Plus One Computer Science Chapter Wise previous Questions Chapter 12 Internet and Mobile Computing

Kerala Plus One Computer Science Chapter Wise previous Questions Chapter 12 Internet and Mobile Computing

Question 1.
a) Define Intranet (March – 2015)
b) Write the structure of an e-mail address.
Answer:
a) Intranet : A private network inside a company or organisation is called an intranet,
b) The structure of the email address is given below username@domainname eg:[email protected]

Question 2.
a) Acquiring information such as username, password, credit card details etc., using misleading websites is known as (Say – 2015)
b) Pick the odd one out: Google, Safari, Mozilla Firefox, Internet explorer.
Answer:
a) Phishing
b) Google it is a search engine All others are web browsers

Question 3.
Bluetooth can be used for communication (Say – 2015)
i) long distance
ii) short distance
iii) mobile phone
iv) all of these
Answer:
ii) short distance / iii) mobile phone

Question 4.
Pick the odd one from the following list: (March – 2016)
a) Spam
b) Trojan horse
c) Phishing
d) Firewall
Answer:
Firewall

Question 5.
Which one of the following technologies is used for locating geographic positions according to satellite-based navigation system? (Say – 2016)
a) MMS
b) GPS
c) GSM
d) SMS
Answer:
b) GPS

Question 6.
Explain “DOS attack’’ on servers. (Say – 2016)
Answer:
Denial of Service(DoS) attack : Its main target is * a Web server. Due to this attack the Web server/ computer forced to restart and this results refusal of service to the genuine users. If we want to access a website first you have to type the web site address in the URL and press Enter key, the browser requests that page from the web server. Dos attacks send huge number of requests to the web server until it collapses due to the load and stops functioning.

Question 7.
Find the best matches from the given definitions for the terms in the given list. (Worm, Hacking, Phishing, Spam) (March – 2017)
a) Unsolicited emails sent indiscriminately.
b) A technical effort to manipulate the normal behavior of a networked computer system.
c) A stand-alone malware program usually makes the data traffic slow.
d) Attempt to acquire information like usernames and passwords by posing as the original website.
e) Appear to be a useful software but will do damage like deleting necessary files.
Answer:
Worm – c
Hacking – b
Phishing-d
Spam – a

Question 8.
Social media plays an important role in today’s life. Write notes supporting and opposing its impacts. (March – 2015)
Answer:
Advantages of social media.

  • Bring people together : It allows people to maintain the friendship.
  • Plan and organize events: It allows users to plan and organize events.
  • Business promotion : It helps the firms to promote their sales.
  • Social skills: There is a key role of the formation of society.

Disadvantages.

  • Intrusion to privacy : Some people may misuse the personal information.
  • Addiction : sometimes it may waste time and money.
  • Spread rumours : The news will spread very quickly and negatively

Question 9.
One of your friends wants to send an email to his father abroad to convey him birthday wishes with a painting done by him. Explain the structure and working of email to him. (Say – 2015)
Answer:
The email message contains the following fields.

  • To : Recipient’s address will be enter here. Multiple recipients are also allowed by using coma.
  • CC : Enter the address of other recipients to get a carbon copy of the message.
  • bcc : The address to whom blind carbon copies are to be sent. This feature allows people to send copies to third recipient without the knowledge of primary and secondary recipients.
  • From : Address of the sender
  • Reply to : The email address to which replies are to be sent.
  • Subject: Short summary of the message.
  • Body : Here the actual message is to be typed.

Question 9.
Briefly explain any three mobile communication services. (March – 2016)
Answer:
Mobile communication services.
a) Short Message Service(SMS) : It allows transferring short text messages containing up to 160 characters between mobile phones. The sent message reaches a Short Message Service Center(SMSC), that allows ‘store and forward’ systems. It uses the protocol SS7(Signaling System No7), The first SMS message ‘Merry Christmas’ was sent on 03/12/1992 from a PC to a mobile phone on the Vodafone GSM network in UK.

b) Multimedia Messaging Service (MMS): It allows sending Multi-Media(text, picture, audio and video file) content using mobile phones. It is an extension of SMS.

c) Global Positioning System(GPS): It is a space-based satellite navigation system that provides location and time information in all weather conditions, anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites. The system provides critical capabilities to military, civil and commercial users around the world. It is maintained by the United States government and is freely accessible to anyone with a GPS receiver. GPS was created and realized by the U.S. Department of Defense (DoD) and was originally run with 24 satellites. It is used for vehicle navigation, aircraft navigation, ship navigation, oil exploration, Fishing, etc. GPS receivers are now integrated with mobile phones.
Plus One Computer Science Chapter Wise previous Questions Chapter 12 Internet and Mobile Computing 1

d) Smart Cards : A smart card is a plastic card with a computer chip or memory that stores and transacts data. A smart card (may be like your ATM card) reader used to store and transmit data. The advantages are it is secure, intelligent and convenient.

The smart card technology is used in SIM for GSM phones. A SIM card is used as identification proof.

Question 10.
Define Internet. Compare two types of Internet connectivities namely Dial-up and Broadband. (March – 2016)
Answer:
Types of connectivity
There are two ways to connect to the internet. First one dialing to an ISP’s computer or with a direct connection to an ISP.

Question 11.
What is browsing? Briefly explain the steps needed for browsing. (Say – 2016)
Answer:
The process of visiting a website is called browsing.
Web Browsing steps are given below,

  • The browser determines the URL entered.
  • The browser asks the DNS for URLS corresponding IP address (Numeric address)

Plus One Computer Science Chapter Wise previous Questions

Leave a Comment