Professional Documents
Culture Documents
Semester: 2 Credit:4
Course Title: Internet Computing &
Ethics Course Code: 21ODBCT153
Submitted Date: 06-Dec-2021 Last date of Submission: 10-Dec-
2021
Sec A
Sec B
Question No 11 12 13 14 15
Student Signature:
UID: D21BCA16016 Course Code: 21ODBCT153
Answer - The four functions of a computer actually explain the core reasons why it was
built. They include:
Data input
Data Processing.
information output.
Data and information storage.
To describe the four functions of a computer, we can take a look at the basic steps by which
we prepare a letter on a computer.
It starts when the user composes, inputs, and edits sets of letters, numbers, and symbols using
a keyboard. The raw data is then processed and viewed in real-time via display hardware.
Answer - Hub and Switch are both network connecting devices. The hub operates at the
physical layer and is responsible for transmitting the signal to the port to respond to where
the signal was received, while the switch is able to terminate depending on the connection
setting and requirement.
Objective Hub main objective is to transmit Switch enables connection setting and
1 the signal to port to respond terminating based on need.
where the signal was received.
2 Layer Hub works in Physical Layer. Switch works in Data Link Layer.
Transmission Hub uses broadcast type Switch uses unicast, multicast as well
3
Type transmission. as broadcast type transmision.
4 Ports Hub can have maximum 4 ports. Switch can have 24 to 28 ports.
5 Collision Hub has a single collision In Switch, each port have their own
2/14
UID: D21BCA16016 Course Code: 21ODBCT153
Transmission Hub uses half duplex Switch uses full duplex transmission
7
Mode transmission mode. mode.
Answer - Virtual reality (VR), the use of computer modeling and simulation that enables a
person to interact with an artificial three-dimensional (3-D) scene or other sensory
environment. VR applications immerse the user in a computer-generated environment that
simulates reality through the use of interactive devices that send and receive information and
are worn as goggles, headsets, gloves or body suits . In a typical VR format, a user wearing a
helmet with a stereoscopic screen views animated images of the simulated environment.
Internet is a virtual networking medium that can be connected and used by various devices
these days. It enables users to send, receive, collect, store, update, delete data and perform
many other operations across the globe. Internet access is expanding its limits every day, as
technological advances are enormous. Some of the major uses of internet are e-commerce, e-
learning, knowledge sharing, social interaction, variety of media, file transfer,
communication.
3/14
UID: D21BCA16016 Course Code: 21ODBCT153
Any number of different factors can guide businesses toward the type or types of electronic
payments that work best for them and their vendors.
An e-payment system is a way to transact or pay for goods and services electronically
without the use of checks or cash. It is also called electronic payment system or online
payment system.
Answer - Internet security is a distinct aspect of broader concepts such as cyber security and
computer security, which focus on the specific threats and vulnerabilities of online access to
and use of the Internet.
In today's digital landscape, many of our daily activities depend on the Internet. Various
forms of communication, entertainment, and financial and work-related tasks are
accomplished online. This means tons of data and sensitive information are constantly being
shared on the internet.
Answer - What is e-commerce? E-commerce is the buying and selling of goods or services
via the Internet, and the transfer of money and data to complete the sale. It is also known as
electronic commerce or internet commerce.
Today, questions about e-commerce usually focus on which channels are best for executing
online business, but one of the most burning questions is the appropriate spelling of e-
commerce. The truth is, no one is right or wrong, and it usually comes down to preference.
Answer - Currently, e-commerce is a new trend in the world of buying and selling that brings
together sellers and buyers who are far away but still can do business safely and certainly
4/14
UID: D21BCA16016 Course Code: 21ODBCT153
easier with internet banking. can. The purpose of this study is to analyze how Internet
banking can significantly affect the development of e-commerce, which may or may not
actually reduce or change the growth of e-commerce in Indonesia. Internet banking is one of
the tools that can increase e-commerce for consumers or, conversely, internet banking can
reduce or not significantly increase the number of consumers in e-commerce.
Answer - Free distributions (or "distros") of GNU/Linux systems include and only offer free
software. They reject non-free applications, non-free programming platforms, non-free
drivers, non-free firmware "blobs" and any other non-free software and documentation. If
they find that some were joined by mistake, they remove it.
Answer - Although the history of computers goes back many decades and there are five
certain
Generations of computers.
Each generation is defined by a significant technological development that changes
Basically how computers work - more compact, less expensive, but leading to more
Powerful, efficient and robust machines.
5/14
UID: D21BCA16016 Course Code: 21ODBCT153
programming language that can be understood by computers). These computers were limited
to
solving one problem at a time. Input was based on punched cards and paper tape. Output
came
out on printouts.
6/14
UID: D21BCA16016 Course Code: 21ODBCT153
everyday products.
Answer - In the world of technology, a large number of users are communicating with
different devices in different languages. It also includes the many ways in which they
transmit data with the various software they implement. Therefore, worldwide
communication would not be possible if there were no fixed 'standards' that would govern the
way users communicate for data, as well as the way our devices treat those data. Here we
will discuss these standard set of rules.
"Protocols" which are sets of rules that help govern the way a particular technology works for
communication. In other words, it can be said that protocols are digital languages
implemented in the form of networking algorithms. There are various networks and network
protocols the user uses while surfing.
Types of Protocols
There are various types of protocols that support a major and compassionate role in
communicating with different devices across the network. These are:
Transmission Control Protocol (TCP)
Internet Protocol (IP)
User Datagram Protocol (UDP)
Post office Protocol (POP)
Simple mail transport Protocol (SMTP)
File Transfer Protocol (FTP)
Hyper Text Transfer Protocol (HTTP)
Hyper Text Transfer Protocol Secure (HTTPS)
7/14
UID: D21BCA16016 Course Code: 21ODBCT153
Telnet
Gopher
8/14
UID: D21BCA16016 Course Code: 21ODBCT153
1) Software-as-a-Service (SaaS)
2) Platform-as-a-Service (PaaS)
3) Infrastructure-as-a-Service (IaaS)
9/14
UID: D21BCA16016 Course Code: 21ODBCT153
PaaS gives the runtime environment for application development and deployment tools.
Google Apps Engine(GAE), Windows Azure, SalesForce.com are the examples of PaaS.
Advantages of PaaS
PaaS is easy to develop. Developer can focus on development and innovation without
worrying about infrastructure.
In PaaS, the developer only needs a PC and an internet connection to start building the
application.
Disadvantages of PaaS
A developer can write the application according to the platform provided by the PaaS vendor
so it is a problem to move the application to another PaaS vendor.
3) Infrastructure-as-a-Service (IaaS)
IaaS is a way of delivering cloud computing infrastructure such as servers, storage, networks
and operating systems.
Customers can access these resources as an on-demand service over a cloud computing
platform i.e. Internet.
In IaaS, you buy the entire resource rather than buying servers, software, datacenter space or
network equipment.
IaaS was previously called Hardware as a Service (HaaS). It is a cloud computing platform
based model.
HaaS differs from IaaS in that users have bare hardware on which they can deploy their own
infrastructure using the most appropriate software.
Benefits of IaaS
In IaaS, the user can dynamically choose the CPU, memory storage configuration as per the
requirement.
Users can easily access the vast computing power available on IaaS Cloud platform.
Disadvantages of IaaS
10/14
UID: D21BCA16016 Course Code: 21ODBCT153
Macro Virus:
11/14
UID: D21BCA16016 Course Code: 21ODBCT153
Unlike most viruses that are written in a low-level language (such as C or assembly
language), they are written in a high-level language such as Visual Basic. These viruses are
triggered when a program capable of executing a macro is run. For example, macro viruses
can be contained in spreadsheet files.
Polymorphic Virus:
A virus signature is a pattern that can identify a virus (a series of bytes that make up the virus
code). So a polymorphic virus mutates each time it is installed to avoid detection by
antivirus. The functionality of the virus remains the same but its signature changes.
Encrypted Virus:
To avoid detection by antivirus, this type of virus exists in encrypted form. It is also
accompanied by a decryption algorithm. So the virus first decrypts and then executes.
Stealth Virus:
It is a very tricky virus because it alters the code that can be used to detect it. Therefore, it
becomes very difficult to detect the virus. For example, it can alter the read system call such
that whenever the user asks to read code modified by a virus, the original form of the code is
shown instead of the infected code.
Tunneling Virus:
This virus attempts to bypass detection by antivirus scanners by installing itself in the
interrupt handler chain. Interception programs, which reside in the background of an
operating system and catch viruses, are disabled during tunneling viruses. Similar viruses
install themselves in device drivers.
Multilateral Virus:
This type of virus is capable of infecting many parts of the system, including the boot sector,
memory, and files. This makes it difficult to detect and incorporate.
Armored Virus:
An armored virus is coded to make it difficult for an antivirus to detect and understand. It
uses a variety of techniques to do this such as fooling the antivirus into believing it is
somewhere other than its true location or uses compression to complicate its code.
Browser Hijacker:
12/14
UID: D21BCA16016 Course Code: 21ODBCT153
As the name suggests this virus is coded to target the user's browser and can change the
browser settings. It is also called browser redirect virus because it redirects your browser to
other malicious sites that can harm your computer system.
Resident Virus:
Resident virus installation stores for your RAM and mediation along with the operation of
your device. They are so sneaky that they may even attach themselves to your anti-virus
software program files.
Answer - All kinds of ecommerce business models are flourishing. Online store sales are
expected to grow by 385% in this decade.
types of ecommerce
Major Ecommerce Business Classifications
B2B: Business to Business Ecommerce
B2c: Business to Consumer Ecommerce
C2C Ecommerce
C2B: Consumer to Business Ecommerce
Government / Public Administration Ecommerce
Major Ecommerce Business Classifications
Electronic commerce includes all online marketplaces that connect buyers and sellers.
Internet is used to process all electronic transactions.
The first thing to think about is what type of business transaction you are going for. When
you think about the business you want to run, to whom do you see yourself selling? Is your
business B2B, B2C, C2C, or C2B?
B2B: Business to Business Ecommerce
The B2B model focuses on providing products from one business to another. While there are
many business service providers in this space, you will find software companies, office
furniture and supply companies, document hosting companies and many other ecommerce
business models under this heading.
13/14
UID: D21BCA16016 Course Code: 21ODBCT153
C2C Ecommerce
B2B and B2C are quite intuitive concepts for most of us, but the idea of C2C is different.
What does a consumer-to-consumer ecommerce business look like?
Built on the rise of the e-commerce sector and growing consumer confidence in online
trading, these e-commerce websites allow customers to trade, buy and sell items in exchange
for a small commission paid on the site. Opening a C2C site requires careful planning.
C2B: Consumer to Business Ecommerce
C2B is another model that most people don't immediately think about, but it is growing in
vogue. This online commerce business is when the consumer sells goods or services to
businesses, and is roughly equivalent to a sole proprietorship serving a larger business.
Government / Public Administration Ecommerce
The models listed above are the primary ecommerce retail structures, but they are not the
only ones. Other types include government/public administrations that deal with businesses
or consumers.
B2G (also known as B2A), for businesses whose only customers are governments or public
administration types. An example is Synergetics Inc. in Ft. Collins, Colorado, which provides
contractors and services to government agencies.
C2G (also known as C2A): Usually individuals who pay universities to the government for
taxes or tuition.
16. Elucidate the difference between smart cards, credit cards and debit
cards and also elaborate where they are used in real life.
17. Explain how apache web server works with neat diagram.
*****************
14/14