0% found this document useful (0 votes)
31 views3 pages

It Question Bank

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views3 pages

It Question Bank

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

UNIT-1

CHAPTER-2
TOPIC:-INTERNET AND IT’S APPLICATION

Short Questions

1. What is an internal backbone? Describe backbone in local and global


level.
2. Explain about different features of internet.
3. Describe the role of internet service providers. Name some of the ISPs
in India.
4. What do you mean by MAC address?
5. What do you mean by web browser? Explain about different types of
web browser.
6. What do you mean by search engine? Explain about its different steps,
used for a searching operation.
7. Distinguish between IP address and MAC address in internet.
8. What do you mean by Internet Relay Chat?
9. What is a Uniform Resource Locator? Explain different parts of a URL
with proper example.

Very Short Questions

1. What is Internet?

2. What are ARP and RARP?

3. What do you mean by webpage?

4. What do you mean by website?

5. What do you mean by web server?

6. What is WWW?

7. What is the use of SMTP?

8. What it the use of IMAP and POP?

9. What do you mean by SMS?

10. What is voice mail?

11. What do you mean by chatting?


12. What is video conferencing?

13. What do you mean by ITS?

14 What is COMA?

15. What is WLL?

16. What is GSM?

17. Short notes


a) Ethernet
b) Token ring
c) FDDI
d) Gateway access connection
e) Dial-up access connection
f) Direct access connection
g) Cable modem connection
h) DSL
i) ISDN
j) Wireless connection
k) ISP
l) Internet protocol
m) TCP/IP
n) FTP

UNIT-1
CHAPTER-3
TOPIC:-NETWORK SECURITY ON INTERNET
Very Short Questions

1. Short notes:
1. Cyber crime
2. Virus
3. Trojan horse
4. WORM
5. Denial of Service
6. Cookies
7. Spam
8. Snooping
9. Eavesdropping
10. Spoofing
11. Cyber-stalking
12. Cyber terrorism
13. Software piracy
14. IPR violations
15. Online fraud
16. Vishing
17. BOt Networks
18. Encryption
19. Digital signature
20. VPN
21. Proxy server
22. Cyber squatting
23. Phishing
24. Pornography
25. Cross-site scripting
26. Firewall
27. Intranet
28. Extranet
29. Cyber law.
30. Block cipher.
31. Stream cipher.
32. Cryptography.
33. Symmetric Key cryptography/private key encryption.
34. Asymmetric key cryptography/public key encryption.

Short Questions
1. What is meant by WORM?

2. What do you mean by Trojan horse?

1. Describe the uses and security related to computer cookies?

4. Distinguish between Phishing and Vishing?

5. Distinguish between snooping and spoofing?

6. What do you mean by digital signature?

7. Discuss various needs of a cyber law.

8. Cyber law encompasses laws relating to which things of cyber space?

9. What do you mean by spoofing? Discuss different types of spoofing

10. Discuss the objectives and features of information Technology Act of India.

You might also like