SEE Computer Science Notes ( Chapter Wise)


 Data Communication & Telecommunication


1. What is communication? From which word is it derived?

Communication is the process of exchanging information, ideas, or messages between individuals or systems. It is derived from the Latin word "communicare," which means "to share."


2. Define telecommunication.

Telecommunication is the exchange of information over long distances using electronic means such as telephones, radios, or satellites.


3. Define transceiver.

A transceiver is a device that can transmit and receive signals, such as those used in radios and telecommunications.


4. Define wireless.

Wireless refers to the method of communication that uses electromagnetic waves to transmit data without the use of physical cables.


5. What is data communication?

Data communication is the process of transferring data or information between devices or systems through a communication medium.


6. List the elements of data communication.

The elements of data communication are:

  1. Sender
  2. Receiver
  3. Message
  4. Medium
  5. Protocol

7. What is data transmission mode?

Data transmission mode refers to the direction in which data flows between two devices during communication.


8. List different types of data communication.

The types of data communication are:

  1. Simplex
  2. Half-duplex
  3. Full-duplex

9. Define differences between guided and unguided media.

  • Guided Media: Communication occurs through physical mediums like cables (e.g., twisted-pair, coaxial, fiber-optic cables).
  • Unguided Media: Communication occurs through wireless means, such as radio waves or satellites.

10. Differences between simplex mode and duplex mode.

  • Simplex Mode: Data flows in one direction only (e.g., TV broadcasting).
  • Duplex Mode: Data flows in both directions (e.g., telephone communication).

11. Define computer network and justify how it reduces operation cost.

A computer network is a group of interconnected computers that share resources and data. It reduces operational costs by enabling resource sharing, reducing hardware costs, and improving collaboration.


12. What are the advantages of a computer network?

The advantages are:

  1. Resource sharing
  2. Data accessibility
  3. Enhanced communication
  4. Cost efficiency

13. What are the disadvantages of a computer network?

The disadvantages are:

  1. Security issues
  2. High setup cost
  3. Dependency on the server
  4. Maintenance complexity

14. What is Local Area Network (LAN)? Write its importance.

A Local Area Network (LAN) is a network that connects computers in a small geographical area, like an office or school.
Importance: It facilitates resource sharing, file sharing, and centralized data management within a local area.


15. What is Metropolitan Area Network (MAN)? Write its features.

A Metropolitan Area Network (MAN) is a network that spans a city or a large campus.
Features:

  1. Covers larger areas than LAN.
  2. Provides high-speed connectivity.
  3. Connects multiple LANs.

16. What is Wide Area Network (WAN)? Mention its characteristics.

A Wide Area Network (WAN) is a network that connects devices over large geographical areas, like cities or countries.
Characteristics:

  1. Long-distance communication.
  2. Uses leased telecommunication lines.
  3. Supports large-scale data exchange.

17. List the different services provided by a computer network.

  1. File sharing
  2. Resource sharing
  3. Internet access
  4. Email communication

18. What is networking architecture or model?

Networking architecture or model defines the structure and layout of a network, including how devices communicate and share resources.


19. What are the types of networking architecture?

The types of networking architecture are:

  1. Peer-to-peer architecture
  2. Client-server architecture

20. What is a protocol? List any four types of common protocols.

A protocol is a set of rules that govern data communication between devices.
Four common protocols:

  1. HTTP
  2. FTP
  3. SMTP
  4. TCP/IP


21. Explain about star topology.

Star topology is a network setup where all devices are connected to a central hub or switch.
Advantages:

  1. Easy to install and manage.
  2. Faults in one device do not affect others.
    Disadvantages:
  3. Failure of the central hub affects the whole network.
  4. Requires more cables compared to other topologies.

22. Explain about bus topology.

Bus topology is a network setup where all devices are connected to a single central cable, called the backbone.
Advantages:

  1. Easy to set up.
  2. Requires less cable.
    Disadvantages:
  3. Difficult to troubleshoot.
  4. A fault in the backbone can disrupt the entire network.

23. Explain about ring topology.

Ring topology is a network configuration where devices are connected in a circular chain.
Advantages:

  1. Data flows in a single direction, reducing collisions.
  2. Suitable for small networks.
    Disadvantages:
  3. Failure of one device can disrupt the whole network.
  4. Adding or removing devices is difficult.

24. List any four services of the internet.

  1. Email
  2. Web browsing
  3. File transfer
  4. Online banking

25. List the different hardware components required for connecting to the internet.

  1. Modem
  2. Router
  3. Network Interface Card (NIC)
  4. Ethernet cables

26. Define the term "internet" and write its importance in today’s world.

The internet is a global network of interconnected computers that enables sharing of information and resources.
Importance:

  1. Facilitates communication.
  2. Provides access to vast information.
  3. Supports online education and e-commerce.

27. What is network topology?

Network topology refers to the physical or logical arrangement of devices in a network.


28. Define the term "message."

A message is the information or data that is transmitted from the sender to the receiver in a communication process.


29. Define the term "sender."

A sender is the device or individual that initiates communication by transmitting data or messages.


30. Define the term "receiver."

A receiver is the device or individual that accepts and processes the transmitted message or data.


31. What is a medium?

A medium is the physical or wireless channel used to transmit data between a sender and a receiver.


32. What is an encoder?

An encoder is a device or program that converts data into a specific format for efficient transmission.


33. What is a decoder?

A decoder is a device or program that converts encoded data back into its original format for processing.


34. Define half-duplex mode.

Half-duplex mode is a communication mode where data flows in both directions but only one direction at a time.


35. Define full duplex mode.

Full duplex mode is a communication mode where data flows in both directions simultaneously.


36. What is transmission media? What are the types of it?

Transmission media is the physical or wireless channel through which data is transmitted.
Types:

  1. Guided media (e.g., twisted-pair cable, coaxial cable).
  2. Unguided media (e.g., radio waves, microwaves).

37. Define websites.

Websites are collections of interlinked web pages hosted on a server, accessed through the internet.


38. Define URL. List its types.

A URL (Uniform Resource Locator) is the address used to access a specific resource on the internet.
Types:

  1. Absolute URL
  2. Relative URL

39. What is a web browser? Name any two common browser software.

A web browser is software that allows users to access and view websites.
Examples:

  1. Google Chrome
  2. Mozilla Firefox

40. Define uploading and downloading.

  • Uploading: Transferring data from a local device to a server or the internet.
  • Downloading: Retrieving data from a server or the internet to a local device.


41. Define ISP. Write any two popular ISPs of Nepal.

An ISP (Internet Service Provider) is a company that provides internet access to users.
Popular ISPs in Nepal:

  1. Nepal Telecom
  2. WorldLink Communications

42. What is a search engine? Write any two popular search engines.

A search engine is software that allows users to find information on the internet by entering keywords.
Examples:

  1. Google
  2. Bing

43. Define ARPA.

ARPA (Advanced Research Projects Agency) is a U.S. government agency responsible for the development of early networking technologies, including ARPANET, which was the foundation of the modern internet.


44. Define intranet.

An intranet is a private network used within an organization to share information and resources securely.


45. Define e-fax.

E-fax is the electronic transmission of documents over the internet, functioning as a digital alternative to traditional fax machines.


46. What are the differences between e-mail and e-fax?

  • E-mail: Used for sending text-based messages and files over the internet.
  • E-fax: Used for sending scanned documents electronically, replicating a fax machine's function.

47. What is Domain Name System?

The Domain Name System (DNS) is a system that translates human-readable domain names (e.g., www.google.com) into IP addresses understood by computers.


48. What is e-commerce?

E-commerce is the buying and selling of goods or services over the internet.


49. Define bridge.

A bridge is a network device that connects two or more local area networks (LANs) to enable communication between them.


50. Define WWW.

The World Wide Web (WWW) is a system of interlinked web pages and multimedia content accessible via the internet using a web browser.


51. Define video conferencing.

Video conferencing is a technology that allows people in different locations to communicate in real time using video and audio.


52. Define Telnet.

Telnet is a network protocol used to access remote computers over a network, typically for managing and controlling servers.


53. Define repeater.

A repeater is a network device that amplifies and retransmits signals to extend the range of a communication network.


54. Define router.

A router is a network device that connects multiple networks and directs data packets to their destination.


55. Difference between switch and hub.

  • Switch: Sends data to a specific device in the network.
  • Hub: Broadcasts data to all devices in the network.

56. Difference between router and switch.

  • Router: Connects multiple networks and manages traffic between them.
  • Switch: Connects devices within the same network.

57. List the different software components required for connecting to the internet.

  1. Operating system with network drivers
  2. Web browser
  3. Email client
  4. Antivirus software

58. What are the three methods of connectors for fiber-optic cables?

  1. SC (Subscriber Connector)
  2. LC (Lucent Connector)
  3. ST (Straight Tip Connector)

59. Define media connectors. Write its types.

Media connectors are devices used to connect network cables to computers or other networking devices.
Types:

  1. RJ45
  2. Fiber-optic connectors

60. Define gateway.

A gateway is a network device that acts as a bridge between two different networks, often with different protocols.



61. What does the abbreviation "LAN" stand for in computers?

LAN stands for Local Area Network.


62. Explain about unbounded media.

Unbounded media refers to wireless communication media that use electromagnetic waves to transmit data without physical cables.
Examples: Radio waves, microwaves, infrared.


63. Define network protocol.

A network protocol is a set of rules and standards that govern how data is transmitted and received over a network.


64. What is a network interface card (NIC)?

A Network Interface Card (NIC) is a hardware component that connects a computer to a network and allows it to communicate with other devices.


65. Mention differences between client/server architecture and peer-to-peer architecture.

  • Client/Server Architecture: A central server provides resources to multiple clients.
  • Peer-to-Peer Architecture: All devices have equal roles and share resources directly.

66. "Internet is called the network of networks." Justify.

The internet is called the "network of networks" because it interconnects millions of private, public, academic, business, and government networks worldwide.


67. Draw and briefly explain about client-server network.

A client-server network consists of a central server that provides resources and services to multiple client computers. The server manages requests and ensures security. (Illustration required separately.)


68. Give reasons that "Computer networks reduce operational costs."

Computer networks reduce operational costs by:

  1. Enabling resource sharing (e.g., printers).
  2. Reducing data duplication.
  3. Allowing centralized management.

69. Difference between bounded and unbounded media.

  • Bounded Media: Uses physical cables (e.g., twisted-pair, coaxial).
  • Unbounded Media: Uses wireless signals (e.g., radio waves, infrared).

70. Difference between LAN and WAN.

  • LAN: Covers a small geographical area like an office or school.
  • WAN: Covers large geographical areas like cities or countries.

71. What is communication?

Communication is the process of exchanging information between two or more individuals or systems.


72. What is telecommunication?

Telecommunication is the transmission of information over long distances using electronic means like telephones or satellites.


73. Examples of communication?

  1. Email
  2. Phone calls
  3. Face-to-face conversations

74. Define data communication.

Data communication is the exchange of data between devices or systems using a communication medium.


75. Elements of data communication?

  1. Sender
  2. Receiver
  3. Message
  4. Medium
  5. Protocol

76. What is data/message?

A message is the data or information that is transmitted from the sender to the receiver in a communication process.


77. What is sender?

A sender is the device or person that initiates communication by sending data or messages.


78. Define medium.

A medium is the channel through which data is transmitted from the sender to the receiver.


79. Define receiver.

A receiver is the device or person that receives and processes the transmitted message or data.


80. Define protocols.

Protocols are a set of rules that define how data is transmitted, received, and processed between devices in a network.



81. What is data transmission?

Data transmission is the process of sending and receiving data between devices over a communication medium.


82. Types of data transmission?

  1. Analog transmission
  2. Digital transmission

83. What is simplex mode?

Simplex mode is a communication mode where data flows in one direction only, such as in a TV broadcast.


84. What is duplex mode?

Duplex mode is a communication mode where data flows in both directions simultaneously or alternately.


85. Types of duplex mode?

  1. Half-duplex
  2. Full-duplex

86. What is half-duplex mode?

Half-duplex mode allows data to flow in both directions, but only one direction at a time.


87. What is full-duplex mode?

Full-duplex mode allows data to flow in both directions simultaneously.


88. Difference between simplex mode and duplex mode of communication?

  • Simplex Mode: Data flows in one direction only.
  • Duplex Mode: Data flows in both directions, either alternately or simultaneously.

89. What is an analog signal?

An analog signal is a continuous signal that varies over time and represents information in a waveform, such as sound waves.


90. What is a digital signal?

A digital signal is a discrete signal that represents information using binary code (0s and 1s).


91. What is modem?

A modem (modulator-demodulator) is a device that converts digital signals to analog signals and vice versa for data transmission over communication lines.


92. What is bit?

A bit (binary digit) is the smallest unit of data in computing, represented as either 0 or 1.


93. What is bandwidth?

Bandwidth is the maximum amount of data that can be transmitted over a communication medium in a given time, measured in bits per second (bps).


94. What is communication media?

Communication media are the channels used to transmit data between devices, either through physical cables or wireless signals.


95. Types of communication media?

  1. Guided media (e.g., twisted-pair cable, fiber-optic cable).
  2. Unguided media (e.g., radio waves, microwaves).

96. What is wired media?

Wired media refers to communication channels that use physical cables to transmit data, such as twisted-pair and coaxial cables.


97. What is wireless media?

Wireless media refers to communication channels that use electromagnetic waves to transmit data without cables, such as radio waves and microwaves.


98. Define twisted-pair cable.

A twisted-pair cable consists of pairs of insulated copper wires twisted together to reduce interference and transmit data.


99. Define coaxial cable.

A coaxial cable is a type of cable with a central conductor surrounded by an insulating layer, a metallic shield, and an outer protective layer, used for high-frequency data transmission.


100. What is fiber-optic cable?

A fiber-optic cable is a communication medium that uses thin strands of glass or plastic to transmit data as light signals, offering high speed and low interference.



101. What is a microwave system?

A microwave system uses high-frequency radio waves to transmit data wirelessly over long distances.


102. What is a radio wave system?

A radio wave system uses electromagnetic waves in the radio frequency range to transmit data wirelessly.


103. What is satellite communication?

Satellite communication involves transmitting data via satellites in Earth's orbit, enabling long-distance wireless communication.


104. Define infrared transmission.

Infrared transmission is a wireless communication method that uses infrared light waves to transmit data over short distances.


105. What is laser transmission?

Laser transmission uses focused beams of light to transmit data wirelessly over long distances with high speed and accuracy.


106. What is Wi-Fi technology?

Wi-Fi (Wireless Fidelity) is a wireless networking technology that allows devices to connect to the internet or communicate with each other using radio waves.


107. What is guided media?

Guided media refers to communication channels that use physical cables, such as twisted-pair, coaxial, and fiber-optic cables, to transmit data.


108. Define unguided media.

Unguided media refers to communication channels that use wireless methods, such as radio waves, microwaves, and infrared, to transmit data.


109. Difference between guided media and unguided media?

  • Guided Media: Uses physical cables for data transmission.
  • Unguided Media: Uses wireless methods like radio waves.

110. Define computer network.

A computer network is a group of interconnected computers that share resources, data, and services.


111. Some services provided by the computer network?

  1. File sharing
  2. Internet access
  3. Email communication
  4. Resource sharing (e.g., printers)

112. Terms used in computer networks?

  1. Node
  2. Router
  3. Protocol
  4. Bandwidth

113. Advantages of computer network?

  1. Resource sharing
  2. Cost efficiency
  3. Improved communication
  4. Data accessibility

114. Disadvantages of computer network?

  1. Security risks
  2. Maintenance complexity
  3. High setup cost
  4. Dependency on the server

115. Write components of a computer network.

  1. Network Interface Card (NIC)
  2. Router
  3. Switch
  4. Cables or wireless medium

116. What is hardware?

Hardware refers to the physical components of a computer system, such as the CPU, monitor, keyboard, and mouse.


117. What is a hub?

A hub is a network device that connects multiple devices in a network and broadcasts data to all connected devices.


118. What is a switch?

A switch is a network device that connects multiple devices in a network and directs data to the specific device it is intended for.


119. What is a router?

A router is a network device that connects multiple networks and manages the flow of data between them.


120. What is a bridge?

A bridge is a network device that connects two or more local area networks (LANs) to work as a single network.



121. What is a gateway?

A gateway is a network device that connects two different networks, often with different protocols, enabling communication between them.


122. What is a repeater?

A repeater is a network device that amplifies and retransmits signals to extend the range of a network.


123. What is network operating software?

Network operating software is software that manages and controls network resources, such as file sharing, device management, and user access.


124. What is a communication protocol?

A communication protocol is a set of rules that govern how data is transmitted and received over a network.


125. What is a device driver?

A device driver is software that allows the operating system to communicate with hardware devices.


126. Define LAN.

LAN (Local Area Network) is a network that connects computers within a small geographical area, such as an office or school.


127. Define MAN.

MAN (Metropolitan Area Network) is a network that spans a city or large campus, connecting multiple LANs.


128. Define WAN.

WAN (Wide Area Network) is a network that connects devices over large geographical areas, such as countries or continents.


129. What is network architecture?

Network architecture defines the design and structure of a network, including how devices communicate and share resources.


130. Define centralized network.

A centralized network is a network where all resources and data are managed by a central server.


131. Define network topologies.

Network topologies refer to the physical or logical arrangement of devices in a network.


132. Define bus or linear topology.

Bus topology is a network setup where all devices are connected to a single central cable, called the backbone.


133. Define star topology.

Star topology is a network setup where all devices are connected to a central hub or switch.


134. Define ring topology.

Ring topology is a network setup where devices are connected in a circular chain, with each device linked to its neighboring devices.


135. Define internet.

The internet is a global network of interconnected computers that allows users to share information and access online resources.


136. Services of the internet.

  1. Email
  2. Web browsing
  3. Online banking
  4. Social networking

137. What is WWW?

The World Wide Web (WWW) is a system of interlinked web pages and multimedia content accessible through the internet.


138. What is electronic mail?

Electronic mail (email) is a method of sending and receiving messages and files over the internet.


139. Advantages of email.

  1. Fast and efficient communication
  2. Cost-effective
  3. Allows attachment of files
  4. Accessible anywhere with an internet connection

140. What is e-mail fraud?

Email fraud is a type of cybercrime where fraudulent emails are sent to deceive recipients into providing personal or financial information.



141. What is e-fax?

E-fax is the process of sending and receiving fax messages through email or the internet instead of traditional fax machines.


142. Difference between e-fax and e-mail.

  • E-fax: Used for transmitting scanned documents electronically, replicating traditional faxing.
  • E-mail: Used for sending text-based messages and attachments over the internet.

143. What is IRC?

IRC (Internet Relay Chat) is a protocol for real-time text messaging and communication over the internet.


144. What is video conferencing?

Video conferencing is a technology that enables real-time audio and video communication between individuals or groups in different locations.


145. Define File Transfer Protocol (FTP).

FTP (File Transfer Protocol) is a standard protocol used for transferring files between computers on a network.


146. Define newsgroups (Usenet).

Newsgroups, also known as Usenet, are online discussion forums where users can share and discuss information on specific topics.


147. What is online banking?

Online banking is a service that allows customers to perform financial transactions through the internet using a bank's secure platform.


148. Features of online banking.

  1. Account management
  2. Fund transfers
  3. Bill payments
  4. Loan applications

149. What is a search engine?

A search engine is software that helps users find specific information on the internet by entering keywords or phrases.


150. Write the popular search engines.

  1. Google
  2. Bing
  3. Yahoo

 

 Notes Prepared By : Aastha Shrees, Sudarshan Thapa, SEE Batch 2081 ( Brilliant United Academy)



Ethical And Social Issues in ICT

1. What is cyber ethics?

Cyber ethics refers to rules and principles guiding ethical behavior and responsible use of computers and internet technologies.

2. What is computer ethics?

Computer ethics refers to moral guidelines and standards for using computers, software, and data in a responsible manner.

3. Write any four commandments of computer ethics.

  1. Do not harm others using computers.
  2. Do not steal data.
  3. Respect privacy.
  4. Do not spread malware.

4. What is digital citizenship?

Digital citizenship refers to responsible and safe participation in the digital world, respecting others' rights and following online ethics.

5. Write any four elements of digital citizenship.

  1. Digital etiquette.
  2. Digital literacy.
  3. Digital safety.
  4. Respect for intellectual property rights.

6. Define digital footprint.

A digital footprint refers to the trail of data created when users browse, post, or interact on digital platforms.

7. What are the main classifications of digital footprints?

Digital footprints are classified as active footprints (intentional actions like posting) and passive footprints (unintentional data like browsing history).

8. Write the managing or protecting digital footprints.

Managing digital footprints refers to controlling online activities, securing privacy settings, deleting unused accounts, and avoiding oversharing sensitive information.

9. What is cyberbullying?

Cyberbullying refers to using online platforms to harm, harass, or embarrass others through negative comments, threats, or false content.

10. What are the objectives of ICT?

Objectives of ICT include improving communication, enhancing education, creating job opportunities, and ensuring access to global information resources.

11. What is IT policy?

IT policy refers to guidelines and rules promoting proper, ethical, and secure use of information and communication technologies (ICT).

12. Write any five ways to manage digital footprints.

  1. Use privacy settings.
  2. Avoid sharing sensitive data.
  3. Delete unused accounts.
  4. Monitor online activities.
  5. Use strong passwords.

13. What is the major vision of IT policy of Nepal?

The major vision of Nepal's IT policy is transforming Nepal into a knowledge-based society by utilizing information technology effectively.

14. What is the mission of the IT policy of Nepal?

The mission of IT policy refers to ensuring access to technology, promoting digital literacy, and supporting innovation for national development.

15. What is electronic transaction? When was the electronic transaction act introduced in Nepal?

Electronic transaction refers to online buying, selling, or data exchange. The Electronic Transaction Act was introduced in Nepal in 2004.

16. What is meant by malicious apps?

Malicious apps refer to software intentionally designed to harm devices, steal data, or disrupt system operations and functionality.

17. What is social media?

Social media refers to platforms like Facebook and Instagram that allow users to share, communicate, and interact digitally.

18. What kind of attack is social scams and phishing attacks?

Social scams and phishing attacks refer to deceptive methods tricking users into revealing personal information, like passwords or credit card details.

19. What is malware?

Malware refers to malicious software, such as viruses or spyware, designed to disrupt, damage, or steal data from systems.

20. What is hacking?

Hacking refers to gaining unauthorized access to a system or network to steal, modify, or disrupt data or services.

21. Write any two examples of computer ethics.

Examples of computer ethics are respecting others’ privacy and avoiding software piracy by not using unlicensed software.

22. Why is ethics important in information technology?

Ethics in IT refers to ensuring responsible use of technology, protecting privacy, avoiding misuse, and respecting intellectual property rights.

23. What is the purpose of hacking?

The purpose of hacking refers to either malicious intent (stealing data) or ethical goals (finding system weaknesses to improve security).

24. List any four places where cyberbullying occurs.

Cyberbullying occurs on social media, messaging apps, online gaming platforms, and emails, where people misuse technology to harm others.

25. Briefly explain cyber law. Why is it needed?

Cyber law refers to legal rules governing online activities. It is needed to prevent cybercrimes and protect user privacy.

26. Explain any two threats in social media.

  1. Cyberbullying: Harassment online.
  2. Phishing: Tricking users to steal sensitive data like passwords or financial information.

27. What is the full form of ICT?

ICT refers to Information and Communication Technology.

28. What is the full form of SME?

SME refers to Small and Medium Enterprise.

29. What is the full form of ISP?

ISP refers to Internet Service Provider.

30. What is the full form of SMO?

SMO refers to Social Media Optimization.

31. Write the full form of the following:

i. ETA: Electronic Transaction Act
ii. MITC: Ministry of Information Technology and Communication
iii. DOS: Denial of Service

32. What is social engineering?

Social engineering refers to tricking people into revealing confidential information by exploiting their trust and lack of awareness.



33. What do you mean by social scams and phishing attacks?

Social scams and phishing attacks refer to fraudulent activities that trick users into sharing sensitive information like passwords or financial details.

34. Define fake accounts.

Fake accounts refer to online profiles created with false identities, often used for scams, impersonation, or spreading misinformation.

35. Define malware attack and hacks.

A malware attack refers to harmful software disrupting systems, while hacks refer to unauthorized access to steal or manipulate data.

36. Write the opportunities in social media.

Social media opportunities refer to connecting people, sharing knowledge, promoting businesses, learning skills, and spreading information quickly to a wide audience.

37. Define copyright law.

Copyright law refers to legal protection for creators’ original work, ensuring it is not copied, reproduced, or used without permission.

38. Define trademark law.

Trademark law refers to the protection of brand names, logos, and symbols, ensuring businesses retain unique identity and ownership.

39. Define digital signature law.

Digital signature law refers to rules governing secure and valid electronic signatures for verifying identity in online transactions.

40. Share your thoughts about cyberbullying.

Cyberbullying refers to online harassment that harms others emotionally. It must stop through awareness, ethical use, and stricter rules.

41. Define IT policy 2022 in short.

IT policy 2022 refers to a framework aimed at promoting digital literacy, innovation, technology access, and national development through ICT.

42. What is the Electric Transaction Act?

The Electric Transaction Act refers to legal provisions ensuring secure, reliable, and trusted digital transactions and e-commerce practices.

43. Write the cyber ethics domains it mainly deals with.

Cyber ethics domains refer to privacy protection, intellectual property rights, prevention of hacking, responsible social media use, and data security.

44. Describe do's and don'ts of cyber ethics in a table.

Do's

Don'ts

Respect privacy.

Don’t steal data.

Use licensed software.

Don’t spread malware.

Follow copyright rules.

Don’t hack systems.

Report cybercrimes.

Don’t engage in cyberbullying.

45. Define telecommunication law.

Telecommunication law refers to regulations ensuring fair use of communication technologies like phones, the internet, and other digital platforms.

46. Define data protection and privacy law.

Data protection and privacy law refers to rules ensuring personal data is collected, stored, and used securely and ethically.

47. When was cyber law started in Nepal?

Cyber law in Nepal refers to the legal framework introduced in 2004 through the Electronic Transaction Act to regulate digital activities.

48. What is the full form of CCA?

CCA refers to Certified Computer Administrator.

49. Define technical terms.

Technical terms refer to specific words or phrases related to technology, such as “IP address,” “server,” or “encryption.”

50. What are the moral issues that deal with the use of ICT?

Moral issues in ICT refer to privacy concerns, copyright violations, data misuse, and ethical behavior while using technology and online platforms.

51. What is the policy formulated for the overall development of ICT and secure society?

The IT policy refers to a framework promoting ICT development for economic growth, digital literacy, and creating a secure online society.

52. What is an online platform that enables people to build a social network?

An online platform like Facebook or Instagram refers to websites or apps used to create and maintain social connections digitally.

53. Who is the person who gains unauthorized access to an information system and uses it for personal benefits?

A hacker refers to someone who gains unauthorized access to systems to steal, modify, or misuse sensitive information.

54. Write any two tips to maintain digital reputation.

  1. Be mindful of what you post online.
  2. Regularly review and update your privacy settings on social media platforms.

55. What is the difference between cyber law and cybercrime?

Cyber law refers to rules governing online behavior, while cybercrime refers to illegal activities like hacking, phishing, or spreading viruses.

56. How many members are needed to represent the private sector?

Three members refer to the representatives from the private sector in Nepal’s IT council for ICT development.

57. Define digital access.

Digital access refers to the ability of individuals to use technology and the internet for communication, learning, and work purposes.

58. What is digital commerce?

Digital commerce refers to the buying and selling of goods or services using online platforms like websites and mobile apps.

59. What is digital communication?

Digital communication refers to exchanging information electronically through emails, messages, video calls, or social media platforms.

60. Define digital literacy.

Digital literacy refers to the ability to use technology effectively, responsibly, and safely for communication, learning, and problem-solving.

61. Define digital etiquette.

Digital etiquette refers to the proper and respectful behavior when communicating or interacting online with others.

62. What is digital law and digital security?

Digital law refers to rules for ethical use of technology, while digital security refers to measures for protecting data and systems.

63. Define digital health and wellness.

Digital health and wellness refers to using technology in a balanced way to protect physical and mental health, like reducing screen time.

64. Write the ways to become a good digital citizen.

Becoming a good digital citizen refers to respecting others’ privacy, avoiding cyberbullying, using technology responsibly, and following online ethics.

65. What is meant by a digital citizen?

A digital citizen refers to someone who uses technology responsibly, ethically, and safely in the digital environment.

66. Write any four objectives of the electronic transaction act 2003.

  1. Ensure secure transactions.
  2. Promote e-commerce.
  3. Prevent cybercrimes.
  4. Protect digital users’ rights.

67. Write any two objectives of the IT policy of Nepal.

  1. To promote digital literacy.
  2. To create employment opportunities in the ICT sector.

68. List any two problems of IT policy.

  1. Lack of infrastructure in rural areas.
  2. Limited awareness about IT policies among people.

69. What are the four examples of cybercrime?

Examples of cybercrime are hacking, spreading viruses, identity theft, and online scams like phishing or fraud.

70. What is the difference between the do's and don'ts of cyber ethics?

Do’s refer to responsible actions like respecting privacy, while don’ts refer to harmful actions like hacking or cyberbullying.

71. Define engineering.

Engineering refers to the application of science and technology to design, build, and solve practical problems effectively.

72. Define human error.

Human error refers to mistakes made by people, often leading to system failures, data breaches, or cybersecurity issues.

73. Define phishing.

Phishing refers to a cyberattack where attackers trick users into sharing sensitive information like passwords through fake emails or websites.

 

  Notes Prepared By : Sneha Khatri, Bibek Kunwar, SEE Batch 2081 ( Brilliant United Academy)


Computer Security


1. What is computer security?

Computer security refers to measures and practices for protecting computers, networks, and data from unauthorized access or damage.

2. What are the factors of computer security?

Factors of computer security include confidentiality, integrity, availability, authentication, access control, and regular system updates.

3. How many reasons to use and keep the computer safely? Give some reasons.

Keeping computers safe protects personal data, prevents malware attacks, ensures system reliability, and supports secure online activities.

4. What do you mean by information security?

Information security refers to protecting digital or physical data from unauthorized access, use, or theft through proper security measures.

5. How can the information be protected?

Information can be protected by encryption, using strong passwords, limiting access, regular updates, and antivirus software.

6. Define security threats.

Security threats refer to potential dangers like viruses, phishing, malware, and hacking that compromise computer and network systems.

7. What is hacking?

Hacking refers to unauthorized access to computer systems or networks to steal, modify, or misuse information.

8. What are the types of security threats?

Types of security threats include malware, phishing, spyware, ransomware, and Distributed Denial of Service (DDoS) attacks.

9. Define phishing.

Phishing refers to tricking users into revealing sensitive information like passwords through fake emails or websites.

10. What is meant by rootkit attack?

A rootkit attack refers to software that hides in a system to gain unauthorized access and control over the computer.

11. Write the types of rootkits.

Types of rootkits include kernel-level rootkits, application-level rootkits, hardware-based rootkits, and firmware rootkits.

12. What is a keylogger?

A keylogger refers to software or hardware that secretly records a user’s keystrokes to steal sensitive information.

13. How can you detect keyloggers?

Keyloggers can be detected by using updated antivirus software, monitoring unusual system activity, and inspecting installed programs.

14. What do you mean by botnet attack?

A botnet attack refers to a network of infected computers used by attackers to perform large-scale malicious activities.

15. Write down the prevention of botnets with cybersecurity controls.

Prevent botnets by updating software, using firewalls, installing antivirus, and avoiding suspicious links or downloads.

16. Define hacker.

A hacker refers to a person who gains unauthorized access to systems to steal, modify, or misuse data or resources.

17. Make a list of classified types of hackers.

Types of hackers include:

  1. White Hat (Ethical Hackers).
  2. Black Hat (Malicious Hackers).
  3. Grey Hat (Mix of Both).

18. What is a cracker?

A cracker refers to a person who breaks into systems or software for malicious purposes, often to steal or destroy data.

19. Define cracking.

Cracking refers to breaking software protections like passwords or licenses to gain unauthorized access or misuse software.

20. What is computer ethics? Write any two of them.

Computer ethics refers to rules for responsible computer use.

  1. Respect others’ privacy.
  2. Avoid illegal software copying.

21. Define hardware security.

Hardware security refers to protecting physical computer components like CPUs, storage devices, and servers from theft or damage.

22. What is data and information security?

Data and information security refer to protecting data and information from unauthorized access, alteration, or destruction.

23. What is backup?

A backup refers to creating a copy of data to restore it in case of loss due to system failure or cyberattack.

24. Why is backup vital to computer security systems?

Backup is vital for recovering lost data, ensuring business continuity, and protecting against ransomware attacks or accidental deletion.

25. What is a password?

A password refers to a secret combination of characters used to authenticate and secure access to a system or account.

26. Why is a password used in a computer?

A password is used to restrict unauthorized access and protect data in computers, accounts, or online services.

27. Define encryption and decryption.

Encryption refers to converting data into an unreadable format, while decryption refers to converting encrypted data back to its original form.

28. What are malicious codes?

Malicious codes refer to harmful programs like viruses, worms, and spyware that disrupt or damage computer systems.

29. Define firewall with examples.

A firewall refers to a security device or software that blocks unauthorized access to networks, like Windows Firewall or Cisco ASA.

30. What is biometric verification?

Biometric verification refers to using physical characteristics like fingerprints, facial recognition, or voice to authenticate users securely.

31. What is software security?

Software security refers to measures to protect applications from threats like malware, hacking, and unauthorized access.

32. Write any four measures of hardware security.

  1. Use locks for hardware.
  2. Implement CCTV surveillance.
  3. Secure physical access.
  4. Protect hardware from environmental hazards.

33. What is a power protection device? Write its role in computer security.

A power protection device refers to tools like UPS or surge protectors that prevent damage to systems during power fluctuations.

34. Why is it important to protect computer systems from dust?

Protecting from dust prevents overheating, improves system efficiency, and avoids damage to sensitive components like fans and processors.


35. What is antivirus software? Write four examples.

Antivirus software refers to programs that detect and remove malware. Examples: Norton, Avast, McAfee, Kaspersky.

36. Define worm with an example.

A worm refers to a self-replicating malware that spreads across networks. Example: Mydoom.

37. What is spyware and adware?

Spyware refers to software that secretly gathers user data. Adware refers to software that displays unwanted advertisements on systems.

38. Define ransomware. How can you protect from ransomware on social media?

Ransomware refers to malware that locks data for a ransom. Protect by avoiding unknown links, updating antivirus, and enabling backups.

39. Write any four uses of biometrics.

  1. Secure login.
  2. Attendance systems.
  3. Mobile phone unlocking.
  4. Restricted area access.

40. Define keylogger. What are the processes to detect it?

A keylogger refers to software that records keystrokes. Detect by using antivirus, monitoring system behavior, and inspecting installed programs.

41. What is a botnet attack? Write any four ways to prevent botnets with cybersecurity controls.

A botnet attack refers to using infected devices for malicious activities. Prevent with firewalls, antivirus, strong passwords, and updates.

42. Why are power protection devices needed in computers? Name any four such devices.

Power protection devices prevent damage from power surges. Examples: UPS, voltage stabilizer, surge protector, spike guard.

43. Write the common rules for making a strong password.

Rules include using a mix of uppercase, lowercase, numbers, and symbols; avoiding common words; and updating passwords regularly.

44. Write the importance of information security.

Information security refers to protecting data from unauthorized access, ensuring confidentiality, integrity, and availability of sensitive information.

45. Differentiate between encryption and decryption.

Encryption refers to converting data into a secure format. Decryption refers to converting encrypted data back into readable form.

46. Define Scandisk.

Scandisk refers to a Windows utility that checks and fixes errors on hard drives, improving system performance and reliability.

47. What do you mean by defragmentation?

Defragmentation refers to reorganizing scattered data on a disk to improve storage efficiency and system performance.

48. What is biometric? Write some common uses of it.

Biometric refers to authentication using physical traits like fingerprints. Uses: mobile unlocking, attendance, banking, and security access.

49. Differentiate between ethical hacker and cracker.

Ethical hacker refers to authorized individuals finding security flaws. Cracker refers to malicious hackers breaking systems illegally.

50. Write any four differences between authentication and authorization in computer security.

  1. Authentication: Verifies identity; Authorization: Grants access.
  2. Authentication: Uses passwords; Authorization: Uses roles.
  3. Authentication: Happens first; Authorization: Happens after authentication.
  4. Authentication: Confirms users; Authorization: Confirms permissions.

51. What is CCTV? How can we get benefits from CCTV?

CCTV refers to closed-circuit television used for monitoring. Benefits include preventing theft, improving security, and gathering evidence.

52. List any one major factor which causes infection of our computer system.

Downloading files from untrusted sources refers to a major factor causing infections like malware or viruses in systems.

53. Define fire extinguisher.

A fire extinguisher refers to a safety device used to control or put out small fires, including electrical and hardware-related fires.

54. Write the full form of CPAV.

CPAV refers to Central Point Antivirus.

55. Write any two differences between Volt Guard and Spike Guard.

  1. Volt guard protects from voltage fluctuations. Spike guard protects from power surges.
  2. Volt guard stabilizes current. Spike guard blocks excess current.

56. What is the full form of UPS?

UPS refers to Uninterruptible Power Supply.

57. When was the first CCTV system started?

The first CCTV system refers to the system installed in 1942 by Siemens AG in Germany for military testing.

58. What do you mean by Hard Lock Key?

Hard lock key refers to a hardware device that prevents software from unauthorized use, ensuring copyright protection.

59. What are the software security mechanisms?

Software security mechanisms refer to firewalls, antivirus programs, intrusion detection systems, encryption, and multi-factor authentication.

60. Define insurance. How can people get benefits from it?

Insurance refers to financial protection against losses. Benefits include covering costs from theft, fire, or cyber incidents.

61. What are the disadvantages of CCTV?

Disadvantages include privacy invasion, high installation costs, and vulnerability to hacking or tampering by attackers.

62. What is a password policy? Write any two important criteria for creating a strong password.

Password policy refers to rules for secure passwords. Criteria: Use mixed characters, avoid common words, and change passwords regularly.

63. What is system hacking?

System hacking refers to gaining unauthorized access to a system to modify, steal, or destroy data.

64. Define viruses. What are the popular computer viruses?

Viruses refer to malicious programs replicating in systems. Examples: Melissa, WannaCry, ILOVEYOU, and Trojan Horse.


  Notes Prepared By : Nishana Ghatri Magar, Susan Somai  SEE Batch 2081 ( Brilliant United Academy)

 


Computer Security


1. What is computer security?

Computer security refers to measures and practices for protecting computers, networks, and data from unauthorized access or damage.

2. What are the factors of computer security?

Factors of computer security include confidentiality, integrity, availability, authentication, access control, and regular system updates.

3. How many reasons to use and keep the computer safely? Give some reasons.

Keeping computers safe protects personal data, prevents malware attacks, ensures system reliability, and supports secure online activities.

4. What do you mean by information security?

Information security refers to protecting digital or physical data from unauthorized access, use, or theft through proper security measures.

5. How can the information be protected?

Information can be protected by encryption, using strong passwords, limiting access, regular updates, and antivirus software.

6. Define security threats.

Security threats refer to potential dangers like viruses, phishing, malware, and hacking that compromise computer and network systems.

7. What is hacking?

Hacking refers to unauthorized access to computer systems or networks to steal, modify, or misuse information.

8. What are the types of security threats?

Types of security threats include malware, phishing, spyware, ransomware, and Distributed Denial of Service (DDoS) attacks.

9. Define phishing.

Phishing refers to tricking users into revealing sensitive information like passwords through fake emails or websites.

10. What is meant by rootkit attack?

A rootkit attack refers to software that hides in a system to gain unauthorized access and control over the computer.

11. Write the types of rootkits.

Types of rootkits include kernel-level rootkits, application-level rootkits, hardware-based rootkits, and firmware rootkits.

12. What is a keylogger?

A keylogger refers to software or hardware that secretly records a user’s keystrokes to steal sensitive information.

13. How can you detect keyloggers?

Keyloggers can be detected by using updated antivirus software, monitoring unusual system activity, and inspecting installed programs.

14. What do you mean by botnet attack?

A botnet attack refers to a network of infected computers used by attackers to perform large-scale malicious activities.

15. Write down the prevention of botnets with cybersecurity controls.

Prevent botnets by updating software, using firewalls, installing antivirus, and avoiding suspicious links or downloads.

16. Define hacker.

A hacker refers to a person who gains unauthorized access to systems to steal, modify, or misuse data or resources.

17. Make a list of classified types of hackers.

Types of hackers include:

  1. White Hat (Ethical Hackers).
  2. Black Hat (Malicious Hackers).
  3. Grey Hat (Mix of Both).

18. What is a cracker?

A cracker refers to a person who breaks into systems or software for malicious purposes, often to steal or destroy data.

19. Define cracking.

Cracking refers to breaking software protections like passwords or licenses to gain unauthorized access or misuse software.

20. What is computer ethics? Write any two of them.

Computer ethics refers to rules for responsible computer use.

  1. Respect others’ privacy.
  2. Avoid illegal software copying.

21. Define hardware security.

Hardware security refers to protecting physical computer components like CPUs, storage devices, and servers from theft or damage.

22. What is data and information security?

Data and information security refer to protecting data and information from unauthorized access, alteration, or destruction.

23. What is backup?

A backup refers to creating a copy of data to restore it in case of loss due to system failure or cyberattack.

24. Why is backup vital to computer security systems?

Backup is vital for recovering lost data, ensuring business continuity, and protecting against ransomware attacks or accidental deletion.

25. What is a password?

A password refers to a secret combination of characters used to authenticate and secure access to a system or account.

26. Why is a password used in a computer?

A password is used to restrict unauthorized access and protect data in computers, accounts, or online services.

27. Define encryption and decryption.

Encryption refers to converting data into an unreadable format, while decryption refers to converting encrypted data back to its original form.

28. What are malicious codes?

Malicious codes refer to harmful programs like viruses, worms, and spyware that disrupt or damage computer systems.

29. Define firewall with examples.

A firewall refers to a security device or software that blocks unauthorized access to networks, like Windows Firewall or Cisco ASA.

30. What is biometric verification?

Biometric verification refers to using physical characteristics like fingerprints, facial recognition, or voice to authenticate users securely.

31. What is software security?

Software security refers to measures to protect applications from threats like malware, hacking, and unauthorized access.

32. Write any four measures of hardware security.

  1. Use locks for hardware.
  2. Implement CCTV surveillance.
  3. Secure physical access.
  4. Protect hardware from environmental hazards.

33. What is a power protection device? Write its role in computer security.

A power protection device refers to tools like UPS or surge protectors that prevent damage to systems during power fluctuations.

34. Why is it important to protect computer systems from dust?

Protecting from dust prevents overheating, improves system efficiency, and avoids damage to sensitive components like fans and processors.


35. What is antivirus software? Write four examples.

Antivirus software refers to programs that detect and remove malware. Examples: Norton, Avast, McAfee, Kaspersky.

36. Define worm with an example.

A worm refers to a self-replicating malware that spreads across networks. Example: Mydoom.

37. What is spyware and adware?

Spyware refers to software that secretly gathers user data. Adware refers to software that displays unwanted advertisements on systems.

38. Define ransomware. How can you protect from ransomware on social media?

Ransomware refers to malware that locks data for a ransom. Protect by avoiding unknown links, updating antivirus, and enabling backups.

39. Write any four uses of biometrics.

  1. Secure login.
  2. Attendance systems.
  3. Mobile phone unlocking.
  4. Restricted area access.

40. Define keylogger. What are the processes to detect it?

A keylogger refers to software that records keystrokes. Detect by using antivirus, monitoring system behavior, and inspecting installed programs.

41. What is a botnet attack? Write any four ways to prevent botnets with cybersecurity controls.

A botnet attack refers to using infected devices for malicious activities. Prevent with firewalls, antivirus, strong passwords, and updates.

42. Why are power protection devices needed in computers? Name any four such devices.

Power protection devices prevent damage from power surges. Examples: UPS, voltage stabilizer, surge protector, spike guard.

43. Write the common rules for making a strong password.

Rules include using a mix of uppercase, lowercase, numbers, and symbols; avoiding common words; and updating passwords regularly.

44. Write the importance of information security.

Information security refers to protecting data from unauthorized access, ensuring confidentiality, integrity, and availability of sensitive information.

45. Differentiate between encryption and decryption.

Encryption refers to converting data into a secure format. Decryption refers to converting encrypted data back into readable form.

46. Define Scandisk.

Scandisk refers to a Windows utility that checks and fixes errors on hard drives, improving system performance and reliability.

47. What do you mean by defragmentation?

Defragmentation refers to reorganizing scattered data on a disk to improve storage efficiency and system performance.

48. What is biometric? Write some common uses of it.

Biometric refers to authentication using physical traits like fingerprints. Uses: mobile unlocking, attendance, banking, and security access.

49. Differentiate between ethical hacker and cracker.

Ethical hacker refers to authorized individuals finding security flaws. Cracker refers to malicious hackers breaking systems illegally.

50. Write any four differences between authentication and authorization in computer security.

  1. Authentication: Verifies identity; Authorization: Grants access.
  2. Authentication: Uses passwords; Authorization: Uses roles.
  3. Authentication: Happens first; Authorization: Happens after authentication.
  4. Authentication: Confirms users; Authorization: Confirms permissions.

51. What is CCTV? How can we get benefits from CCTV?

CCTV refers to closed-circuit television used for monitoring. Benefits include preventing theft, improving security, and gathering evidence.

52. List any one major factor which causes infection of our computer system.

Downloading files from untrusted sources refers to a major factor causing infections like malware or viruses in systems.

53. Define fire extinguisher.

A fire extinguisher refers to a safety device used to control or put out small fires, including electrical and hardware-related fires.

54. Write the full form of CPAV.

CPAV refers to Central Point Antivirus.

55. Write any two differences between Volt Guard and Spike Guard.

  1. Volt guard protects from voltage fluctuations. Spike guard protects from power surges.
  2. Volt guard stabilizes current. Spike guard blocks excess current.

56. What is the full form of UPS?

UPS refers to Uninterruptible Power Supply.

57. When was the first CCTV system started?

The first CCTV system refers to the system installed in 1942 by Siemens AG in Germany for military testing.

58. What do you mean by Hard Lock Key?

Hard lock key refers to a hardware device that prevents software from unauthorized use, ensuring copyright protection.

59. What are the software security mechanisms?

Software security mechanisms refer to firewalls, antivirus programs, intrusion detection systems, encryption, and multi-factor authentication.

60. Define insurance. How can people get benefits from it?

Insurance refers to financial protection against losses. Benefits include covering costs from theft, fire, or cyber incidents.

61. What are the disadvantages of CCTV?

Disadvantages include privacy invasion, high installation costs, and vulnerability to hacking or tampering by attackers.

62. What is a password policy? Write any two important criteria for creating a strong password.

Password policy refers to rules for secure passwords. Criteria: Use mixed characters, avoid common words, and change passwords regularly.

63. What is system hacking?

System hacking refers to gaining unauthorized access to a system to modify, steal, or destroy data.

64. Define viruses. What are the popular computer viruses?

Viruses refer to malicious programs replicating in systems. Examples: Melissa, WannaCry, ILOVEYOU, and Trojan Horse.


  Notes Prepared By : Nishana Ghatri Magar, Susan Somai  SEE Batch 2081 ( Brilliant United Academy)

 


 

Post a Comment

Post a Comment (0)

Previous Post Next Post