You are on page 1of 27

UNIT-2 (COMPUTER NETWORKS) 15(MARKS)

1. Differentiate between LAN, WAN,MAN and PAN.


Ans.
A local area network, or LAN, consists of a computer network at a single site, typically an
individual office building. A LAN is very useful for sharing resources, such as data storage and
printers.
A metropolitan area network, or MAN, consists of a computer network across an entire city,
college campus or small region. A MAN is larger than a LAN.
A wide area network, or WAN, occupies a very large area, such as an entire country or the
entire world. A WAN can contain multiple smaller networks such as LANs and MANs. Internet is
the best example of WAN.
A personal area network, or PAN, is a computer network organized around an individual
person within a single building.

2. What are the benefits of Cloud Computing?


Ans.
Following are the benefits of cloud computing:
• Lower IT infrastructure and computer costs for users
• Improved performance
• Fewer Maintenance issues
• Instant software updates
• Improved compatibility between Operating systems
• Backup and recovery
• Increased storage capacity
• Increase data safety

3. Differentiate between Private and Public Cloud.


Ans.
• Private Cloud: Here, computing resources are deployed for one particular organization. This
method is more used for intra-business interactions. Where the computing resources can be
governed, owned and operated by the same organization.
• Public Cloud: This type of cloud is used usually for B2C (Business to Consumer) type
interactions. Here the computing resource is owned, governed and operated by government, an
academic or business organization.

4. What is IoT?
Ans.
• The phrase Internet of Things (IoT) refers to connecting various physical devices and objects
throughout the world via internet. The term IoT was firstly proposed by Kevin Ashton in 1999.
• For example, when the household devices of our daily life connect with the internet the system
can be called a Smart-Home in IoT environment
• The Internet of Things (IoT) is the network of physical objects—devices, instruments, vehicles,
buildings and other items embedded with electronics, circuits ,software, sensors and network
connectivity that enables these objects to collect and exchange data.

A.K.Pandey,pythonforstudents.blogspot.com
5. What are the advantages of using Optical Fibre?
Ans.
1. Greater Bandwidth
Copper cables were originally designed for voice transmission and have a limited bandwidth. Fiber
optic cables provide more bandwidth for carrying more data than copper cables of the same
diameter. Within the fiber cable family, singlemode fiber delivers up to twice the throughput
of multimode fiber.
2. Faster Speeds
Fiber optic cables have a core that carries light to transmit data. This allows fiber optic cables to
carry signals at speeds that are only about 31 percent slower than the speed of light—faster than
Cat5 or Cat6 copper cables. There is also less signal degradation with fiber cables.
3. Longer Distances
Fiber optic cables can carry signals much farther than the typical 328-foot limitation for copper
cables. For example, some 10 Gbps single mode fiber cables can carry signals almost 25 miles. The
actual distance depends on the type of cable, the wavelength and the network.
4. Better Reliability
Fiber is immune to temperature changes, severe weather and moisture, all of which can hamper
the connectivity of copper cable. Plus, fiber does not carry electric current, so it’s not bothered by
electromagnetic interference (EMI) that can interrupt data transmission
5. Thinner and Sturdier
Compared to copper cables, fiber optic cables are thinner and lighter in weight. Fiber can
withstand more pull pressure than copper and is less prone to damage and breakage.
6. Lower Total Cost of Ownership
Although some fiber optic cables may have a higher initial cost than copper, the durability and
reliability of fiber can make the total cost of ownership (TCO) lower. And, costs continue to
decrease for fiber optic cables and related components as technology advances.

6. What are the advantages of Client Server Model?


Ans.
• Centralized: Centralized back-up is possible in client-server networks, i.e., all the data is stored
in a server.
• Security: These networks are more secure as all the shared resources are centrally
administered.
• Performance: The use of the dedicated server increases the speed of sharing resources. This
increases the performance of the overall system.
• Scalability: We can increase the number of clients and servers separately, i.e., the new element
can be added, or we can add a new node in a network at any time.

7. What is Router?
Ans. Router is a networking device which chooses the best optimal path from available paths to
send the signals. It interconnects different networks. The simplest function of a router is to received
packets from one connected network and pass them to second connected network.
8. Differentiate between Amplitude Modulation and Frequency Modulation?
Ans.
Amplitude Modulation(AM):
Amplitude Modulation, commonly abbreviated as AM, is a common method of broadcasting radio
signals.

A.K.Pandey,pythonforstudents.blogspot.com
In AM, the amplitude of the carrier wave is modified in order to transmit the input signal (the one
that carries information).
In AM, the amplitude of the carrier wave is modified proportionally according to the amplitude of
the input signal
AM involves the alteration of the amplitude of the carrier wave
The typical frequency range in which AM works is 535 to 1705 Kilohertz
Frequency Modulation(FM):
Frequency Modulation, often referred to as FM, is another, relatively newer method of modulation
where the carrier wave is modified proportionally according to the input signal. In FM, the
instantaneous frequency of the carrier wave is altered according to the amplitude of the input
signal.
In FM, the frequency of the carrier wave is modified proportionally according to the amplitude of
the input signal
FM involves changes in the frequency of the carrier wave.
The frequency range is around 88-108 Megahertz for FM.

9. What are wireless network strategies to avoid collision?


Ans. Wireless networks implement it using a special protocol called CSMA/CA(Carrier Sense
Multiple Access/Collision Avoidance) as wired networks are FULL DUPLEX hence collision detection
method used is CSMA/CD(Carrier Sense Multiple Access/Collision Detection) .
1. CSMA/CA with ACK(Acknowledgement) Method
In this method, as soon as a node transmits data to another node, the receiving node must send an
acknowledgement signal called ACK, once it has received the data. The ACK signal must reach to the
sender node with in a specific time-frame.
If the sender node does not receive ACK in specific time, it considers it as a failed transmission and
retransmits the data.
2. CSMA/CA with RTS/CTS(Ready to Send/Clear to Send)
In this method, the sender node first sends an RTS signal to receiver. Receiver confirms its readiness
to receive by sending a CTS signal to the sender as well as all other nodes.
• Other nodes upon receiving a CTS will now not transmit(will wait) as they now know that some
transmission taking place and communicate channel as BUSY.
• The sender node upon receiving a CTS goes ahead with transmission.
Once the transmission ends, the receiver node sends ACK signal to all nodes:
• The sender nodes take it(ACK) as confirmation of successful transmission.
• Other nodes take ACK signal as end of transmission. Now they can transmit, if they need to as
now channel if FREE.

10. What are error detection techniques?


Ans.
Some popular techniques for error detection are:
1. Simple Parity check
2. Two-dimensional Parity check
3. Checksum
4. Cyclic redundancy check

A.K.Pandey,pythonforstudents.blogspot.com
11. What are common Inter Protocol Versions?
Ans. There are currently two versions of IP.
IPv4: It is most widely deployed Internet protocol used to connect devices to the Internet. IPv4 uses
a 32-bit address scheme allowing for a total of 232 addresses. An IPv4 address has following format:
x.x.x.x, where x is calles an octet and must be a decimal value between 0 and 255.An IPv4 address
must contain three periods and four octets.
IPv6 Address: A new Internet addressing system Internet Protocol version6 is being deployed to
fulfill the need for more internet addresses. IPv6 utilizes 128-bit Internet Addresses. The IPv6
address can have either of the following two formats:
(i) Normal IPv6 Address: This has following format:
y:y:y:y:y:y:y:y
(ii) IPv6(Dual) Address. An IPv6(Dual) address combines an IPv6 and IPv4 address and has the IPv6
portion of the address(indicated with y’s) is always at the beginning, followed by the IPv4
portion(indicated with x’s).
y: y: y: y: y: y:x.x.x.x

12. What are the use of following commands: Traceroute, Ping, ipconfig, nslookup and
whois?
Ans.
 Traceroute: It is a network diagnostic tool to track the pathway taken by a packet on an IP
network from source to destination.
Ex> c:\>tracert google.com
 Ping: Ping command is a command prompt command used to test the ability of the source
computer to reach a specified destination computer.
Ex c:\>ping 192.168.1.1 –t
 ipconfig: It is an extensively used networking troubleshooting command. It is often used to
display the basic networking information(addresses etc.) on a given computer but can do much
more than that.
 nslookup: (name server lookup) is a network utility program used to obtain information about
internet servers. It finds name server information for domains by querying the Domain Name
System.
Type nslookup IP address
 Whois: It is a query and response protocol that is widely used for querying databases that store
the registered users or assignees of an internet resource, such as a domain name, an IP address
block, or an autonomous system, but is also used for a wider range of other information.

13. What is OSI Model? What are the uses of Application Layer?
Ans. OSI (Open Systems Interconnection) is a reference model for how applications communicate
over a network.
OSI Model is:
i) logical models.
ii) define standards for networking.
iii)divide the network communication process in Seven layers.
In this architecture, each layer serves the layer above it and, in turn, is served by the layer below
it. So, in a given message between users, there will be a flow of data down through the layers in
the source computer, across the network, and then up through the layers in the receiving

A.K.Pandey,pythonforstudents.blogspot.com
computer. Only the application layer, at the top of the stack, doesn’t provide services to a
higher-level layer.
Application Layer
• Application Layer is the top most layer of OSI(Open System Interconnection) which is
responsible for generating and receiving data that can be transported on the network.
• Manipulation of data in various ways is done in this layer which enables a user to get access to
the network.
• Some services provided by this layer include e-mail, transferring files, directory services,
network resources etc.

14. Differentiate between HTTP and HTTPS?


Ans.
1. HTTP URL in your browser’s address bar is http:// and the HTTPS URL is https://.
2. HTTP is unsecured while HTTPS is secured.
3. HTTP sends data over port 80 while HTTPS uses port 443.
4. HTTP operates at application layer, while HTTPS operates at transport layer.
5. No SSL certificates are required for HTTP, with HTTPS it is required that you have an SSL
certificate.
6. HTTP doesn’t require domain validation, where as HTTPS requires at least domain validation and
certain certificates even require legal document validation.
7. No encryption in HTTP, with HTTPS the data is encrypted before sending.

15. What is the use of Session Control Protocol?


Ans. Session Control Protocol (SCP)
• Several heavily used Internet applications such as FTP, GOPHER, and HTTP use a protocol model
in which every transaction requires a separate TCP connection. Since clients normally issue
multiple requests to the same server, this model is quite inefficient, as it incurs all the
connection start up costs for every single request.
• SCP is a simple protocol which lets a server and client have multiple conversations over a single
TCP connection. The protocol is designed to be simple to implement, and is modelled after TCP.

16. What is the use of Secure Shell(SSH)?


Ans. Secure Shell (SSH)
• Secure Shell (SSH) is a cryptographic network protocol for operating network services securely
over an unsecured network. Typical applications include remote command-line, login, and
remote command execution, but any network service can be secured with SSH.
• SSH provides a secure channel over an unsecured network in a client–server architecture,
connecting an SSH client application with an SSH server. The protocol specification distinguishes
between two major versions, referred to as SSH-1 and SSH-2. The standard TCP port for SSH is
22. SSH is generally used to access Unix-like operating systems, but it can also be used
on Microsoft Windows. Windows 10 uses OpenSSH as its default SSH client.
• SSH was designed as a replacement for Telnet and
for unsecured remote shell protocols. The encryption used by SSH is intended to provide
confidentiality and integrity of data over an unsecured network, such as the Internet.

A.K.Pandey,pythonforstudents.blogspot.com
17. Differentiate between POP and IMAP?
Ans.
POP (Post Office Protocol )
• POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-
mail. POP3 is a client/server protocol in which e-mail is received and held for you by your
Internet server.
• POP3 is designed to delete mail on the server as soon as the user has downloaded it. However,
some implementations allow users or an administrator to specify that mail be saved for some
period of time. POP can be thought of as a "store-and-forward" service.
IMAP (Internet Message Access Protocol)
• MAP (Internet Message Access Protocol) is a standard email protocol that stores email messages
on a mail server, but allows the end user to view and manipulate the messages as though they
were stored locally on the end user's computing device(s). This allows users to organize
messages into folders, have multiple client applications know which messages have been read,
flag messages for urgency or follow-up and save draft messages on the server.
• IMAP can be contrasted with another client/server email protocol, Post Office Protocol 3 (POP3).
With POP3, mail is saved for the end user in a single mailbox on the server and moved to the end
user's device when the mail client opens. While POP3 can be thought of as a "store-and-forward"
service, IMAP can be thought of as a remote file server.
18. What are the uses of Near Field Communication (NFC)?
Ans. Near-field communication (NFC)
• Near-field communication (NFC) is a set of communication protocols that enable two electronic
devices, one of which is usually a portable device such as a smartphone, to
establish communication by bringing them within 4 cm (11⁄2 in) of each other.
• NFC devices are used in contactless payment systems, similar to those used in credit cards
and electronic ticket smart cards and allow mobile payment to replace or supplement these
systems. This is sometimes referred to as NFC/CTLS (contactless) or CTLS NFC.
• NFC is used for social networking, for sharing contacts, photos, videos or files.NFC-enabled
devices can act as electronic identity documents and keycards.
19. Expand the following
FTP-File Transfer Protocol
CSMA-carrier sense multiple access
GSM-Global System for Mobile communications
VoIP-Voice over Internet Protocol
SMTP-Simple Mail Transfer Protocol
SSL-Secure Sockets Layer
HTTPS-Hypertext Transfer Protocol Secure
OSI-Open Systems Interconnection
GPRS-General Packet Radio Service
LTE-Long Term Evolution
CDMA-Code Division Multiple Access
FDMA-Frequency Division Multiple Access
DNS-Domain Name System
WAP-Wireless Application Protocol
SaaS-Software as a service
PaaS-Platform as a Service
IaaS-Infrastructure as a service

A.K.Pandey,pythonforstudents.blogspot.com
20. “Bhartiya Connectivity Association” is planning to spread their offices in four major cities in India
to provide regional IT infrastructure support in the field of Education & Culture. The company
has planned to setup their head office in New Delhi in three locations and have named their
New Delhi offices as “Front Office”, and “Back Office” and “Work Office” located in other three
major cities of India. A rough layout of the same is as follows:

IN NEW DELHI
DI FRONT BACK
A WORK

WEST
EAST
SOUTH

Approximate distances between these offices as per network survey team are as follows:

Place From Place To Distance

Back Office Front office 10 KM

Back Office Work office 70 Meter

Back Office East office 1291 KM

Back Office West office 790 KM

Back Office South office 1952 KM

In continuation of the above, the company experts have planned to install the following number of
computers in each of their offices:

Back Office 100

Front Office 20

Work Office 50

East Office 50

West Office 50

South Office 50

A.K.Pandey,pythonforstudents.blogspot.com
(i) Suggest network type for connecting each of the following sets of their offices:
 Back Office and Work Office
 Back Office and South Office
(ii) Which device you will suggest to be produced by the company for connecting all the
computers within each of their offices out of the following devices?
a. Hub/Switch b. Modem c. Telephone
(iii) Which of the following communication medium, you will suggest to be produced by the
company for connecting their local offices in New Delhi for very effective and fast
communication.
a. Telephone cable b. Optical Fiber c. Ethernet Cable
(iv) Suggest the layout for connecting each office.
Answers:-

(i) MAN
WAN
(ii) Hub/Switch required connecting computers of their offices
(iii) Optical Fiber.
(iv) Cable Layout:

IN NEW DELHI
DI FRONT BACK
A WORK

WEST
EAST
SOUTH

21. The cyber mind organization has set up its new branch at Delhi for its office and web activities. It
has 4 blocks of buildings as shown in diagram:

Block A Block C

Block B Block D

Distance between various Blocks: Number of Computers

Block A to Block B ----- 40 mtr Block A ----- 25

Block B to Block C ----- 120 mtr Block B ----- 50

Block C to Block D ----- 60 mtr Block C ----- 125

Block A to Block D A.K.Pandey,pythonforstudents.blogspot.com


----- 170 mtr Block D ----- 10

Block B to Block D ----- 150 mtr

Block A to Block C ----- 70 mtr


(i) Suggest the most suitable place to house the server of this organization with a suitable
reason with justification.
(ii) Suggest a most suitable cable layout of connections between the Wing and topology.
(iii) Suggest the placement of the following device with justification:
Repeater  Hub/Switch
(iv) The organization is planning to link its head office situated in the city in hilly region where
cable connection is not feasible, suggest an economic way to connect it with reasonably high
speed.

Answer:-

(i) The most suitable place/block to house the server of this organization would be Block C, as
this block contains the maximum number of computers, thus decreasing the cabling cost for
most of the computers as well as increasing the efficiency of the maximum computers in the
network.

(ii) a) Bus Topology Block A Block C

Total length of cable required:

40 + 70 + 60 = 170 mtrs
Block B Block D

(iii) In Bus Topology only a Repeater required between Block A & Block C because the distance is
large.
In Star Topology Repeater required between Block A & Block C and that between Block B &
Block C
A Hub/Switch required interconnecting the different computers in each block.

(iv) The most economical way to connect it with a reasonable high speed would be use radio
wave transmission, as they are easy to install, can travel long distances, and penetrate buildings
easily, so they are widely used for communication, both indoors and outdoors. Radio waves also
have the advantage to being omnidirectional.

A.K.Pandey,pythonforstudents.blogspot.com
Unit-3(Data Management/RDBMS & MYSQL) 15 Marks
1. Explain Following: Attribute, Schema, Tuple, Degree and Cardinality.

Ans.
• Attribute: Attributes are the properties that define a relation. e.g.; ROLL_NO, NAME
• Relation Schema: A relation schema represents name of the relation with its attributes. e.g.;
STUDENT (ROLL_NO, NAME, ADDRESS, PHONE and AGE) is relation schema for STUDENT. If a
schema has more than 1 relation, it is called Relational Schema.
• Tuple: Each row in the relation is known as tuple/record/row.
• Degree: The number of attributes in the relation is known as degree of the relation.
• Cardinality: The number of tuples in a relation is known as cardinality.

2. Explain: Primary, Candidate, Alternate and Foreign Key.


Ans.
Primary key: It is an attribute or set of attributes which can uniquely identify a tuple.
Candidate Key - An attribute or set of attributes which possess the quality to become Primary .
Alternate Key: It is a candidate key which is not selected as Primary Key.
Foreign Key: A foreign key is an attribute value in a table that acts as the primary key in another
table. Hence, the foreign key is useful in linking together two tables.

3. Which command is used to create new database?


Ans. create databse<database_name>

4. Which command is used to view all tables in a database?


Ans. show tables.

5. What are the commands in DDL and DML?


Ans.
DDL
DDL is short name of Data Definition Language, which deals with database schemas and
descriptions, of how the data should reside in the database.
• CREATE - to create a database and its objects like (table, index, views, store procedure, function,
and triggers)
• ALTER - alters the structure of the existing database
• DROP - delete objects from the database
• RENAME - rename an object
DML
DML is short name of Data Manipulation Language which deals with data manipulation and includes
most common SQL statements such SELECT, INSERT, UPDATE, DELETE, etc., and it is used to store,
modify, retrieve, delete and update data in a database.
• SELECT - retrieve data from a database
• INSERT - insert data into a table
• UPDATE - updates existing data within a table
• DELETE - Delete all records from a database table

A.K.Pandey,pythonforstudents.blogspot.com
6. What are the constraints used while creating a new table?
Ans. Constraints are the rules that we can apply on the type of data in a table. That is, we can
specify the limit on the type of data that can be stored in a particular column in a table using
constraints.
The available constraints in SQL are:
• NOT NULL: This constraint tells that we cannot store a null value in a column. That is, if a column
is specified as NOT NULL then we will not be able to store null in this particular column any
more.
• UNIQUE: This constraint when specified with a column, tells that all the values in the column
must be unique. That is, the values in any row of a column must not be repeated.
• PRIMARY KEY: A primary key is a field which can uniquely identify each row in a table. And this
constraint is used to specify a field in a table as primary key.
• FOREIGN KEY: A Foreign key is a field which can uniquely identify each row in a another table.
And this constraint is used to specify a field as Foreign key.
• CHECK: This constraint helps to validate the values of a column to meet a particular condition.
That is, it helps to ensure that the value stored in a column meets a specific condition.
• DEFAULT: This constraint specifies a default value for the column when no value is specified by
the user.

7. Which command is used to delete table and database?


Ans. drop<table_name>, drop<Database_name>

8. How to add new field in a table?


Ans. alter table<table_name> add<new-fieldname>

9. Which command is used to modify the field of a table?


Ans. alter table<table_name> modify<fieldname>

10. Which command is used to delete a field of a table?


Ans. Ans. alter table<table_name> drop<fieldname>

11. Write a command to insert a new record in a table:STUDENT with fields(RNO(int),


NAME(varchar), MARKS(int)).
Ans. insert into STUDENT values(11,’abcd’,23)

12. What will be the output when following command will be executed?
SELECT * FROM Student WHERE ROLL_NO BETWEEN 1 AND 10;
Ans. It will print the details of students having roll no. from 1 to 10(1 and 10 are inclusive).

13.

A.K.Pandey,pythonforstudents.blogspot.com
Based on the table given above what will be the output of following commands:
i. SELECT SupplierID, Name, Address FROM Suppliers WHERE Name LIKE 'Ca%';
ii. SELECT * FROM Suppliers WHERE Address LIKE '%Okhla%';
iii. SELECT SupplierID, Name, Address FROM Suppliers WHERE Name LIKE '_ango%';

Ans.
i. Output:
S3 Canadian Biz 6/7, Okhla Phase II,Delhi
S4 Caravan Traders 2-A, Pitampura, Delhi
ii. Output:
S1 Paragon Suppliers 21-3, Okhla, Delhi
S3 Canadian Biz 6/7, Okhla Phase II, Delhi
iii. Output:
S2 Mango Nation 21, Faridabad, Haryana

14. What will be the output when following command will be executed?
SELECT * FROM Student WHERE ROLL_NO IN (1,4);

Ans. It will print details of students whose roll no is either 1 or 4 in student table.

15. What will be the output when following command will be executed?
UPDATE Student SET NAME = 'PRATIK' WHERE Age = 20;

Ans. It will change the name to PRATIK of students having age=20 in student table.

A.K.Pandey,pythonforstudents.blogspot.com
16. Write command to delete all records from a table: EMPLOYEE.

Ans. delete * from EMPLOYEE;

17. What are common Aggregate functions of SQL?

Ans. Various Aggregate Functions

1) Count() 2) Sum() 3) Avg() 4) Min() 5) Max()

18. Consider the table given and answer the questions follows:
TABLE : PRODUCT

P_ID ProductName Manufacturer Price


TP01 Talcom Powder LAK 40
FW05 Face Wash ABC 45
BS01 Bath Soap ABC 55
SH06 Shampoo XYZ 120
FW12 Face Wash XYZ 95
PP01 Hand Wash NULL 95

i. To increase the Price of all Products by 10.


update PRODUCT set price=price+10;
ii. To display average price of product sorted on the basis of Manufacturer.
select Manufacturer, avg(price) from PRODUCT group by Manufacturer;
iii. To display minimum and maximum Price of product Manufacturer wise.
select manufacturer, min(price), max(price) from PRODUCT group by
Manufacturer;
iv. To display details of product having name ends with ‘h’.
select manufacturer, min(price), max(price) from PRODUCT group by
Manufacturer;
v. To display product name and price of product having P_ID either BS01 or FW12.
select manufacturer, min(price), max(price) from PRODUCT group by
Manufacturer;
vi. To display manufacturer wise sum of Price in descending order of Price.
select Manufacturer, sum(Price) from PRODUCT group by manufacturer order
by sum(price) desc;
vii. To count unique Manufacturer.
Select count(distinct Manufacturer) from PRODUCT;
viii. To print average Price of product from manufacturer either ‘ABC’ or ‘XYZ’.
select avg(price) from PRODUCT where Manufacturer in (‘ABC’,’XYZ’);

A.K.Pandey,pythonforstudents.blogspot.com
ix. To delete record of ‘Shampoo’.
delete from PRODUCT where ProductName=’Shampoo’;
x. To decrease the price of product by 20 of manufacturer ‘XYZ’.
update PRODUCT set Price=Price-20 where Manufacturer=’XYZ’;
xi. To print P_ID, ProductName, price and price of 12 items as BunchPrice.
select P_ID, ProductName,Price, Price*12 as BunchPrice from PRODUCT;
xii. To print details of product with null manufacturer.
select * from PRODUCT where Manufacturer is null;
xiii. To print manufacturer wise price when total price is greater than 100;
Select manufacturer, sum(price) from PRODUCT group by Manufacturer having
sum(price)>100;

19. Differentiate between GET() and POST() method.

Ans. GET Method


1. Data sent by Get Method can be seen in url, so get method should not be used while dealing with
sensitive information
2. As parameters are part of url so parameters remain there in browser history.
3.Get requests can be bookmarked, can be cached.
4.Get requests have length restrictions
5.Get requests should be used for queries which don’t affect anything on server.
POST Method
1.Parameters can’t be seen in url, so recommended to use POST method dealing with sensitive
information
2.Parameters are not saved in the browser history
3.Cannot be bookmarked
4.POST request can send max 8Mb Data
5.POST requests are suitable for queries where response page changes over a time.

20. Write SQL commands for (b) to (e) and write the outputs for (f) and the basis of table
GRADUATE.
SNo NAME STIPEND SUBJECT AVERAGE DIV
1 KARAN 400 PHYSICS 68 1
2 MANOJ 450 COMPUTER SC 68 1
3 ARUN 300 CHEMISTRY 62 2
4 SABINA 350 PHYSICS 63 1
5 JOHN 500 MATHEMATICS 70 1
6 ROBERT 400 CHEMISTRY 55 2
7 RUBINA 250 PHYSICS 64 1
8 VIKAS 450 MATHEMATICS 68 1
9 VARUN 500 COMPUTER SC 62 1
10 VIKAS 300 MATHEMATICS 57 2

A.K.Pandey,pythonforstudents.blogspot.com
(a) List the names of those students who have obtained division 1 stored by NAME
(b) Display a report listing NAME, SUBJECT, STIPEND and amount of stipend eceived in a
year assuming that STIPEND is paid every month.
(c) To count the number of students who are either PHYSICS or COMPUTERSC raduates.
(d) To insert a new row in the GRADUATE table :
11, “Kajol”,300, “COMPUTER SC”,75,1.
(e) Give the output of the following SQL statement
(i) Select MIN(AVERAGE) from GRADUATE where SUBJECT=”PHYSICS”;
(ii) Select SUM (STIPEND) from GRADUATE where DIV=2
(iii) Select AVG (STIPEND) from GRADUATE where AVERAGE>=65
(iv) Select COUNT (distinct SUBJECT) from GRADUATE:
Ans. (a) Select name from graduate
where div = 1
order by name ;
(b) Select name , stipend , subject , stipend * 12
from graduate;
(c) Select count (*)
from graduate
where subject in (“physics”,”computer sc”);
(d) Insert into graduate
values (11,”kajol”, 300, “computer sc”, 75,1);
(e) (i) 63 (ii) 000 (iii) 450 (iv) 4

21. Write SQL commands for (a) to (d) and write the outputs for (f) on the basis of table CLUB.
COACH-ID COACH NAME AGE SPORTS DATEOFAPP PAY SEX
1 KUKREJA 35 SQUASH 27/3/96 1000 M
2 RAVINA 34 KARATE 20/1/98 1200 F
3 KARAN 34 SQUASH 19/2/98 1200 M
4 TARUN 33 SWIMMING 1/1/98 1500 M
5 ZUBIN 36 BASKETBALL 12/1/98 750 M
6 KETAKI 36 BASKETBALL 24/2/98 800 F
7 ANKITA 39 SWIMMING 20/2/98 2200 F
8 ZAREEN 37 SQUASH 22/2/98 1100 F
9 KUSH 41 KARATE 13/1/98 900 M
10 SHALIYA 37 KARATE 19/2/98 1700 M
(a) To show all information about the swimming coaches in the club.
(b) To list the names of all coaches with their date of appointment (DATOFAPP) in descending
order.
(c) To display a report showing coach name pay age and bonus (15% of pay) for all the coaches.
(d) To insert a new row in the CLUB table with the following data.
11, “PRAKASH”, 37, “SQUASH”, {25/02/98},2500, “M”.
(e) Give the output of the following SQL statements.
(i) Select COUNT (distinct SPORTS) from CLUB:
(ii) Select MIN (AGE) from CLUB where SEX = “F”.
(iii) Select AVG (PAY) from CLUB where SPORTS = “KARATE”
(iv) Select SUM (PAY) from CLUB where DATOFAPP>{31/01/98}.
Ans. (a) Select coachname

A.K.Pandey,pythonforstudents.blogspot.com
from club
where soprts=”SWIMMING”;
(b) Select coachname
from club
order by DATEOFAPP;
(c) select coachname,pay,age,0.15*pay
from club;
(d) insert into club values
(11,”PRAKASH”,37,”SQUASH”,{25/02/98},2500,”M”);
(e) (i) 4 (ii) 34 (iii) 1100 (iv) 7800

22. Consider the following tables GAMES and PLAYER. Write SQL commands for the statements (i)
to (iv) and give outputs for SQL queries (v) to (viii)

GAMES
GCode GameName Number PrizeMoney Date
101 CaromBoard 2 5000 23-jan-2004
102 Badminton 2 12000 12-dec-2003
103 TableTennis 4 8000 14-feb-2004
104 Chess 2 9000 01-jan-2004
105 LawnTennis 4 25000 19-mar-2004

PLAYER
PCode Name GCode
1 Arjun 101
2 Ravi 105
3 Jignesh 101
4 Nihir 103
5 Sohil 104

I. To display the name of players who plays CaromBoard.


II. To display details of those game which are having PrizeMoney more than 8000.
III. To display the details of those games whose name starts from character ‘B’.
IV. To display the details of those games which start after 01-jan -2004.
V. Select COUNT(DISTINCT number) from games;
VI. Select MAX(date) , MIN(date) from games;
VII. Select AVG(PrizeMoney) from games Group by Number Having count(GCode) > 2;
VIII. Select GameName from games Where date BETWEEN ’10-Jan-2004’ AND ’20-Feb-2004’;
Ans
(I) Select name from player, games
where gamename=’CaromBoard’ and player.Gcode=Games.Gcode;
(II) Select GameName from games where PrizeMoney>8000;
(III) Select GameName from games where GameName like ‘B%’;
(IV) Select * from Games where date >’ 01-jan -2004’;
(V) 2
4
(VI) MaX Date Min Date

A.K.Pandey,pythonforstudents.blogspot.com
19-mar-2004 12-dec-2003
(VII) 16500
(VIII) CaromBoard

23. Consider the following tables Books and Issued. Write SQL commands for the statements
(i) to (iv) and give outputs for SQL queries (v) to (viii)

Table: Books
BookId BookName AuthorName Publishers Price Type Qty
C0001 Fast Cook Lata Kapoor EPB 355 Cookery 5
F0001 The Tears William First Publ 650 Fiction 20
T0001 My First C++ Brain& Brooke EPB 350 Text 10
T0002 C++ Brainworks A.W. Rossaine TDH 350 Text 15
F0002 Thunderbolts Anna Roberts First Publ 750 Fiction 50

Table: Issued
BookId QuantityIssued
T0001 4
C0001 5
F0001 2

(i) To show Book Name, Author Name and Price of books of First Publ Publishers
(ii) To list the names from books of Text type
(iii) To display the names and price from books in ascending order of their price.
(iv) To increase the price of all books of EPB publishers by 50
(v) To display the BookId, BookName and QuantityIssued for all books which have been issued
(vi) To insert a new row in the table Issued having the following data : “F0003” , 1
(vii) Give the output of the following queries based on the above tables:
(a) Select Count(*) from Books;
(b) Select Max(Price) from Books where Quantity >= 15;
(c) Select BookName, AuthorName from Books where Publisher =”EPB”;
(d) Select Count (Distinct Publishers) from Books where Price>=400;
Ans.
(i) Select BookName, AuthorName, Price from Books where Publishers= ‘First Publ’;
(ii) Select BookName from Books where Type=’text’;
(iii) Select name, price from books order by price;
(iv) Update set price = price + 50 where publisher= ‘EPB’;
(v) Select BookId, BookName, QuantityIssued from Books, Issued
where Books.BookId =Issued.BookId;
(vi) Insert into Issued values ( ‘F0003’,1);
(a) 5
(b) 750
(c) Fast Cook Lata Kapoor
My First C++ Brain & Brooke
(d) 2

A.K.Pandey,pythonforstudents.blogspot.com
Unit-4(SOCIETY LAW & ETHICS) 10 Marks
1. What are common ethical issues regarding Technology?

Ans. Common ethical issues are:

i. Intellectual Property Rights- Intellectual property rights are the legal rights that cover the
privileges given to individuals who are the owners and inventors of a work, and have created
something with their intellectual creativity. Individuals related to areas such as literature, music,
invention, etc., can be granted such rights, which can then be used in the business practices by
them.

ii. Plagiarism- Plagiarism is the "wrongful appropriation" and "stealing and publication" of
another author's "language, thoughts, ideas, or expressions" and the representation of them as
one's own original work.

iii. Digital Property Rights- Digital Rights Management refers to a collection of systems used to
protect the copyrights of electronic media. Digital property include digital music and movies, as
well as other data that is stored and transferred digitally.

2. How Digital Rights Management protect (protective measure) the copyrights of electronic
media?

Ans. As there are multiple types of threats to digital properties, there are many ways you can
ensure protection of your digital properties.
Protective Measures:
 Anti-Temper Solutions: There are many anti-temper solutions available today which ensure that
your digital property is temper-proof. These anti-temper solutions use a host of advanced
technilogies to prevent hackers from hacking, or manipulationg your digital properties.
 Legal Clauses: Add legal clause in the clauses of use of your software/digital properties such as “
Terms of services”.
 Limit the sharing of software code: You should share your software code only with trusted
individuals who are part of development team. You should use DRM(Digital Right Management)
solution to protect your software from being scraped for source code .
3. Explain the features of GNU General Public License?
Ans. The GNU General Public License (GNU GPL or GPL) is a widely-used free software license,
which guarantees end users the freedom to run, study, share and modify the software.[
This means with GPL, a user can:

Copy the software

Distribute the software however you want

Charge a fee to distribute the software

Make whatever modifications to the software you want.

A.K.Pandey,pythonforstudents.blogspot.com
4. Explain the features of Apache License?
Ans. The Apache License is a permissive free software license written by the Apache Software
Foundation (ASF).It allows users to use the software for any purpose, to distribute it, to modify it,
and to distribute modified versions of the software under the terms of the license, without concern
for royalties.
The Apache License offers:
• Rights are perpetual(Once granted, can continue to use forever)
• Rights are worldwide
• Rights are granted for no fee or royalty
• Rights are non-exclusive(You are not the sole licensee)
• Rights are irrevocable(No one take rights away one granted)

5. What are the features of Open Source Software?


Ans.
1) In general, open source refers to any program whose source code is made available for use or
modification as users or other developers see fit. Open source software is usually developed as a
public collaboration and made freely available.
2) Open Source is a certification mark owned by the Open Source Initiative (OSI). Developers of
software that is intended to be freely shared and possibly improved and redistributed by others can
use the Open Source trademark if their distribution terms conform to the OSI's Open Source
Definition.
To summarize, the Definition model of distribution terms require that:
• The software being distributed must be redistributed to anyone else without any restriction.
• The source code must be made available (so that the receiving party will be able to improve or
modify it).
• The license can require improved versions of the software to carry a different name or version
from the original software.
6. What is open data? Give some examples of open data?
Ans. Open data is the idea that some data should be freely available to everyone to use and
republish as they wish, without restrictions from copyright, patents or other mechanisms of control.
• Open data is data that anyone can access, use or share. The only requirement - at most - is that
those who use and share the data attribute it to its source.
• Open data is often focused on material related to science, medicine, maps, chemical
compounds and other data that may contribute to the common good.
• There are 3 important principles behind this definition of open, which are why Open Data is so
powerful:
i. Availability and Access: that people can get the data
ii. Re-use and Redistribution: that people can reuse and share the data
iii. Universal Participation: that anyone can use the data
7. What is Data Privacy or Information Privacy?
Ans. Data privacy, also called information privacy, is the aspect of information technology (IT) that
deals with the ability an organization or individual has to determine what data in a computer system
can be shared with third parties.
• As more of our data becomes digitized, and we share more information online, data privacy is
taking on greater importance.

A.K.Pandey,pythonforstudents.blogspot.com
• When data that should be kept private gets in the wrong hands, bad things can happen. A data
breach at a government agency can, for example, put top secret information in the hands of an
enemy state. A breach at a corporation can put proprietary data in the hands of a competitor.
8. What are the common steps to protect your personal data?
Ans. At home, use a mail slot or locking mailbox, so that thieves can’t steal your mail.
• Before discarding, shred documents, including receipts and bank and credit card statements,
that contain personal information.
• Make sure to secure your home Wi-Fi network and other devices so that criminals can’t
“eavesdrop” on your online activity.
• Don’t automatically provide your Personal Information just because someone asks for it.
Determine if they really need it and, if so, ask how they’ll help protect it.
• Use strong, unique passwords for all of your online accounts.
9. What is Privacy Law? How it is Useful to maintain Privacy of individual and
organization?
Ans. Regulation that protects a person's right to be left alone, and governs collection, storage, and
release of his or her financial, medical, and other personal information.
• Over 2.5 quintillion bytes of data are created each day. Much of this data consists of information
that would allow people to be personally and individually identified (or, personal information).
• There are currently over 2 billion active Facebook users. Every minute, approximately half a
million snapchat users share photos while Instagram adds another 50,000 photos to that total.
There are half a million tweets sent every minute. The amount of personal information that is
being exchanged each day is staggering and growing.
• Privacy laws are considered within the context of an individual's privacy rights or within
reasonable expectation of privacy.
Privacy laws can be broadly classified into:
• General privacy laws that have an overall bearing on the personal information of individuals and
affect the policies that govern many different areas of information.
• Specific privacy laws that are designed to regulate specific types of information. Some examples
include:
• Communication privacy laws
• Financial privacy laws
• Health privacy laws
• Information privacy laws
• Online privacy laws
• Privacy in one's home
10. What are the important Points of Privacy Law of India?
Ans. The Right to Privacy is a fundamental right and an intrinsic part of Article 21 that protects life
and liberty of the citizens and as a part of the freedoms guaranteed by Part III of the Constitution.
• In June 2011, India passed subordinate legislation that included various new rules that apply to
companies and consumers. A key aspect of the new rules required that any organization that
processes personal information must obtain written consent from the data subjects before
undertaking certain activities. However, application and enforcement of the rules is still
uncertain
• On 24 August 2017, a nine-judge bench of the Supreme Court unanimously held that the right to
privacy is an intrinsic part of right to life and personal liberty under Article 21 of the
Constitution.

A.K.Pandey,pythonforstudents.blogspot.com
Previously, the Information Technology (Amendment) Act, 2008 made changes to the Information
Technology Act, 2000 and added the following two sections relating to Privacy:
i. Section 43A, which deals with implementation of reasonable security practices for sensitive
personal data or information and provides for the compensation of the person affected by wrongful
loss or wrongful gain.
ii. Section 72A, which provides for imprisonment for a period up to three years and/or a fine up to
Rs. 500,000 for a person who causes wrongful loss or wrongful gain by disclosing personal
information of another person while providing services under the terms of lawful contract.
• A constitutional bench of the Supreme Court declared 'Privacy' as a fundamental right on 24
August 2017.
11. What types of Crimes are categorized under Cyber Crime?
Ans. Cybercrime, or computer-oriented crime, is a crime that involves a computer and a network.
The computer may have been used in the commission of a crime, or it may be the target.
• Cybercrimes can be defined as: "Offences that are committed against individuals or groups of
individuals with a criminal motive to intentionally harm the reputation of the victim or cause
physical or mental harm, or loss, to the victim directly or indirectly, using modern
telecommunication networks such as Internet (networks including chat rooms, emails, notice
boards and groups) and mobile phones (Bluetooth/SMS/MMS)".
• In 2018, a study by Center for Strategic and International Studies (CSIS), in partnership
with McAfee, concludes that close to $600 billion, nearly one percent of global GDP, is lost to
cybercrime each year.
12. What are the common features of Phishing e-mails?
Ans. Too Good To Be True - Lucrative offers and eye-catching or attention-grabbing statements are
designed to attract people’s attention immediately. For instance, many claim that you have won an
iPhone, a lottery, or some other lavish prize. Just don't click on any suspicious emails. Remember
that if it seems to good to be true, it probably is!
• Sense of Urgency - A favorite tactic amongst cybercriminals is to ask you to act fast because the
super deals are only for a limited time. Some of them will even tell you that you have only a few
minutes to respond. When you come across these kinds of emails, it's best to just ignore them.
Sometimes, they will tell you that your account will be suspended unless you update your
personal details immediately. Most reliable organizations give ample time before they terminate
an account and they never ask patrons to update personal details over the Internet. When in
doubt, visit the source directly rather than clicking a link in an email.
• Hyperlinks - A link may not be all it appears to be. Hovering over a link shows you the actual
URL where you will be directed upon clicking on it. It could be completely different or it could be
a popular website with a misspelling, for instance www.bankofarnerica.com - the 'm' is actually
an 'r' and an 'n', so look carefully.
• Attachments - If you see an attachment in an email you weren't expecting or that doesn't make
sense, don't open it! They often contain payloads like ransom ware or other viruses. The only
file type that is always safe to click on is a .txt file.
• Unusual Sender - Whether it looks like it's from someone you don't know or someone you do
know, if anything seems out of the ordinary, unexpected, out of character or just suspicious in
general don't click on it!
13. What steps should be taken to prevent Phishing attack?
Ans. To protect against spam mails, spam filters can be used. Occasionally, spam filters may even
block emails from legitimate sources, so it isn’t always 100% accurate.

A.K.Pandey,pythonforstudents.blogspot.com
• The browser settings should be changed to prevent fraudulent websites from opening. Browsers
keep a list of fake websites and when you try to access the website, the address is blocked or an
alert message is shown.
• Many websites require users to enter login information while the user image is displayed. This
type of system may be open to security attacks. One way to ensure security is to change
passwords on a regular basis, and never use the same password for multiple accounts. It’s also a
good idea for websites to use a CAPTCHA system for added security.
• Banks and financial organizations use monitoring systems to prevent phishing. Individuals can
report phishing to industry groups where legal actions can be taken against these fraudulent
websites. Changes in browsing habits are required to prevent phishing. If verification is required,
always contact the company personally before entering any details online.
• If there is a link in an email, hover over the URL first. Secure websites with a valid Secure Socket
Layer (SSL) certificate begin with “https”. Eventually all sites will be required to have a valid SSL.
14. What are the dangers of illegal downloading?
Ans.
• It’s against the law: Illegal downloads have an adverse effect on revenue to the music and
movie industry, consequently the entertainment industry takes illegal downloading seriously
and monitors the web for signs of illegal downloading. If your child gets caught, you are
responsible.
• Dodgy downloads: If you downloads from an illegal website there’s a chance they will
inadvertently download viruses, Trojan malware and worms. These can cause varying
degrees of damage, from slowing down your machine to wiping data, crashing your device
and encrypting your files and demanding money to repair it.
15. What is child Pornography? What are the laws in India to protect child Pornography?
Ans. Child pornography is a form of pornography showing children which is against the law in many
countries. Child pornography is most often made by taking pictures or video.
• Child pornography is publishing and transmitting obscene material of children in electronic
form. In recent years child pornography has increased due to the easy access of the internet, &
easily available videos on the internet.
• Child pornography is the most heinous crime which occurs and has led to various other crimes
such as sex tourism, sexual abuse of the child etc.
CHILD PORNOGRAPHY IN INDIA
• Child pornography is a crime in India. Information Technology Act, 2000 & Indian Penal Code,
1860 provides protection from child pornography. Child is the person who is below the age of 18
years.
• 12 In February 2009, the Parliament of India passed the Information Technology Bill which made
creation and transmission of child pornography illegal. The newly passed Information
Technology Bill is set to make it illegal to not only create and transmit child pornography in
any electronic form, but even to browse it. The punishment for a first offence of publishing,
creating, exchanging, downloading or browsing any electronic depiction of children in “obscene
or indecent or sexually explicit manner” can attract five years in jail and a fine of Rs 10 lakh.
• Section 67B proposes specifically to punish involvement in sexually explicit online or electronic
content that depicts children. It will also be an offence to “cultivate, entice or induce children to
online relationship with other children for a sexual act.”
• Punishment for first conviction with imprisonment which may extend to 3 years & fine which
may extend to 5 lakhs rupees. And for subsequent offence imprisonment which may extend to 5
years & fine which may extend to 10 lakhs rupees.

A.K.Pandey,pythonforstudents.blogspot.com
16. How cyber-forensic plays a crucial role in the investigation of cyber offenses and
online frauds?
Ans. Cyber Forensics, also known as computer forensics, plays a crucial role in the investigation of
cyber offenses and online frauds. It involves the extraction and analysis of digital evidence such as
an electronic document, computer, laptop, and storage mediums such as USB drives, hard disks etc.
• Cyber Forensics is one of the branches of Digital Forensics that deals with the extraction,
preservation, and inspection of any such device that has a storage memory and basic computing
power.
• Cyber Forensics experts are proficient in the extraction of existing or deleted information from a
storage or computing device for conducting investigations.
17. Write a short note on Information Technology Act, 2000?
Ans. The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of
the Indian Parliament notified on 17 October 2000. It is the primary law India dealing
with cybercrime and electronic commerce.
• The original Act contained 94 sections, divided into 13 chapters and 4 schedules. The laws apply
to the whole of India. Persons of other nationalities can also be indicted under the law, if the
crime involves a computer or network located in India.
• The Act provides a legal framework for electronic governance by giving recognition to electronic
records and digital signatures. It also defines cyber crimes and prescribes penalties for them.
18. What are societal issues and cultural changes induced by technology/Computers?
Ans. Social change
Alterations in the norms, cultural values, and behavioural patterns after some time
Social Issues Computers Have Created
1. Communication Breakdown
2. Defamation of Character
3. Identity Theft
4. Cyber Bullying
5. Gaming Addiction
6. Privacy
7. Health & Fitness
8. Education-Only copy paste
9. Terrorism & Crime
10. Sexuality
• Technology
Application of scientific knowhow to manufacture items that deal with given situations or problems
• Relationship between technology and social change
(i) Technological improvements increases information and knowledge
(ii) Technological improvements leads to better technology
(iii) Sociologists consider adaptation of societies to technological advancements
19. What are negative impact of Internet on Society?
Ans. The negative impact of the internet on society
• Everyone wants to get out of the internet to able to spend some time with families, friends, and
relatives with their moments. But most people are addicted to the internet. And it’s losing the
connection and bond of having a family, friends, and relatives.
• The Internet is transforming social transactions through the use of the internet. Best wishes,
happy birthday wishes or happy marriage anniversary to gift cards such things are now sent by
the using internet and this is nothing more than artificial care.

A.K.Pandey,pythonforstudents.blogspot.com
• The Internet is also helping the politicians to infect society by dividing the unity of people by
producing communalism and casteism material on the internet.
• There are so many inappropriate materials on social media sites and the internet. Such material
I don’t think will be good for children, teenagers. There are so many hacking information and
data on the internet. Even children are hacking the websites today.
20. What is e-waste? What is the procedure to dispose e-waste?
Ans. E-Waste(Electronic waste): It may be defined as discarded computers, office electronic
equipment, entertainment device electronics, mobile phones, TV and refrigerators etc.
E-waste Disposal Process
• E-waste management involves proper recycling and recovery of the disposed material. The
recycle and recovery includes the following unit operations:
1. Dismantling: Removal of parts cpntaining dangerous substances(CFCs, switches, PCB); removal
of easily accessible parts containing valuable substances(cable containing copper, steel, iron,
precious metals containing parts).
2. Segregation of ferrous metal, non-ferrous metal and plastic: This separation is normally done in
a shredder process.
3. Refurbishment and reuse: Refurbishment and reuse of e-waste has potential for those used in
electrical and electronic equipments which can be easily refurbished to put to its original use.
4. Recycling/recovery of valuable materials: Ferrous metals in electrical arc furnaces, non-ferrous
metals in smelting plants, precious metals in separating works.
5. 5. Treatment/disposal of dangerous materials and waste: Chlorofluora-carbons(CFCs) are
treated thermally, Printed cCircuit Board(PCB) disposed of in underground storages,
Mercury(Hg) is recycled or disposed off underground.
21. What are the composition of e-waste?
Ans. Composition of e-waste: Electrical and electronic equipment contains metallic and non metallic
elements, alloys and compounds such as Copper, Aluminum, Gold, Silver, Palladium, Platinum,
Nickel, Tin, Lead, Iron, Sulphur, Phosphorous, Arsenic etc.
22. What is Identity Theft? How you can protect you against Identity Theft?
Ans. It occurs when someone uses another person’s personal information such as name, Adhaar
number, credit card number, or other identifying information to take on persons’ identity in order to
commit fraud or other crime.Stealing an identity is, unfortunately, surprisingly easy to do and
happens mostly to unsuspecting victims.Online identity theft is the theft of personal information in
order to commit fraud.
Protection Against Identity Theft
You can protect you against Identity Theft by following the steps given below:
1. Protect Personal Information: You should ensure that all your identification and financial
documents are kept in a safe and private place. Before sharing your personal information make
sure the safe use of it.
2. Use Unique Ids to protect your devices and accounts: To access your online accounts and digital
devices, make sure to make them unique by following, following steps:
a. Avoid names, address and DOB for login details
b. Make password hard to guess.
c. Use lower and uppercase letters both, number and special symbols.
d. Do not use same password for multiple accounts.
3. Use biometric protection: Biometrics are any metrics related to human physical features such as
voice, hands, fingerprints, earlobes, retina, iris, DNA etc.

A.K.Pandey,pythonforstudents.blogspot.com
Modern age computing devices like smart phones provide biometric protection such as finger
print login or face detection technology.
But as with other technology, biometric information can also be misused. Thus, you should
always make sure to:
a. Not to over use it
b. Use it only at places you are fully confident of and not at any unreliable place.
23. What are Gender Issue While Teaching/Using Computers?
Ans. While teaching computers, there are many gender specific issues that must be addressed to
enforce gender equality in computer science education.
Gender Issue: The trend that more boys opt for Computer Science than girls has been continuing
for years now. So under representation of girls is one major issue. There are some other issues as
well, lets discuss gender issue at school-level Computer Science education.
A. Under representation: A leading engineering institution of India has reported that there has
been about 17% of girls represented in Computer Science engineering recent years. There are
many factors as:
1. Preconceived Notions: There are preconceived notions prevalent that subconsciously play a
role. Notions like” boys are better at technical things, girls are good at humanities, arts, etc. girls
must take up career keeping in mind that they have to rise family. They must not take up high
involvement careers and Teaching is the best option for girls as it gives you half day off and
ample of holidays” have their impact in decision making of girls while taking up subjects.
Also in India parents play an important role while about subjects and parents directly/indirectly
push these pre-conceived notion influencing girl’s decision and girls end up taking other subjects
than Computer Science.
2. Lack of Interest: During primitive years, children often play games on computers/smart
phones. Most games available today are boys-centric that increases their interest in computers.
Also at home boys get to play more on computers/smart phones and develop more interest in
computers than girls.
3. Lack of Motivation : Girls are pressurised to choose career option which will give them ‘work
life balance’in favour of family roles they have to play later on.
4. Lack of Role Models: Girls these days see less of role models in the field of ‘Computer
Science’ whom they can imitate. TV, movies, advertisement, every where it is potrayed that is
technical fielss like Computer Science are men’s field. All these things influence girls sub-
psychologically and they infer that CS is for boys and do not take subject.
5. Lack of encouragement in class: As there are lesser number of girls in class, the teachers for
most work-assignments end up choosing more boys. Also less number of girls means, lesser
peer-encouragement. Also some teachers pin point on their roles in society such ‘girls will get
married and may not take it up as career’. All this may play as Hindrance and girls do not
develop as much interest as they can in ‘Computer Science’.
B. Not Girl-Friendly Work Culture
It has been observed that when, in schools, work-partners are chosen, boys prefer boys over
girls. And even if a girl and a boy are made work-partners, boys prefer to work effectively and
make girls silent observers. Boys are not comfortable in situations where they are not playing
active roles.
Even if girls are given separate computers to work on, they are very shy of working actively. As
per a study, the problems mentioned by girls in a computer room are like: ’insufficient access
time’, ‘insufficient peripherals available’ etc. contrary to problems mentioned by boys such as
‘software not usable’, ‘limitation of software’, ‘poor quality of help ’etc.

A.K.Pandey,pythonforstudents.blogspot.com
23. What are the solutions to Gender Issue While Teaching/Using Computers?
Ans.
i. There should be more initiative and programmes that encourage girls to take up
Computer Science subject. Presently there are many initiative supported by government
and run by many tech giants to encourage more girls to take up ‘Computer Science’
subject.
ii. The film and TV censor board should ensure fair representation of female role models in
TV, cinema etc. so that more girls to take up ‘Computer Science’ subject.
iii. In the practical room, girls should be encouraged more to work on their own and also to
find solutions of their routine problems such as ‘peripheral not available’. They should
assertively speak to the lab attendant to get all the peripheral devices they want. They
should be encouraged to celebrate small success in the lab (such as an error is removed
from program) to big success (such as project working superbly)

24. What are Disability Issues While Teaching and Using Computers?
Ans. Increased focus on inclusive education and promoting access for students with disabilities and
impairments, in the field of technology and computer science have made today’s classroom really
diverse and inclusive.
In the specially-abled students, there can be one or more disabilities:
i. Locomotors disabilities: Polio, Leprosy, Cerebral palsy
ii. Hearing and speech disabilities: Hearing impairment, speech aphasia
iii. Cognitive impairment: Special learning deficits (Dyslexia, Dyscalculia), Down’s syndrome,
Autism.
iv. Vision impairment: Low vision, blindness
Various disability issues faced in the teaching/using computer with regard to above disabilities are
being discussed below:
1. Unavailability of Teaching Material/Aids:
• Students with different disabilities need different types of teaching aids/materials. For example
visually challenged students would want that there are screen readers that could read the digital
content to them
• Similarly, hearing impaired students would want more of visual input than oratory; rather
oratory instructions should be available in sign language if possible.
• Students with locomotors disability can use virtual keyboards, joy sticks and programming
editors that can support virtual keyboards.
• For low vision students, Braille keyboards, braille monitors and braille Printer should be made
available.
Unavailability of such support programming aids are big issue.
2. Lack of Special Needs Teachers: For different types of special needs, if special needs teachers are
available, disabled students get their needs addressed in right manner.
There should be teacher who knows what type of HW/SW TOOLS etc. can be used for the
differently able students as per their specific needs.
There are many types of software features and voice assistant that visually impaired students
can use are:
• Microsoft Narrator, Cortana nad Ubuntu’s Orca and onBoard, the voice assistant.
• A special version of Linux called BLinux for blind.
• Various accessibility features of Office Software.
• Specialized editor for visually impaired students for typing programs.

A.K.Pandey,pythonforstudents.blogspot.com
3. Lack of Supporting Curriculum:
• Curriculum should be designed while keeping focus on inclusive education. There always should
be possible alternatives keeping in mind special needs of the students.
• Software and programs should be so used so that the disabled students can easily work on that.
• Programming language that require manual coding such as Python, can also be used for
teaching programming as long as specialized editors are available.
• The computer science contests and programming contests should be conducted so that all types
of students can participate in them, inclusively.
25. What are possible solutions for Disability Issues While Teaching and Using Computers?
Ans. School must work towards making available the required teaching aids/materials to fulfil
special needs of students with disability.
• There should be proper budget allocated for buying the required material and equipment to
promote inclusive education.
• School must employ special needs teachers and should also train other teachers as well about
how to interact with students with social needs so as to help them learn in a better inclusive
way.
• School must support the inclusive curriculum and refrain from any other practice that directly or
indirectly puts the disabled students at the disadvantaged side.

A.K.Pandey,pythonforstudents.blogspot.com

You might also like