
- Authentication: Uses passwords; Authorization:
Uses roles.
- Authentication: Happens first; Authorization:
Happens after authentication.
- Authentication: Confirms users; Authorization:
Confirms permissions.
51. What is
CCTV? How can we get benefits from CCTV?
CCTV refers to
closed-circuit television used for monitoring. Benefits include preventing
theft, improving security, and gathering evidence.
52. List any
one major factor which causes infection of our computer system.
Downloading
files from untrusted sources refers to a major factor causing infections like
malware or viruses in systems.
53. Define fire
extinguisher.
A fire
extinguisher refers to a safety device used to control or put out small fires,
including electrical and hardware-related fires.
54. Write the
full form of CPAV.
CPAV refers to Central
Point Antivirus.
55. Write any
two differences between Volt Guard and Spike Guard.
- Volt guard protects from voltage
fluctuations. Spike guard protects from power surges.
- Volt guard stabilizes current.
Spike guard blocks excess current.
56. What is the
full form of UPS?
UPS refers to Uninterruptible
Power Supply.
57. When was
the first CCTV system started?
The first CCTV
system refers to the system installed in 1942 by Siemens AG in Germany for
military testing.
58. What do you
mean by Hard Lock Key?
Hard lock key
refers to a hardware device that prevents software from unauthorized use,
ensuring copyright protection.
59. What are
the software security mechanisms?
Software
security mechanisms refer to firewalls, antivirus programs, intrusion detection
systems, encryption, and multi-factor authentication.
60. Define
insurance. How can people get benefits from it?
Insurance
refers to financial protection against losses. Benefits include covering costs
from theft, fire, or cyber incidents.
61. What are
the disadvantages of CCTV?
Disadvantages
include privacy invasion, high installation costs, and vulnerability to hacking
or tampering by attackers.
62. What is a
password policy? Write any two important criteria for creating a strong
password.
Password policy
refers to rules for secure passwords. Criteria: Use mixed characters, avoid
common words, and change passwords regularly.
63. What is
system hacking?
System hacking
refers to gaining unauthorized access to a system to modify, steal, or destroy
data.
64. Define
viruses. What are the popular computer viruses?
Viruses refer
to malicious programs replicating in systems. Examples: Melissa, WannaCry,
ILOVEYOU, and Trojan Horse.
Notes
Prepared By : Nishana Ghatri Magar, Susan Somai SEE Batch 2081 ( Brilliant United Academy)
Post a Comment