You are on page 1of 4

COMPUTER

APPLICATIONS
Assignment # 1

NOVEMBER 28, 2022


MUHAMMAD FARHAD
BBA FIRST SEMESTER
Question 1: Network topology can be used for the arrangement of various types of
telecommunication networks, including command and control radio networks, industrial field
busses, and computer networks, therefore explain different types of topology.

Ans: - there are different types of network topology. Some of them are mentioned below: -

 Bus topology
 Ring topology
 Mesh topology
 Tree topology
 Star topology

 Bus topology: - Bus topology is a network setup where each computer and network
device is connected to a single cable or backbone. Depending on the type of
computer network card, coaxial cable or an RJ- 45 network cable is used to connect them
together.

 Ring topology: - Ring topology is a type of network topology in which each device is
connected to two other devices on either side via an RJ-45 cable or coaxial cable. This forms
a circular ring of connected devices which gives it its name. Data is commonly transferred in
one direction along the ring, known as a unidirectional ring.

 Mesh topology: - A mesh topology is a network setup where each computer and network
device is interconnected with one another. This topology setup allows for most
transmissions to be distributed even if one of the connections goes down. It is a topology
commonly used for wireless networks.

 Tree topology: - A tree topology is a special type of structure where many connected
elements are arranged like the branches of a tree. For example, tree topologies are
frequently used to organize the computers in a corporate network, or the information in
a database.

 Star topology: - Star topology is a network topology in which each network component is
physically connected to a central node such as a router, hub or switch.
In a star topology, the central hub acts like a server and the connecting nodes act like clients.
When the central node receives a packet from a connecting node, it can pass the packet on
to other nodes in the network. A star topology is also known as a star network.

Question 2: Write down any five types of Attacks and how they are harmful for the system & files?

Ans: - There are many different types of computer or cyber-attacks some of them are listed below:

 Malware attack: - A malware attack is a common cyberattack where malware (normally
malicious software) executes unauthorized actions on the victim's system. The malicious
software (a.k.a. virus) encompasses many specific types of attacks such as ransomware,
spyware, command and control, and more.

Page 1 of 4
 Password attack: - It's a type of cyberattack where hackers attempt to access a file, folder,
account, or computer secured with a password. It's generally done with the help of software
that expedites cracking or guessing passwords.

 Phishing attack: - Phishing is when attackers attempt to trick users into doing 'the wrong
thing', such as clicking a bad link that will download malware, or direct them to a dodgy
website.

 Insider attack: - An insider threat refers to a cyber-security risk that originates from within
an organization. It typically occurs when a current or former employee, contractor, vendor
or partner with legitimate user credentials misuses their access to the detriment of the
organization's networks, systems and data.

 Denial of service attack: - An attack meant to shut down a machine or network, making it
inaccessible to its intended users. DoS attacks accomplish this by flooding the target with
traffic, or sending it information that triggers a crash.

Question 3: Define Software and also enlist its types with the help of diagram?

Software: - Software is a set of instructions, data or programs used to operate computers and
execute specific tasks. There are 2 types of software: system software and application software.

 System software: - System software is a type of computer program that is designed to run a
computer's hardware and application programs.
 Application software: - An application program (software application, or application, or app
for short) is a computer program designed to carry out a specific task other than one relating
to the operation of the computer itself, typically to be used by end-users. Word processors,
media players, and accounting software are examples.

Page 2 of 4
Question 4: How are computer technologies are used in military.

Ans: - Computer technology is helping in creating new advantages for infantry and armour. Things
like: -

• Guided munition systems


• Rocket and explosive defence system for tanks or APC’s
• Advanced biosensors for soldiers
• 3D printable weaponry
• And many other noticeable trends in soldier tech.

Page 3 of 4

You might also like