Computer Fundamentals Assignments
Computer Fundamentals Assignments
Semester 1
Assignment No 1
Subject with code : SEC-001 Computer Fundamentals
ASSIGNMENT QUESTIONS
UNIT -1
Q1. Discuss the evolution of computers, highlighting the key advancements in each
generation. How has computing technology transformed over time?
Q2. Explain the architecture of a computer system, focusing on the roles of CPU, ALU,
and memory (RAM, ROM). How do micro, mini, mainframe, and supercomputers
differ in terms of architecture and functionality?.
Q3. Define the concept of an operating system. Discuss the need for an operating system
and outline the different types, including batch, single-user, multi-processing,
distributed, and time-shared operating systems.
Q5. Compare and contrast UNIX, Linux, and Windows operating systems. Highlight the
key features that distinguish these systems and discuss their applications in different
computing environments.
Q6. Explain the concepts of Command Line Interface (CLI) and Graphical User Interface
(GUI). Discuss the advantages and disadvantages of each interface type. Provide
examples of situations where one might be preferred over the other.
Branch BBA
Semester 1
Assignment No 2
Subject with code : SEC-001 Computer Fundamentals
ASSIGNMENT QUESTIONS
UNIT -2
Q1. Explain the role of web browsers in accessing the World Wide Web. Discuss the
significance of Uniform Resource Locators (URLs) and domain names in navigating
the web.?
Q2. Provide a brief history of the Internet and its functions. How has the Internet evolved
over time, and what are its primary functions in today's digital era?.
Q3. Compare and contrast various forms of Internet communication, including email,
chatting, instant messenger services, and news groups. How do these
communication methods contribute to online interactions.
Q4. Define and distinguish between E-Commerce and M-Commerce. Explore the various
aspects of E-Services, such as online banking, online payment modes, mobile wallets,
and their impact on digital transactions
Q5. Analyze the role of social networking sites in connecting people online. How do
these platforms contribute to social interactions and information sharing? Discuss
the significance of E-Learning and Online Education in the digital age.
Q6. Provide a step-by-step guide on managing an email account. Include topics such as
configuring an email account, logging in, receiving and sending emails, sending files
as attachments, maintaining an address book, and downloading files.
Branch BBA
Semester 1
Assignment No 3
Subject with code : SEC-001 Computer Fundamentals
ASSIGNMENT QUESTIONS
UNIT -3
Q1. Identify and explain the different types of cyber threats (malware, phishing, hacking,
etc.) and their potential impact.?
Q2. Describe some key factors to consider when identifying safe websites and portals,
including secure seals and browsing habits?.
Q3. Discuss the social, legal, and ethical implications of using information technology.
How has IT affected the way we work, socialize, and interact with others?.
Q4. Explain the concept of cybercrime and its various forms. What are the steps
individuals and organizations can take to prevent cybercrime?.
Q5. Analyze the role of cyber laws and regulations, such as the Indian IT Act, in
addressing online security and ethical concerns. Discuss the importance of
intellectual property rights (IPR) and how concepts like copyright, patent, and
software licensing govern digital creations.
Branch BBA
Semester 1
Assignment No 4
Subject with code : SEC-001 Computer Fundamentals
ASSIGNMENT QUESTIONS
UNIT -4
Q1. Distinguish between passive and active cyber security threats, providing examples of
each type. Describe the potential effects of these threats on individuals and
organizations?
Q2. Compare and contrast the following types of cyber threats, explaining their distinct
characteristics and methods of attack:
i. Computer viruses
ii. Malware
iii. Adware
iv. Ransomware
v. Spyware
vi. Emotet
vii. Identity theft
viii. Denial of service (DoS)
ix. Man-in-the-middle (MITM) attacks
x. Phishing
xi. SQL injection
xii. Password attacks.
Q3. Explain the concept of risk assessment in network security and outline the steps
involved in conducting a thorough assessment.
Q4. Discuss common security issues that organizations face and describe the security
measures that can be implemented to mitigate risks, such as firewalls and
encryption/decryption techniques.
Q5. Identify and categorize different types of assets that require protection in a network
environment (data, applications, systems, and network).