Saturday, February 24, 2024

65 Very Short Questions Fundamentals 4 Marks - SEE COMPUTER SCIENCE 2080

 65 Very Short Questions Fundamentals 4 Marks - SEE COMPUTER SCIENCE 2080



1.      What is communication?

Communication is sending and receiving information between two or more persons.

2.      What is analog signal?

An analog signal refers to a continuous electrical signal that varies over time and represents data as a continuous waveform.

3.      What is web server?

A web server is a software or hardware that delivers web content to clients like browsers.

4.      What is mail server?

A mail server is a computer system that is dedicated to handling and managing the sending, receiving, and storage of emails.

5.      What is topology?

Network topology is the inter-connected pattern of network components.

6.      What is bandwidth?

Bandwidth can be defined as the maximum volume of data that can be transmitted through a communication system.

7.      What is internet?

The Internet is a global network of interconnected computers that allows people to share information and communicate from anywhere in the world.

 

 

8.      What is E-mail?

E-mail is the most widely used service on the Internet which sends and receives messages electronically through the Internet

9.      What is web browser?

Web browser is a computer program that access web pages and displays them on the user’s computer.

10.  Define IP address.

IP address is an unique numerical identifier for every device or network that connects to the internet.

11.  What is search engine?

Search engine is the communication program that searches documents on the basis of specified keywords and returns a list of the web links that matches the keywords.

12.  What is social media?

Social Media is an online tool that helps us to stay connected with the whole world.

13.  What is network protocol?

A set of rules followed for interconnection and communication between computers in a network is called network protocol.

14.  What is Ecommerce?

E-commerce is also known as electronic commerce or Internet commerce which means buying and selling of goods, products, or services through Internet.

 

15.  What is digital currency?

Digital currency is a type of electronic money that is stored and exchanged using computers and other digital devices

16.  What is digital citizenship?

Digital citizenship refers to the responsible and ethical use of technology and the internet which involves understanding, practicing, and promoting appropriate behavior when using digital tools and resources

17.  What is digital signature?

Digital signature is a security mechanism system used on the internet for data and information transaction by attaching a code at the end of the electronic message that confirms the authenticity of sent message.

18.  What is Cloud computing?

Cloud computing is a technology that allows users to access and use of computing resources, like servers and software, over the internet.

19.  What is cyber-crime?

Cyber crime refers to criminal activities that are carried out using computers, networks and the internet.

20.  What is cyber law?

The law which governs the legal issues in the cyber space regarding the internet or WWW for digital data processing and transaction is called cyber law.

 

 

21.  What is cyber bullying?

Cyber bullying is a kind of harassment using mobiles or computers.

22.  What is key logger?

A keylogger is a tool that secretly records every key pressed on a computer or mobile device.

23.  Define computer security.

Computer security refers to protecting computer and its content from damage, theft or misuse and action to prevent such incidents.

24.  What is hardware security?

Hardware security is the protection given to the various hardware tools and equipment used in computer system from the accidental or intentional harm.

25.  What is Software security?

Software security is the protection of computer systems and applications from threats, such as hacking, virus attacks, and unauthorized access, to ensure their confidentiality, integrity, and availability.

26.  What is information security?

Information security is the practice of preventing unauthorized access, use, disclosure,  modification, recording or destruction of information.

 

 

 

 

27.  What is switch in network connecting device?

Switch is a network connectivity device which joins multiple computers together to share information among them. The selected computer can get information through switch

28.  What is the business done through the internet called?

The business done through internet is e-commerce.

29.  Give some examples of cyber law

Computer crimes/Cyber-crime law

Intellectual property law

Data protection and privacy law

Telecommunication law

30.  In which communication media data transfer is the fastest?

In Fiber optic cable, data transfer is the fastest

31.  List out any two applications of internet.

Email and Social Media

32.  Where does intranet has been used?

Intranet has been used to share internal information and resources within an organization.

33.  Write any two benefits of cloud computing.

Any two benefits of cloud computing are

It allows to quickly and easily access, store information anywhere, anytime in the whole world, using an internet connection.

It is easier to get back-up and restore the data.

 

34.  Mention any two services provided by internet.

Any two services provided by internet are Search engine and E-mail.

35.  Write the name of any two search engines.

The name of any two search engines is google.com and ask.com

36.  Which device is used to connect PC with telephone line?

MODEM is used to connect PC with telephone line

37.  What is the vision of IT Policy of Nepal 2072?

To transform Nepal into information and knowledge based society and economy.

38.  Name any two modes of electronic payment.

Any two modes of electronic payments are:

i) Debit Card / Credit Card

ii) Mobile wallet like e-sewa, khalti

39.  Why switch is also known as smart hub?

Switch is also known as smart hub  because it transfers packets to only those selected computers connected in network

40.  Write two examples of bounded media

Any two examples of bounded media are Twisted Pair Cable and Fiber Optic Cable

41.  Write any two examples of full duplex modes of data transmission.

Telephone and Mobile

 

42.  List some areas where Al can help us.

Robotics and Education

43.  Why do you connect your PC to the UPS?

We connect PC to the UPS to control fluctuation of electric voltage and provides enough backup electric power to the computer system when there is power failure

44.  Give reason in short that "Computer network reduces the cost of operation."

Computer network reduces the cost of operation by sharing hardware and software.

45.  What is communication media?

A channel or path through which data and information are transmitted between connected devices in a network environment is called communication media

46.  What is a digital footprint?

Digital footprint is a trace of data that is created while using the Internet

47.  What is a backup?

Backup is the system of copying data and programs into another location or creating a duplicate copy of it in a secured place.

48.  What is Online Payment?

Online payment refers to the payment for buying goods or services through the Internet using different online payment gateway.

 

 

49.  What is IoT?

IoT is a system of interrelated computing device to exchange information over a network without human-to-human or human to computer interaction

50.  What are the types of cloud computing services?

The services of cloud computing are : Infrastructure as a Service (IaaS), Software as a Service (SaaS), Platform as a Service (PaaS).

51.  What are data communication mode?

Data communication modes refer to direction of  data flow between devices in a network or communication system. Simplex, Half Duplex and Full Duplex mode are the types of communication mode.

52.  What is computer network?

Computer network is a group of two or more computers and devices connected to each other through wired or wireless media to exchange data and information and share hardware, software and other resources.

53.  What is M-Commerce?

The online transactions through the wireless handheld devices such as mobile phone, laptop, palmtop, tablet, or any other personal digital assistant is called M-Commerce.

54.  What is e-governance?

E-Governance refers to the use of the digital technology by government to enhance the delivery of public services and engage with citizens more effectively.

55.  Define Cryptography.

Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents

56.  What is AI?

Artificial intelligence refers to the simulation of human intelligence in machines that are programmed to think and act like humans.

57.  Write two methods for hardware security.

Any two methods for hardware security are Insurance and Regular maintenance of computer hardware.

58.  Write opportunities and threats in social media.

Opportunities of social media is It creates awareness and innovate the way people live and Threats of social media is personal data and privacy can be easily hacked and shared on the internet.

59.  Write any two advantages of social media.

Any two advantages of social media are:

a)      It creates awareness and innovate the way people live

b)     Social media let us share anything with others around the world.

60.  List any two software security measures.

Any two software security measures are password and backup

61.  Which connector is used with coaxial cable?

BNC connector is used with coaxial cable

62.  Why data decryption is necessary?

To convert encrypted (coded) data into readable form.

63.  List some points about how we can protect our data.

Antivirus software can detect and remove virus from the computer.

Software for backup helps in securing the information by keeping backup.

64.  List any two commandments of computer ethics.

Any two commandments of computer ethics.

Do not use a computer to publish fake information.

Do not search the file or record of other people.

65.  Write two examples of bounded media

Any two examples of unbounded media are Satellite and Radiowave.

 

 

“Minds are like parachutes, they only function when they are open.”

 

 

No comments:

Post a Comment