It Systems 2nd Sem Question Bank & Solutions
It Systems 2nd Sem Question Bank & Solutions
Ans. SSD stands for Solid State Drive and HDD stands for Hard
Disk drive.
SSD has high read/ write performance for random and
2
sequential data retrieval as compared to HDD.
SSD is now more popular as compared to HDD in Desktops
and Laptops.
Ans. A search engine is a software programme or a system designed to help users find
information stored on the internet or within a specific database.
How does a search engine work: -?
Search engine aims to provide the most relevant search results in minimal time to
their users.
The databases contain meta data and indexes of selected webpages, out of
billions of webpages across the WWW for the searching keywords. Out of selected
webpages, the most relevant webpages are displayed in search results with the
help of the ranking module.
A search engine generally performs three functions:
1. Crawling: - Every search engine has some automated software which are
known invariably as the bot, robot, web wanderers, spiders, Crawler or
indexer. The purpose of the spider is to traverse and scan the World Wide Web
for publicly available information.
2. Indexing: - This is a process to organize and store the results found in the
Crawling function such that they can be further processed by search engine 5
algorithm. A search engine does not store all information available on the
webpage instead it stores details like title and description of the page, date of
creation/ updating, type of content, associated search terms, links coming to
and from this webpage and other parameter required by its algorithms.
3. Ranking: - This is the process of showing results in order of their relevance.
Most relevant pages are shown first while the least one will be on after word.
This is done using the ranking algorithm of the search engine. Some
dominating ranking factors are links referring to this webpage, website age
associated keywords, speed of webpage loading, time spent on a webpage,
etc.
Primary Memory: -
Primary memory is known as main memory or internal storage because it is
directly assessable by the CPU.
It is used to store program instruction, data and intermittent results.
It is made of semi-conductor devices. Due to its fast access rate and circuits
complexity, it is expensive in comparison to secondary memory.
A computer cannot work if there is no primary memory installed into the system.
RAM, ROM, cache memory are example of primary memory.
a) Random Access Memory (RAM): -
RAM is also known as a temporary or volatile memory because whatever data
stored in it remains till the computer is switched ON. When the current is
switched off, all stored data will be wiped out or lost.
RAM is the most essential element of a computer system because, without it, the
system cannot perform its tasks.
RAM is further classified into two types:
a. Static RAM
b. Dynamic RAM
SRAM: - The word static indicates that the memory retains its contents as long as
power remains supplied.
DRAM: - DRAM is constructed of tiny capacitors that leak electricity. Designers use
DRAM because it is much denser, uses less power and generate less heat than SRAM.
b)Read Only Memory (ROM): -
The programs stored in ROM are permanent and are not lost or erased when the
current is switched off, so it is a non-volatile memory type.
ROM is available in different types including PROM, EPROM and EEPROM.
PROM (Programmable Read Only Memory): -
PROM is read only memory that can be modified only once by a user. The user
buys a blank PROM and enters the desired contents using a PROM programmer.
EPROM (Erasable and Programmable Read Only Memory): -
It is programmable with the added advantage of being reprogrammable. To
reprogram an EPROM, the entire chip must first be erased.
EEPROM (Electrically Erasable and Programmable Read Only Memory): -
The EEPROM is programmed and erased electrically. It can be erased and
reprogrammed about ten thousand times. Both erasing and programming take
about 4 to 10 ms.
c)Cache Memory
Cache memory is an intermediate form of storage between primary memory and
CPU. It is used to store data that are frequently needed for execution. It is used to
increase the performance of CPU. Different types of cache memory are: Level 1(L1)
cache, Level 2(L2) cache and Level 3 (L3) cache.
L1 cache: L1 cache is the primary cache and it the fastest and costliest cache.
L2 cache: L2 cache is the secondary cache. It is slower and less expensive than L2.
Cache.
L3 cache: L3 cache is special cache which is used to increase performance of L1 and
L2. Its slowest and least expensive among L1 and L2 cache.
Secondary Memory: -
Secondary memory is mainly used to store data permanently. It is also termed as
‘External Memory’ due to lack of direct access between CPU and the memory.
It is a non-volatile memory; data retains even after the computer system is
switched off or electric power is disconnected.
Examples: HDD, SSD, Floppy, CD, DVD, etc.
Ans. A computer system is one that is able to take a set of inputs, process them and
create a set of output. This is done by a combination of hardware and software.
A computer System consists of the following functional unit.
-Input unit
-Central Processing Unit
-Memory Unit
-Output Unit
1. Input Unit: -
Computer needs to receive data and construction in order to solve any problem.
Therefore; we need to input the data and instructions into the computers.
The input unit consists of one or more input devices some commonly used input-devices
are: Mouse, Punched card reader, Magnetic tape readers, Etc.
Ans. The digital India is a flagship programme of the government of India with a vision to
transform India into a digitally empowered society and knowledge economy.
Digital India program is centred on three key vision areas as defined below: -
1. Digital infrastructure as a utility to every citizen: -
Availability of high-speed internet as a core utility for delivery of services to citizens.
Cardle to grow digital identity that is unique lifelong, online and authenticable to every
citizen.
Mobile phone & bank account enabling citizen participation in digital & financial space.
Easy access to a common service centre.
Shareable private space on a public cloud.
Safe and secure cyber space.
Example: - Aadhaar, Digi-locker, DBT (Direct Benefit Transfer), E-Sign, Etc.
2. Governance and service on demand: -
Seamlessly integrated services across departments or jurisdiction. 5
Availability of services in real time from online and mobile platforms.
All citizen entitlements to be portable & available on the cloud.
Digital transformed services for improving ease of doing business.
Making financial transactions electronic & cashless.
Leveraging Geospatial Information System (GIS) for decision support system and
development.
Example: - BHIM, E-PANCHAYAT, E-PATHSHALA, KISAN SUVIDHA, Etc.
3. Digital Empowerment of Citizens: -
Universal digital literacy.
Universally access digital resources.
Availability of digital resources/services in Indian languages.
Collaborative digital platforms for participative governance.
Citizens not required to physically submit Govt. documents/certificates.
Example: - MY GOV, AEPS, PMKVY, SMART CITTES, Etc.
UNIT-2 (SET-1)
Q.
No.
Question & Answer -2 marks each Bloom's
taxonomy
Level
1 Write any two major types of shells on most UNIX systems with their prompt Level 1
symbol.
Ans Two major types of shells available on most Unix systems with their prompt
symbol are as follows.
Shell prompt symbol
-------- ---------------------
Bourne Shell $
C Shell %
2 Write any two shell commands with their description and syntax. Level 1
Ans Two commands are,
a. Cd (change directory) : cd command is used to change the current
working directory.
Syntax: $ cd <directory name>
b. Mkdir : to create a new directory
Syntax: $ mkdir <directory name>
2 Create the following directory structure using UNIX/Linux bash shell. After Level 3
creation, delete the structure.
Insert mode: this mode is used for inserting text into the file by vi editor.
Whatsoever is typed in this mode is treated as input and placed in temporary
memory and after a command from the user it goes to the file. To switch from
command mode to insert mode, the user need to press ‘i’ on the keyboard. You
need to press ‘Esc’ key to return from insert mode to command mode.
5 Explain the function of grep command briefly with suitable example. Level 2
Ans Grep command globally search for regular expression and print out. This
command searchesa file for a matchingpattern or regular expression.
Example :
Let a text file “hockey.txt” which contains 2 lines content as follows.
India has won 11 medals in field hockey.
India has won 4 medals in in the shooting.
Case 1: Searching for specific Pattern
Syntax: grep "pattern" filename
This searches for the "pattern" in the specified file and prints all lines
that contain the pattern.
Example: grep "medal" hockey.txt
Case 2: Display Line Numbers
Syntax: grep –n "pattern" filename
Example: grep -n “medal” hockey.txt
The output will be,
1: India has won 11 medals in field hockey.
2: India has won 4 medals in in the shooting.
Here, the search pattern “medal” will be highlighted in the line with
line number 1 and 2.
Case 3: Invert Match
Syntax: grep -v "pattern" filename
This prints all lines that do not match the pattern.
Example: grep -v "medal" hockey.txt
Case 4: Counting Matches
Syntax: grep –c “pattern” filename
This counts the number of lines that match the pattern.
Example: Grep -c “medal” hockey.txt
The output will be, 2.
In this case the word “medal” occurs 2 times in hockey.txt, so the
output will be 2.
Case 5: Searching for specific Pattern from multiple filenames
Syntax: grep –h “pattern” filenames
This especially useful in the matching lines themselves, regardless of
which file they came from.
Example: grep –h “medal” hockey.txt file2.txt
6 Explain the major differences between Linux and Windows operating system. Level 4
Ans Key area Linux Windows
Kernel It is an open-source, Unix-like Windows uses a proprietary
operating system. The core of kernel developed by
the Linux OS is the Linux Microsoft. It is based on the
kernel, which is responsible Windows NT kernel, which
for managing hardware and has evolved over the years to
system resources. support modern hardware
and provide a user-friendly
experience.
Source Code Linux is open-source, which Windows is a closed-source,
Availability means the source code is proprietary operating
freely available. Anyone can system. The source code is
view, modify, and distribute it. not available to the public,
This gives users a high degree and users cannot modify the
of control and flexibility over core system. Microsoft
the operating system. maintains full control over
the OS.
User Linux typically uses various Windows has a consistent,
Interface (UI)
desktop environments like user-friendly interface
GNOME, KDE, and Xfce. These (starting with Windows 95 up
environments can be to the latest version,
customized to a high degree, Windows 11). It is known for
offering flexibility to users. its ease of use, with a Start
The interface may be more Menu, taskbar, and window-
technical, but many user- based design that most users
friendly distributions (like find intuitive.
Ubuntu) provide simple,
attractive interfaces.
System Linux can run on older or less Windows tends to require
Requirements powerful hardware. This more system resources (e.g.,
makes it a good choice for RAM, CPU power), especially
lightweight or resource- in newer versions. As a
constrained systems. result, it might not run as
efficiently on older hardware.
7 Explain UNIX architecture with a neat diagram Level 2
Ans The UNIX architecture is known for its simplicity, modularity, and robustness. It
consists of several layers that work together to manage the system. A typical Unix
System Structure is presented below.
Kernel:
A kernel is a backbone of the Unix operating system that is loaded into
the memory on system startup (boot-up time) and manages the overall system
until shutdown.
Shell:
A shell is a special program that acts as an intermediary between the user
and the Kernel of the operating system.Shell is a utility program thatstarts up
when we log on. Shell provides a platform or environment by which any user can
interact with the computer system by typing commands. The shell interprets the
commands typed by the user on the command line or a script file.
In this diagram:
The User Interface is where users interact with the system, usually
through a terminal or graphical interface.
The Shell processes user commands and requests services from the
kernel.
The Utilities provide various tools and programs for file and system
management such as ls, cp, mv, grep, etc.
The Kernel directly interacts with the hardware, managing resources and
system calls.
b. Copy files
cp Projects/Alpha/report.txt Projects/Beta/
cp Projects/Alpha/data.txt Projects/Gamma/
c. Move file
mv Projects/Alpha/summary.txt Projects/Gamma/
e. Concatenate files
cat data.txt >> summary.txt
9 Discuss the step by step procedure to install Ubuntu OS in your system. Level 1
Ans - Plug the bootable media which includes Ubuntu OS into our system.
- Now we need to set the booting sequence to USB disk instead of HDD. This is
done by changing boot priority in the BIOS setting at the time of computer
start.
- Restart the computer and access to BIOS setting by pressing function keys F1
or F2 or F10 or F12 (or any other) depending on your BIOS and computer
manufacturer. It will show your BIOS screen (it may look differ, as per your
system). Give a higher priority to your USB drive.
- Save and exit BIOS settings.
- The booting process will begin once boot media is detected by the BIOS. The
installer will check the disk (file system). The system will prepare to install
Ubuntu operating system.
- After a while, we will see the Ubuntu 20.04 (or any other version) welcome
page. Here we have to click the Install Ubuntu option.
- Next, select the language and click continue.
- Thereafter, select the keyboard layout and click the continue.
- Now we need to select the types of apps we want to begin with. We may
choose any of the available options i.e., Normal or Minimal. We can instruct
the installer to update the ubuntu while installing by checking the checkmark
option.
- Then we need to choose, how we want to install the OS from the available
options. i.e., Erase disk and install ubuntu or something else.
- After confirmation, the disk will be erased accordingly and the installation
will continue.
- Select the time zone i.e., “Kolkata” then press continue.
- Then create login credentials and name of the computer.
- Restart the system to complete the installation.
10 Write short notes on shell commands. Level 2
Ans Shell commands consist of a single or more word separated by white spaces. The
first word is the command, and subsequent words are the options or arguments.
There are two types of internal commands available in Unix, such as,
a. Directory and file manipulation command
b. Terminal, Information & Utility command
Question Bank
<a
href="https://www.google.com">Visit Google</a>
3. Q. What is CSS? Explain its purpose in web 1+1 BL2 (Understand)
development.
1
elements.
h1
Ans.
{
color: blue;
text-align: center;
}
5. Q. Explain the difference between an ID and a class in 2 BL 4 (Analyze)
CSS.
2
7. Q. List any two basic HTML tags used for formatting 1+1 BL1 (Remember)
text.
3
12. Q. Write the HTML code to create a hyperlink that 2 BL 3 (Apply)
links to "https://www.example.com" with the text
"Click Here."
<a href="https://www.example.com">Click
Ans.
Here</a>
13. Q. What is the purpose of the <title> tag in HTML? 2 BL2 (Understand)
4
18. Q. Write the CSS code to center-align text in a <div> 2 BL 3 (Apply)
element.
div
Ans.
{
text-align: center;
}
19. Q. What CSS property is used to set the font size of 2 BL1 (Remember)
text? Provide an example.
P
{
font-size: 16px;
}
20. Q. Write the CSS code to set the width of an element to 2 BL 3 (Apply)
80% of the page.
Element
Ans.
{
width: 80%;
}
21. Q. What is the function of the <br> tag in HTML? 2 BL1 (Remember)
22. Q. What is the purpose of the <footer> tag in HTML? 2 BL2 (Understand)
5
The <footer> tag defines the footer section of a
Ans. webpage, usually containing information like
copyright, contact, and links.
23. Q. How do you specify a comment in HTML? 2 BL1 (Remember)
p
Ans.
{
border: 1px solid black;
}
25. Q. What CSS property controls the font style (italic, 2 BL1 (Remember)
normal)?
p
{
font-style: italic;
}
26. Q. Write the CSS code to make all links appear red and 2 BL 3 (Apply)
remove the underline.
a
{
color: red;
text-decoration: none;
}
27. Q. How would you link an external CSS file named 2 BL 3 (Apply)
"style.css" in an HTML document?
6
Ans. <link rel="stylesheet" href="style.css">
28. Q. Describe how inline CSS is applied to an HTML 1+1 BL2 (Understand)
element. Provide an example.
/* This is a comment */
p{
color: blue;
}
30. Q. How do you align text to the right in CSS? 2 BL 3 (Apply)
Example:
p{
text-align: right;
}
31. Q. Between using HTML tags and CSS for text 1+1 BL5 (Evaluate)
formatting, which do you think is more efficient for
creating consistent styles across a website? Explain
your reasoning.
7
Using CSS is more efficient for creating consistent
styles across a website because CSS separates content
Ans. from presentation. With CSS, a single stylesheet can
apply uniform formatting to multiple pages, making it
easier to manage and update.
32. Q. Create an HTML code snippet that includes a 1+1 BL6 (Create)
heading "My Hobby" and a paragraph describing
your favorite hobby?
<h1>My Hobby</h1>
Ans.
<p>My favorite hobby is reading books about science
and technology.</p>
33. Q. What do you mean by hyperlink? 2 BL2(Understand)
<th colspan="2">Name</th>
<th rowspan="2">Phone</th>
Cell padding is the space between the cell edges and the
8
Ans. cell content.
th, td {
padding: 15px;
}
table {
border-spacing: 30px;
}
9
<head> - This section contains metadata about the
HTML document, such as the document's title,
character set, and links to CSS files or JavaScript. It
does not display content on the webpage.
Example:
<html>
<head>
<title>Sample Page</title>
<meta charset="UTF-8">
</head>
<body>
<h1>Welcome to the Sample Page</h1>
<p>This is a simple HTML document structure.</p>
</body>
</html>
10
2. Q. What is CSS? Explain its different types and how 1+2+2 BL2 (Understand)
CSS is applied in an HTML document.
Example:
Example:
<head>
<style>
p{
11
color: green;
}
</style>
</head>
Example in HTML:
<head>
<link rel="stylesheet" href="styles.css">
</head>
p{
color: red;
}
Ans.
HTML (HyperText Markup Language) is the standard
language for creating webpages. It defines the
12
structure of a webpage, allowing developers to add
content like text, images, and links.
4. Q. What is the <table> tag in HTML, and how is it 1+4 BL2 (Understand)
structured?
Ans. The <table> tag is used to create tables in HTML,
organizing data in rows and columns. A table structure
typically includes:
Example:
13
<table>
<tr>
<th>Header 1</th>
<th>Header 2</th>
</tr>
<tr>
<td>Data 1</td>
<td>Data 2</td>
</tr>
</table>
5. Q. Explain the use of <ul>, <ol>, and <li> tags in 5 BL2 (Understand)
HTML.
Ans.
The <ul> (unordered list) and <ol> (ordered list) tags
are used to create lists in HTML. The <li> (list item)
tag defines each item within these lists.
Example:
<ul>
<li>Item 1</li>
<li>Item 2</li>
</ul>
6. Q. Describe the use of the <form> tag in HTML. 1+4 BL2 (Understand)
Mention some commonly used form elements.
14
Ans. The <form> tag is used to create forms for collecting
user input. It contains input elements like:
<a
href="https://www.example.com">Link</a>
15
id: Provides a unique identifier for an element.
<div id="uniqueID">Content</div>
8. Q. What is the purpose of the <br> and <hr> tags in 2.5+2.5 BL2 (Understand)
HTML?
The <br> and <hr> tags are both empty tags in HTML,
Ans meaning they don’t have closing tags:
Hello<br>World
<p>Section 1</p>
<hr>
<p>Section 2</p>
9. Q. What is the difference between the <div> and 5 BL4 (Analyze)
<span> tags?
<div class="container">
16
<p>Content inside a div.</p>
</div>
<table>
Ans.
<tr>
<Td>Row 1, Column 1</td>
<Td>Row 1, Column 2</td>
</tr>
<tr>
<Td>Row 2, Column 1</td>
<Td>Row 2, Column 2</td>
</tr>
</table>
11. Q. Evaluate the use of <div> and <section> tags in 1+2+2 BL5 (Evaluate)
HTML for organizing webpage content. Which tag
would you use for grouping related content, and
why? Provide examples.
<div> tag:
Ans.
o A generic container for grouping
content, but it carries no semantic
17
meaning.
o Useful for applying styles or JavaScript
functionality to a group of elements.
<section> tag:
o A semantic element that groups content
related to a specific topic or theme.
o Improves accessibility and SEO, as
screen readers and search engines can
better understand the structure of the
webpage.
<!DOCTYPE html>
Ans.
<html>
<head>
<title>Welcome Page</title>
</head>
<body>
<h1>Welcome to My Page</h1>
<br>
</body>
</html>
18
STATE COUNCIL FOR TECHNICAL EDUCATION & VOCATIONAL TRAINING, ODISHA
INTRODUCTION TO IT SYSTEMS (TH-1B)
QUESTION BANK (with Solutions) – UNIT 4 (SET-1)
(Common to 1st & 2nd Sem)
Short Questions & Answers(02 Marks Each)
1. How a user can open a document in OpenOffice Writer and what
are the options for it. Level-2 (understanding)
Answer:
A user can open created document in these ways.
i. Via Quick Starter: Open Quick Starter by these method then click on the
open document. It will show an open dialog box to browse for the desired
file to be open.
ii. Via Start Center:
Open Start Center by clicking on OpenOffice icon.
We can open from a list of recent documents.
The document can also be open from the menu option file.
Recent Documents list of the File menu.
Answer:
Freezing A Row & A Column:
Click into the cell that is immediately below the row you want to frozen and
immediately to the right of the column you want to be frozen.
Choose Windows Freeze. A dark line appears, indicating where the
freeze is put.
Unfreezing
To unfreeze rows or columns, choose Window Freeze. The checkmark by
Freeze will be removed.
10.What is Open Office Tool. Level-1 (Remembering)
Answer:
Open Office Tool is an open source software suite of Apache Open Office
(AOO) that can run on several hardware architecture and various operating
systems.it includes various tools like Writer, Calc, Impress, drawing applications etc.
All these components are well integrated and commonly referred as Open Office
tools.
Answer:
AOO Stands for Apache Open Office. It is a open source software suite of
Apache Open Office that can run on several hardware architecture and various
operating systems.
Answer:
Step-1: Insert data into Calc which is to be graphically represented.
Step-2: Select the data to be included in chart/graph information.
Step-3: Either press the chart icon on standard toolbar or click on insert
chart option.
Step-4: It will show chart wizard with the default information of the chart as per
the given data.
(i) Title Bar: It is situated at the top of the Writer windows and shows the
file name of the current document.
(ii) Menu Bar: The Menu bar is just below the title bar having various
menus. When a menu is clicked it dropdowns and displays several
commands. We will discuss one by one each such menu.
File: To apply commands to current document, to open or close
document.
Edit: For editing the current document, for example, cut, paste.
View: For controlling display of document on the screen.
Insert: For inserting new elements in document, like, comments,
special characters, graphics, and objects.
Format: For formatting the layout and content of document.
Tools: For spelling check, gallery of object art to add to document,
to configure menus.
Table: To insert, edit, delete a table in a text document.
Windows: For manipulating and displaying document windows.
Help Menu: Contains link to pen the AOO help file, Update options
check for any available update for the software. It also gives
information about the version and license information of the
program.
(iii) Tool Bar: The writer supports several toolbars i.e; docked, floating, and
tear-off toolbar.
Docked Toolbar: It is fixed by default but it can be moved to different
locations.
Floating Toolbars: It is context-sensitive. It appears as per the current
cursor position or selection.
Tear-off Toolbars: It can be opened via a triangle on toolbar icons.
(iv) Right-click Menus: User can right-click on a paragraph, graphic, or other
objects to open a context menu. It is the fastest and easiest way to reach a
function of the right-clicked object.
(v) Ruler:
Rulers are used to control and see page margins, paragraph
indents, and various alignments of writer objects.
It can be shown or hidden via ruler check mark in view menu.
(vi) Status Bar:
The Writer status bar is located at the bottom of the workspace.
It provides information about the document and convenient ways
to quickly change some document features.
It contains page number, page style, language, writer mode, file
save status, digital signature, page zooming control etc.
To Replace Text
a. Choose Edit - Find & Replace to open the Find & Replace dialog.
b. Enter the text to search in the Find text box.
c. Enter the text to replace the found text in the Replace with text box.
d. Either click Replace or Replace All.
e. When you click Replace, Writer will search the whole document for the text
in the Find box, starting at the current cursor position. When text is found,
Writer highlights the text and waits for your response.
f. Click Replace to replace the highlighted text in the document with the text
in the Replace text box. Click Find Next to advance to the next found text
without replacing the current selection.
g. When you click Replace All, Writer replaces all text that matches your entry.
Slides Pane:
The slides pane contains thumbnail pictures of the slides in your
presentation.
Clicking a slide in this pane select it and place it in the workspace.
When a slide is in the workspace you can apply to it any changes
desire.
Several additional operations can be formed on one or more slides
simultaneously in the slide pane.
Add a new slide to the presentation.
Mark a slide a hidden, deletes a slide from the presentation if it
is no longer needed.
Rename a slide, duplicate a slide or move it to a different
position in the presentation.
Tasks Pane:
The tasks pane has several sections. To expand the section you wish to
use, click on the right-pointing triangle to the left of the caption. Only one
section at a time can be selected.
Master page: Here you define the page style for your presentation.
Layout: The pre-packaged layouts are shown here. You can choose the
one you want, use it as it is, or modified it to your requirements.
Custom Animation: A variety of animations for selected elements of a
slide are listed. Animation can be added to a slide and it can also be
changed or removed later.
Slide Transition: We can select transition type, its speed (slow, medium,
fast) choose between an automatic or manual transition, and choose
how long the selected slide will be shown.
Workspace:
The workspace has five tabs Normal, outline, notes, hand out & slide
sorter. These five tabs are called view button. The workspace below the view
button changes depending on the chosen view.
Normal View: Normal view is the main view for working with individual
slides. Use this view to format and design and to add text, graphics and
animation effects.
Outline View: The outline view contains all the slides of the presentation
in their number sequence. It shows topic titles, bulleted list & numbered
list for each slide in outline format.
Notes View: Use the notes view to add notes to a slide.
Click the notes tab in the workspace.
Select the slide to which you want to add notes.
In the text box below the slide, click on the words, click to add
notes and begin typing.
Handout View: The handout view is for setting of the layout of your slide
for a printed handout. Click the handout tabs in the workspace, and
then choose Layouts in the Task pane. We can choose to print 1, 2, 3, 4,
5, 6, or 9 slides per page.
Slide Sorter view: slide Sorter view contains all of the slide thumbnails.
Use this view to work with a group of slides or with only one slide.
Question Bank & Solutions
(1st/2nd Semester 2024-25)
Introduction to IT Systems
UNIT-5: Information Security Best Practice(SET-1)
Short Questions With Answers(02 Marks Each)
1. What is the difference between Data & Information ?
Ans: Data refers to collection of basic facts and figures. It is generally raw information
that simply includes name, basic numbers or texts. In computers, it may be in the form
of different types of files, such as images, text, graphics, and videos.
Information is data that has been processed and organized in order to provide a
meaningful output from raw data.
Example. The Name, Date of birth, contact number of a student are data, but if we have
to find out the list of students whose age is more than 18 years that is known as
information.
Worms: A worm is technically not a virus but a program very similar to a virus. It has
the ability to self-replicate causes harm to a system. It can be executed without the
help of any other program.
5. What are the symptoms to know the presence of virus in your system ?
Ans:
Your system becomes very slow.
System terminates abnormally.
Showing problem while booting.
Showing insufficient memory or memory full even you have fewer amounts of
data.
Showing unexpected performance while working.
7. What is Firewall ?
A firewall is a network security system that monitors and controls incoming and
outgoing network traffic based on predetermined security rules. It acts as a barrier
between a trusted network (like your home or office network) and an untrusted
network (like the internet).
Benefits of using a firewall:
Protection against unauthorized access:
Blocking malicious traffic:
Protecting sensitive data:
Enhancing network security
8. What is VPN ?
Ans: VPN stands for Virtual Private Network, it is a technology that creates a secure,
encrypted connection over a less secure network, such as the internet. It works by
creating a private tunnel between your device and a VPN server, masking your IP
address and encrypting your internet traffic.
9. What is IP spoofing ?
Ans:IP spoofing is a technique where an attacker disguises the source IP address of a
network packet to trick a target system into believing the packet originated from a
legitimate source. This allows the attacker to bypass security measures and potentially
launch malicious attacks.
12. What are the safety measures to be taken while doing online
transaction?
Ans:
Here are some safety measures to take while doing online transactions:
Official Website: Always access your bank's official website directly from your
browser's address bar. Avoid clicking on links in emails or texts. Always check
(https://).
Beware of Phishing Attempts: Be wary of emails or calls requesting personal
information. Your bank will never ask for sensitive details via email or phone.
Secure Wi-Fi: Avoid using public Wi-Fi networks for online transactions. If you
must, use a VPN to encrypt your connection.
Strong Passwords: Create strong, unique passwords for each online account.
Avoid using easily guessable information.
Use Two-Factor Authentication (2FA): Enable 2FA whenever possible to add an
extra layer of security.
13.what are the safety measures to be taken while doing online shopping ?
Ans:
Here are some safety measures to take while doing online shopping:
Secure Websites: Only shop from trusted website or on websites with a secure
connection (https://). Look for the padlock symbol in the address bar.
Trusted Sellers: Choose reputable online retailers with good reviews and
customer feedback.
Payment Security: Use trusted payment methods. In case of any doubt, always
purchase products on cash on delivery.
Secure Wi-Fi: Avoid using public Wi-Fi networks for online transactions. If you
must, use a VPN to encrypt your connection.
Keep Software Updated: Regularly update your operating system and security
software to protect against vulnerabilities.
Beware of Phishing: Be cautious of suspicious emails, texts, or calls. Never share
personal information with unsolicited requests.
15. What are different tools and techniques used to protect your
computer from information threats.
The tools and techniques used to protect your computer from information
threats are Firewall, Antivirus software, VPN, Backup, Cryptography, Digital
signature, Authorization, Authentication etc.
16. Write down different ways through which malware can approach your
system?
Ans:
Malwares can approach your system any one of the following ways.
When we download directly from some untrusted link/ website.
By email from unknown link
Corrupted storage/ removable devices
Unsecure WIFI
By Network propagation etc.
19.What is Malware?
Ans: Malware is short for malicious software and is used as a single term to refer to
viruses; Trojans, horses, worms, Spywares etc.
22.what is USB and write the name of two USB storage media ?
Ans: USB (Universal Serial Bus) is a standard for connecting and transferring data
between computers and electronic devices. It also provides a power supply to devices.
USB ports are widely used for connecting peripherals such as keyboards, mice, printers,
and storage devices.
Two examples of USB storage media are: Pen Drive, Media card
Spyware: A malware that spy the user's information with the aim to harm them.
E.g., cookies on webpages and keyloggers can log everything including your credentials.
Adware: It is malware that is designed to create revenue for its developers. It is also
termed advertising-supported software. It tracks user's behaviour and sells out that
information to interested third parties. To avoid adware, use an adblocker.
Keyloggers: A spyware that is designed for stealing the data via recording the keystrokes
pressed by the user on their keyboard. An attacker may track your typing in a real-time
manner or afterward via a file used to store the keystrokes.
Ex. Computer Spy, Kidlogger, syprix are some examples of keyloggers.
Sweepers: These are programs to wipe out data from the targeted machines.
Backdoor: If malicious users gain access to the system, they can install a program, used
to create another way (backdoor) to enter into the system. The purpose is to gain
unauthorized access to the system.
Ex. Deep Throat, Portal of Doom, Subseven, NetBus are some popular backdoors.
Email Phishing: The most common type, where attackers send fraudulent emails.
Smishing: Phishing attacks via SMS messages.
Vishing: Phishing attacks through voice calls.
Spear Phishing: Targeted attacks aimed at specific individuals or organizations.
Whaling: High-profile phishing attacks targeting executives or celebrities.