You are on page 1of 14

Assignment No.

Programme Name: BCA UID: D21BCA16016

Semester: 2 Credit:4
Course Title: Internet Computing &
Ethics Course Code: 21ODBCT153
Submitted Date: 06-Dec-2021 Last date of Submission: 10-Dec-
2021

Max. Marks: 30 Weightage: 50% (15 Marks)

Sec A

Question No 1-2 3-5 6-9 10

Page No 2-3 3-4 9-10 5

Sec B

Question No 11 12 13 14 15

Page No 5-7 7-8 8-11 11-13 13-14

Student Signature:
UID: D21BCA16016 Course Code: 21ODBCT153

SECTION A (10 MARKS)

1. Illustrate the functionality of computer.

Answer - The four functions of a computer actually explain the core reasons why it was
built. They include:

Data input
Data Processing.
information output.
Data and information storage.
To describe the four functions of a computer, we can take a look at the basic steps by which
we prepare a letter on a computer.

It starts when the user composes, inputs, and edits sets of letters, numbers, and symbols using
a keyboard. The raw data is then processed and viewed in real-time via display hardware.

2. Explain difference between Hub and Switch.

Answer - Hub and Switch are both network connecting devices. The hub operates at the
physical layer and is responsible for transmitting the signal to the port to respond to where
the signal was received, while the switch is able to terminate depending on the connection
setting and requirement.

Following are the important differences between Hub and Switch.

Sr. Key Hub Switch


No
.

Objective Hub main objective is to transmit Switch enables connection setting and
1 the signal to port to respond terminating based on need.
where the signal was received.

2 Layer Hub works in Physical Layer. Switch works in Data Link Layer.

Transmission Hub uses broadcast type Switch uses unicast, multicast as well
3
Type transmission. as broadcast type transmision.

4 Ports Hub can have maximum 4 ports. Switch can have 24 to 28 ports.

5 Collision Hub has a single collision In Switch, each port have their own

2/14
UID: D21BCA16016 Course Code: 21ODBCT153

Sr. Key Hub Switch


No
.

Domain domain. collision domain.

Packet Hub do not provide packet Switch provides packet filtering.


6
Filtering filtering.

Transmission Hub uses half duplex Switch uses full duplex transmission
7
Mode transmission mode. mode.

3. Define Virtual Reality.

Answer - Virtual reality (VR), the use of computer modeling and simulation that enables a
person to interact with an artificial three-dimensional (3-D) scene or other sensory
environment. VR applications immerse the user in a computer-generated environment that
simulates reality through the use of interactive devices that send and receive information and
are worn as goggles, headsets, gloves or body suits . In a typical VR format, a user wearing a
helmet with a stereoscopic screen views animated images of the simulated environment.

4. What is Internet and Use of it?

Answer - Answer: The Internet is a global system of interconnected computers using a


standardized Internet protocol suite to communicate and share information.

Internet is a virtual networking medium that can be connected and used by various devices
these days. It enables users to send, receive, collect, store, update, delete data and perform
many other operations across the globe. Internet access is expanding its limits every day, as
technological advances are enormous. Some of the major uses of internet are e-commerce, e-
learning, knowledge sharing, social interaction, variety of media, file transfer,
communication.

5. What is cloud computing and Big data?

Answer - Difference between Big Data and Cloud Computing :

S.No. BIG DATA CLOUD COMPUTING


01. Big data refers to the data which is Cloud computing refers to the on
huge in size and also increasing rapidly demand availability of computing
with respect to time. resources over internet.
02. Big data includes structured data, Cloud Computing Services includes

3/14
UID: D21BCA16016 Course Code: 21ODBCT153

unstructured data as well as semi- Infrastructure as a Service (IaaS),


structured data. Platform as a Service (PaaS) and
Software as a Service (SaaS).
03. Volume of data, Velocity of data, On-Demand availability of IT resources,
Variety of data, Veracity of data, and broad network access, resource pooling,
Value of data are considered as the 5 elasticity and measured service are
most important characteristics of Big considered as the main characteristics of
data. cloud computing.

6. What is Electronic Payment System?

Answer - Electronic payment is a digital transaction between two parties. Types of e-


payments include ACH, wire and bank transfers, cards, digital wallets, mobile pay and more.

Any number of different factors can guide businesses toward the type or types of electronic
payments that work best for them and their vendors.
An e-payment system is a way to transact or pay for goods and services electronically
without the use of checks or cash. It is also called electronic payment system or online
payment system.

7. What is Internet Security?

Answer - Internet security is a distinct aspect of broader concepts such as cyber security and
computer security, which focus on the specific threats and vulnerabilities of online access to
and use of the Internet.

In today's digital landscape, many of our daily activities depend on the Internet. Various
forms of communication, entertainment, and financial and work-related tasks are
accomplished online. This means tons of data and sensitive information are constantly being
shared on the internet.

8. List out application of E-commerce.

Answer - What is e-commerce? E-commerce is the buying and selling of goods or services
via the Internet, and the transfer of money and data to complete the sale. It is also known as
electronic commerce or internet commerce.

Today, questions about e-commerce usually focus on which channels are best for executing
online business, but one of the most burning questions is the appropriate spelling of e-
commerce. The truth is, no one is right or wrong, and it usually comes down to preference.

9. Explain how net banking is used in e-commerce.

Answer - Currently, e-commerce is a new trend in the world of buying and selling that brings
together sellers and buyers who are far away but still can do business safely and certainly

4/14
UID: D21BCA16016 Course Code: 21ODBCT153

easier with internet banking. can. The purpose of this study is to analyze how Internet
banking can significantly affect the development of e-commerce, which may or may not
actually reduce or change the growth of e-commerce in Indonesia. Internet banking is one of
the tools that can increase e-commerce for consumers or, conversely, internet banking can
reduce or not significantly increase the number of consumers in e-commerce.

10.State different GNU distributions.

Answer - Free distributions (or "distros") of GNU/Linux systems include and only offer free
software. They reject non-free applications, non-free programming platforms, non-free
drivers, non-free firmware "blobs" and any other non-free software and documentation. If
they find that some were joined by mistake, they remove it.

Free GNU/Linux Distros


We recommend that you use a free GNU/Linux system distribution, one that does not include
proprietary software at all. That way you can be sure that you are not installing any non-free
programs. Here is our list of such distros:
Free GNU/Linux distributions.

SECTION B (20 MARKS)

11.Explain various generations of computer.

Answer - Although the history of computers goes back many decades and there are five
certain
Generations of computers.
Each generation is defined by a significant technological development that changes
Basically how computers work - more compact, less expensive, but leading to more
Powerful, efficient and robust machines.

1940 – 1956: First Generation – Vacuum Tubes


These early computers used vacuum tubes as circuitry and magnetic drums for memory. As a
result, they were enormous, literally taking up entire rooms and costing a fortune to run.
These
were inefficient materials which generated a lot of heat, sucked huge electricity and
subsequently
generated a lot of heat which caused ongoing breakdowns.
These first generation computers relied on ‘machine language’ (which is the most basic

5/14
UID: D21BCA16016 Course Code: 21ODBCT153

programming language that can be understood by computers). These computers were limited
to
solving one problem at a time. Input was based on punched cards and paper tape. Output
came
out on printouts.

1956 – 1963: Second Generation – Transistors


The replacement of vacuum tubes by transistors saw the advent of the second generation of
Computation Although first invented in 1947, transistors were not used significantly in
computers
until the end of the 1950s. They were a huge improvement over the vacuum tube, yet
Subjecting the computer to harmful levels of heat. However, they were much better
Vacuum tubes make computers smaller, faster, cheaper and less heavy on the use of
electricity. They
Still relying on punch card for input/printout.

1964 – 1971: Third Generation – Integrated Circuits


By this phase, transistors were now being miniaturized and put on silicon chips (called
semiconductors). This led to a massive increase in speed and efficiency of these machines.
These
were the first computers where users interacted using keyboards and monitors which
interfaced
with an operating system, a significant leap up from the punch cards and printouts. This
enabled
these machines to run several applications at once using a central program which functioned
to
monitor memory.

1972 – 2010: Fourth Generation – Microprocessors


This revolution can be summed in one word: Intel. The chip-maker developed the Intel 4004
chip in 1971, which positioned all computer components (CPU, memory, input/output
controls)
onto a single chip. What filled a room in the 1940s now fit in the palm of the hand. The Intel
chip
housed thousands of integrated circuits. The year 1981 saw the first ever computer (IBM)
specifically designed for home use and 1984 saw the Macintosh introduced by Apple.
Microprocessors even moved beyond the realm of computers and into an increasing number
of

6/14
UID: D21BCA16016 Course Code: 21ODBCT153

everyday products.

2010 Onwards: Fifth Generation – Artificial Intelligence


Computer devices with artificial intelligence are still in development, but some of the
Technologies are beginning to emerge and are being used such as voice recognition.
AI is a reality made possible by parallel processing and using superconductors. lean towards
In the future, computers will be fundamentally changed again by quantum computation,
molecular and
nanotechnology.
The essence of fifth generation will be using these technologies to ultimately create machines
which can process and respond to natural language, and have capability to learn and organize
themselves.

12.Explain different types of protocols.

Answer - In the world of technology, a large number of users are communicating with
different devices in different languages. It also includes the many ways in which they
transmit data with the various software they implement. Therefore, worldwide
communication would not be possible if there were no fixed 'standards' that would govern the
way users communicate for data, as well as the way our devices treat those data. Here we
will discuss these standard set of rules.

"Protocols" which are sets of rules that help govern the way a particular technology works for
communication. In other words, it can be said that protocols are digital languages
implemented in the form of networking algorithms. There are various networks and network
protocols the user uses while surfing.

Types of Protocols
There are various types of protocols that support a major and compassionate role in
communicating with different devices across the network. These are:
Transmission Control Protocol (TCP)
Internet Protocol (IP)
User Datagram Protocol (UDP)
Post office Protocol (POP)
Simple mail transport Protocol (SMTP)
File Transfer Protocol (FTP)
Hyper Text Transfer Protocol (HTTP)
Hyper Text Transfer Protocol Secure (HTTPS)

7/14
UID: D21BCA16016 Course Code: 21ODBCT153

Telnet
Gopher

Transmission Control Protocol (TCP): TCP is a popular communication protocol which is


used for communicating over a network. It divides any message into series of packets that are
sent from source to destination and there it gets reassembled at the destination.
Internet Protocol (IP): IP is designed explicitly as addressing protocol. It is mostly used with
TCP. The IP addresses in packets help in routing them through different nodes in a network
until it reaches the destination system. TCP/IP is the most popular protocol connecting the
networks.
User Datagram Protocol (UDP): UDP is a substitute communication protocol to
Transmission Control Protocol implemented primarily for creating loss-tolerating and low-
latency linking between different applications.
Post office Protocol (POP): POP3 is designed for receiving incoming E-mails.
Simple mail transport Protocol (SMTP): SMTP is designed to send and distribute outgoing
E-Mail.
File Transfer Protocol (FTP): FTP allows users to transfer files from one machine to another.
Types of files may include program files, multimedia files, text files, and documents, etc.
Hyper Text Transfer Protocol (HTTP): HTTP is designed for transferring a hypertext among
two or more systems. HTML tags are used for creating links. These links may be in any form
like text or images. HTTP is designed on Client-server principles which allow a client system
for establishing a connection with the server machine for making a request. The server
acknowledges the request initiated by the client and responds accordingly.
Hyper Text Transfer Protocol Secure (HTTPS): Hyper Text Transfer Protocol Secure,
abbreviated to HTTPS, is a standard protocol for securing communication between two
computers, one using a browser and the other receiving data from a web server. Is. HTTP is
used to transfer data in hypertext format between the client browser (request) and the web
server (response), the same is the case with HTTPS, except that the transfer of data is done in
an encrypted format. So it can be said that https thwarts hackers by interpreting or modifying
the data during the transfer of packets.
Telnet: Telnet is a set of rules designed for connecting one system with another. The
connecting process here is termed as remote login. The system which requests for connection
is the local computer, and the system which accepts the connection is the remote computer.
Gopher: Gopher is a collection of rules implemented for searching, retrieving as well as
displaying documents from isolated sites. Gopher also works on the client/server principle.

13.Explain service models of cloud computing in detail.

Answer - Categories of service model

8/14
UID: D21BCA16016 Course Code: 21ODBCT153

The service models are categorized into three basic models:

1) Software-as-a-Service (SaaS)
2) Platform-as-a-Service (PaaS)
3) Infrastructure-as-a-Service (IaaS)

Categories cloud computing


1) Software-as-a-Service (SaaS)
SaaS is known as 'On-Demand Software'.
It is a software distribution model. In this model, the applications are hosted by a cloud
service provider and publicized to the customers over internet.
In SaaS, associated data and software are hosted centrally on the cloud server.
User can access SaaS by using a thin client through a web browser.
CRM, Office Suite, Email, games, etc. are the software applications which are provided as a
service through Internet.
The companies like Google, Microsoft provide their applications as a service to the end
users.
Advantages of SaaS
SaaS is easy to buy because the pricing of SaaS is based on monthly or annual fee and it
allows the organizations to access business functionalities at a small cost, which is less than
licensed applications.
SaaS needed less hardware, because the software is hosted remotely, hence organizations do
not need to invest in additional hardware.
Less maintenance cost is required for SaaS and do not require special software or hardware
versions.
Disadvantages of SaaS
SaaS applications are totally dependent on Internet connection. They are not usable without
Internet connection.
It is difficult to switch amongst the SaaS vendors.
2) Platform-as-a-Service (PaaS)
PaaS is a programming platform for developers. This platform is generated for the
programmers to create, test, run and manage the applications.
A developer can easily write the application and deploy it directly into PaaS layer.

9/14
UID: D21BCA16016 Course Code: 21ODBCT153

PaaS gives the runtime environment for application development and deployment tools.
Google Apps Engine(GAE), Windows Azure, SalesForce.com are the examples of PaaS.
Advantages of PaaS
PaaS is easy to develop. Developer can focus on development and innovation without
worrying about infrastructure.
In PaaS, the developer only needs a PC and an internet connection to start building the
application.
Disadvantages of PaaS
A developer can write the application according to the platform provided by the PaaS vendor
so it is a problem to move the application to another PaaS vendor.
3) Infrastructure-as-a-Service (IaaS)
IaaS is a way of delivering cloud computing infrastructure such as servers, storage, networks
and operating systems.
Customers can access these resources as an on-demand service over a cloud computing
platform i.e. Internet.
In IaaS, you buy the entire resource rather than buying servers, software, datacenter space or
network equipment.
IaaS was previously called Hardware as a Service (HaaS). It is a cloud computing platform
based model.
HaaS differs from IaaS in that users have bare hardware on which they can deploy their own
infrastructure using the most appropriate software.
Benefits of IaaS
In IaaS, the user can dynamically choose the CPU, memory storage configuration as per the
requirement.
Users can easily access the vast computing power available on IaaS Cloud platform.
Disadvantages of IaaS

10/14
UID: D21BCA16016 Course Code: 21ODBCT153

IaaS cloud computing platform model is dependent on availability of Internet and


virtualization services.

14.What is virus? Explain different type of virus in detail.

Answer - Types of Viruses


Difficulty Level : Hard
Last Updated : 03 Aug, 2021
A virus is a piece of code embedded in a legitimate program. Viruses are self-replicating and
are designed to infect other programs. They can wreak havoc in the system by modifying or
destroying files causing system crashes and program malfunctions. A virus dropper (usually
a Trojan horse) puts the virus into the system upon arrival on the target machine.
For more details, see this.

Various types of viruses:


File Virus:
This type of virus infects the system by attaching itself to the end of a file. It replaces the
start of a program so that control jumps to its own code. After the execution of your code,
control is returned to the main program. Its implementation is also not taken into account. It
is also called parasitic virus because it does not leave any file intact but also leaves the host
functional.

Boot Sector Virus:


It infects the system's boot sector, executed each time the system is booted and before the
operating system is loaded. It infects other bootable media such as floppy disks. These are
also known as memory viruses because they do not infect the file system.

Macro Virus:

11/14
UID: D21BCA16016 Course Code: 21ODBCT153

Unlike most viruses that are written in a low-level language (such as C or assembly
language), they are written in a high-level language such as Visual Basic. These viruses are
triggered when a program capable of executing a macro is run. For example, macro viruses
can be contained in spreadsheet files.

Source code virus:


It looks for the source code and modifies it to contain the virus and help it spread.

Polymorphic Virus:
A virus signature is a pattern that can identify a virus (a series of bytes that make up the virus
code). So a polymorphic virus mutates each time it is installed to avoid detection by
antivirus. The functionality of the virus remains the same but its signature changes.

Encrypted Virus:
To avoid detection by antivirus, this type of virus exists in encrypted form. It is also
accompanied by a decryption algorithm. So the virus first decrypts and then executes.

Stealth Virus:
It is a very tricky virus because it alters the code that can be used to detect it. Therefore, it
becomes very difficult to detect the virus. For example, it can alter the read system call such
that whenever the user asks to read code modified by a virus, the original form of the code is
shown instead of the infected code.

Tunneling Virus:
This virus attempts to bypass detection by antivirus scanners by installing itself in the
interrupt handler chain. Interception programs, which reside in the background of an
operating system and catch viruses, are disabled during tunneling viruses. Similar viruses
install themselves in device drivers.

Multilateral Virus:
This type of virus is capable of infecting many parts of the system, including the boot sector,
memory, and files. This makes it difficult to detect and incorporate.

Armored Virus:
An armored virus is coded to make it difficult for an antivirus to detect and understand. It
uses a variety of techniques to do this such as fooling the antivirus into believing it is
somewhere other than its true location or uses compression to complicate its code.

Browser Hijacker:

12/14
UID: D21BCA16016 Course Code: 21ODBCT153

As the name suggests this virus is coded to target the user's browser and can change the
browser settings. It is also called browser redirect virus because it redirects your browser to
other malicious sites that can harm your computer system.
Resident Virus:

Resident virus installation stores for your RAM and mediation along with the operation of
your device. They are so sneaky that they may even attach themselves to your anti-virus
software program files.

15.Illustrate the real life examples of all e-commerce business models.

Answer - All kinds of ecommerce business models are flourishing. Online store sales are
expected to grow by 385% in this decade.
types of ecommerce
Major Ecommerce Business Classifications
B2B: Business to Business Ecommerce
B2c: Business to Consumer Ecommerce
C2C Ecommerce
C2B: Consumer to Business Ecommerce
Government / Public Administration Ecommerce
Major Ecommerce Business Classifications
Electronic commerce includes all online marketplaces that connect buyers and sellers.
Internet is used to process all electronic transactions.

The first thing to think about is what type of business transaction you are going for. When
you think about the business you want to run, to whom do you see yourself selling? Is your
business B2B, B2C, C2C, or C2B?
B2B: Business to Business Ecommerce
The B2B model focuses on providing products from one business to another. While there are
many business service providers in this space, you will find software companies, office
furniture and supply companies, document hosting companies and many other ecommerce
business models under this heading.

B2c: Business to Consumer Ecommerce


The B2C sector is what most people think of when they envision an e-commerce business.
This is the deepest market, and many of the names you'll see here are in known quantities
even offline. B2c ecommerce sales are the traditional retail model, where a business sells to
individuals, but the business is conducted online as opposed to a physical store.

13/14
UID: D21BCA16016 Course Code: 21ODBCT153

C2C Ecommerce
B2B and B2C are quite intuitive concepts for most of us, but the idea of C2C is different.
What does a consumer-to-consumer ecommerce business look like?

Built on the rise of the e-commerce sector and growing consumer confidence in online
trading, these e-commerce websites allow customers to trade, buy and sell items in exchange
for a small commission paid on the site. Opening a C2C site requires careful planning.
C2B: Consumer to Business Ecommerce
C2B is another model that most people don't immediately think about, but it is growing in
vogue. This online commerce business is when the consumer sells goods or services to
businesses, and is roughly equivalent to a sole proprietorship serving a larger business.
Government / Public Administration Ecommerce
The models listed above are the primary ecommerce retail structures, but they are not the
only ones. Other types include government/public administrations that deal with businesses
or consumers.

B2G (also known as B2A), for businesses whose only customers are governments or public
administration types. An example is Synergetics Inc. in Ft. Collins, Colorado, which provides
contractors and services to government agencies.
C2G (also known as C2A): Usually individuals who pay universities to the government for
taxes or tuition.

16. Elucidate the difference between smart cards, credit cards and debit
cards and also elaborate where they are used in real life.
17. Explain how apache web server works with neat diagram.

*****************

14/14

You might also like