Professional Documents
Culture Documents
3
Semester: I(A), II(A), III(A) Marks: 20
Instructions:
MUST write your Name, KASBIT Student ID.
Attempt the Mid-term exam paper by typing on MS-Word.
Merge this file and your attempted Mid-term exam paper into ONE Single File and
convert this file into Pdf.
Name the pdf file as e.g. ID-XXXXX Mid-term exam.
You must press the submit button in the LMS after uploading your attempted
Mid-term paper.
Upload your ONE Single pdf File of Mid Term Exam on LMS before the due date
and time (By email not permitted).
You must take reference from Internet to give a detailed answer. Also mention
web pages referred after attempting each question.
Late submission NOT Permitted.
All the students are supposed to concentrate on the assignment on an individual basis.
If the submitted document speaks of any copying, duplication or plagiarism, it shall
stand cancelled.
================================================================
Q1) Define E-Comerce and also explain its types. (4 Marks)
Q2) What is a trojan horse? Also explain the impact of trojan horses on your
computers. (4 Marks)
Q3) Define Operating systems. Also explain the types and functions of operating
systems. (4 Marks)
Q4) Discuss in detail about various operators which can be used while using the
search engines and the purpose of using that operator. (4 Marks)
Q5) Give a brief descriptions of various E-book readers available in the market.
(2 Marks)
Q6) Define top level domain. What is the purpose of top level domains? Also give
some examples. (2 Marks)
Name: Ammar Ali Khan Program: BBA (2Y) - Evening Student ID: 16545
Types of Ecommerce:
There are 3 major types of E-Commerce which are as follows:
1. Business to Consumer (B2C)
2. Consumer to Consumer (C2C)
3. Business to Business (B2B)
1. Business to Consumer (B2C):
Business to Consumer also commonly known as B2C websites. Business to
Consumer (B2C) refers to the process of business selling products and services
directly to consumers, with no middleman.
Now a days, B2C websites are most popular websites as it targets the biggest
segment which is consumer or general public. It allows businesses to cut off all the
middleman and sell their products or services directly to consumers.
Amazon.com is the best example for B2C website. Jeff Bezos – CEO of Amazon is
world richest person is the world’s wealthiest person for the third year in a row.
2. Consumer to Consumer (C2C:
Consumer to Consumer also commonly known as C2C websites. Consumer to
Consumer (C2C) refers to the process of selling products to each other by
consumers.
Traditional markets require business to customer relationships, in which a customer
goes to the business in order to purchase a product or service. In Consumer to
Consumer markets, the business facilitates an environment where C can sell goods
or services to each other.
Ebay.com, Craiglist.com, OLX.com, Dubbizle.com are famous website for C2C
ecommerce.
3. Business to Business (B2B)
Business to Business also commonly known as B2B websites. Business to Business
(B2B) refers to the process of business selling products or services to another
business.
Business to Business (B2B) websites have higher transaction value in comparison to
Business to Consumer (B2C) and Consumer to Consumer (C2C). Business to
Business (B2B) websites help business to promote their products or services to
Name: Ammar Ali Khan Program: BBA (2Y) - Evening Student ID: 16545
Q2) What is a trojan horse? Also explain the impact of trojan horses on your
computers.
Ans: Definition of Trojan Horse:
To define a Trojan horse, it's important first to describe what a Trojan horse conveys,
which is a virus or malware. A virus is usually self-replicating, whereas malware is
non-replicating, but both are intended to cause damage to a computer and its
resources. A Trojan horse is a coded program which masks the existence of a virus
or malware by making its appearance look normal while containing malicious utilities
transparent to the user; utilities that execute unnoticed in the background until it is
too late.
Impact of Trojan Horses on Computer:
Trojan Horse can enable cyber-criminals to spy on you, steal your sensitive data,
and gain backdoor access to your system. These actions can include:
Deleting data
Blocking data
Modifying data
Copying data
Disrupting the performance of computers or computer networks
Trojan Horse can impact computer in different ways based on the type of Trojan
Horse which are mentioned are as follows:
1. Backdoor Trojan Horse:
A backdoor Trojan Horse gives malicious users remote control over the infected
computer. They enable the author to do anything they wish on the infected
computer – including sending, receiving, launching and deleting files, displaying
data and rebooting the computer. Backdoor Trojans are often used to unite a
group of victim computers to form a botnet or zombie network that can be used
for criminal purposes.
2. Exploit Trojan Horse:
Exploits Trojan Horse are programs that contain data or code that takes
advantage of a vulnerability within application software that’s running on your
computer.
3. Rootkit Trojan Horse:
Rootkits Trojan Horse are designed to conceal certain objects or activities in your
system. Often their main purpose is to prevent malicious programs being
detected – in order to extend the period in which programs can run on an infected
computer.
4. Trojan-Banker:
Trojan-Banker programs are designed to steal your account data for online
banking systems, e-payment systems and credit or debit cards.
Name: Ammar Ali Khan Program: BBA (2Y) - Evening Student ID: 16545
5. Trojan-DDoS:
These programs conduct DoS (Denial of Service) attacks against a targeted web
address. By sending multiple requests – from your computer and several other
infected computers – the attack can overwhelm the target address… leading to a
denial of service.
6. Trojan-Downloader:
Trojan-Downloaders can download and install new versions of malicious
programs onto your computer – including Trojans and adware.
7. Trojan-Dropper:
These programs are used by hackers in order to install Trojans and / or viruses –
or to prevent the detection of malicious programs. Not all antivirus programs are
capable of scanning all of the components inside this type of Trojan.
8. Trojan-FakeAV:
Trojan-FakeAV programs simulate the activity of antivirus software. They are
designed to extort money from you – in return for the detection and removal of
threats… even though the threats that they report are actually non-existent.
9. Trojan-GameThief:
This type of program steals user account information from online gamers.
10. Trojan-IM:
Trojan-IM programs steal your logins and passwords for instant messaging
programs – such as ICQ, MSN Messenger, AOL Instant Messenger, Yahoo
Pager, Skype and many more.
11. Trojan-Ransom:
This type of Trojan can modify data on your computer – so that your computer
doesn’t run correctly or you can no longer use specific data. The criminal will only
restore your computer’s performance or unblock your data, after you have paid
them the ransom money that they demand.
12. Trojan-SMS:
These programs can cost you money – by sending text messages from your
mobile device to premium rate phone numbers.
13. Trojan-Spy:
Trojan-Spy programs can spy on how you’re using your computer – for example,
by tracking the data you enter via your keyboard, taking screen shots or getting a
list of running applications.
14. Trojan-Mailfinder:
These programs can harvest email addresses from your computer.
Name: Ammar Ali Khan Program: BBA (2Y) - Evening Student ID: 16545
Q3) Define Operating systems. Also explain the types and functions of operating
systems.
Ans: Definition of Operating Systems:
An operating system (OS) is system software that manages computer hardware,
software resources, and provides common services for computer programs.
able to operate with a limited amount of resources. Windows CE and Minix 3 are
some examples of embedded operating systems.
6. Real-time
A real-time operating system is an operating system that guarantees to process
events or data by a specific moment in time. A real-time operating system may be
single- or multi-tasking, but when multitasking, it uses specialized scheduling
algorithms so that a deterministic nature of behavior is achieved. Such an event-
driven system switches between tasks based on their priorities or external
events, whereas time-sharing operating systems switch tasks based on clock
interrupts.
7. Library
A library operating system is one in which the services that a typical operating
system provides, such as networking, are provided in the form of libraries and
composed with the application and configuration code to construct a unikernel: a
specialized, single address space, machine image that can be deployed to cloud
or embedded environments.
Q4) Discuss in detail about various operators which can be used while using the
search engines and the purpose of using that operator.
Ans: Search Engine Operators:
A search operator (sometimes referred to as a search parameter) is a character or
string of characters used in a search engine query to narrow the focus of the search.
Here are few examples of Search Engine Operators:
a) Space or +
b) OR
c) ()
d) -
e) “”
f) *
g) Related:
h) $/€
i) #..#
j) Filetype:
A. Space or +
Display search results that include specific words.
Example:
Art + Painting
Results have both words, art and painting, in any order.
B. OR
Display search results that include only one word from a list.
Example:
Horse OR Pony
Results have either the word, Horse, or the word, Pony.
C. ()
Combine search results that include specific words with those that include only one
word from a list.
Example:
Houston Texas (burger OR sandwich) Results include both words, Houston Texas, and
either the word, burger, or the word, sandwich.
D. –
E. “”
F. *
Q5) Give a brief descriptions of various E-book readers available in the market
Ans: E-book Readers:
An E-book reader, also called E-Reader or E-Book Device, is a mobile electronic
device that is designed primarily for the purpose of reading digital e-books.
Any device that can display text on a screen may act as an e-reader; however,
specialized e-reader devices may optimize portability, readability, and battery life for
this purpose. Their main advantages over printed books are portability, since an e-
reader is capable of holding thousands of books while weighing less than one book,
and the convenience provided due to add-on features
Various E-Book Readers:
There are various type of E-Book Readers available in the market:
a) Amazon Kindle
b) Barnes & Noble Nook
c) BeBook Neo
d) Kobo E-Reader
e) Sony Reader
f) Onyx Boox Note2
Q6) Define top level domain. What is the purpose of top level domains? Also give
some examples.
Ans: Definition of Top Level Domain:
At their essence, a TLD, also known as a domain extension, is what follows the
domain name in a query. The .com in google.com is the top-level domain. These
extensions were proposed as methods to help further distinguish and categorize
domains. In the early days of the internet, the system was much more rigidly
categorized according to these TLDs.
A top-level domain was intended to help classify a feature of a website, such as its
purpose, the owner, or the geographical origin. It also multiplied the number of
available domain names, since cars.com is not the same as cars.org. To this effect,
six original top-level domain names were created.
Purpose of Top Level Domains
A TLD identifies something about the website associated with it, such as its purpose,
the organization that owns it or the geographical area where it originates. Each TLD
has a separate registry managed by a designated organization under the direction of
the Internet Corporation for Assigned Names and Numbers (ICANN).
Example of Top Level Domains:
Over time, more top-level domains were added to the original list. Presently, there
are 20 generic top-level domains at the peak of the domain name system hierarchy.
These 20 generic TLDs can be split into four categories:
Generic restricted – Domains that must be used for their intended purposes
o .biz
o .name
o .pro
Infrastructure – Meant solely for aiding the DNS infrastructure. The only TLD
within this subcategory is .arpa.
Sponsored domains – These can only be utilized by companies or entities tied
to these industries including:
o .aero
o .asia
o .cat
o .coop
o .edu
o .gov
o .int
o .jobs
Name: Ammar Ali Khan Program: BBA (2Y) - Evening Student ID: 16545
o .mil
o .mobi
o .tel
o .travel