You are on page 1of 13

Online Mid Term Examination Fall-Evening 2020

Student ID: __16545_____________ Date: 3/November/2020


JJJJJUNEJune=________________
Course Title: Introduction to Computers Course Code: MIS-302

Program: BBA (2Y) Teacher Name: Aamir Hussain

3
Semester: I(A), II(A), III(A) Marks: 20

Instructions:
 MUST write your Name, KASBIT Student ID.
 Attempt the Mid-term exam paper by typing on MS-Word.
 Merge this file and your attempted Mid-term exam paper into ONE Single File and
convert this file into Pdf.
 Name the pdf file as e.g. ID-XXXXX Mid-term exam.
 You must press the submit button in the LMS after uploading your attempted
Mid-term paper.
 Upload your ONE Single pdf File of Mid Term Exam on LMS before the due date
and time (By email not permitted).
 You must take reference from Internet to give a detailed answer. Also mention
web pages referred after attempting each question.
 Late submission NOT Permitted.
 All the students are supposed to concentrate on the assignment on an individual basis.
If the submitted document speaks of any copying, duplication or plagiarism, it shall
stand cancelled.
================================================================
Q1) Define E-Comerce and also explain its types. (4 Marks)

Q2) What is a trojan horse? Also explain the impact of trojan horses on your
computers. (4 Marks)

Q3) Define Operating systems. Also explain the types and functions of operating
systems. (4 Marks)

Q4) Discuss in detail about various operators which can be used while using the
search engines and the purpose of using that operator. (4 Marks)

Q5) Give a brief descriptions of various E-book readers available in the market.
(2 Marks)

Q6) Define top level domain. What is the purpose of top level domains? Also give
some examples. (2 Marks)
Name: Ammar Ali Khan Program: BBA (2Y) - Evening Student ID: 16545

Q1) Define E-Commerce and also explain its types.


Ans: Definition of E-Commerce
Electronic commerce, or e-commerce, is defined as the "production, distribution,
marketing, sale or delivery of goods and services by electronic means". An
e‑commerce transaction can be between enterprises, households, individuals,
governments and other public or private organizations.

Types of Ecommerce:
There are 3 major types of E-Commerce which are as follows:
1. Business to Consumer (B2C)
2. Consumer to Consumer (C2C)
3. Business to Business (B2B)
1. Business to Consumer (B2C):
Business to Consumer also commonly known as B2C websites. Business to
Consumer (B2C) refers to the process of business selling products and services
directly to consumers, with no middleman.
Now a days, B2C websites are most popular websites as it targets the biggest
segment which is consumer or general public. It allows businesses to cut off all the
middleman and sell their products or services directly to consumers.
Amazon.com is the best example for B2C website. Jeff Bezos – CEO of Amazon is
world richest person is the world’s wealthiest person for the third year in a row.
2. Consumer to Consumer (C2C:
Consumer to Consumer also commonly known as C2C websites. Consumer to
Consumer (C2C) refers to the process of selling products to each other by
consumers.
Traditional markets require business to customer relationships, in which a customer
goes to the business in order to purchase a product or service. In Consumer to
Consumer markets, the business facilitates an environment where C can sell goods
or services to each other.
Ebay.com, Craiglist.com, OLX.com, Dubbizle.com are famous website for C2C
ecommerce.
3. Business to Business (B2B)
Business to Business also commonly known as B2B websites. Business to Business
(B2B) refers to the process of business selling products or services to another
business.
Business to Business (B2B) websites have higher transaction value in comparison to
Business to Consumer (B2C) and Consumer to Consumer (C2C). Business to
Business (B2B) websites help business to promote their products or services to
Name: Ammar Ali Khan Program: BBA (2Y) - Evening Student ID: 16545

nationwide or globally such as online advertising, recruiting, market research,


technical support and training.
Alibaba.com is the world’s biggest B2B marketplace platform which connect one
business to another business globally.

References for Q1:


1. Definition of E-Commerce:
https://www.wto.org/english/thewto_e/minist_e/mc11_e/briefing_notes_e/bfecom_e.htm
2. CEO of Amazon: https://www.forbes.com/billionaires/
3. Consumer to Consumer (C2C): https://www.investopedia.com/terms/c/ctoc.asp
Name: Ammar Ali Khan Program: BBA (2Y) - Evening Student ID: 16545

Q2) What is a trojan horse? Also explain the impact of trojan horses on your
computers.
Ans: Definition of Trojan Horse:
To define a Trojan horse, it's important first to describe what a Trojan horse conveys,
which is a virus or malware. A virus is usually self-replicating, whereas malware is
non-replicating, but both are intended to cause damage to a computer and its
resources. A Trojan horse is a coded program which masks the existence of a virus
or malware by making its appearance look normal while containing malicious utilities
transparent to the user; utilities that execute unnoticed in the background until it is
too late.
Impact of Trojan Horses on Computer:
Trojan Horse can enable cyber-criminals to spy on you, steal your sensitive data,
and gain backdoor access to your system. These actions can include:

 Deleting data
 Blocking data
 Modifying data
 Copying data
 Disrupting the performance of computers or computer networks
Trojan Horse can impact computer in different ways based on the type of Trojan
Horse which are mentioned are as follows:
1. Backdoor Trojan Horse:
A backdoor Trojan Horse gives malicious users remote control over the infected
computer. They enable the author to do anything they wish on the infected
computer – including sending, receiving, launching and deleting files, displaying
data and rebooting the computer. Backdoor Trojans are often used to unite a
group of victim computers to form a botnet or zombie network that can be used
for criminal purposes.
2. Exploit Trojan Horse:
Exploits Trojan Horse are programs that contain data or code that takes
advantage of a vulnerability within application software that’s running on your
computer.
3. Rootkit Trojan Horse:
Rootkits Trojan Horse are designed to conceal certain objects or activities in your
system. Often their main purpose is to prevent malicious programs being
detected – in order to extend the period in which programs can run on an infected
computer.
4. Trojan-Banker:
Trojan-Banker programs are designed to steal your account data for online
banking systems, e-payment systems and credit or debit cards.
Name: Ammar Ali Khan Program: BBA (2Y) - Evening Student ID: 16545

5. Trojan-DDoS:
These programs conduct DoS (Denial of Service) attacks against a targeted web
address. By sending multiple requests – from your computer and several other
infected computers – the attack can overwhelm the target address… leading to a
denial of service.
6. Trojan-Downloader:
Trojan-Downloaders can download and install new versions of malicious
programs onto your computer – including Trojans and adware.
7. Trojan-Dropper:
These programs are used by hackers in order to install Trojans and / or viruses –
or to prevent the detection of malicious programs. Not all antivirus programs are
capable of scanning all of the components inside this type of Trojan.
8. Trojan-FakeAV:
Trojan-FakeAV programs simulate the activity of antivirus software. They are
designed to extort money from you – in return for the detection and removal of
threats… even though the threats that they report are actually non-existent.
9. Trojan-GameThief:
This type of program steals user account information from online gamers.
10. Trojan-IM:
Trojan-IM programs steal your logins and passwords for instant messaging
programs – such as ICQ, MSN Messenger, AOL Instant Messenger, Yahoo
Pager, Skype and many more.
11. Trojan-Ransom:
This type of Trojan can modify data on your computer – so that your computer
doesn’t run correctly or you can no longer use specific data. The criminal will only
restore your computer’s performance or unblock your data, after you have paid
them the ransom money that they demand.
12. Trojan-SMS:
These programs can cost you money – by sending text messages from your
mobile device to premium rate phone numbers.
13. Trojan-Spy:
Trojan-Spy programs can spy on how you’re using your computer – for example,
by tracking the data you enter via your keyboard, taking screen shots or getting a
list of running applications.
14. Trojan-Mailfinder:
These programs can harvest email addresses from your computer.
Name: Ammar Ali Khan Program: BBA (2Y) - Evening Student ID: 16545

How Trojans impact mobile devices:


Trojans aren’t problems for only laptop and desktop computers. They can also
impact your mobile devices, including cell phones and tablets.
In general, a Trojan comes attached to what looks like a legitimate program. In
reality, it is a fake version of the app, loaded up with malware. Cybercriminals will
usually place them on unofficial and pirate app markets for unsuspecting users to
download.
In addition, these apps can also steal information from your device, and generate
revenue by sending premium SMS texts.
One form of Trojan malware has targeted Android devices specifically. Called
Switcher Trojan, it infects users’ devices to attack the routers on their wireless
networks. The result? Cybercriminals could redirect traffic on the Wi-Fi-connected
devices and use it to commit various crimes.

References for Q2:


1. Definition of Trojan Horse: https://study.com/academy/lesson/what-is-a-trojan-horse-virus-
definition-examples-removal-options.html
2. Impact of Trojan Horse on Computer: https://www.kaspersky.com/resource-
center/threats/trojans
3. How Trojans impact mobile devices: https://us.norton.com/internetsecurity-malware-what-is-a-
trojan.html
Name: Ammar Ali Khan Program: BBA (2Y) - Evening Student ID: 16545

Q3) Define Operating systems. Also explain the types and functions of operating
systems.
Ans: Definition of Operating Systems:
An operating system (OS) is system software that manages computer hardware,
software resources, and provides common services for computer programs.

Types and Functions of Operating Systems:


1. Single-tasking and multi-tasking
A single-tasking system can only run one program at a time, while a multi-tasking
operating system allows more than one program to be running in concurrency.
This is achieved by time-sharing, where the available processor time is divided
between multiple processes. These processes are each interrupted repeatedly in
time slices by a task-scheduling subsystem of the operating system. Multi-tasking
may be characterized in preemptive and co-operative types. In preemptive
multitasking, the operating system slices the CPU time and dedicates a slot to
each of the programs. Unix-like operating systems, such as Solaris and Linux—
as well as non-Unix-like, such as AmigaOS—support preemptive multitasking.
Cooperative multitasking is achieved by relying on each process to provide time
to the other processes in a defined manner. 16-bit versions of Microsoft Windows
used cooperative multi-tasking; 32-bit versions of both Windows NT and Win9x
used preemptive multi-tasking.
2. Single- and multi-user
Single-user operating systems have no facilities to distinguish users, but may
allow multiple programs to run in tandem.[6] A multi-user operating system
extends the basic concept of multi-tasking with facilities that identify processes
and resources, such as disk space, belonging to multiple users, and the system
permits multiple users to interact with the system at the same time. Time-sharing
operating systems schedule tasks for efficient use of the system and may also
include accounting software for cost allocation of processor time, mass storage,
printing, and other resources to multiple users.
3. Distributed
A distributed operating system manages a group of distinct, networked
computers and makes them appear to be a single computer, as all computations
are distributed (divided amongst the constituent computers).
4. Templated
In the distributed and cloud computing context of an OS, templating refers to
creating a single virtual machine image as a guest operating system, then saving
it as a tool for multiple running virtual machines. The technique is used both in
virtualization and cloud computing management, and is common in large server
warehouses.
5. Embedded
Embedded operating systems are designed to be used in embedded computer
systems. They are designed to operate on small machines with less autonomy
(e.g. PDAs). They are very compact and extremely efficient by design, and are
Name: Ammar Ali Khan Program: BBA (2Y) - Evening Student ID: 16545

able to operate with a limited amount of resources. Windows CE and Minix 3 are
some examples of embedded operating systems.
6. Real-time
A real-time operating system is an operating system that guarantees to process
events or data by a specific moment in time. A real-time operating system may be
single- or multi-tasking, but when multitasking, it uses specialized scheduling
algorithms so that a deterministic nature of behavior is achieved. Such an event-
driven system switches between tasks based on their priorities or external
events, whereas time-sharing operating systems switch tasks based on clock
interrupts.
7. Library
A library operating system is one in which the services that a typical operating
system provides, such as networking, are provided in the form of libraries and
composed with the application and configuration code to construct a unikernel: a
specialized, single address space, machine image that can be deployed to cloud
or embedded environments.

References for Q3:


1. Definition of Operating System: https://en.wikipedia.org/wiki/Operating_system
2. Types and Functions of Operating Systems: https://en.wikipedia.org/wiki/Operating_system
Name: Ammar Ali Khan Program: BBA (2Y) - Evening Student ID: 16545

Q4) Discuss in detail about various operators which can be used while using the
search engines and the purpose of using that operator.
Ans: Search Engine Operators:
A search operator (sometimes referred to as a search parameter) is a character or
string of characters used in a search engine query to narrow the focus of the search.
Here are few examples of Search Engine Operators:
a) Space or +
b) OR
c) ()
d) -
e) “”
f) *
g) Related:
h) $/€
i) #..#
j) Filetype:
A. Space or +
Display search results that include specific words.
Example:
Art + Painting
Results have both words, art and painting, in any order.

B. OR

Display search results that include only one word from a list.
Example:
Horse OR Pony
Results have either the word, Horse, or the word, Pony.

C. ()

Combine search results that include specific words with those that include only one
word from a list.
Example:
Houston Texas (burger OR sandwich) Results include both words, Houston Texas, and
either the word, burger, or the word, sandwich.

D. –

Exclude a word from search results.


Example:
House-Flat
Results include the word, house, but do not include the word, flat.
Name: Ammar Ali Khan Program: BBA (2Y) - Evening Student ID: 16545

E. “”

Search for an exact phrase in a certain order.


Example:
“History of Muslims”
Results include the exact phrase, History of Muslims.

F. *

Substitute characters in place of the asterisk.


Example:
Singer
Results include any word that begins with the text, writer (e.g., singer, singers)
G. Related:
Related: is an operator that helps you find sites related to a specified URL.
Example:
Related: Airbnb.com
Results include competitor websites such as vrbo.com, homeaway.com, flipkey.com,
etc.
H. $ / €
This operator helps you search for products by price.
Example:
iPhone 8 Plus $400
Results include iPhone 8 Plus of worth $400
I. #..#
Putting two dots between two years creates a search command for results that fall
within that year range.
Example:
Ted Talks 2016..2020
Results include Ted Talks from specified years only.
J. Filetype:
Filetype: tells Search Engine to return only results of, you guessed it, a specific type
of file. It is useful when looking for research, which is often in PDF or other document
file formats, rather than HTML.
Example:
Exports of Pakistan filetype: pdf
Results include exports of Pakistan in pdf file format only

References for Q4:


1. Search Engine Operators: https://www.spyfu.com/blog/google-search-operators/ & Course
Book/ Slides
Name: Ammar Ali Khan Program: BBA (2Y) - Evening Student ID: 16545

Q5) Give a brief descriptions of various E-book readers available in the market
Ans: E-book Readers:
An E-book reader, also called E-Reader or E-Book Device, is a mobile electronic
device that is designed primarily for the purpose of reading digital e-books.
Any device that can display text on a screen may act as an e-reader; however,
specialized e-reader devices may optimize portability, readability, and battery life for
this purpose. Their main advantages over printed books are portability, since an e-
reader is capable of holding thousands of books while weighing less than one book,
and the convenience provided due to add-on features
Various E-Book Readers:
There are various type of E-Book Readers available in the market:
a) Amazon Kindle
b) Barnes & Noble Nook
c) BeBook Neo
d) Kobo E-Reader
e) Sony Reader
f) Onyx Boox Note2

References for Q5:


1. Various E-Book Readers: https://www.flatworldsolutions.com/epub/articles/e-readers.php &
https://www.pcmag.com/picks/the-best-ereaders
Name: Ammar Ali Khan Program: BBA (2Y) - Evening Student ID: 16545

Q6) Define top level domain. What is the purpose of top level domains? Also give
some examples.
Ans: Definition of Top Level Domain:
At their essence, a TLD, also known as a domain extension, is what follows the
domain name in a query. The .com in google.com is the top-level domain. These
extensions were proposed as methods to help further distinguish and categorize
domains. In the early days of the internet, the system was much more rigidly
categorized according to these TLDs.
A top-level domain was intended to help classify a feature of a website, such as its
purpose, the owner, or the geographical origin. It also multiplied the number of
available domain names, since cars.com is not the same as cars.org. To this effect,
six original top-level domain names were created.
Purpose of Top Level Domains
A TLD identifies something about the website associated with it, such as its purpose,
the organization that owns it or the geographical area where it originates. Each TLD
has a separate registry managed by a designated organization under the direction of
the Internet Corporation for Assigned Names and Numbers (ICANN).
Example of Top Level Domains:
Over time, more top-level domains were added to the original list. Presently, there
are 20 generic top-level domains at the peak of the domain name system hierarchy.
These 20 generic TLDs can be split into four categories:

 Generic – Domains that are used for general reasons.


o .com
o .info
o .net
o .org

 Generic restricted – Domains that must be used for their intended purposes
o .biz
o .name
o .pro

 Infrastructure – Meant solely for aiding the DNS infrastructure. The only TLD
within this subcategory is .arpa.
 Sponsored domains – These can only be utilized by companies or entities tied
to these industries including:
o .aero
o .asia
o .cat
o .coop
o .edu
o .gov
o .int
o .jobs
Name: Ammar Ali Khan Program: BBA (2Y) - Evening Student ID: 16545

o .mil
o .mobi
o .tel
o .travel

References for Q6:


1. Definition of Top Level Domain: https://www.domain.com/blog/2018/12/18/what-is-a-top-level-
domain/
2. Purpose of Top Level Domains: https://searchapparchitecture.techtarget.com/definition/top-
level-domain-TLD
3. Examples of Top Level Domains: https://www.domain.com/blog/2018/12/18/what-is-a-top-
level-domain/

You might also like