0% found this document useful (0 votes)
20 views12 pages

Wa0015.

The document covers the importance of networking in biometric systems, detailing types of networks such as LAN, WAN, and MAN, as well as wireless networks like Wi-Fi and mobile networks. It explains the functioning of biometric attendance systems, advantages of computer networks, and various networking models, including peer-to-peer and client/server. Additionally, it discusses Internet concepts, electronic mail, search engines, and the role of different servers, along with steps for connecting biometric systems to the Internet.

Uploaded by

surajsatihal1280
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views12 pages

Wa0015.

The document covers the importance of networking in biometric systems, detailing types of networks such as LAN, WAN, and MAN, as well as wireless networks like Wi-Fi and mobile networks. It explains the functioning of biometric attendance systems, advantages of computer networks, and various networking models, including peer-to-peer and client/server. Additionally, it discusses Internet concepts, electronic mail, search engines, and the role of different servers, along with steps for connecting biometric systems to the Internet.

Uploaded by

surajsatihal1280
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Unit-4 Computer Networks, Internet and Standards of Biometric Data

Session 1: computer networks


1) What is Need and Importance of Networking in Biometric System.
 The biometric attendance system is commonly used in every organisation to record the
attendance of employees.
 It takes the input from the user only when it is connected to Internet through Wi-Fi network.
 This is because any input provided to the biometric devices gets stored in
the server, which provides services to clients.
 input provided to the biometric devices gets stored in the server, which provides services to
clients.
 Biometric systems consist of many devices interlinked together due to which biometric devices
can communicate with each other and can share the biometric templates within few seconds.
2) What is computer Network?
Ans. Collection of computers and other hardware components interconnected by communication
channel is called computer network

3) Explain Types of networks?


LAN (Local Area Network):- The purpose of sharing computing infrastructure within the organisation.
This type of network is called local area network .
LAN operate in a limited geographical area, such as schools, colleges, offices, etc.
II) Wide Area Network (WAN):- This network are used to connect between different
locations across large geographical areas. WAN connect LAN's between different
locations. For example, computers or devices in a branch office could connect to the
computer networks at the head office through telephone lines or satellites.
III) Metropolitan Area Network (MAN):- A MAN is a network that connects two or more
LAN or CAN (Campus Area Network) together but does not extend beyond the
boundaries of metropolitan area. MAN is operated by a government body or
corporation.

4) Explain Wireless Network


a)Wi-F(Wirless Fedility)i:-
 Wi-Fi is a technology that takes an Internet signal and converts it into radio waves. These radio
waves are picked up by wireless adapter.
 The devices in the radius of approximately 50–60 feet can catch the signal.
 Wi-Fi routers are used for broadband connections at home.
b) Mobile network:-
 Mobile phone technologies have evolved different communication standards for their
networks.
 GSM is used by AT&T and T-Mobile and CDMA is used byother major carriers
c) Bluetooth technology is used to connect the different components wirelessly.
 Bluetooth has a range of approximately 300 feet and consumes little power.
 The printer, wireless keyboard and mouse can be connectedto computer through Bluetooth.

5)Explain Biometric Attendance System (BAS)


 Biometric attendance machine captures fingers or iris for identity verification.
 Biometric time attendance machines also counts employees’ work schedule, based on the report.
 Biometric attendance systems ensure the accuracy of attendance and is useful in the organisations
with large number of employees.

6). List the advantages of a computer network.


 We can share the resource and information through computer network
 We can share hardware component like printer,
 We can purchase single internet connection and shared among multiple system,
 when a client sends a request to the system and when there are various terminals networked in the
system, there is at least one terminal, which can respond to the client if others are bust or not
working.

6. State the networking models used in computer networks.


There are basically two network models—peer-to-peer and client/server.
i) Peer-to-peer (P2P) model:- In a peer-to-peer biometric network, the
clients are all networked to one another without having the need of main hosts.
ii) Client/server model:- Client/server network consists of one central server and several client computers
connected to the server. The server is a powerful computer with high processing speed and high storage
capacity, while the clients are less powerful with either personal computers or workstations.

7. Give the diagrams of networking models.


8. What is Intranet?
 Intranet provides access to the web applications within the organisation.
 Intranet web application is set up to be used by the employee of the organisation.
 This internal web application is called Intranet.
9. What is Internet?
Internet is the largest computer network in the world, connecting billions of computers and other computing
devices.
10. Explain the function of the following network devices—
(a) repeaters:-
 Repeaters is a two port device. In a long distance network, when the signal becomes weak, a repeater
is used to regenerate the signal.
 When the signal becomes weak, they copy the signal bit by bit and regenerate it at the original
strength.
 The signal can be transmitted over the same network.
(b) router:-
 A router is a device like a switch that routes data packets based on their IP addresses.
 Router is mainly a Layer 3 or Network Layer device. Routers are used for connecting various networks
(LAN or WAN).
 A router transmits data from incoming network to another network. A router maintains a routing
table of various networks.
(c) modem:- Modems, also called as modulator and de-modulator, are the device that modulates one or
more carrier waves to encode data and demodulates the carrier wave to decode that data. The modems
provide the cheapest way to send and receive data, like the telephone lines.
11. What is network protocol? Explain TCP/IP network protocol.
Protocols are a set of rules or standards that allow network devices to communicate and exchange
information.
 TCP/IP is a combination of two protocols. TCP stands for Transmission Control Protocol, and IP stands
for Internet Protocol.
 It is the most widely used protocol for data transfer over Internet.
 TCP offers connection- based services. Most operating systems support TCP/IP.
 TCP/IP consists of four distinct network layers:1) Link layer,2) Internet protocol,3) Transport layer, 4)
Application layer.

A. Fill in the blanks


1. Collection of computers and other hardware components
interconnected by communication channel is called computer network
2. Computer network allows sharing of resources and information
3. Computers can be connected through wire, or without wire
4. Resources in computer network include devices, such as printer
5. Printer sharing is possible through computer network
6. There are three types of computer networks.
7. LAN stands for Local Area Network
8. Computers networked within a limit of geographical area are called LAN
9. WAN means Wide Area Network
10. LANs at different locations, when connected together are called Metropolitan Area Network
12. LANs beyond the boundaries of a city, when connected together are called Metropolitan Area Network
13. P2P networking model stands for model peer to peer.
14. When each computer can act both as a server and client, then that networking model is called peer to
peer. model.
15. HTTP stands for Hyper Text Transfer Protocol
16. IP address means address Internet Protocol.
17. When there is one server and many clients, then such
networking model is called client server model.
18. In Aadhaar card biometric data the client server Intranetnetworking model is used.
19. Internal network of an organisation is called Intranet
B. Multiple choice questions
1. The computer network that is used outside the Intranet is known as _________________.
(a) Internet (b) Extranet (c) Cable (d) Router
2. The global system of interconnected networks that use TCP/IP protocol is known as
(a) Internet (b) WAN (c) Intranet (d) LAN
3. The largest network of the computers in the world is
(a) Internet (b) Extranet (c) MAN (d) LAN
4. Which of the following are network devices?
(a) Repeater (b) Modem (c) Router (d) All of these
5. _________________ is used to regenerate the signal when it becomes weak.
(a) Network hub (b) Network switch (c) Repeater (d) Router
6. To join the two physical segments of the same network _________________ is used.
(a) Network bridge (b) Network switch (c) Repeater (d) Router
7. Multiple nodes in the network are connected by using the
(a) Network hub (b) Wi-Fi (c) LAN (d) router
8. The combination of network hub and network bridge can be performed by using _________________.
(a) Bluetooth (b) network switch (c) gateway (d) modem
9. The device that routes the data packets based on their IP addresses is _________________.
(a) UTP cable (b) telephone (c) repeater (d) router
10. Two networks working on different networking models can be connected together by using
(a) network gateways (b) desktop (c) Internet (d) Wi-F
11. Modem means _________________.
(a) modulator demodulator (b) modulator (c) de-modulator (d) router
12. The cheapest way to send and receive the data through the telephonelines can be performed by using a_
(a) modulator demodulator (b) modulator (c) de-modulator (d) modem
13. Wireless access point is also known as _________________.
(a) spot (b) soft spot (c) hot spot (d) Wi-Fi spot
14. The device that is a combination of router and an access point is _________________.
(a) modem (b) hot spot (c) Wi-Fi router (d) repeater
15. The set of standards that allow network devices to communicate an exchange information is called
(a) Wi-Fi router (b) protocol (c) repeater (d) modem
C. State whether the following statements are True or False
1. Protocols are the set of rules for communication. (TRUE)
2. In a computer network, all computers need not use the same protocol for communication.(FALSE)
3. Protocols may include signaling, authentication, error detection and correction. (TRUE)
4. TCP/IP stands for Transmission Control Protocol/Internet Protocol. (TRUE)
5. TCP/IP is not a core protocol of Internet. .(FALSE)
6. IP is the primary protocol used for relaying data across the network boundaries. (TRUE)
7. Ipv4 uses 64 bit addressing scheme. .(FALSE)
8. Ipv4 provides 232 possible addresses. .(FALSE)
9. IANA means Internet Assigned Numbers Authority. (TRUE)
10. Ipv6 uses 64 bit address. (TRUE)
11. Ipv6 address consists of 8 groups of four hexadecimal digits. .(FALSE)
12. Most of the operating systems support Ipv4 and Ipv6. (TRUE)

Session 2: Internet and Its applIcatIon


1)What is electronic mail? State its advantages.
Electronic mail or e-mail enables exchanging messages as electronic mails or files between two or more
people. Advantages:-
2. Give the steps for sending and receiving e-mail.
Procedure
1. Open your e-mail account by providing the correct e-mailID and password.
2. Click on Compose Message to create a new e-mail message.
3. A message window will open, which will allow you to enter the e-mail ID of the recipient.
4. Enter the receiver’s e-mail address in To
5. Make sure that the e-mail address is typed is the correct person.
6. If you wish to send a copy of the message to another person, add their names to the Cc: box. who should
receive the copies of the e-mail in Cc (Carbon copy)
7. You can also copy and send the message to another person using Bcc (Blind Carbon Copy).
8. The person who receives Bcc copy , can see all the e-mail addresses that this letter is sent to. Persons
under To and Cc.
9. Type the title or relevant subject related to the mail in Subject. The subject line of a message helps to know
about the message.
10. Enter the content of the message into the main box. Use a greeting at the start of the message and a
salutation at the end.
11. Attach the other file or files which should be sent with the e-mail by clicking the attachment button with
the paper clip icon.
12. Send the e-mail by clicking ‘Send’ button.

3. What do you mean by search engine? Give the steps for obtaining useful information using search
engine.
Search engines are the websites used to search the information on the Internet.
steps for obtaining useful information:-
Search engines make it possible to search the required information based on the search criteria. Search
engines are designed for the Internet users to find any information easily. After typing the keywords in the
search box of the search engine and clicking the search button, you will get a number of websites matching
your requested information. You can obtain the necessary information by clicking one or several hyperlinks.
4. Explain the role of DNS server.
DNS Server – used for translating URL to IP addresses.

5. What is FTP? How is FTP used for sharing of files?


e-mail client software have a limited capacity of sending a file of upto 25 MB in size) as an attachment. The
files exceeding the size of 25 MB cannot be sent as e-mail attachments. FTP is used to transfer large files of
one computer to another computer over the Internet. This protocol is operated on TCP/IP and used to upload
files on the Internet as well as to download files from Internet.
6. What is a web browser? State any four commonly used web browsers.
A Web Browser is an application software used to access the World Wide Web.
four commonly used web browsers are:-
Internet Explorer, Mozilla Firefox, Google Chrome, Safari, Opera
7. What is a website? Give examples.
A website consists of several webpages. The web page consists of text, images, videos and other multimedia
and hyperlinks.
Examples:- https://www.mhrd.gov.in
8. Explain the role of the following servers
(i) web server (ii) mail server (iii) print server (iv) DNS server
 Web server – used for storing web pages and providing these to the client computers.
• Mail server – used for electronic mail and providing them to the client computers.
• Print server – used to manage the printing services of client computers.
• DNS Server – used for translating URL to IP addresses.
10. What do you mean by uploading and downloading on Internet?
The process of retrieving information from the server computers to client computers is called downloading.
The process of providing information from client computers to server computers is called uploading
11. Explain how Internet works.
Internet is a network of interconnected networks and is designed to operate without a central control. It
consists of clients, servers and Internet Service Provider (ISP). The architecture of Internet is hierarchical in
nature.
12. What is domain name? Explain the different domain name extensions and their meaning.
A domain name is a human-friendly name for a device on the Internet. Domain name gives an identity to all
the websites, which exist on the Internet.
different domain name extensions and their meaning.
.com Commercial (for-profit) websites https://www.youtube.com
.org Non profitable organisations https://www.wikipedia.org
.gov Government organisations https://www.indianrail.gov.in
.edu Educational institutions https://www.educause.edu
.net Network-related domains https://www.media.net
13. Give the steps for connecting biometric attendance system of the Internet.
Step 1. Connectivity of Biometric Attendance System (BAS):The Biometric Attendance System (BAS) is
connected to the computer system either in a LAN via Ethernet port or through a USB port.
 We can also connect the Pendrive directly to the BAS using its USB port also. It uses Wi-Fi as well as
GPRS .
 The possible connectivity of the BAS to the PC or the USB drive Computer Networks , internet and
standards of biometric data205
Step 2. BAS Connectivity either with PC in LAN or with USB Pendrive. If the PC and the BAS machine both
are connected in LAN using Ethernet port, then such a network If the PC and the BAS machine both are
connected directly via USB Cable using USB port, then such a network
Step 3. Connectivity and Configuration of the BAS to the PC After having the physical connection of BAS in
LAN , the BAS has to be configured in the network to function as a node.To connect the BAS machine to the
PC in LAN, it is necessary to assign the IP address of same series.
Step 4. To configure manual IP address to the PC do the following First right click on the network icon on
lower right corner of taskbar area When this icon is right-clicked the option to Open ‘Network and Internet’
settings will appear below. Click on ‘Open Network and Internet Once ‘Network and Internet Settings’
appears, go ahead to click on ‘Change adapter settings’ on top of right corner under ‘Related settings’.
Step 5. Here you can see Ethernet adapters installed on your computer. You can change the network settings
by right clicking on the connection and then selecting the option Properties,
Step 6. In the Network Connection Properties window, put a tick (√) on Internet Protocol Version 4 (TCP/IPv4)
and click on ‘Properties’.
Step 7. If you have DHCP server configured, you can configure the computer to get IP address and other
network information automatically by selecting ‘Obtain an IP address automatically’.
Step 8. To assign static IP address or do manual network configuration, click on the ‘Use the following IP
addresses’
Step 9. Now login in eSSL desktop, based application using default login credentials
Step 10. To configure IP address to BAS, click on ‘Utilities Tab’ and select ‘Device Management’
Step 11. The TD and USB options are displayed under Device Name, where TD works on LAN (Ethernet) port
and USB on USB port To assign or edit IP address, right click on TD and select ‘Edit’ option
14. Give the steps to check your computer's IP address.
To find the IP address on Windows 10 using
 Visit the computer network lab and start the computer connected in network.
 Click on Start button and choose All apps.
 Click on the command prompt or press WinKey+R to enter command
 Type ipconfig/all and press Enter. Find your Ethernet adapter Ethernet,
 locate row IPv4 Address and IPv6 Address.
A. Fill in the blanks
1. The Internet is the largest network in the world.
2. Internet is run by a non-profitable organisation called Internet society
3. Every website address starts with http
4. WWW stands for World Wide Web
5. URL means Uniform Resource Locator
6. The domain name .gov indicates that it is a government website.
7. Every computer connected to the Internet is identified by Its IP address.
8. IP address contains four numbers.
9. ISP stands for Internet Service Provider
10. IP addresses are stored in text files
11. Testing of the network can be performed by using ping command.
12. Domain name gives identity to all the websites on the Internet.
13. Commercial websites are indicated by .com in the domain name.
B. Multiple choice questions
1. Normally all Indian websites are indicated by ______________ in the domain name.
(a) .au (b) .us (c) .in (d) .uk
2. Which of these is a protocol used in the Internet?
(a) TCP/IP (b) HTTPn(c) FTP (d) All of these
3. FTP stands for ______________.
(a) File transfer protocol (b) File transfer practice
(c) File to punch (d) Former transfer protocol
4. The main usage of FTP protocol is ______________.
(a) electronic mail exchange (b) file exchange
(c) informing and controlling messages (d) HTML document exchange
5. The main usage of HTTP protocol is ___________________.
(a) controlling IP addresses (b) file exchange
(c) electronic mail exchange (d) HTML document exchange
6. The main usage of TCP/IP protocol is _________________.
(a) controlling the exchange of IP addresses (b) file exchange
(c) electronic mail exchange (d) HTML document exchange
7. Electronic mail exchange can be achieved by using ______________ protocol.
(a) FTP (b) SMTP (c) HTTP (d) TCP/IP
8. SMTP stands for ___________________.
(a) Simple mail transfer protocol (b) Simple mail transfer process
(c) Super mail transfer protocol (d) Super mail to process
9. Error messages are informed and controlled by using ___________________ protocol.
(a) FTP (b) SMTP (c) ICMP (d) TCP/IP
10. The computer that distributes the resources is called
(a) Client (b) Server (c) Down-loader (d) Up-loader
11. The process of retrieving information from the server computer to the client computer is
(a) uploading (b) downloading (c) managing (d) printing
12. The process of providing information from the client computer to the server computer is
(a) uploading (b) downloading (c) managing (d) printing
13. DNS server is used ______________.
(a) to manage printing services (b) to manage electronic mails
(c) for storing of webpages (d) for translating URL to IP addresses
C. State whether the following statements are True or False
1. Web server is used for storing of web pages and providing these to the
client computers. True
2. DNS server is used to manage electronic mails. False
3. FTP means file transfer practice. False
4. Mozilla Firefox is a web browser. True
5. Sir Tim Berners Lee is considered as the father of world wide web. True
6. Safari is a text editing software. False
7. Computers connected to the Internet cannot be controlled remotely. True
8. Using remote access functionality, sometimes hackers can steal important data without the owner’s
knowledge. True
9. Checking of examination result online is an example of file sharing. True
10. Any information on the Internet cannot be found using search engine. False
11. Google is an example of search engine. True
12. Unique identity of a website cannot be reflected by its domain name. False
13. By using electronic mail we can exchange our messages or files to two or more people. True
14. Cost of the use of Internet is very high. False
15. E-mail can be sent from one country to any other country in the world True

SESSION 3: STANDARDS OF BIOMETRIC DATA


A. Fill in the blanks
1. ASCII stands for American Standard Code for Information Interchange
2. ASCII is a 7 bit code.
3. The extended version of ASCII is _8_ bit code.
4. ASCII code is used for binary representation of letters and numbers__.
5. ASCII code is also called alphanumeric locator__ code.
6. The ASCII code for the character A is 0100 0001__.
7. EBCDIC code means Extended Binary Coded Decimal Interchange Code_.
8. EBCDIC code can represent 256_ characters.
9. By using EBCDIC code 8 character can be represented in binary form.
10. In ASCII code ______7____ characters can be represented in binary form.
11. Unicode means _universal_ code.
12. All characters in Indian languages, such as Hindi, Marathi and Tamil can be represented in binary form by
using Unicode
13. IEC stands for _International Electro technical Commission.
14. The industry consortia includes _BioAPI,
Consortium, _ Biometric Consortium and OASIS__.

B. Multiple choice questions


1. The ASCII code for the character D is ______________.
(a) 0100 0100 (b) 0100 0101 (c) 0100 0110 (d) 0100 1100
2. National standards of biometric data are developed as per______________.
(a) Government policy (b) Government policy on open standards
(c) private sector policy (d) standard organisations
3. UIDAI means ______________.
(a) Unique Identification Authority of India (b) Universal Identification Authority of India
(c) Unique Identification Authority of Internet (d) Unique Isolated Authority of India
4. The fingerprint image standard adopted in India is_____________________.
(a) ISO/IEC (b) ISO/IEC 19794
(c) ISO/IEC 19794-4 (d) None of these
5. In image acquisition the scan resolution standard is______________ dpi.
(a) 100 (b) 200 (c) 400 (d) 500
6. In image acquisition the number of bits to be used per pixel is __________________.
(a) 2 (b) 4 (c) 8 (d) 16
7. In fingerprint image the format compressed__________________ is recommended.
(a) jpeg 2000 (b) png 2000 (c) xml 2000 (d) wav 2000
8. In iris images, the iris diameter should be ______________pixels.
(a) 100 (b) 150 (c) 200 (d) 250
9. In iris images, the iris margin segmentation must be______________ % left and right of the iris diameter
(a) 30% (b) 50% (c) 60% (d) 80%
10. Iris images shall be captured and stored in grayscale with pixel depth ______________ bits per pixel.
(a) 2 (b) 4 (c) 6 (d) 8
11. The eye image should be eliminated by using light havinga wavelength between ______________ and
______________nanometers.
(a) 500, 700 (b) 700, 900 (c) 900, 1100 (d) 1100, 1300
12. CBEFF stands for ______________.
(a) Common Biometric Exchange Formula Framework
(b) Common Biometric Electronic Form Format
(c) Common Biometric Exchange Format Framework
(d) Common Based Electronic Format Framework
13. INCITS stands for ______________.
(a) International Council for Information Technology Standards
(b) International Committee for Information Technology Standards
(c) International Committee for Internet Technology Standards
(d) International Committee for Information Technology Solutions
14. Which of the following subcommittees focus on the security issues of biometrics?
(a) SC 17 (b) SC 27 (c) SC 37 (d) None of these
15. Which of the following is not the organisation to develop biometric standards?
(a) ISO (b) ICAO (c) ANSI (d) ISO/IEU

D. Short answer questions


1. What is ASCII code? State its features.
-It is the coding system traditionally used with personal computers. ASCII is a 7-digit (7-bit) code
2. What are image acquisition requirements as per the biometric standards?
Give the image acquisition formats.
 The duplicate check during the enrolment phase will use 1:N matching. 1:N matching for large
gallery size and high enrolment rate will require substantial computing resources
 The matching time and matching accuracy is directly related to the quality of the images.
Therefore, it is essential that the highest quality of images be consistently captured
 It is also required that all 10 fingers are captured whenever physically possible.
 The goal during authentication is to achieve fast overall response while permitting a wide variety
of capture devices and associated software.
 It is sufficient to capture only one or two fingers for reliable 1:1 authentication.
 The image quality needed for authentication is not as stringent as in enrolment.

3. Why are biometric standards important?


 Biometrics are used for national security purposes .
 National Institute of Standards and Technology (NIST) has proposed to form an international standards
body to increase the deployment biometrics standards for a variety of applications.
 A standards is necessary to ensure the systems and applications are interoperable, scalable, usable,
reliable and secure.

4. What are the various e-Governance applications in India


using Biometrics.
The UIDAI Fingerprint Image Standard will adopt ISO/ IEC 19794-4 Fingerprint Image Data Standard
as Indian Standard and specify certain implementation values
5. What is ISO
 International Organisation for Standardisation (ISO) is the world’s largest developer of standards.
 It is composed of government or industry representatives from the national standards bodies of 148
countries.
6. State colour, pixel depth and Ilimination requirement in capturing eye image.
Colour and pixel depth
The iris images shall be captured and stored in grayscale with pixel depth 8bits/pixel.
Illumination
The eye should be illuminated using near-infrared light with wavelength between 700 and 900
nanometres (nm) approximately.

7. Explain ASCII.
 ASCII (American Standard Code for Information Interchange) It is the coding system traditionally used
with personal computers.
 ASCII is a 7-digit (7-bit) code, although there are several different 8-bit extended versions of ASCII that contain
additional symbols not included in the 7-bit ASCII code.

8. Explain Unicode.
 Unicode are limited to only the Latin alphabet used with the English language,
 Unicode is a universal international coding standard designed to represent text-based data written in
any ancient or modern language.
 It uniquely identifies each character using 0s and 1s, no matter which language, program, or computer
platform is being used.
 It is quickly replacing ASCII as the primary text-coding system.
 Unicode is used by most web browsers and is widely used for web pages and web applications.

Session 4: IT practices
A. Fill in the blanks
1. A simple text file that records every activity, such as downloads, page loading and errors is called
log file.
2. A log file records events that occur in an operating system.
3. Violation of copyright, patents, trademark and terms of license agreement is prohibited under law.
4. The information to uniquely establish a person’s identify is called personally identifiable
information (PII)
5. In creative common license CC BY-NC-ND, the ND stands for no drives
6. In creative common license CC BY-NC, the NC stands for non-commercial
7. The Information Technology services in India are regulated by using IT Act 2000
8. The is the key to create digital signature private key and public key is the key to verify digital
signature.
9. IT Act 2009 gives legal recognition to electronic transaction and digital signature.
10. If a person intentionally destroys the computer source code then it is treated as crime under IT
Act.

B. Multiple choice questions


1. When did IT Act 2000 come into effect?
(a) October 17, 2000 (b) November 11, 2000
(c) October 17, 2001 (d) November 11, 2001
2. What are the components of IT Act 2000?
(a) Legal recognition to digital signature
(b) Regulation of certification authorities
(c) Digital Certificates
(d) All of the above
3. Computer crime includes ___________________.
(a) creating viruses
(b) stealing a credit card number
(c) unauthorised use of a mainframe computer
(d) All of the above
4. A suite of guiding beliefs, standards, or ideals that
pervades an individual, group, or community of people is _____________.
(a) ethics (b) morals (c) integrity (d) laws
5. What are computer ethics?
(a) Honest, moral code that should be followed when on
the computer
(b) A computer program about honesty
(c) A computer that fits on or under a desk
(d) A list of commandments in the Bible
6. Creative commons licenses are indicated with the symbol
(a) ® (b) T (c) © (d) cc
7. Which of the following creative commons licences is use for non-commercial distribution?
(a) CC-BY (b) CC BY-SA (c) CC BY-NC (d) CC BY-NC-ND
8. Which of the following is not allowed as per IT Act 2000?
(a) Electronic transaction
(b) Storing official documents in the digital format
(c) Do the cybercrimes
(d) Punishment for computer related crimes

C. State whether the following statements are True or False


1. As per code of ethics, you can use any computer system, software, or data files without the
permission of owner iscomes under the code of ethics. ( False)
2. As per code of ethics, always send emails from your owne-mail ID.(True)
3. As per code of ethics, it is allowed to send unsolicited e-mail to a large group of people. ( False)
4. Proper credit should be given to others for intellectual property.(True)
5. Anybody can use copy or modify the public domain software. (True)
6. The e-mail is not a valid and legal form of communication. ( False)
7. According to IT Act, electronic transactions are legal. .(True)
8. A log file records the events that occur in operating system or application software .(True)
D. Short answer questions
1. What is log data file?
Ans:- Keeping the record of each activity in a text file called log file.
2. Why was IT Act 2000 introduced?
Ans:- The data is vulnerable to cyber-crime. Therefore, with the need to provide the legal framework,
Parliament of India, passed the Information Technology Act in 2000.

0. Which is the act that provides legal framework for e-Governance in India?
Ans:- Information Technology Act

1. What are the salient features of the IT Act?


The following are the features of IT Act 2000:
 To give legal recognition to electronic transaction done by electronic way or use of internet.
 To give legal recognition to digital signature for accepting any agreement.
 To provide facility of online filling documents relating to school admission or registration in
employment exchange.
 According to IT Act 2000, any company can store their data in electronic storage.
 To stop cyber crime and protect privacy of Internet users.
 To give more power to IPO, RBI and Indian Evidence act for restricting electronic crime.
 To give legal recognition for keeping books of accounts by bankers and other companies in electronic
form.

2. What are the basic ethics in information technology?


o Do not use other users computer system, software, or data files without permission.
 Take appropriate approval or permission before using system resources, including communication
ports, file space, other system peripherals and computer time.
 Organisations implementing the computer system must consider the personal and professional
development, physical safety and human dignity
of all workers.
 Appropriate human-computer ergonomic standards should be considered in system design and in the
workplace.
 Avoid sending mails from or borrowing other’s login ID and password.
 Hosting of personal pages on official compute and providing access for commercial purposes should
not be allowed.
 Sending out unsolicited e-mail to a large group of people should be prohibited.
 Honour copyrights, patent and trademark. Violation of copyright, patents, trademark and terms of
license agreement is prohibited by law. Even the pirated software should not be used. Also give the
proper credit to others for intellectual property.

3. What is code of ethics? What is one advantage and one disadvantage of a code of ethics?
A code of ethics is a document that outlines a set of acceptabl behaviours.

8. What does the term intellectual property mean? Give an example.


Intellectual property is an idea, invention, or process that derives from the work of the mind or
intellect.
9. What are the advantages of using Creative Commons
License?
 Creative Commons license is used by authors to control the use of their work.

10.What are freeware, shareware and public domain software? Give examples.
 Freeware:- The software developers publish their code and make their software available
for others to use and distribute for free.
Example:- Example:- magazines
 Shareware:- is the software that can be shared with other users with owner’s permission,
provided it should not be copied.
Example:- magazines
 public domain software:- The public domain software are waived copyright.Anybody can use
them, copy or modify it in any manner they want without taking the permission.
Example:- text, figures or any artistic work
10. What is fair use?
Fair use is a limitation on copyright law that allows for the use of protected works without prior
authorisation in specific cases.

11. What protections are provided by a patent?


o A patent creates protection for someone who invents a new product or process.
o A patent holder has the right to exclude others from making, usin offering the product for sale.
o Patent protection is valid for a limited period of 20 years before the invention or process
enters the public domain.
 patent will only be granted if the invention or process being submitted is original, non-obvious and
useful.

12. What does a trademark protect?


It is a word, phrase, logo, shape or sound that identifiesa source of goods or services. For example, ‘f’
is the trademark of Facebook.

You might also like