0% found this document useful (0 votes)
130 views56 pages

It Systems 2nd Sem Question Bank & Solutions

The document provides an introduction to IT systems, focusing on internet skills and computer basics, including definitions and functions of key concepts such as the Internet, web browsers, search engines, and computer memory types. It includes a series of questions and answers that cover topics like the uses of modems, types of printers, and comparisons between different storage devices. Additionally, it discusses the components of a computer system and their functions, emphasizing the importance of both primary and secondary memory.

Uploaded by

Mousumi Ghosh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
130 views56 pages

It Systems 2nd Sem Question Bank & Solutions

The document provides an introduction to IT systems, focusing on internet skills and computer basics, including definitions and functions of key concepts such as the Internet, web browsers, search engines, and computer memory types. It includes a series of questions and answers that cover topics like the uses of modems, types of printers, and comparisons between different storage devices. Additionally, it discusses the components of a computer system and their functions, emphasizing the importance of both primary and secondary memory.

Uploaded by

Mousumi Ghosh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 56

INTRODUCTION TO IT SYSTEMS

UNIT- 1: INTERNET SKILLS AND COMPUTER BASICS (SET-1)


2 MARK QUESTIONS & ANSWERS

Q. No. Question Taxonomy Marking


Level Scheme
Q 1. What is Internet? Name two common application of Internet. L1

Ans. Internet is a collection of various interconnected networks of


heterogeneous types all over the globe together. It is also referred
as network of networks. 2
Application: Communication, E-Commerce, Social Network
Q2. List four applications of internet. L1

Ans. Communication, E-Commerce, Social networking, Job-hunting. 0.5x4


Q3. Define WWW. L1

Ans. WWW stands for World Wide Web. It is an information system


where different kinds of files or resources are hoisted and uniquely 2
accessed via Uniform Resource Locator (URL) Address.
Q 4. Define URL and TCP/IP. L1

Ans. URL stand for Uniform Resource Locator. It is a Unique identifier of 1


a web resource with a specification of how to access and from
where to access it.
Transmission Control Protocol and Internet Protocol are set of rules 1
that govern the linking of a computer system or device to the
Internet and similar computer networks.
Q5. What are the uses of Modem?
L1

Ans. Modem is the short name for hardware device Modulator-


Demodulator. It is used to convert the digital data of a computer
system to an analog signal which can travel over telephone lines 2
and vice-versa.
Q6. List out four commonly used web-browsers name. L1

Ans. Google Chrome, Microsoft Edge, Mozilla Firefox, Opera. 0.5x4


Q7. L1
What is web browser?
Ans. A web browser is a client-side application program to search and
2
retrieve information from the world wide web, available in the form
of web pages and display it on the client’s machine.

Q8. Define search engine? Give two examples of Search Engine. L1


Ans. A search engine is a software programme or a system designed to
help users find information stored on the internet or within a
specific database. 2
Example: Google, Yahoo.

Q9. What do you mean by digital India? L1


Ans. Digital India is a flagship programme of the Government of India
with a vision to transform India into a digitally empowered society
and knowledge economy. 2
The program envisages providing government services by electronic
means to reduce paper work and enhancing accountability.

Q 10. Define CPU? L1

Ans. CPU stands for Central Processing Unit. It performs arithmetic,


logical and other operations to transform inputted data into more 2
usable information/output.

Q 11. Write the names of two input and output devices. L1

Ans. Input device: - Mouse, Keyboard. 1


Output device: - Monitor, Printer. 1

Q 12. Compare between SSD and HDD. L2

Ans.  SSD stands for Solid State Drive and HDD stands for Hard
Disk drive.
 SSD has high read/ write performance for random and
2
sequential data retrieval as compared to HDD.
 SSD is now more popular as compared to HDD in Desktops
and Laptops.

Q 13. Name two examples of impact and non-impact printer. L1

Ans.  Impact printer: Dot-matrix, Daisy wheel 1


 Non-impact printer: Inject, Laser 1

Q 14. Define ALU. L1

Ans.  ALU stands for Arithmetic and Logic Unit.


 It performs all the arithmetic & logical operations for the
2
computer system e.g., addition, subtraction, compare,
complement, shift, etc.

Q15. What is Email? Name two email service providers. L1

Ans. Email or electronic mail is a method of exchanging digital messages 1


from one electronic device to another or to many recipients using
1
the Internet.
Email Service Provider: Google, Yahoo

Q16. Compare between EPROM and EEPROM L2


Ans. EPROM EEPROM
1. EPROM stands for 1. EEPROM stands for
Erasable Programmable Electrically Erasable
Read Only Memory. Programmable Read 2
Only Memory.

2. Its content is erased 3. Its content is erased


using ultraviolet light. using electricity.

Q17. Classify the types of web search queries. L2

Ans. There are three main types of web searches:


1. Navigational: The purpose is to navigate a website that is in
the mind of the user or he/she thinks that such website
should be there or they have visited the website in past.
2. Informational: Here user’s intention is to find related about
the given search term which may be on some interlinked 2
static webpages. The purpose is to read these pages to
acquire facts about the input text.
3. Transactional: The purpose of such web queries to reach a
website where further in interaction or web-mediated
activity is performed.

Q18. Compare Primary Memory and Secondary Memory. L2

Ans. PRIMARY MEMORY SECONDARY MEMORY


1. Data can be transferred 1. Data can be transferred
from primary memory from primary memory
to processor directly. to processor directly.
2
2. It is faster than 2. It is slower than Primary
Secondary Memory. Memory.
3. It is smaller in size. 3. It is bigger in size.
5 MARK QUESTIONS & ANSWERS

Q 1. What is a web browser? Discuss common features of a web browser. L2

Ans. A browser is a client-side application program to search and retrieve information


from the world-wide-web, available in the form of webpages and display it on the
client’s machine. It is also termed as “Web Browser”.
Common Browser Features:
1. Book Marking: - It is the process of storing URL for the future retrieval. With this
feature, users can store and manage web addresses of frequently visiting
websites in their browser software. 5
2. Download Management: - This is an inbuilt software tool for browsers that
allows the users to manage all the downloaded files. It displays the files in
chronological order and gives us the facility to search files by their name. We can
also browse the folder where it actually stored by ‘Show in Folder’ or ‘Open
Containing Folder’ option.
3. Password Management: - Browsers provide a facility to store usernames and
passwords of websites that requires authentication.
4. Tabbed Browsing: - It allows users to browse different websites simultaneously
on different tab windows. All these tabs reside in a single web browser window.
5. Brower History: - Browser can store all webpages visited by its user with
associated data like the page title, time of visit, etc. So that user can revisit those
webpages if necessary. All such data is stored locally on the browser.
6. Spell Checking: - This browser feature provides the capability to correct the
misspelled words.
7. Auto Update: - This feature shows the ability of a browser for self- updating.
Now a day, almost every browser is capable of auto updating.
8. Ad Blocking: - It is also termed ad filtering. Browsers having this feature are
capable of blocking or altering online advertising. Generally, it is done with help
of some browser extension.
9. Page Zooming: - It is the page level capability of the browser to zoom in or zoom
out the web content or images displayed on the webpage.
Q2. Define search engine. How does a search engine work? Explain. L2

Ans. A search engine is a software programme or a system designed to help users find
information stored on the internet or within a specific database.
How does a search engine work: -?
 Search engine aims to provide the most relevant search results in minimal time to
their users.
 The databases contain meta data and indexes of selected webpages, out of
billions of webpages across the WWW for the searching keywords. Out of selected
webpages, the most relevant webpages are displayed in search results with the
help of the ranking module.
 A search engine generally performs three functions:
1. Crawling: - Every search engine has some automated software which are
known invariably as the bot, robot, web wanderers, spiders, Crawler or
indexer. The purpose of the spider is to traverse and scan the World Wide Web
for publicly available information.
2. Indexing: - This is a process to organize and store the results found in the
Crawling function such that they can be further processed by search engine 5
algorithm. A search engine does not store all information available on the
webpage instead it stores details like title and description of the page, date of
creation/ updating, type of content, associated search terms, links coming to
and from this webpage and other parameter required by its algorithms.
3. Ranking: - This is the process of showing results in order of their relevance.
Most relevant pages are shown first while the least one will be on after word.
This is done using the ranking algorithm of the search engine. Some
dominating ranking factors are links referring to this webpage, website age
associated keywords, speed of webpage loading, time spent on a webpage,
etc.

Q3. Explain different types of Computer Memory briefly. L2


Ans. Computer memory is one of the most important components of the computer
system. Computer memory is a vital resource that is managed by the operating
system. When the data is sent to the memory it is kept at some particular location
called to address.
Types of computer memory: -
The computer system makes use of different types of memory depending upon the
functional requirement. Depending on the direct accessibility of memory by CPU,
memories are classified as a Primary and Secondary type. 5

Primary Memory: -
 Primary memory is known as main memory or internal storage because it is
directly assessable by the CPU.
 It is used to store program instruction, data and intermittent results.
 It is made of semi-conductor devices. Due to its fast access rate and circuits
complexity, it is expensive in comparison to secondary memory.
 A computer cannot work if there is no primary memory installed into the system.
RAM, ROM, cache memory are example of primary memory.
a) Random Access Memory (RAM): -
 RAM is also known as a temporary or volatile memory because whatever data
stored in it remains till the computer is switched ON. When the current is
switched off, all stored data will be wiped out or lost.
 RAM is the most essential element of a computer system because, without it, the
system cannot perform its tasks.
 RAM is further classified into two types:
a. Static RAM
b. Dynamic RAM
SRAM: - The word static indicates that the memory retains its contents as long as
power remains supplied.
DRAM: - DRAM is constructed of tiny capacitors that leak electricity. Designers use
DRAM because it is much denser, uses less power and generate less heat than SRAM.
b)Read Only Memory (ROM): -
 The programs stored in ROM are permanent and are not lost or erased when the
current is switched off, so it is a non-volatile memory type.
 ROM is available in different types including PROM, EPROM and EEPROM.
PROM (Programmable Read Only Memory): -
 PROM is read only memory that can be modified only once by a user. The user
buys a blank PROM and enters the desired contents using a PROM programmer.
EPROM (Erasable and Programmable Read Only Memory): -
 It is programmable with the added advantage of being reprogrammable. To
reprogram an EPROM, the entire chip must first be erased.
EEPROM (Electrically Erasable and Programmable Read Only Memory): -
 The EEPROM is programmed and erased electrically. It can be erased and
reprogrammed about ten thousand times. Both erasing and programming take
about 4 to 10 ms.
c)Cache Memory
Cache memory is an intermediate form of storage between primary memory and
CPU. It is used to store data that are frequently needed for execution. It is used to
increase the performance of CPU. Different types of cache memory are: Level 1(L1)
cache, Level 2(L2) cache and Level 3 (L3) cache.
L1 cache: L1 cache is the primary cache and it the fastest and costliest cache.
L2 cache: L2 cache is the secondary cache. It is slower and less expensive than L2.
Cache.
L3 cache: L3 cache is special cache which is used to increase performance of L1 and
L2. Its slowest and least expensive among L1 and L2 cache.
Secondary Memory: -
 Secondary memory is mainly used to store data permanently. It is also termed as
‘External Memory’ due to lack of direct access between CPU and the memory.
 It is a non-volatile memory; data retains even after the computer system is
switched off or electric power is disconnected.
 Examples: HDD, SSD, Floppy, CD, DVD, etc.

Q4. Explain different components of computer with block diagram? L2

Ans. A computer system is one that is able to take a set of inputs, process them and
create a set of output. This is done by a combination of hardware and software.
A computer System consists of the following functional unit.
-Input unit
-Central Processing Unit
-Memory Unit
-Output Unit

Fig:- Computer System Block Diagram

1. Input Unit: -
 Computer needs to receive data and construction in order to solve any problem.
Therefore; we need to input the data and instructions into the computers.
 The input unit consists of one or more input devices some commonly used input-devices
are: Mouse, Punched card reader, Magnetic tape readers, Etc.

 All the input devices perform the function like: -


a. Accept the data and instructions from the outside world.
b. Convert it to a form that the computer can understand.
c. Supply the converted data to the computer system for further processing.
2. CPU (Central Processing Unit): -
 The CPU consist of arithmetic and logical unit (ALU), control unit (CU) and memory
storage Unit.
 CPU is the place where the actual processing of data takes place on the execution of the
program. It is responsible for processing most of the data, turning input data into output
data.
 ALU (Arithmetic Logical Unit) Perform all the arithmetic and logical operations for the
computer system. It is made up of three parts:
a. Adder where the actual calculations task place.
b. Register which store the information temporarily,
c. Accumulator in which the intermittent results of the calculations are kept.
 The aim of CU is to send and receive control signals to all parts of a computer system. The
control signals are helpful in the smooth execution of instruction in the CPU,
communication over buses to memory and I/O devices.
 The instruction and data given to the computer are stored in memory or storage unit.
This data along with the program instructions are used by the CU and ALU.
3. Memory: -
 Memory is used to store data, instruction, intermittent results and information.
 The memory unit is divided into 2 parts: - Primary Memory and Secondary Memory.
 Primary memory is also known as main memory of a computer; it is a volatile memory
used by the computer to store data and instructions during processing.
 When the system is switched off, the data are lost from this memory. To store that data
permanently we used a memory i.e. secondary memory. e.g. of primary memory are:
RAM and ROM.
 Secondary Memory is also known as auxiliary memory of a computer is a permanents
memory where we store data and instructions permanently. The size of secondary
memory is very large as compared to that of the primary memory.
4. Output Unit: -
 Output unit consist of one or more output device by which result of data processing is
sent to the outside world. Example: printer, plotter, speaker, etc.
 After the computer process the data, it has to represent the result in a human
understandable from. For this purpose, we need an output device, which will accept the
result from the CPU and present to the user in a form which he/she can understand.

Q5. 5. What is Digital India. Explain its key vision areas. L2

Ans.  The digital India is a flagship programme of the government of India with a vision to
transform India into a digitally empowered society and knowledge economy.
 Digital India program is centred on three key vision areas as defined below: -
1. Digital infrastructure as a utility to every citizen: -
 Availability of high-speed internet as a core utility for delivery of services to citizens.
 Cardle to grow digital identity that is unique lifelong, online and authenticable to every
citizen.
 Mobile phone & bank account enabling citizen participation in digital & financial space.
 Easy access to a common service centre.
 Shareable private space on a public cloud.
 Safe and secure cyber space.
 Example: - Aadhaar, Digi-locker, DBT (Direct Benefit Transfer), E-Sign, Etc.
2. Governance and service on demand: -
 Seamlessly integrated services across departments or jurisdiction. 5
 Availability of services in real time from online and mobile platforms.
 All citizen entitlements to be portable & available on the cloud.
 Digital transformed services for improving ease of doing business.
 Making financial transactions electronic & cashless.
 Leveraging Geospatial Information System (GIS) for decision support system and
development.
 Example: - BHIM, E-PANCHAYAT, E-PATHSHALA, KISAN SUVIDHA, Etc.
3. Digital Empowerment of Citizens: -
 Universal digital literacy.
 Universally access digital resources.
 Availability of digital resources/services in Indian languages.
 Collaborative digital platforms for participative governance.
 Citizens not required to physically submit Govt. documents/certificates.
 Example: - MY GOV, AEPS, PMKVY, SMART CITTES, Etc.

Q6. Distinguish between RAM and ROM. L4


Ans. RAM ROM
 Ram stands for Random Access  ROM stands for Read Only Memory.
Memory.  It is non-volatile in nature. Its contents
 It is volatile in nature. Its are non-erased when power is turned
contents are erased when power off.
is turned off.
 Both read and write is possible in  Only read operation is possible in
RAM. ROM. 5
 It hold data/program during  Data can be stored in ROM at the time
execution. of manufacturing.
 It provides run time memory to  It does not provide run-time memory.
computer.  Types of ROM are: PROM, EPROM,
 Types of RAM are: SRAM and EEPROM.
DRAM.
Q7. Distinguish between SSD and HDD. L4
Ans SSD HDD
 SSD stands for Solid State Drive.  HDD stands for Hard Disk Drive.
 It is made of electronic  It is made of magnetic disk.
components.
 It does not contain moving part.  It contains moving part. 5
 It is faster than HDD.  It is slower than SSD.
 It is more expensive than HDD.  It is less expensive than SSD.
 It generates little or no noise.  It generates more noise often louder
noise.
 It consumes less electricity.  It consumes more electricity.
Question Bank & Solutions
(1st/2nd Semester 2024-25)
Introduction to IT Systems

UNIT-2 (SET-1)

Q.
No.
Question & Answer -2 marks each Bloom's
taxonomy
Level
1 Write any two major types of shells on most UNIX systems with their prompt Level 1
symbol.
Ans Two major types of shells available on most Unix systems with their prompt
symbol are as follows.
Shell prompt symbol
-------- ---------------------
Bourne Shell $
C Shell %

2 Write any two shell commands with their description and syntax. Level 1
Ans Two commands are,
a. Cd (change directory) : cd command is used to change the current
working directory.
Syntax: $ cd <directory name>
b. Mkdir : to create a new directory
Syntax: $ mkdir <directory name>

3 Explain ‘cd’ command available in Unix/Linux. Level 1


Ans the ‘cd’ command is used to change the current working directory.
Syntax: $cd <directory Name>
Various symbols can be used with the command. Symbols with their meaning are
as under:
Single dot (.) : current directory
Double dot(..) : upper directory / parent directory
Tilde (~) : home directory
4 Briefly write the procedure to remove a directory. Level 2
Ans To remove a directory ‘rmdir’ command is used. The directory must be empty
before trying to remove the directory. The syntax is,
$ rmdir <name of directory>
5 Distinguish between cat and touch command in UNIX/Linux? Level 4
Ans touch command helps the user to create one or more files simultaneously. The
cat command helps us to create, view and concatenate files.
Syntax of touch command to create a file:
$touch <filename>.<extension name>
Example of touch command to create a file:
$touch abc.txt
Syntax of cat command to create a file :
$ cat ><filename>.<extension name>
Example of cat command to create a file:
$cat > abc.txt
6 You are given a text file. Your job is to count the number of characters and Level 3
number of words in the file. Write the lines of code to do this task in
Unix/Linux.
Ans Let the text file be “file1.txt”
The line of code to count the number of characters will be,
$wc -c file1.txt
The line of code to count the number of words will be,
$wc -w file1.txt
7 List out any four popular operating System. Level 1
Ans Four popular operating systems are,
i. MS-Windows,
ii. Ubuntu,
iii. Solaris, and
iv. Android.
8 Computing now-a-days are mobile computing. Justify. Level 5
Ans The market share of android OS is approximately 40% which is highest as
compared to other existing operating systems. Hence the phrase ‘computing
now-a-days are mobile computing’ is justified.
9 Write brief procedure to create a bootable media. Level 2
Ans - Various freely available tools such as Rufus, Unetbootin etc, can be used
to create a bootable USB with ISO file.
- The user may write (burn) the downloaded ISO file on the CD/DVD and
make a bootable disc.
10 Explain the purpose of an Operating System in a Computer. Level 2
Ans The purpose of Operating system is to make sure the computer system performs
well by managing its computational activities. It also provides an environment for
development and execution of programs.
11 Define Kernel in the context of Operating System. Level 1
Ans A kernel is a backbone of the operating system that is loaded in to the memory
on system startup (boot-up time) and manages the overall system until
shutdown.

12 Define shell in Unix/Linux operating system. Level 1


Ans Shell is a utility program that starts up when we log on. Shell provides a platform
or environment by which any user can interact with the computer system by
typing commands. The shell interprets the commands typed by the user on the
command line or a script file.
13 Write four examples of Shells used in different Operating Systems. Level 1
Ans Sh-the Bourne Shell
bash-the Bourne Again Shell
csh-the C Shell
KDE and GNOME managers on Linux which provides graphical user interface.
14 List out some advantages of Operating System Level 2
Ans Some advantages of operating system are listed below:
 Provides working environment to the user
 Resource Sharing
 Hardware Accessibility
 Multitasking
 Data Security
15 Operating System plays major role in the Computer System. Justify it. Level 5
Ans The computer system consists of hardware components. Operating system
activates the hardware components in order to perform the desired task by the
user. Without operating system, the system cannot run. Hence, operating system
plays major role in the computer system.
16 Write the functions of keys dd, dw, C and D in vi editor. Level 1
Ans dd – Delete a line
dw – Delete word
C – Delete contents of a line after the cursor and insert new text. Press ESC to
end insertion.
D – Delete contents of line after the cursor.
17 Write the general format of Unix command syntax. Level 1
Ans The Unix command syntax consists of three parts: the command, a list of options
and arguments.
Syntax:
command <options><arguments>
Example:
cp file1.txt file2.txt
18 Is it possible to install the OS without formatting the partition, and what would Level 4
the situation be if the partition is not formatted?
Ans Yes, it is possible to install the OS without formatting the partition. If we don’t
format the partition, then the old data will be remained in the disk, but the OS
will be installed.
19 Explain functions of clear and echo commands in UNIX. Level 1
Ans The clear command clears the terminal.
Syntax: $ clear
The echo command helps the user to write a string to standard output device.
Syntax: $ echo <string>
Example: $ echo “hello world”
20 Write any two examples of Directory and File manipulation command, and two Level 1
examples of Terminal, information & utility command with their functions.
Ans Two examples of file directory and manipulation commands are,
pwd : prints the working directory
ls : lists the content of the directory
Two examples of Terminal, Information & Utility commands are,
clear: clears the terminal
echo : write a string to standard output device.
5 marks Questions & Answers
1 Discuss any five basic features of Unix/Linux shell. Level 1
Ans Basic features of all Unix/Linux shells are as below:
a. Prompt: Shell displays a character or group of characters (such as
$ or #) when it is ready to accept a new command.
b. Command interpretation: when a user enters a command, it is the
shell that determines which program to run in order to perform the
command.
c. Multitasking: users are provided the facility to run more than one
command at a time. It controls the jobs and lets us multitask.
d. Command history: shell keeps track of all the back-to-back supplied
commands. It enables the user to repeat the previous commands or
similar one.
e. Wildcards and Aliases: shell provides the functionality to use some
meta characters (e.g., an asterisk (*), question mark (?) , etc) to
abbreviate filenames or pathnames that match a certain set of
characters, known as wildcards. In addition, the shell enables a user
to avoid typing long commands using aliases.
f. Piping and I/O Redirection: Using this functionality, the output of one
program can directly be supplied to another program or file.

2 Create the following directory structure using UNIX/Linux bash shell. After Level 3
creation, delete the structure.

Ans $ mkdir Animal


$ cd Animal
$ mkdir Wild
$ mkdir Pet
$ cd Wild
$ touch tiger.txt
$ touch lion.txt
$ cd..
$ cd Pet
$ touch cat.txt
$~
$ cd Animal
$ cd Pet
$ rm cat.txt
$ cd..
$ cd Wild
$ rm tiget.txt
$ rm lion.txt
$ cd..
$ rmdir Pet
$ rmdir Wild
$ cd..
$ rmdir Animal
3 Write short notes on usages cat command. Level 2
Ans Cat command helps us to create, view and concatenate files. The cat command
can be used in the following ways.
To view a file:
Syntax: $cat <filename>
Example : $ cat abc.txt
view multiple files:
Syntax : $cat <filename1><filename2>
$cat abc.txt xyz.txt
to view content of a file preceding with line number ‘n’:
Syntax: $cat -n <filename>
Example: $cat -5 abc.txt
to create a new file
Syntax: $cat > [file name]
Example: $cat > abc.txt
to copy the contents of one file to another file
Syntax: $cat [source file] > [destination file]
Example: $cat abc.txt > xyz.txt
to append the content of file1 to file2
Syntax : $cat [file1] >> [file2]
Example: $ cat file1.txt >> file2.txt
4 There are two modes of operation in vi editor. Discuss each of them briefly. Level 2
Ans The two modes of operation available in vi editor are,
a. Command mode and
b. Insert mode
Command mode: The vi editor opens in the command mode. As the name
implies, this mode is used to perform some commands which in turn causes some
actions on the file. In command mode, we can move the cursor and cut, copy,
paste the text. Command mode also saves the changes which we made to the
file. Hence it performs administrative tasks for file editing. Commands in
command mode are case sensitive. Several commands are there for each task to
work with vi editor, but the commands must be entered in command mode.

Insert mode: this mode is used for inserting text into the file by vi editor.
Whatsoever is typed in this mode is treated as input and placed in temporary
memory and after a command from the user it goes to the file. To switch from
command mode to insert mode, the user need to press ‘i’ on the keyboard. You
need to press ‘Esc’ key to return from insert mode to command mode.
5 Explain the function of grep command briefly with suitable example. Level 2
Ans Grep command globally search for regular expression and print out. This
command searchesa file for a matchingpattern or regular expression.

The syntax of grep command:


Grep [options] <regular-expression><file-name>
Options:
-n print lines and line numbers where pattern matches
-v prints all the lines that do not contain the expression
-c prints only a count of the lines that match a pattern
-h displays the matched lines, but do not display the file name.

Example :
Let a text file “hockey.txt” which contains 2 lines content as follows.
India has won 11 medals in field hockey.
India has won 4 medals in in the shooting.
Case 1: Searching for specific Pattern
Syntax: grep "pattern" filename
This searches for the "pattern" in the specified file and prints all lines
that contain the pattern.
Example: grep "medal" hockey.txt
Case 2: Display Line Numbers
Syntax: grep –n "pattern" filename
Example: grep -n “medal” hockey.txt
The output will be,
1: India has won 11 medals in field hockey.
2: India has won 4 medals in in the shooting.
Here, the search pattern “medal” will be highlighted in the line with
line number 1 and 2.
Case 3: Invert Match
Syntax: grep -v "pattern" filename
This prints all lines that do not match the pattern.
Example: grep -v "medal" hockey.txt
Case 4: Counting Matches
Syntax: grep –c “pattern” filename
This counts the number of lines that match the pattern.
Example: Grep -c “medal” hockey.txt
The output will be, 2.
In this case the word “medal” occurs 2 times in hockey.txt, so the
output will be 2.
Case 5: Searching for specific Pattern from multiple filenames
Syntax: grep –h “pattern” filenames
This especially useful in the matching lines themselves, regardless of
which file they came from.
Example: grep –h “medal” hockey.txt file2.txt

6 Explain the major differences between Linux and Windows operating system. Level 4
Ans Key area Linux Windows
Kernel It is an open-source, Unix-like Windows uses a proprietary
operating system. The core of kernel developed by
the Linux OS is the Linux Microsoft. It is based on the
kernel, which is responsible Windows NT kernel, which
for managing hardware and has evolved over the years to
system resources. support modern hardware
and provide a user-friendly
experience.
Source Code Linux is open-source, which Windows is a closed-source,
Availability means the source code is proprietary operating
freely available. Anyone can system. The source code is
view, modify, and distribute it. not available to the public,
This gives users a high degree and users cannot modify the
of control and flexibility over core system. Microsoft
the operating system. maintains full control over
the OS.
User Linux typically uses various Windows has a consistent,
Interface (UI)
desktop environments like user-friendly interface
GNOME, KDE, and Xfce. These (starting with Windows 95 up
environments can be to the latest version,
customized to a high degree, Windows 11). It is known for
offering flexibility to users. its ease of use, with a Start
The interface may be more Menu, taskbar, and window-
technical, but many user- based design that most users
friendly distributions (like find intuitive.
Ubuntu) provide simple,
attractive interfaces.
System Linux can run on older or less Windows tends to require
Requirements powerful hardware. This more system resources (e.g.,
makes it a good choice for RAM, CPU power), especially
lightweight or resource- in newer versions. As a
constrained systems. result, it might not run as
efficiently on older hardware.
7 Explain UNIX architecture with a neat diagram Level 2
Ans The UNIX architecture is known for its simplicity, modularity, and robustness. It
consists of several layers that work together to manage the system. A typical Unix
System Structure is presented below.
Kernel:
A kernel is a backbone of the Unix operating system that is loaded into
the memory on system startup (boot-up time) and manages the overall system
until shutdown.

Shell:
A shell is a special program that acts as an intermediary between the user
and the Kernel of the operating system.Shell is a utility program thatstarts up
when we log on. Shell provides a platform or environment by which any user can
interact with the computer system by typing commands. The shell interprets the
commands typed by the user on the command line or a script file.
In this diagram:

 The User Interface is where users interact with the system, usually
through a terminal or graphical interface.
 The Shell processes user commands and requests services from the
kernel.
 The Utilities provide various tools and programs for file and system
management such as ls, cp, mv, grep, etc.
 The Kernel directly interacts with the hardware, managing resources and
system calls.

8 Using UNIX Shell Commands Level 3


a. Create a directory structure with a main directory named "Projects" that
contains subdirectories "Alpha," "Beta," and "Gamma." In "Alpha," create
three files named "report.txt," "data.txt," and "summary.txt."
b. Copy "report.txt" to the "Beta" directory and "data.txt" to the "Gamma"
directory.
c. Move "summary.txt" to the "Gamma" directory.
d. Delete the "Beta" directory.
e. Concatenate the contents of “data.txt” and “summary.txt” into
“summary.txt”
Ans a. Create the directory structure
mkdir Projects
cd Projects
cat > report.txt
India lifted the first cricket ODI world cup in 1983.
Press ctrl+d
cat > data.txt
India lifted the first cricket T20 world cup in 2007.
Press ctrl+d
cat > summary.txt
India lifted the second cricket ODI world cup in 2011.
Press ctrl+d

b. Copy files
cp Projects/Alpha/report.txt Projects/Beta/
cp Projects/Alpha/data.txt Projects/Gamma/

c. Move file
mv Projects/Alpha/summary.txt Projects/Gamma/

d. Delete Beta directory


rm Projects/Beta

e. Concatenate files
cat data.txt >> summary.txt
9 Discuss the step by step procedure to install Ubuntu OS in your system. Level 1
Ans - Plug the bootable media which includes Ubuntu OS into our system.
- Now we need to set the booting sequence to USB disk instead of HDD. This is
done by changing boot priority in the BIOS setting at the time of computer
start.
- Restart the computer and access to BIOS setting by pressing function keys F1
or F2 or F10 or F12 (or any other) depending on your BIOS and computer
manufacturer. It will show your BIOS screen (it may look differ, as per your
system). Give a higher priority to your USB drive.
- Save and exit BIOS settings.
- The booting process will begin once boot media is detected by the BIOS. The
installer will check the disk (file system). The system will prepare to install
Ubuntu operating system.
- After a while, we will see the Ubuntu 20.04 (or any other version) welcome
page. Here we have to click the Install Ubuntu option.
- Next, select the language and click continue.
- Thereafter, select the keyboard layout and click the continue.
- Now we need to select the types of apps we want to begin with. We may
choose any of the available options i.e., Normal or Minimal. We can instruct
the installer to update the ubuntu while installing by checking the checkmark
option.
- Then we need to choose, how we want to install the OS from the available
options. i.e., Erase disk and install ubuntu or something else.
- After confirmation, the disk will be erased accordingly and the installation
will continue.
- Select the time zone i.e., “Kolkata” then press continue.
- Then create login credentials and name of the computer.
- Restart the system to complete the installation.
10 Write short notes on shell commands. Level 2
Ans Shell commands consist of a single or more word separated by white spaces. The
first word is the command, and subsequent words are the options or arguments.

Syntax: Command <options><arguments>

There are two types of internal commands available in Unix, such as,
a. Directory and file manipulation command
b. Terminal, Information & Utility command

Directory and file manipulation command:


These commands are related to manipulate the file and directory.
Example: pwd, cd, ls etc. Some of the commands are explained below.

i. Pwd : print working directory


This command prints the complete path of the current working directory.
Syntax: $ pwd
ii. Cd: change directory
This command changes the current working directory.
Syntax: $ cd <directory name>
cd.  current directory
cd..  move to the parent directory.
Cd ~  move to home directory

Terminal, Information & Utility command:


These commands are related to terminal management only, such as
clear, echo, repeat etc.
i. Clear : clears the terminal
Syntax: $ clear
ii. echo : write a string to standard output device
Syntax: $ echo “hello world”
iii. repeat: repeats a command specified times.
Syntax: $ repeat <number><command>
1st Sem./2ns Sem 2024-25

Code/Th : TH1 Subject Name: Fundamentals of IT Systems


Unit: 3 (HTML4, CSS, making basic personal webpage

Question Bank

SECTION-A (SHORT QUESTIONS & ANSWERS)-02 MARKS EACH


Sl All the Questions of Section ‘A’ carrying 02 marks Division Texonomy Level
No. of
marks
1. Q. What is HTML, and what is its purpose? 1+1 BL1 (Remember)

HTML stands for HyperText Markup Language.


Ans.
It is used to create and structure content on the web.
HTML provides the basic structure for web pages by
using tags to define elements like headings,
paragraphs, images, and links etc.
2. Q. How do you add hyperlink in HTML? Write a code 1+1 BL 3 (Apply)
to create a hyperlink to open Google weppage.

Syntax: <a href=url> Text</a>


Ans.

Code to create a hyperlink to open Google


weppage-

<a
href="https://www.google.com">Visit Google</a>
3. Q. What is CSS? Explain its purpose in web 1+1 BL2 (Understand)
development.

CSS (Cascading Style Sheets) is a stylesheet language


Ans.
used to define the appearance and layout of HTML

1
elements.

It is used to control design aspects like colors, fonts,


spacing, and layout on web pages.
4. Q. Write the CSS code to make all <h1> elements blue 2 BL 3 (Apply)
in color and center-aligned.

h1
Ans.
{
color: blue;
text-align: center;
}
5. Q. Explain the difference between an ID and a class in 2 BL 4 (Analyze)
CSS.

An ID selector (#idName) is unique and can only be


Ans.
used once on a page, whereas a class selector
(.className) can be applied to multiple elements.

IDs are used for specific, unique elements, while


classes are used for groups of elements that share
styles.

6. Q. Describe the difference between inline, internal, 2 BL2 (Understand)


and external CSS.

1. Inline CSS: Added directly to an HTML


Ans.
element using the style attribute.
2. Internal CSS: Written within the <style> tag
inside the <head> section of an HTML file.
3. External CSS: A separate CSS file linked to
the HTML file using a <link> tag, making it
easier to manage and apply styles across
multiple pages.

2
7. Q. List any two basic HTML tags used for formatting 1+1 BL1 (Remember)
text.

<p> for paragraphs and


Ans.

<b> for bold text and both of them are singular


tags.
8. Q. Which HTML tag is used to add an image to a 2 BL1 (Remember)
webpage?

The image tag is used to add an image to a webpage


Ans.
and it is a paired tag. The syntax of this tag is-

<img src=” source path ”> Text </img>.


9. Q. Explain the purpose of the <head> section in an 2 BL2 (Understand)
HTML document.

The <head> section contains metadata, links to


Ams.
stylesheets, and scripts that help to set up the webpage
before rendering the content in the <body> part.
10. Q. In CSS, what does color: red; do when applied to a 2 BL 3 (Apply)
paragraph (<p>) tag?

It changes the text color of all paragraph <p> elements


Ans.
to red.
11. Q. Why do we use external CSS files? 2 BL2 (Understand)

External CSS files help separate design from content,


Ans.
making it easier to apply consistent styling across
multiple HTML pages and simplify maintenance.

Taxonomy Level: Understand (Explaining the


benefits of external CSS).

3
12. Q. Write the HTML code to create a hyperlink that 2 BL 3 (Apply)
links to "https://www.example.com" with the text
"Click Here."

<a href="https://www.example.com">Click
Ans.
Here</a>
13. Q. What is the purpose of the <title> tag in HTML? 2 BL2 (Understand)

The <title> tag defines the title of the webpage, which


Ans.
appears in the browser tab and helps identify the page
in bookmarks and search engine results.
14. Q. What is the difference between the <ol> and <ul> 1+1 BL2 (Understand)
tags in HTML?

<ol> creates an ordered list with numbered items,


Ans.
while <ul> creates an unordered list with bullet points.
15. Q. What does the alt attribute in an <img> tag do? 2 BL2 (Understand)

The alt attribute provides alternative text for an image,


Ans.
which gets displayed if the image cannot load and
helps with accessibility by describing the image for
screen readers.
16. Q. What is the purpose of the margin property in CSS? 2 BL2 (Understand)

The margin property creates space around an


Ans.
element's outer edge, separating it from surrounding
elements.
17. Q. Explain the difference between an ID selector and a 1+1 BL 4 (Analyze)
class selector in CSS.

An ID selector (e.g., #header) is unique to one element


and cannot be reused, while a class selector
Ans.
(e.g., .container) can be applied to multiple elements.

4
18. Q. Write the CSS code to center-align text in a <div> 2 BL 3 (Apply)
element.

div
Ans.
{
text-align: center;
}
19. Q. What CSS property is used to set the font size of 2 BL1 (Remember)
text? Provide an example.

The font-size property is used. Example:


Ans.

P
{
font-size: 16px;
}

Taxonomy Level: Remember (Recalling the font-size


property and providing an example).

20. Q. Write the CSS code to set the width of an element to 2 BL 3 (Apply)
80% of the page.

Element
Ans.
{
width: 80%;
}
21. Q. What is the function of the <br> tag in HTML? 2 BL1 (Remember)

The <br> tag creates a line break, moving the


following content to a new line.
Ans.

22. Q. What is the purpose of the <footer> tag in HTML? 2 BL2 (Understand)

5
The <footer> tag defines the footer section of a
Ans. webpage, usually containing information like
copyright, contact, and links.
23. Q. How do you specify a comment in HTML? 2 BL1 (Remember)

Comments in HTML are written as <!-- Comment here -


->.
24. Q. How do you add a border around a paragraph in 2 BL 3 (Apply)
CSS?

p
Ans.
{
border: 1px solid black;
}
25. Q. What CSS property controls the font style (italic, 2 BL1 (Remember)
normal)?

The font-style property. Example:


Ans.

p
{
font-style: italic;
}
26. Q. Write the CSS code to make all links appear red and 2 BL 3 (Apply)
remove the underline.

a
{
color: red;
text-decoration: none;
}
27. Q. How would you link an external CSS file named 2 BL 3 (Apply)
"style.css" in an HTML document?

6
Ans. <link rel="stylesheet" href="style.css">

28. Q. Describe how inline CSS is applied to an HTML 1+1 BL2 (Understand)
element. Provide an example.

Inline CSS is added directly within an HTML element's


Ans.
style attribute. Example:

<p style="color: red;">This is a red


paragraph.</p>
29. Q. How do you comment out code in CSS? Provide an 1+1 BL1 (Remember)
example.

CSS comments are written as /* Comment here */.


Ans.
Example:

/* This is a comment */
p{
color: blue;
}
30. Q. How do you align text to the right in CSS? 2 BL 3 (Apply)

Use the text-align property with the value right.


Ans.

Example:

p{
text-align: right;
}
31. Q. Between using HTML tags and CSS for text 1+1 BL5 (Evaluate)
formatting, which do you think is more efficient for
creating consistent styles across a website? Explain
your reasoning.

7
Using CSS is more efficient for creating consistent
styles across a website because CSS separates content
Ans. from presentation. With CSS, a single stylesheet can
apply uniform formatting to multiple pages, making it
easier to manage and update.

HTML tags, while useful for basic formatting, require


repetitive coding and are harder to maintain on larger
websites.

32. Q. Create an HTML code snippet that includes a 1+1 BL6 (Create)
heading "My Hobby" and a paragraph describing
your favorite hobby?

<h1>My Hobby</h1>
Ans.
<p>My favorite hobby is reading books about science
and technology.</p>
33. Q. What do you mean by hyperlink? 2 BL2(Understand)

A hyperlink is a bit of text, an image, or a button in a


Ans. hypertext document that you can click. A hyperlink
may include a link to another document or to another
part of the current page.

34. Q. Distinguish between colspan and rowspan 1+1 BL4 (Analyze)


properties while creating a Table?

Ans. Colspan is used to span a cell over multiple columns.

<th colspan="2">Name</th>

The value of the colspan attribute represents the number


of columns to span.

Rowspan is used to span a row over multiple rows.

<th rowspan="2">Phone</th>

The value of the rowspan attribute represents the


number of rows to span.
35. Q. Define cellpadding and cellspacing in Table tag. 2 BL2 (understand)

Cell padding is the space between the cell edges and the

8
Ans. cell content.

By default the padding is set to 0.

To add padding on table cells, we use the following


CSS padding property:

th, td {
padding: 15px;
}

Cell spacing is the space between each cell.

By default the space is set to 2 pixels.

table {
border-spacing: 30px;
}

SECTION-B (LONG QUESTIONS & ANSWERS)-05 MARKS EACH


Sl Q/Ans All the Questions of Section ‘B’ carrying 05 marks Division Texonomy Level
No. of
marks
1. Q. Explain the basic structure of an HTML document. 2+3 BL2 (Understand)
What are the main elements, and what is the role
of each?

An HTML document has a specific structure that helps


Ans.
the browser interpret and render the webpage. The
main elements in the basic structure are:

<!DOCTYPE html> - This declaration defines the


document type and version of HTML. It helps the
browser to understand that the document is
written in HTML5.

<html> - This is the root element of an HTML


document. It wraps all other elements.

9
<head> - This section contains metadata about the
HTML document, such as the document's title,
character set, and links to CSS files or JavaScript. It
does not display content on the webpage.

<title> - Defines the title of the webpage, which


appears on the browser tab.

<meta> - Provides metadata such as character


encoding (charset="UTF-8").

<body> - This section contains the actual content


that appears on the webpage, such as headings,
paragraphs, images, and links.

Example:

<html>
<head>
<title>Sample Page</title>
<meta charset="UTF-8">
</head>
<body>
<h1>Welcome to the Sample Page</h1>
<p>This is a simple HTML document structure.</p>
</body>
</html>

Each element has a specific role. The <!DOCTYPE


html> defines the document type, <html> is the
container for the entire content, <head> contains
meta-information, and <body> includes visible
content.

10
2. Q. What is CSS? Explain its different types and how 1+2+2 BL2 (Understand)
CSS is applied in an HTML document.

CSS (Cascading Style Sheets) is a language used to


Ans.
style HTML elements, defining the look and layout of
web pages. CSS controls various design aspects, like
colors, fonts, and spacing, enhancing the user
interface.

There are three main ways to apply CSS to HTML:

Inline CSS - CSS is added directly to the HTML


element using the style attribute. This method is
useful for small, specific styling but is not
recommended for large projects due to limited
reusability.

Example:

<p style="color: blue;">This is a blue


paragraph.</p>

Internal CSS - CSS rules are placed inside a <style>


tag within the <head> section of an HTML
document. This is useful when the styling is
specific to a single page.

Example:

<head>
<style>
p{

11
color: green;
}
</style>
</head>

External CSS - CSS is written in a separate file (usually


with a .css extension) and linked to the HTML
document using a <link> tag. This method is the most
effective and efficient for larger websites, as it allows
for reusable and maintainable code.

Example in HTML:

<head>
<link rel="stylesheet" href="styles.css">
</head>

Example in CSS (styles.css):

p{
color: red;
}

Each method has specific use cases, but external CSS is


generally preferred for maintainable and scalable web
design.

3. Q. What is HTML, and why is it important in web 1+4 BL2 (Understand)


development?

Ans.
HTML (HyperText Markup Language) is the standard
language for creating webpages. It defines the

12
structure of a webpage, allowing developers to add
content like text, images, and links.

HTML is important because:

It provides the foundation for webpages.

It ensures that web content is structured,


accessible, and readable by browsers.

It is essential for search engine optimization (SEO),


making pages discoverable.

It enables linking and navigation between different


pages.

Taxonomy Level: Understand (Explaining the


purpose and importance of HTML).

4. Q. What is the <table> tag in HTML, and how is it 1+4 BL2 (Understand)
structured?
Ans. The <table> tag is used to create tables in HTML,
organizing data in rows and columns. A table structure
typically includes:

<table>: The table container.

<tr>: Defines a table row.

<th>: Defines a table header cell.

<td>: Defines a table data cell.

Example:

13
<table>
<tr>
<th>Header 1</th>
<th>Header 2</th>
</tr>
<tr>
<td>Data 1</td>
<td>Data 2</td>
</tr>
</table>

5. Q. Explain the use of <ul>, <ol>, and <li> tags in 5 BL2 (Understand)
HTML.
Ans.
The <ul> (unordered list) and <ol> (ordered list) tags
are used to create lists in HTML. The <li> (list item)
tag defines each item within these lists.

<ul>: Creates a bullet-point list.

<ol>: Creates a numbered list.

<li>: Specifies individual items in the list.

Example:

<ul>
<li>Item 1</li>
<li>Item 2</li>
</ul>

6. Q. Describe the use of the <form> tag in HTML. 1+4 BL2 (Understand)
Mention some commonly used form elements.

14
Ans. The <form> tag is used to create forms for collecting
user input. It contains input elements like:

<input type="text">: For single-line text input.

<input type="password">: For password input


(conceals text).

<input type="submit">: For submitting the form.

<textarea>: For multi-line text input.

<select>: For dropdown selection.

Forms are commonly used for user registration, login,


surveys, and data collection.
7. Q. What is an HTML attribute, and give three 2+3 BL1 (Remember)
examples of commonly used attributes.

HTML attributes provide additional information about


Ans.
HTML elements and are written within the opening
tag. Common attributes include:

href: Used in <a> tags to specify the link’s


destination.

<a
href="https://www.example.com">Link</a>

src: Used in <img> tags to specify the image


source.

<img src="image.jpg" alt="Description">

15
id: Provides a unique identifier for an element.

<div id="uniqueID">Content</div>
8. Q. What is the purpose of the <br> and <hr> tags in 2.5+2.5 BL2 (Understand)
HTML?
The <br> and <hr> tags are both empty tags in HTML,
Ans meaning they don’t have closing tags:

<br> (Line Break): Inserts a line break within


text, moving the following content to a new line. It
is often used in paragraphs for spacing.

Hello<br>World

<hr> (Horizontal Rule): Inserts a horizontal line


across the page, often used to separate content
sections. It’s a visual divider on a webpage.

<p>Section 1</p>
<hr>
<p>Section 2</p>
9. Q. What is the difference between the <div> and 5 BL4 (Analyze)
<span> tags?

The <div> and <span> tags are generic containers in


Ans.
HTML, but they have different uses:

<div>: A block-level element used to group larger


sections of content. It takes up the full width
available, and each <div> starts on a new line.

<div class="container">

16
<p>Content inside a div.</p>
</div>

<span>: An inline element used to style or group


smaller parts within a block, such as words or
phrases. It does not start on a new line.

<p>This is <span style="color:


red;">important</span> information.</p>

Both tags are often styled with CSS to format content


as needed.
10. Q. Write the HTML code to create a table with two 5 BL3 (Apply)
rows and two columns.

<table>
Ans.
<tr>
<Td>Row 1, Column 1</td>
<Td>Row 1, Column 2</td>
</tr>
<tr>
<Td>Row 2, Column 1</td>
<Td>Row 2, Column 2</td>
</tr>
</table>

11. Q. Evaluate the use of <div> and <section> tags in 1+2+2 BL5 (Evaluate)
HTML for organizing webpage content. Which tag
would you use for grouping related content, and
why? Provide examples.

 <div> tag:
Ans.
o A generic container for grouping
content, but it carries no semantic
17
meaning.
o Useful for applying styles or JavaScript
functionality to a group of elements.
 <section> tag:
o A semantic element that groups content
related to a specific topic or theme.
o Improves accessibility and SEO, as
screen readers and search engines can
better understand the structure of the
webpage.

For grouping related content, the <section> tag is


recommended because it provides semantic meaning
and enhances accessibility. For example, a blog post
could use <section> to group the title, author
information, and content.
12. Q. Create an HTML code snippet that includes a 5 BL6 (Create)
heading with the text "Welcome to My Page" and a
line break between the heading and the
paragraph.

<!DOCTYPE html>
Ans.
<html>

<head>

<title>Welcome Page</title>

</head>

<body>

<h1>Welcome to My Page</h1>

<br>

<p>This is my very first webpage.</p>

</body>

</html>

18
STATE COUNCIL FOR TECHNICAL EDUCATION & VOCATIONAL TRAINING, ODISHA
INTRODUCTION TO IT SYSTEMS (TH-1B)
QUESTION BANK (with Solutions) – UNIT 4 (SET-1)
(Common to 1st & 2nd Sem)
Short Questions & Answers(02 Marks Each)
1. How a user can open a document in OpenOffice Writer and what
are the options for it. Level-2 (understanding)
Answer:
A user can open created document in these ways.
i. Via Quick Starter: Open Quick Starter by these method then click on the
open document. It will show an open dialog box to browse for the desired
file to be open.
ii. Via Start Center:
 Open Start Center by clicking on OpenOffice icon.
 We can open from a list of recent documents.
 The document can also be open from the menu option file.
 Recent Documents list of the File menu.

2. Name four ways to starting a document in OpenOffice Writer.


Level-2 (understanding)
Answer:
1) Via Operating System Menu
2) Via QuickStarter
3) Via Start Center
4) Via File Menu

3. What are the two processes to print a document in OpenOffice


Writer? Level-2 (understanding)
Answer:
1) Quick Printing: These options can utilize to quckly send a document to
your default printer.
2) Controlled Printing: it is a customize printing option we can set
parameters for the printing.

4. Which buttons are present in formatting tool bar for paragraph


formatting? (Write at least 10 button names).
Level-2 (understanding)
Answer:

1. Styles & formatting window 2. Apply style 3. Justify


4. Align left 5. Centered 6. Align Right
7. Line spacing 1 8. Line spacing 1.5 9. Line spacing 2
10. Numbering On/Off 11. Bullets On/Off 12. Paragraph Format Dialog
13. Decrease Indent 14. Increase Indent
5. What is the function of auto correct in Open Office Writer?
(Level-2: Understanding)
Answer:
 It contains common misspellings and typing error, which it corrects
automatically.
 Ex:- “abotu" will be changed to “about”.

6. Outlines the features provided by OpenOffice Calc.


Level – 2 (understanding)
Answer:
 Features provided by Calc include
 It consist of several individuals sheets.
 Functions, which can be used to created formulas.
 Database functions, to arrange, store and filter data.
 It provides Dynamic charts, wide range of 2D & 3D charts.
 Marcos, for recordings.
 Ability to open, edit & save Microsoft Excel Spread sheets.
 Import & export of spread sheets in multiple formats.

7. Which steps need to select use Auto correct in OpenOffice Writer.


Level – 1 (Remembering)
Answer:
Select tools  autocorrect option (to open the auto correct dialog box) there
you can define what strings of text are auto corrected and how.

8. Name the different parts of Calc interface.


Level – 1 (Remembering)
Answer:
 Formula Bar: It consists various formulas like sum, average, max etc.
 Individual Cells: each cell being at the intersection of a Colum and a
row.
 Sheet Tabs: At the bottom of the cells the sheet tab are present. These
tabs enable access to each individual sheet.

9. Explain the steps to freezing or unfreezing rows & columns in


OpenOffice Calc? Level – 2 (Understanding)

Answer:
Freezing A Row & A Column:
 Click into the cell that is immediately below the row you want to frozen and
immediately to the right of the column you want to be frozen.
 Choose Windows  Freeze. A dark line appears, indicating where the
freeze is put.
Unfreezing
To unfreeze rows or columns, choose Window Freeze. The checkmark by
Freeze will be removed.
10.What is Open Office Tool. Level-1 (Remembering)
Answer:
Open Office Tool is an open source software suite of Apache Open Office
(AOO) that can run on several hardware architecture and various operating
systems.it includes various tools like Writer, Calc, Impress, drawing applications etc.
All these components are well integrated and commonly referred as Open Office
tools.

11.Define Open Office Writer. Level-1 (Remembering)


Answer:
The writer is the word processor component of Apache OpenOffice (AOO). It is
a free alternative to Windows MS Word. It has extensive support for all common file
formats and by default uses the ODF format.

12.What AOO. Level-1 (Remembering)

Answer:
AOO Stands for Apache Open Office. It is a open source software suite of
Apache Open Office that can run on several hardware architecture and various
operating systems.

13. Interpret the step by step process of creating a chart in OpenOffice


Calc ? Level-1 (Understanding)

Answer:
Step-1: Insert data into Calc which is to be graphically represented.
Step-2: Select the data to be included in chart/graph information.
Step-3: Either press the chart icon on standard toolbar or click on insert 
chart option.
Step-4: It will show chart wizard with the default information of the chart as per
the given data.

14. Select different ways to insert a slide to format presentation?


Level-1 (Understanding)
Answer:
This can be done in a variety of ways:
 Insert  Slide.
 Right-click on the present slide, and select Slide  New Slide from the
pop-up menu.
 Click the Slide icon in the Presentation toolbar.

15.What are the different options provide to print a presentation in


OpenOffice Impress? Level-1 (Understanding)
Answer:
 Impress provide many options for printing a presentation:
 With multiple slides on one page.
 With a single slide per page with notes, as an outline, with date & time,
with page name.
LONG QUESTIONS & ANSWERS(05 MARKS EACH)

1. Explain the features of open office. Level-2 (understanding)


Answer :
a. No licensing fees: It's free software. Anyone can use and distribute it
without any charges.
b. Open source: Source code is openly available. Users can distribute,
copy and modify the software as per the AOO's Open-source licenses.
c. Cross-platform: The software can be installed in several hardware
architectures and under multiple operating systems.
d. Extensive language support: Its user interface is available in more than
40 languages including Hindi, Tamil, etc. It also supports spelling,
hyphenation, and thesaurus dictionaries in over 70 languages.
e. Consistent interface: Provides user interfaces with a similar look and
feel for better administration
f. No vendor lock-in: Supports Open Document format i.e., an XML., it
can be opened in any Text editor
g. File compatibility: In addition to its native Open Document formats,
AOO includes PDF and Flash export capabilities, as well as support for
opening and saving files in many common formats including Microsoft
Office, HTML, XML, etc. It also includes the ability to import and edit
some PDF files.
h. Community support: Worldwide community to fix the software issues
and software enhancement.

2. Interpret how to download and install OpenOffice Software.


Level-3 (Apply)
Answer :
a. In order to to download the current version of Apache's OpenOffice
Software, we have to visit its official website i.e.,
https://www.openoffice.org/download/index.html.
b. Then, we have to choose appropriate options for the operating systems,
language, and version of the OpenOffice package to be downloaded.
Click on the 'Download full installation' button. A full installation file, sized
about 135 MB will be downloaded.
c. Start installation with the downloaded file. By clicking Next, we will be
shown a window to choose the installation location.
d. Click on installation button. (installation process will be began and show
some installing information)
e. Then go to next. Here a ‘Costumer Information’ form will be presented to
take complete customer information.
f. After filling the form, click on Next (their another window will be
represented to choose setup type)
g. Choose setup type “typical” and click on next.
h. Click on installation button to begin the installation process.
After some time open office installation completed wizard appears then
click on “finish”.
i. Now we will have a start link on desktop.
We can open the open office by double clicking the link.

3. Explain the different parts of writer interface? Level-2 (understanding)


Answer:
Writer interface have different parts such as-
(i) Title Bar
(ii) Menu Bar
(iii) Tool Bar
(iv) Right Click Menus
(v) Ruler
(vi) Status Bar

(i) Title Bar: It is situated at the top of the Writer windows and shows the
file name of the current document.
(ii) Menu Bar: The Menu bar is just below the title bar having various
menus. When a menu is clicked it dropdowns and displays several
commands. We will discuss one by one each such menu.
 File: To apply commands to current document, to open or close
document.
 Edit: For editing the current document, for example, cut, paste.
 View: For controlling display of document on the screen.
 Insert: For inserting new elements in document, like, comments,
special characters, graphics, and objects.
 Format: For formatting the layout and content of document.
 Tools: For spelling check, gallery of object art to add to document,
to configure menus.
 Table: To insert, edit, delete a table in a text document.
 Windows: For manipulating and displaying document windows.
 Help Menu: Contains link to pen the AOO help file, Update options
check for any available update for the software. It also gives
information about the version and license information of the
program.
(iii) Tool Bar: The writer supports several toolbars i.e; docked, floating, and
tear-off toolbar.
 Docked Toolbar: It is fixed by default but it can be moved to different
locations.
 Floating Toolbars: It is context-sensitive. It appears as per the current
cursor position or selection.
 Tear-off Toolbars: It can be opened via a triangle on toolbar icons.
(iv) Right-click Menus: User can right-click on a paragraph, graphic, or other
objects to open a context menu. It is the fastest and easiest way to reach a
function of the right-clicked object.
(v) Ruler:
 Rulers are used to control and see page margins, paragraph
indents, and various alignments of writer objects.
 It can be shown or hidden via ruler check mark in view menu.
(vi) Status Bar:
 The Writer status bar is located at the bottom of the workspace.
 It provides information about the document and convenient ways
to quickly change some document features.
 It contains page number, page style, language, writer mode, file
save status, digital signature, page zooming control etc.

4. Identify the process of Find & Replace of a text in OpenOffice Writer.


Level-3 (understanding)
Answer:
To Find Text
a. Choose Edit - Find & Replace to open the Find & Replace dialog.
b. Enter the text to find in the Find text box.
c. Either click Find Next or Find All.
d. When you click Find Next, Writer will show you the next text that is equal to
your entry. You can edit the text, then click Find Next again to advance to
the next found text.
e. Alternatively, you can use the icons at the lower right of the document to
navigate to the next text or to any other object in the document.
f. When you click Find All, Writer selects all text that is equal to your entry.
Now you can for example set all found text to bold, or apply a character
style to all at once.

To Replace Text
a. Choose Edit - Find & Replace to open the Find & Replace dialog.
b. Enter the text to search in the Find text box.
c. Enter the text to replace the found text in the Replace with text box.
d. Either click Replace or Replace All.
e. When you click Replace, Writer will search the whole document for the text
in the Find box, starting at the current cursor position. When text is found,
Writer highlights the text and waits for your response.
f. Click Replace to replace the highlighted text in the document with the text
in the Replace text box. Click Find Next to advance to the next found text
without replacing the current selection.
g. When you click Replace All, Writer replaces all text that matches your entry.

5. Describe different parts IMPRESS Interface in OpenOffice IMPRESS?


Level-2 (understanding)
Answer
The main impress window has three parts such as:
(i) Slides pane
(ii) Task Pane
(iii) Workspace

Slides Pane:
 The slides pane contains thumbnail pictures of the slides in your
presentation.
 Clicking a slide in this pane select it and place it in the workspace.
 When a slide is in the workspace you can apply to it any changes
desire.
 Several additional operations can be formed on one or more slides
simultaneously in the slide pane.
 Add a new slide to the presentation.
 Mark a slide a hidden, deletes a slide from the presentation if it
is no longer needed.
 Rename a slide, duplicate a slide or move it to a different
position in the presentation.

Tasks Pane:
The tasks pane has several sections. To expand the section you wish to
use, click on the right-pointing triangle to the left of the caption. Only one
section at a time can be selected.
 Master page: Here you define the page style for your presentation.
 Layout: The pre-packaged layouts are shown here. You can choose the
one you want, use it as it is, or modified it to your requirements.
 Custom Animation: A variety of animations for selected elements of a
slide are listed. Animation can be added to a slide and it can also be
changed or removed later.
 Slide Transition: We can select transition type, its speed (slow, medium,
fast) choose between an automatic or manual transition, and choose
how long the selected slide will be shown.

Workspace:
The workspace has five tabs Normal, outline, notes, hand out & slide
sorter. These five tabs are called view button. The workspace below the view
button changes depending on the chosen view.
 Normal View: Normal view is the main view for working with individual
slides. Use this view to format and design and to add text, graphics and
animation effects.
 Outline View: The outline view contains all the slides of the presentation
in their number sequence. It shows topic titles, bulleted list & numbered
list for each slide in outline format.
 Notes View: Use the notes view to add notes to a slide.
 Click the notes tab in the workspace.
 Select the slide to which you want to add notes.
 In the text box below the slide, click on the words, click to add
notes and begin typing.
 Handout View: The handout view is for setting of the layout of your slide
for a printed handout. Click the handout tabs in the workspace, and
then choose Layouts in the Task pane. We can choose to print 1, 2, 3, 4,
5, 6, or 9 slides per page.
 Slide Sorter view: slide Sorter view contains all of the slide thumbnails.
Use this view to work with a group of slides or with only one slide.
Question Bank & Solutions
(1st/2nd Semester 2024-25)
Introduction to IT Systems
UNIT-5: Information Security Best Practice(SET-1)
Short Questions With Answers(02 Marks Each)
1. What is the difference between Data & Information ?
Ans: Data refers to collection of basic facts and figures. It is generally raw information
that simply includes name, basic numbers or texts. In computers, it may be in the form
of different types of files, such as images, text, graphics, and videos.
Information is data that has been processed and organized in order to provide a
meaningful output from raw data.
Example. The Name, Date of birth, contact number of a student are data, but if we have
to find out the list of students whose age is more than 18 years that is known as
information.

2. What do you mean by Information Security ?


Ans: Information security is defined as the process or techniques used to protect our
sensitive information from unauthorized access. It aims to ensure the confidentiality,
integrity, and availability of data, whether it is stored or during transmission over
internet.

3. Define Virus, how it is different from worms ?


Ans:
 A computer virus is a software program that has been intentionally created to
make harm to a computer system.
 It can corrupt data, delete data, copy & destroy data on an individual computer.
 It has the ability to replicate (making its duplicate copy automatically) itself.
 It can be spared from one computer to another through internet, network,
storage devices and affects all the programs, memory of computer.

Worms: A worm is technically not a virus but a program very similar to a virus. It has
the ability to self-replicate causes harm to a system. It can be executed without the
help of any other program.

4. Write various steps to be followed in order to prevent your system


from virus ?
Ans:
 Don’t allow CD & pen drive without scanning.
 Always install suitable antivirus software.
 Don’t visit website which are not reputed.
 Don’t open unknown mail or links.
 Always download files from trusted websites.
 Make a habit to keep backup of your important files.

5. What are the symptoms to know the presence of virus in your system ?
Ans:
 Your system becomes very slow.
 System terminates abnormally.
 Showing problem while booting.
 Showing insufficient memory or memory full even you have fewer amounts of
data.
 Showing unexpected performance while working.

6. Write the name of some popular Antivirus software ?


Ans:
Ex. Norton, MacAfee, Kaspersky, e-trust, PC-clean, Microsoft security essential, Quick
heal etc.

7. What is Firewall ?
A firewall is a network security system that monitors and controls incoming and
outgoing network traffic based on predetermined security rules. It acts as a barrier
between a trusted network (like your home or office network) and an untrusted
network (like the internet).
Benefits of using a firewall:
 Protection against unauthorized access:
 Blocking malicious traffic:
 Protecting sensitive data:
 Enhancing network security

8. What is VPN ?
Ans: VPN stands for Virtual Private Network, it is a technology that creates a secure,
encrypted connection over a less secure network, such as the internet. It works by
creating a private tunnel between your device and a VPN server, masking your IP
address and encrypting your internet traffic.

9. What is IP spoofing ?
Ans:IP spoofing is a technique where an attacker disguises the source IP address of a
network packet to trick a target system into believing the packet originated from a
legitimate source. This allows the attacker to bypass security measures and potentially
launch malicious attacks.

10. What is Phishing and how it works?


Ans:
Phishing is a type of cyberattack where attackers use fraudulent emails, text messages,
phone calls, or websites to trick individuals into revealing sensitive information, such as
passwords, credit card numbers, or social security numbers.
Common Phishing Techniques:
Email Phishing: The most common type, where attackers send fraudulent emails.
Smishing: Phishing attacks via SMS messages.
Vishing: Phishing attacks through voice calls.
Spear Phishing: Targeted attacks aimed at specific individuals or organizations.
Whaling: High-profile phishing attacks targeting executives or celebrities.
11. Difference between data encryption and decryption ?
 Encryption and Decryption are two fundamental processes in cybersecurity, used
to protect sensitive information from unauthorized access.
 Encryption is the process of converting plain text (readable data) into ciphertext
(unreadable data) using a specific algorithm and a key. This scrambled ciphertext
can only be understood by someone who possesses the correct decryption key.
 Decryption is the reverse process of encryption. It involves using the decryption
key to convert the ciphertext back into its original plaintext form.

12. What are the safety measures to be taken while doing online
transaction?
Ans:
Here are some safety measures to take while doing online transactions:
 Official Website: Always access your bank's official website directly from your
browser's address bar. Avoid clicking on links in emails or texts. Always check
(https://).
 Beware of Phishing Attempts: Be wary of emails or calls requesting personal
information. Your bank will never ask for sensitive details via email or phone.
 Secure Wi-Fi: Avoid using public Wi-Fi networks for online transactions. If you
must, use a VPN to encrypt your connection.
 Strong Passwords: Create strong, unique passwords for each online account.
Avoid using easily guessable information.
 Use Two-Factor Authentication (2FA): Enable 2FA whenever possible to add an
extra layer of security.

13.what are the safety measures to be taken while doing online shopping ?
Ans:
Here are some safety measures to take while doing online shopping:
 Secure Websites: Only shop from trusted website or on websites with a secure
connection (https://). Look for the padlock symbol in the address bar.
 Trusted Sellers: Choose reputable online retailers with good reviews and
customer feedback.
 Payment Security: Use trusted payment methods. In case of any doubt, always
purchase products on cash on delivery.
 Secure Wi-Fi: Avoid using public Wi-Fi networks for online transactions. If you
must, use a VPN to encrypt your connection.
 Keep Software Updated: Regularly update your operating system and security
software to protect against vulnerabilities.
 Beware of Phishing: Be cautious of suspicious emails, texts, or calls. Never share
personal information with unsolicited requests.

14.what are the safety measures to be followed while using public


computer.
Here are some safety measures that should be followed:
 Avoid Financial Transaction: Always avoid financial transactions while using
public computers.
 Avoid Sensitive Information: Never enter sensitive information like passwords,
credit card numbers, or social security numbers on a public computer.
 Log Out of Accounts: Always log out of all accounts, including email, social media,
and online banking, before leaving the computer.
 Clear Your Tracks: After using the computer, clear your browsing history, cookies,
and temporary internet files.
 Proper scanning of removable devices: After completion of your works eject your
storage devices and scan properly before using again in another computer.

15. What are different tools and techniques used to protect your
computer from information threats.
The tools and techniques used to protect your computer from information
threats are Firewall, Antivirus software, VPN, Backup, Cryptography, Digital
signature, Authorization, Authentication etc.

16. Write down different ways through which malware can approach your
system?
Ans:
Malwares can approach your system any one of the following ways.
 When we download directly from some untrusted link/ website.
 By email from unknown link
 Corrupted storage/ removable devices
 Unsecure WIFI
 By Network propagation etc.

17.What is Cookies in Internet browsing?


Ans: Cookies are used to store a website information about the user internet
browsing on computer. It is a small text file which will remember the details about
your preferences, login information, website visited and other information and helps
the user in subsequent browsing.
18.What are information security goal?
Ans: Confidentiality, Integrity, Availability.

19.What is Malware?
Ans: Malware is short for malicious software and is used as a single term to refer to
viruses; Trojans, horses, worms, Spywares etc.

20.What is digital foot print?


Ans: All the information online about a person that is stored online.
21.What is instant messaging?
Ans: Instant messaging network provides the ability to not only transfer text messages
but also the transfer of files. Instant Message can transfer malware & other programs.

22.what is USB and write the name of two USB storage media ?
Ans: USB (Universal Serial Bus) is a standard for connecting and transferring data
between computers and electronic devices. It also provides a power supply to devices.
USB ports are widely used for connecting peripherals such as keyboards, mice, printers,
and storage devices.

Two examples of USB storage media are: Pen Drive, Media card

23.Write down four removable information storage media?


Ans: CD-RW, DVD-RW,Digital Camera,MP3 player, Pen drive, Blue Ray Disk etc.

24.How to make strong password ?


Ans: Create a strong password with minimum length of ideally 10 characters and
comprising of a mix of alphabets, numbers and special characters/Symbol.
25:What is ATM?
Ans: ATM stands for automated teller machine and it is an electro-mechanical machines
adopted by the international community for banking transactions in the present digital
era.
Long Questions & Answers(05 Marks Each)
1. Write down details about different Information Security Goals?
Ans:There are three main goals protected by information security, collectively known as
CIA triads.
Confidentiality: This feature indicates that authorized users should be allowed to access
data or computer systems, it prevents unauthorized users from the disclosure of data
hence protect the privacy of information. Confidentiality is maintained through access
control mechanisms.
Integrity: Integrity means data in a computer system should not be modified without
authorization. It ensures the authenticity and accuracy of information. Integrity is
achieved by imposing restrictions to modify the data. Users having permission to edit
can only make changes.
Availability: It ensures that information should be available, whenever required. A
legitimate user reliably accesses demanded information with this attribute of
information. For an ideal information system, it should avoid any kind of service
disruption like power failure, hardware failure, etc. Continuity of access procedures,
scheduled backups, regular maintenance is useful to achieve this attribute.
In addition to the above, there are two more principles, authenticity and non-
repudiation.
Authenticity ensures that only legitimate users can have access to the system resources.
It is done via confirming their identities before granting any system resources to them.
User name, password, email, biometrics, etc. is used to achieve authenticity.
Non-repudiation principle ensures that the sender of data is provided with proof of
delivery and the recipient is provided with proof of the sender's identity, so neither
party can deny sending, receiving, or accessing the data.

2. What is Malware, write different forms of malware?


Ans:These are the software created intentionally to fulfil different malicious activities
like corrupt data, delete data, copy & destroy user data on an individual computer. Some
malware is as under:
Virus: It is a computer program that replicates and attaches itself to another computer
program to infect the computer system. Viruses can affect the working of CPU, personal
files, computer systems, etc.
Ex. MyDoom, ILOVEYOU, Slammer, Stuxnet etc.
Worm: It is a software program capable of spread itself orom one system to another
oner network and internet to create harm on a computer system. It is capable of infects
many more computers in a very short period.
Ex. ILOVEYOU, Code Red, Explorer.zip, Love Bug, W32.Nimda, and W32.
Ransomware: It prevents the user to access their operating system, or certain
applications, or any data by encrypting their data. Hackers demand money from victims
to decrypt their files. The motive behind ransomware attacks is monetary.
Ex. Crypto Locker, Conti, WannaCry etc.
Trojan: It is a malware that appears to have normal functionality but in reality, its
malicious activity creates backdoors entry into the target computer.
Ex. Flame, Banker, Downloader, Zeus, and Beast are an example of some popular trojans.

Spyware: A malware that spy the user's information with the aim to harm them.
E.g., cookies on webpages and keyloggers can log everything including your credentials.
Adware: It is malware that is designed to create revenue for its developers. It is also
termed advertising-supported software. It tracks user's behaviour and sells out that
information to interested third parties. To avoid adware, use an adblocker.
Keyloggers: A spyware that is designed for stealing the data via recording the keystrokes
pressed by the user on their keyboard. An attacker may track your typing in a real-time
manner or afterward via a file used to store the keystrokes.
Ex. Computer Spy, Kidlogger, syprix are some examples of keyloggers.
Sweepers: These are programs to wipe out data from the targeted machines.
Backdoor: If malicious users gain access to the system, they can install a program, used
to create another way (backdoor) to enter into the system. The purpose is to gain
unauthorized access to the system.
Ex. Deep Throat, Portal of Doom, Subseven, NetBus are some popular backdoors.

3. Explain different types of Social Engineering Attacks?


Ans:The people can be tricked or psychologically manipulated with help of technology to
take some actions or divulge confidential information. Some popular attack is as under:
Phishing: It is one of the common types of social engineering scams. The hacker typically
sends an email or text to the target, seeking information that might help with a more
significant crime. For example, a hacker might send emails that appear to come from a
source trusted by the victim. That source might be a bank, for instance, asking email
recipients to click on a link to log in to their accounts. Those who click on the link,
though, are taken to a fake website that, like the email, appears to be legitimate. If they
log in at that fake site, they are essentially handing over their login credentials and giving
the crook access to their bank accounts
Vishing: It is the voice version of phishing. “V” stands for voice, but otherwise, the scam
attempt is the same. The hacker uses the phone to trick a victim into handing over
valuable information. For example, a hacker might call an officer, posing as a
government officer. The hacker might prevail upon the victim to provide login
credentials or other information that could be used to target the Organization.
Smishing: It is the text version of phishing which is an acronym for SMS phishing. Here
the hacker sends some link via SMS to the targeted users.
Baiting: In such a scam a USB drive or other electronic media is preloaded with malware
and supplied to users. When a user plugs this device into their system, malware will
enable hackers to hack your computer.
Quid pro quo scam: It is another type of social engineering attack that involves an
exchange as I give you this, and you give me that. Hackers make the victim believe as a
fair exchange, but that's far from the case, as the cheat always comes out on top.
For example, a hacker may call a target, pretending to be an IT support technician. The
victim might hand over the login credentials to their computer, thinking they are
receiving technical support in return. Instead, the hacker can now take control of the
victim's computer, loading it with malware or, perhaps, stealing personal information
from the computer to commit identity theft.

4. Explain different types of Network Threats?


Ans:
Sniffers: Sniffers are programs to monitor network traffic via tracing network packets.
These can be used to gather important information which will be helpful in the attack.
Windump, tcpdum, wireshark are some examples of sniffers.
Botnet: A infected device is termed as the compromised device. When a group of such
compromised devices (zombies) are under the control of some malicious user then the
user can use this network of zombies to attack other systems. Such a zombie network is
termed a botnet.
Pharming: Pharming is a process of illegal installation of malware on a computer or a
network. Man-in-the-middle (MitM) attack: Such an attack happens due to insecure
communication. In such a cyberattack an attacker relay or possibly alter the ongoing
communication between sender and receiver without their knowledge. An attacker can
intercept requests and responses and hence become able to read the contents between
the sender and receiver. There are various types of MitM attacks as under:
IP spoofing: IP spoofing is the creation of Internet Protocol (IP) packets that have a
modified source address to either hide the identity of the sender, impersonate another
computer system or both. It is a technique often used by bad actors to invoke DDoS
attacks against a target device or the surrounding infrastructure.
Session hijacking: A session between the user and the server can be hijacked by the
attacker. Some of the methods used in this regard are session fixing and session
prediction. Here, usually, a valid session between the user and server is taken over by
the attacker.
Distributed denial of service (DDoS): DDoS attacks occur when attackers overload
servers or resources with requests. Attackers can perform these attacks manually or
through botnets, networks of compromised devices used to distribute request sources.
The purpose of a DDoS attack is to prevent users from accessing services or to distract
security teams while other attacks occur.
5. Explain different Techniques used for Combating Information Security
Threats ?
Ans:These are the following technologies used to protect our information from hacker.
Firewall:
A firewall is a dedicated device, or a computer, that monitors network traffic
passing through it and allows routes to be rejected or approved based on rules. It is
software or hardware that is usually placed between a secure network and an
unsecured network, and it acts as a gateway that ensures that nothing private and
malicious things can go out. is not coming in.
Data Backup:
Data backup is the process of creating copies or duplicating the data. Data
backup strategy is very common and useful in case of loss, deletion, or corruption of
our data. It restores us work till last taken backup. Data backup keeps us capable of
maintaining the integrity and availability goal of information security. Backup can be
taken in three ways: incremental backup, differential backup, and full back up.
Virtual Private Network (VPN):
The virtual private network is a network that is constructed by using public wires
(usually the Internet) to connect to a private network, such as a company's internal
network. Many systems enable the creation of networks using the Internet as the
medium for transporting data. These systems use encryption and other security
mechanisms to ensure that only authorized users can access the network and that the
data cannot be intercepted.
Encryption:
Plain data can be converted into a nonreadable format by applying some
techniques. Encryption is such technique that disguises plain text to hide the actual
data for the sake of achieving security. Cryptographic encryption techniques are used to
protect the data and enforce confidentiality during its transmission and storage.
Anti-Virus Software:
Anti-virus software not only protects & clean user from malware infection but it
provides safety from several other attacks and keeps our information safe.
Some popular anti-virus software are Symantec Norton Anti-Virus, MacAfee
Anti-Virus, Kaspersky Anti-Virus, Bitdefender Anti-Virus Plus, Avg Anti-Virus, Quick Heal,
etc.
Intrusion Detection System (IDS):
IDS contains various tools for real-time monitoring of inbound and outbound
traffic in suspect of threats. IDS system alerts the user in case of any fraudulent traffic
approaches to our system.
Intrusion Prevention System (IPS):
IPS security solutions are advanced systems, these not only detect the
fraudulent traffic source but prevent our system from their attack by blocking requests
or ending user sessions. Mostly IDS and IPS are often used together. In IPS various rules
and policies are created for incoming and outgoing packets. Policies check the packet
information and depending on the traffic rule action to allow or deny is issued.

6. What is Phishing and how it works?


Ans:Phishing is a type of cyberattack where attackers use fraudulent emails, text
messages, phone calls, or websites to trick individuals into revealing sensitive
information, such as passwords, credit card numbers, or social security numbers.

How Phishing Works:

Impersonation: Attackers pose as legitimate organizations like banks, social media


platforms, or government agencies.
Deceptive Messages: They send messages that create a sense of urgency or fear, urging
recipients to take immediate action.
Malicious Links or Attachments: The messages often contain malicious links or
attachments that, when clicked or downloaded, can infect devices with malware.
Data Theft: Once victims fall for the deception, they may unknowingly provide their
personal information to the attackers.

Common Phishing Techniques:

Email Phishing: The most common type, where attackers send fraudulent emails.
Smishing: Phishing attacks via SMS messages.
Vishing: Phishing attacks through voice calls.
Spear Phishing: Targeted attacks aimed at specific individuals or organizations.
Whaling: High-profile phishing attacks targeting executives or celebrities.

How to Protect Yourself from Phishing:

Be Skeptical: Always be cautious of unsolicited emails, texts, or calls.


Verify the Sender: Double-check the sender's email address and look for any spelling
errors or suspicious domains.
Avoid Clicking Suspicious Links: Hover over links to see the actual URL before clicking.
Use Strong Passwords: Create unique, strong passwords for each account.
Enable Two-Factor Authentication: Add an extra layer of security to your accounts.
Keep Software Updated: Install security updates promptly to protect against
vulnerabilities.
Use Phishing Detection Tools: Employ tools that can identify and block phishing
attempts.
7. Write down some Information security best practice techniques?
Ans: In order to save our valuable Information, we have to careful ourselves by doing
some best practices as per the guideline issued by Govt. of India as follows.
General Computer Usage
1. All the work should be strictly carried out only on a personal computer/ Laptop that is
not connected to the internet.
2. Create strong passwords for login and the computer lock automatically when it will be
ideal for more than 2 minutes.
3. Computers should be protected using trusted Antivirus software.
4. Always Install and purchase software from trusted agencies.
5. Always scan and take care while using removable devices like USB drives, external
hard drives, and even smartphones.
6. Back up your important files at regular intervals to avoid unexpected loss.
General Internet Browsing
1. Always be careful when clicking on links or downloading, download only from secured
site that starts with "https" sign with a green padlock icon in the browser address bar to
verify that site is secure.
2. Use a web browser that has been permitted by your organization.
3. Always use an updated web browser for browsing.
4. The "Save password" option prompted by the browser should not be selected. Don't
save account information, such as passwords or credit card information in web browsers,
5. Enable multi-factor authentication (MFA) to all possible online accounts and services.
It is used to verify your identity via a separate channel.
6. Make a habit of clearing history from the browser after each logout session.
Password Management
1. Create a strong password with a minimum length of ideally 10 characters and
comprising of a mix of alphabets, numbers, and characters.
2. All passwords (e.g., email, computer, etc.) should be changed at least once every three
months. 3. Don't reuse old passwords.
Email Communication
1. Avoid downloading email attachments or clicking on suspicious links received in
emails from unknown or untrusted sources.
2. Avoid accessing official email accounts from public Wi-Fi connections,
3. Auto save of password for email accounts should not be enabled.
4. Logout from mail accounts after your work is done.
Home Wi-Fi Network
1. Turn on WPA2 or higher encryption feature in wireless routers.
2. Change the default network device name & Password : Unauthorized users may be
familiar with the default Device name & passwords, so it is important to change the
router device's password.
3. Turn off your wireless router when not needed for any extended period.
Avoiding Social Engineering Attacks
1. Be careful to unsolicited phone calls, visits, or email messages from individuals asking
about personal or other Government information. If an unknown individual claim to be
from a legitimate organization, try to verify his or her identity directly with the company.
2. Avoid online conversations to strangers to be safe from Quid pro quo scams.
Smart Device (Smart Phone, Tabs, etc.)
1. Smart devices must not be used for sensitive telephonic conversation. The Wi-Fi and
blue- tooth should be kept in turned-off mode.
2. No free Apps should be loaded in the Smart device.
3. Turn off the applications which are not needed.
4. Be cautious with public Wi-Fi. To be safe, avoid logging into accounts, especially
financial accounts when using public wireless networks.
Online transaction
1. Official Website: Always access your bank's official website directly from your
browser's address bar. Avoid clicking on links in emails or texts. Always check (https://).
2. Use Two-Factor Authentication (2FA): Enable 2FA whenever possible to add an extra
layer of security.
3. Payment Security: Use trusted payment methods. In case of any doubt, always
purchase products on cash on delivery.
4. Beware of Phishing: Be cautious of suspicious emails, texts, or calls. Never share
personal information with unsolicited requests.

You might also like