A. laser.
B. twain.
C. cartridge.
D. media.
Twain is a standard software protocol and application programming interface (API) that regulates communication between software applications and imaging devices such as scanners and digital cameras.
A. system address.
B. SYSID.
C. process ID.
D. IP address.
IP address is recognized by a unique number connected to a network.
A. web-commerce.
B. e-commerce.
C. m-commerce.
D. mobile purchases.
The term m-commerce stands for mobile commerce, which means buying and selling of goods and services on the mobile.
A. Mesopotamians.
B. John Napier.
C. Blaise pascal.
D. Leibnitz.
John Napier developed the concept of logarithm slide rule and Napier’s bones.
A. special-purpose computers.
B. general-purpose computers.
C. PDAs.
D. laptop computers.
The notebooks are also called laptop computers because they can be carried in brief-cases.
A. minicomputer.
B. mainframe computer.
C. super computer.
D. microcomputers.
MAGNUM is a minicomputer which is more powerful than microcomputers in terms of processing power and capabilities.
A. analog-digital computer.
B. logical computer.
C. super-computer.
D. hybrid computer.
Hybrid computer have both the features of analog and digital computer. In these computers, some of the calculations are done in a analog manner and some in a digital manner.
A. input.
B. output.
C. control.
D. main memory.
The input unit provides information from outside into the computer system.
A. binary information technology.
B. binary number.
C. binary digit.
D. bilingual number.
There are two binary digits 0 and 1, which in short, is known as bit.
A. hardware.
B. programs.
C. input.
D. output.
Computer programs are instructions for a computer. All the instructions to the program are given in the form of code.
A. analog computers.
B. hybrid computers.
C. digital computers.
D. mini- computers.
In analog computers, computation is carried out with physical quantities such as voltage, length, current, temperature etc. They operate by measuring rather than counting.
A. analog computers.
B. hybrid computers.
C. digital computers.
D. mini-computers.
Digital computers convert the data into digits (0 and 1) and all the operations are carried out on these digits at extremely fast rates.
A. CPU.
B. supercomputers.
C. analytical engine.
D. digital computers.
Analytical engine is called a pioneer computer because it was the first design to introduce the basic architecture of modern computers.
A. kilobyte.
B. megabyte.
C. gigabyte.
D. byte.
A byte can store one character in binary form i.e.1 byte means 8 bits.
A. Charles Babbage.
B. Herman Hollerith.
C. Von Neumann.
D. Herman Babbage.
Punched card was developed by Charles Babbage but was fabricated by Herman Hollerith.
A. mini-computer.
B. macro-computer.
C. super-computer.
D. mainframe computer.
Super computers are the most powerful computers among digital computer. ANURAG is one of them.
A. Input-Process-Output.
B. Input Process Organization.
C. Integrated Procedure Operation.
D. Integrated Procedure Output.
In IPO cycle, every operation undergoes three phases namely input, process and output.
A. Eckert.
B. Mauchly.
C. Neumann.
D. M.V. Wilkes.
Von Neumann gave the concept of stored program in which the machine instructions are stored with data internally.
A. Herman Hollerith.
B. Howard Aiken.
C. John Von Neumann.
D. Charles Babbage.
Charles Babbage’s great inventions of difference engine and analytical engine earned him the title of ‘Father of Modern Computers’ a fitting tribute to him.
A. parallel processing.
B. vacuum tube.
C. integrated circuit.
D. transistor.
Parallel processing concept is used in fifth generation computers. In this concept, many processors are grouped to function as one large group processor.
A. second generation computers.
B. third generation computers.
C. fourth generation computers.
D. fifth generation computers.
The goal of fifth generation computers is to develop devices that respond to natural language input and are capable of learning and self-organization.
A. VLSI circuits.
B. transistor.
C. vacuum tubes.
D. integrated circuit.
VLSI circuits pack about 50000 transistors in a chip which makes the computer smaller and faster.
A. transistors.
B. integrated circuitry.
C. vacuum tubes.
D. built in error detecting devices.
An IC also known as chip is wafer thin slice of extremely purified silicon crystals.
A. vacuum tubes.
B. integrated circuit.
C. transistor.
D. VLSI circuit.
Transistors are reliable as compared to vacuum tubes and they occupy less space.
A. vacuum tubes.
B. transistor.
C. magnetic tapes.
D. magnetic disks.
First generation computers used thermionic valves (vacuum tubes) and machine languages were used for giving instructions.
A. ALU.
B. memory.
C. control unit.
D. input device.
ALU is one of the components of CPU which carries out arithmetic and logical operations.
A. 1000 bytes.
B. 964 bytes.
C. 1024 bytes.
D. 1064 bytes.
One KB equals to 2^10 bytes i.e. 1024 bytes.
A. accuracy.
B. speed.
C. reliablity.
D. versatility.
Computer system is versatile in nature. It can perform repetitive jobs efficiently.
A. is operated from the control panel.
B. is controlled by the input data entering the system.
C. controls the storage unit.
D. controls all input, output and processing.
CPU carries out the given process and supervises the entire system.
A. integrated circuit.
B. arithmetic logical unit.
C. data processor.
D. memory cell.
The memory of a computer can be thought of as cells. Each of these cells is further broken into smaller parts known as bits. A number of bits together are used to store data instructions by the combination of 0 and 1.
A. 4 bits.
B. 8 bits.
C. 16 bits.
D. 64 bits.
Nibble is an order of 2^2 bits i.e. 4 bits.
A. firmware.
B. hardware.
C. software.
D. liveware.
Firmware is prewritten program permanently stored in read-only memory that configures the computer and is not easily modifiable.
A. PARAM.
B. PACE.
C. VAX.
D. CDC-205.
VAX is not developed in India. It is a minicomputer, which is less powerful than a supercomputer.
A. Transfer Action Position.
B. Transformation of Active Point.
C. Terminal Access Point.
D. Termination Action Process.
TAP stands for Terminal Access Point. A terminal is provided that is capable of not sending a useless probe request to detect a stealth access point. The terminal communicates with a normal access point that reports a network identifier and a stealth access point that does not report a network identifier.
A. Nested Interactive Unit.
B. Nested Internet Unit.
C. Network Interactive Unit.
D. Network Interface Unit.
NIU stands for Network Interface Unit. It helps to establish communication between the server and the workstations.
A. a firewall.
B. a cyber wall.
C. a virus wall.
D. an archie wall.
A virus wall is a program used to block the transmission of files "infected" by a virus. It is usually implemented as a WWW Proxy or Mail Relay. A virus wall may be considered to be a part of a firewall.
A. Character Desktop Main Area.
B. Code Durability Main Access.
C. Character Division Multiple Access.
D. Code Division Multiple Access.
Code Division Multiple Access (CDMA) is a channel access method utilized by various radio communication technologies.
A. Wired Local Lance.
B. World Local Loop.
C. Wired Local Loop.
D. Wireless Local Loop.
Wireless Local Loop (WLL), is a term for the use of a wireless communications link as the "last mile / first mile" connection for delivering plain old telephone service (POTS) and/or broadband Internet to telecommunications customers.
A. Great System Magic.
B. Global System Mark.
C. Great Source Of Management.
D. Global System Mobile.
GSM is the most popular standard for mobile phones in the world. Its promoter, the GSM Association, estimates that 80% of the global mobile market uses this standard.
A. frequency.
B. bandwidth.
C. baud rate.
D. wavelength.
Bandwidth is a measure of available or consumed data communication resources expressed in bits/second or multiples of it (kilobits/s, megabits/s etc.).
A. short cable length.
B. centralization.
C. fault diagnosis.
D. use of hub.
Bus topology has a short cable length because there is a single common path connecting all the nodes.
A. Large Application Number.
B. Large Authorized Network.
C. Local Area Network.
D. Large Authorization Network.
A Local Area Network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport.
A. Operating System Interconnection.
B. Open Source Interconnection.
C. Open Systems Interconnections.
D. Operating Area Interconnections.
The Open Systems Interconnection Reference Model (OSI Reference Model or OSI Model) is an abstract description for layered communications and computer network protocol design.
A. File Transfer Protocol.
B. File Transaction Protocol.
C. Folder Time Delay.
D. Function Transfer Part.
File Transfer Protocol (FTP) is the name of a special set of protocols used by computers connected over the Internet to transfer files.
A. World Wide Workshop.
B. World Wide Web.
C. World Wide Warehouse.
D. World Wide Workstation.
The World Wide Web (commonly abbreviated as "the Web") is an elaborate set of interlinked hypertext documents accessed via the Internet.
A. DoD.
B. Ddo.
C. Odd.
D. ODD.
The ARPANET (Advanced Research Projects Agency Network) developed by ARPA of the United States Department of Defense (DoD) during the Cold War, was the world's first operational packet switching network, and the predecessor of the global Internet.
A. are generally written in HTML.
B. are stored on ISP servers.
C. can be opened without the browser.
D. can have the same URL.
A web page or webpage is a document or resource of information(written in HTML) that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a computer screen.
A. is used so that employees cannot surf the internet.
B. destroys worms and viruses.
C. is a fireproof compartment.
D. protects against unauthorized access.
A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting outward communication. It is also a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all computer traffic between different security domains based upon a set of rules and other criteria.
A. are virus.
B. are self replicating.
C. are files sent by web servers.
D. offer protection against computer virus.
In computing, a cookie(also browser cookie, computer cookie, tracking cookie, web cookie, internet cookie and HTTPcookie) is a small string of text stored on a user's computer by a web browser.
A. gathers unauthorized information with malicious intent.
B. break the security of a computer system.
C. damage the system they break into.
D. create viruses and introduce them into systems.
In common usage, a hacker is a person who breaks into computer.
A. Video conferencing is audio and video communication in real time.
B. Networking is not necessary for video conferencing.
C. E-mail is similar to chatting on the internet.
D. Web page and web site are synonyms.
A videoconference (also known as a videoteleconference) is a set of interactive telecommunication technologies, which allow two or more locations to interact via two-way video and audio transmissions simultaneously.
A. URL is the unique address of a file.
B. ISP is an important internet protocol.
C. HTTP is called a stateless protocol.
D. A browser is used to locate and display Web pages.
ISP is the Internet Service provider which offers access to internet.
A. is used to create web pages.
B. is used by the browser to talk with a web server.
C. breaks a message into fixed sized packets.
D. marks the addresses on the packets.
Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems. It is used for retrieving inter-linked resources led to the establishment of the World Wide Web.
Through video conferencing, two or more people who are far apart can communicate in real time, as though sitting face to face for a meeting. Besides the audio and visual transmission of activities, videoconferencing can be used to share documents, computer-displayed information, and whiteboards.
The core technology used in a video-teleconference system is digital compression of audio and video streams in real time. The hardware or software that performs compression is called a codec (coder/decoder). Compression rates of up to 1:500 can be achieved. The resulting digital stream of 1s and 0s is subdivided into labelled packets, which are then transmitted through a digital network.
The devices for video conferencing include:
for Video input : video camera or webcam
for Video output : computer monitor , television or projector
for Audio input : microphones
for Audio output : loudspeakers or telephone
for Data transfer: analog or digital telephone network, LAN or Internet
There are two kinds of video conferencing systems:
Dedicated systems that have all required components packaged into a single piece of equipment.
Desktop systems that are add-ons to normal PCs. Videoconferences carried out using PCs are also known as e-meetings.
Videoconferencing has a great impact on education where it provides students with the opportunity to learn by participating in 2-way communication. Also, teachers from any where in the world can be brought to classes in remote or isolated places. Students can visit another part of the world to speak with others, visit a zoo, a museum, etc. In the field of medicine and healthcare, it can help in diagnosis, consulting, transmission of medical images. It can also be used to facilitate legal processing and business dealings.
3G stands for third generation of wireless networks, combining high-speed mobile access, carrying voice and data (including video, text, multimedia). The 3G networks cover network technologies including GSM, CDMA, WCDMA, TDMA and WiMAX. The mobile network industry is keen to adopt 3G as it feels that multimedia based content is quickly becoming the norm. This includes services like - Music downloads , Mapping/navigation, Instant messaging, Web surfing, Email services and Gaming.
3G allows high bandwidth, packet based transmission at high data rates. EDGE (Enhanced Data rates for Global Evolution) is an interface that will make it possible for 3G devices to have high data transfer rates.
The Ethernet card allows your computer to connect to a network where all the systems are physically cabled together. It handles only digital signals.
A modem, also connects a computer to a network but it changes digital computer signals to analog signals for transfer over phone lines.
Network cards are thousands of times faster than a modem. A modem lets you connect to an ISP, a network card lets you connect to a network or even a modem.
URL, or Uniform Resource Locator, is the location of a file on the Web. When we type the address of a Web page in the browser, we give the URL.
The most common format of a URL is - http://www.mytown.com/shopping/aasd1.html.
The URL has two parts – the first part, http:// gives the protocol used to locate the file on the Web.
Http represents the Hyper Text Transfer Protocol, which is used to transfer Web pages across the Internet to Web browsers such as Netscape Navigator, Internet Explorer, or Linux. The protocol is followed by a colon and two slashes (://).
The portion of the URL following the protocol , here - www.mytown.com,
specifies the name of the host computer to access. WWW stands for World Wide Web. The right-most designator (here, .com) describes the type of institution or organization.
Following the host name, the directory structure and filename are mentioned. Here, shopping is a directory under the root directory of the host you are accessing. The file aasd1.html is located in this directory.
It is imperative to secure a network so that only authorized users and programs can access data. Some methods usually used are –
Authorization – this checks whether the person wishing to use a resource has the permission to do so. This is done through logins.
Authentication – uses passwords to check that the logged in user is who he claims to be.
Use of Smart Cards – This card has details of the holder on it and generates a code that the computer can recognize.
Use of Biometrics – using features that are unique to everybody, like finger prints, retina patterns to identify the user.
Web pages are generally created using html, and a collection of Web pages will form a website.
A website is a destination whereas a web portal acts as an entry point to various services or resources. The portal will usually include a search facility, directory of other sites, news, e-mail, etc. For example, Yahoo.
Generally, there is no need to login into a website, it provides general information for any user who might visit. The portal will have a login facility and will provide information based on who you are.
Businesses of various sizes have various computer needs. Large businesses generally have large computer setups, such as mainframes and networks. The network usually has a client-server architecture, which is a type of division of labour for computing.
Under the client-server architecture, the server functions as the "brains" of the network, serving a group of client computers, commonly called workstations. The server will be a large-capacity computer, with a large amount of data and application software stored on it. The client computers are smaller and have to place requests for data and applications to the server, which then carries out these requests.
The Internet revolves around the client-server architecture. Your computer runs software called the client and it interacts with another software known as the server located at a remote computer. The client is usually a browser such as Internet Explorer, Netscape Navigator or Mozilla. Browsers interact with the server through protocols. These protocols help in the accurate transfer of data through requests from a browser and responses from the server.
Star topology is also known as star network. It is one of the most common network setups where each of the devices and computers on a network connects to a central hub. It needs more cable to be networked than the usual bus topology. It is used in homes and offices. A major disadvantage of this type of network topology is that if the central hub fails, all computers connected to that hub would be disconnected.
Speed: Sharing and transferring files within networks are very rapid. Thus, it saves time while maintaining the integrity of the file.
Cost: Individually licensed copies of many popular software programs can be costly. Networkable versions are available at considerable savings. Shared programs on a network allow for easier upgrading of the program on one single file server instead of upgrading individual workstations.
Security: Sensitive files and programs on a network are password protected (established for specific directories to restrict access to authorized users) or designated as “copy inhibit”, so that you do not have to worry about illegal copying of programs.
Centralized Software Management: Software can be loaded on one computer (the file server) eliminating the need to spend time and energy installing updates and tracking files on independent computers throughout the building.
Resource Sharing: Resources such as printers, fax machines and modems can be shared.
Electronic mail: E-mail aids in personal and professional communication. Electronic mail on a LAN can enable staff to communicate within the building, having not to leave their desk.
Flexible Access: Access their files from computers throughout the firm
Star Topology
In the computer networking world, the most commonly used topology in LAN is the star topology. Star topologies can be implemented in homes, offices or even in a building. All the computers in the star topologies are connected to central devices like hub, switch or router. The functionality of all these devices is different. Computers in a network are usually connected with the hub, switch or router with the Unshielded Twisted Pair (UTP) or Shielded Twisted Pair Cables.
Mesh Topology
a) LAN (Local Area Network): A group of computers that shares a common connection and is usually in a small area or even in the same building. For example, it can be an office or a home network. It is usually connected by Ethernet cables and has high speed connections. If it was a wireless setup, it would be called a WLAN, which would have a lower connection speed.
b) MAN (Metropolitan Area Network): This is a larger network that connects computer users in a particular geographic area or region. For example, a large university may have a network so large that it may be classified as a MAN. The MAN network usually exists to provide connectivity to local ISPs, cable TV, or large corporations. It is far larger than a LAN and smaller than a WAN. Also, large cities like London and Sydney, Australia, have metropolitan area networks.
c) WAN: (Wide Area Network) This is the largest network and can inter-connect networks throughout the world because it is not restricted to a geographical location. The Internet is an example of a worldwide public WAN. Most WANs exist to connect LANs that are not in the same geographical area. This technology is high speed and very expensive to setup.
Analog: Analog signals are continuous electrical signals that vary in time. In other words, an Analog or analogue signal is any continuous signal for which the time varying feature (variable) of the signal is a representation of some other time varying quantity, i.e., analogous to another time varying signal. It differs from a digital signal in terms of small fluctuations in the signal which are meaningful.
· As opposed to Token Ring's single ring, FDDI uses two rings to achieve better results and less chance of failure.
· In a basic Token Ring network, at any instant, there is a single active ring monitor which supplies the master clock for the ring, whereas in FDDI, this approach is not ideal because of the high data rates. Instead, each ring interface has its own local clock and outgoing data is transmitted using this clock.
· Unlike the basic Token Ring which is based on the use of priority and reservation bits, the priority operation of the FDDI ring uses a principle that is based on a parameter known as the Token Rotation Time or TRT.
· FDDI uses a timed token protocol where Token Ring uses
priority /reservation token access, leading to differences in frame
format and how station traffic is handled.
Although hubs and switches both link the PCs in a network, a switch is more expensive and a network built with switches is generally considered faster than one built with hubs.
When a hub receives a packet of data at one of its ports from a PC on the network, it transmits the packet to all of its ports and, thus, to all of the other PCs on the network. If two or more PCs on the network try to send packets at the same time a collision is said to occur. When that happens all the PCs have to go though a process described in CSMA/CD to resolve the conflict. Each Ethernet Adapter has both a receiver and a transmitter. Because they have to operate at half duplex (data flows one way at a time) and a hub retransmits data from one PC to all of the PCs, the maximum bandwidth is 100 Mhz and that bandwidth is shared by all the PC's connected to the hub. The result is, when a person downloads a large file from another computer, the network becomes congested.
Two computers can be connected directly together in an Ethernet with a crossover cable. A crossover cable doesn't have a collision problem. It hardwires the Ethernet transmitter on one computer to the receiver on the other. Data can be sent in both directions simultaneously. The maximum available bandwidth is 200 Mbps, 100 Mbps each way, and there are no other PC's with which the bandwidth must be shared.
An Ethernet switch automatically divides the network into multiple segments, acts as a high-speed, selective bridge between the segments, and supports simultaneous connections of multiple pairs of computers. When the switch receives a packet, it reads the destination address in the packet, establishes a temporary connection between the source and destination ports, sends the packet on its way, and then terminates the connection.
The Transmission Control Protocol (TCP) is one of the core protocols of the Internet Protocol suite, often simply referred to as TCP/IP. Using TCP, applications on different networked hosts can create connections to one another, over which they can exchange streams of data. The protocol guarantees reliable and in-order delivery of data from sender to receiver. TCP provides connections that need to be established before sending data. TCP connections have three phases:
1. connection establishment
2. data transfer
3. connection termination
At the receiver’s end, the TCP arranges the received packets in proper sequence and discards duplicate packets while at the senders end, TCP makes sure any lost or damaged packets are resent, so that the message is properly communicated.
The Internet Protocol (IP) is a data-oriented protocol used for communicating data across a packet-switched internet work.
IP (Internet Protocol ) is a connectionless protocol. This means that IP does not establish a handshake with connected hosts in order to start generating data. The functions of IP can be simply put as:
- Handling address mapping for the transmitting and receiving hosts.
- Creating the most basic unit of transmission, a datagram. A datagram has a particular format and size.
Bus topology connects each computer (node) to a single segment trunk (a communication line, typically coaxial cable, that is referred to as the 'bus'). The signal travels from one end of the bus to the other. A terminator is required at each to absorb the signal so that it does not reflect back across the bus. A media access method called CSMA/MA is used to handle the collision that occurs when two signals are placed on the wire at the same time. The bus topology is passive. In other words, the computers on the bus simply 'listen' for a signal; they are not responsible for moving the signal along.
Advantages:
·
·
·
·
Disadvantages:
·
·
·
·
·
·
· Performance degrades as additional computers are added.
Network topology is defined as the physical inter-connection of various elements (links, nodes, etc.) of a computer network. Network Topologies can be physical or logical. Physical Topology means the physical design of a network including the devices, location and cable installation. Logical topology refers to the fact as to how data actually transfers in a network as opposed to its design.
The network topology recognises four basic topologies:
Bus topology:
A bus topology is a method of transmission on networks that uses a common vehicle for transmissions and is, therefore, categorized as shared communication. Imagine a bus picking up various people from one stop and dropping of people as it travels and picks up a few more. That is what happens in a bus network exactly.
However, in a Bus topology, only one device is allowed to transmit at a given point of time. The DAP or the Distribute Access Protocol has the information about which station has to transmit the data. The data that is being transmitted has frames that will have the source name and the network address.
Ring topology:
Ring topology is used mainly in two kinds of networks:
a)
b)
Token Ring Networks:
Unlike Ethernet, Token Ring uses a ring topology whereby the data is sent from one machine to the next and so on around the ring until it ends up back where it started. It also uses a token passing protocol which means that a machine can only use the network when it has control of the Token. This ensures that there are no collisions because only one machine can use the network at any given time.
Fiber Distributed Data Interface :
The Fiber Distributed Data Interface or FDDI is a 100 mbps line using the LAN network and is connected through a fiber optic cable. The FDDI technology is used where the networks need a high speed bandwidth and need to cover huge distances than the copper wires usually cover. There are two kinds of networks in this category -- one is the fiber optic wire based and the other is the copper wire based called the Copper distributed data interface.
A point-to-point connection is a dedicated communication link between two systems or processes. Think of a wire that directly connects two systems. The systems use that wire exclusively to communicate. The opposite of point-to-point communications is broadcasting, where one system transmits to many.
A telephone call is a circuit-oriented, point-to-point link between two phones. However, calls are usually multiplexed across telephone company trunks; so, while the circuit itself may be virtual, the users are engaging in a point-to-point communication session.
A. present data.
B. input data.
C. output data.
D. store data.
The users feed the data into the system through input devices. For example-keyboard, mouse, joystick, etc.
A. its short cable length.
B. its centralization.
C. its fault diagnosis.
D. the use of hub.
Bus topology has a short cable length because there is a single common path connecting all the nodes.
A. star.
B. bus.
C. ring.
D. circle.
A bus network topology is a network architecture in which a set of clients is connected via a shared communication line called a bus.
InterSpace is an indicator of what the Internet of the future will be like. It has a client/server architecture and hosts multiple users, by incorporating real-time audio and video communication that allows people to interact within a three-dimensional environment.
InterSpace can be used for distance learning, on-line shopping, gaming, and interactive "Cyber-Events". It provides a great way to meet and talk to people from all over the world.
When computers communicate with each other, there needs to be a common set of rules and instructions that each computer follows. A specific set of communication rules is called a protocol. Because of the many ways computers can communicate with each other, there are many different protocols, like, PPP, TCP/IP, SLIP, HTTP, and FTP.
·
·
·
· File Transfer Protocol (FTP), which uses a set of rules to allow transfer of files (uploading and downloading) between the user’s computer and server.
WLL (Wireless local loop) provides wireless communication from fixed locations such as, homes or offices. The quality of service is very good and it supports fax and modem communication, internet and can connect to a Public Call Office. Here, there is a wireless link as the "last mile/first mile" to connect to the telephone service or to broadband internet. The signal transmissions occur through the air over a terrestrial microwave platform instead of through copper or fiber cables.
Base stations are set up with multi-channel transmitters and receivers and customers are provided an interface unit into which the telephone is connected. When a call is made, a signal is sent to the base station, and a connection is made to allow communication. For an incoming call, the base station makes a wireless connection and gets the call through.
The advantages of WLL include the ability to connect with users, even in remote areas without the need for laying new cables and the capacity for broad bandwidth that is not impeded by fiber or cable capacities.
Email or electronic mail is a way of sending electronic messages using the computer and over a network. The recipient does not have to be online for the email to reach successfully. He/she can read the mail when he is online.
Chatting is textual conversation between 2 or more people who are simultaneously online. This communication goes on in real time.
Cybercrime is criminal activity done using computers and the Internet. This includes anything from illegally downloading music files to stealing sensitive data.
Cyber law (or Cyberlaw) describes the legal issues related to use of information technology. Some topics it covers include intellectual property, privacy, freedom of expression, and jurisdiction.
Wireless communication does not use a medium, like cables, for transmission. There are advantages and disadvantages of this mode.
Advantages – 1. Can be used where cable or wires cannot be laid – over mountains, sea etc.
2. Allows mobility, communication can generally be from anywhere, anytime
Disadvantages – 1. It is not secure as anyone with the right receiver can catch the signals
2. Sensitive to atmospheric conditions, like rain, storm etc.
In a properly designed small to medium-sized network, 80 percent of the traffic on a given segment should be local, and not more than 20 percent should need to move across a backbone link.
The main goals of networking have always been to share resources and to provide a medium for communications.
Sharing Resources – among these are included not only printers and fax machines, but other devices like modems and servers. Software and data on the server maybe accessed and shared by different users.
Reducing Cost – It saves money to have a powerful server to store common files rather than have separate computers, each with its own set of files. Sharing other resources too saves on cost.
Reliability - If a machine goes down, another can take over. Copies of important files can be maintained easily.
Speed - Fast communication of data and messages.
The following are the basic requirements for working of a communication system:
1. The sender (source) who creates the message to be transmitted
2. A medium that carries the message
3. The receiver (sink) who receives the message
Broadcast means we are sending digital signals to any device connected to a network.
·
· FDDI's ring operation is basically very similar to the Token Ring early release operation in the way that tokens are passed on the network.
·
·
·
·
FDDI stands for Fiber Distributed Data Interface. The FDDI topology is ring with two counter-rotating rings for reliability and with no hubs. Cable type is fiber-optic. Connectors are specialized. The media access method is token passing. Multiple tokens may be used by the system. The maximum length is 100 kilometers. The maximum number of nodes on the network is 500. Speed is 100 Mbps. FDDI is normally used as a backbone to link other networks. A typical FDDI network can include servers, connectors and links to other network.
As compared to the bus topology, a star network requires more devices and cables to complete a network. The failure of each node or cable in a star network won’t take down the entire network as happens in the Bus topology.
a)
processing.
b)
c)
d)Transmission: Communication of data achieved by the processing of signals.
GSM and CDMA are differing technologies used for wireless communication. One of the basic things that differentiates GSM and CDMA is the way they handle bandwidth and divide up the signals between multiple users.
GSM (Global System for Mobile communication) uses a Time Division method. This means that each device on the local network is allocated a time slice where it "owns" the bandwidth, and it can send/receive its data. If there are 8 available time slices in a given cycle, each phone would then get 1/8th of every cycle in which it could send and receive signals. Each user’s data is digitized and compressed and sent in his own time slot. Data is encrypted for security. The SIM (Subscriber Identity Module) is an important component of the GSM cellular device and contains connection data, memory for data and applications, and a processor.
CDMA (Code Division Multiple Access) is technology that was first used during World War II. CDMA works on the principle of Spread spectrum.The data is sent in small pieces over a number of frequencies available for use. Each user’s data is encrypted in a particular way and at the receiving end, decrypting is done to recover the actual signal.
Viruses and worms are malicious programs that can cause damage to the computer, but there are differences between them.
A computer virus attaches itself to a file enabling it to spread from one computer to another, leaving infections as it travels.
Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect unless you run or open the malicious program. Remember, a virus cannot be spread without a human action, such as running an infected program.
A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which allows it to travel.
The worm has the capability to replicate itself on your system, so your computer can send out hundreds of copies of the worms instead of a single worm, creating a devastating effect. For example, a worm can send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and this continues.
A worm consumes too much system memory causing Web servers, network servers and individual computers to stop responding.
Often, people use the terms Internet and World Wide Web interchangeably, but they are two separate but related things.
The Internet is a massive network of networks, a networking infrastructure. It forms a network in which any computer can communicate with any other computer as long as they are both connected to the Internet. Information that travels over the Internet does so via a variety of ‘ protocols’.
The World Wide Web, or simply Web, is a way of accessing information over the medium of the Internet. It is an information-sharing model that is built on top of the Internet. The Web uses the HTTP protocol to transmit data. The Web also utilizes browsers, such as Internet Explorer or Firefox, to access Web documents called Web pages that are linked to each other via hyperlinks. Web documents also contain graphics, sounds, text and video.
The Web is just one of the ways that information can be distributed over the Internet. The Internet, not the Web, is also used for e-mail, Usenet news groups, instant messaging and FTP. So the Web is just a portion of the Internet, though a large one.
A. nanoscience.
B. microelectrodes.
C. computer forensics.
D. artificial intelligence.
Nanoscience and nanotechnology involves studying and working with matter on an ultra-small scale. One nanometre is one-millionth of a millimetre and a single human hair is around 80,000 nanometres in width.
A. 00000 to 9ffff(16).
B. 00001 to 9ffff(16).
C. 00010 to 9ffff(16).
D. 10000 to 9ffff(16).
In computer science, a memory address is an identifier for a memory location, at which a computer program or a hardware device can store data and later retrieve it. The memory location address is limited from 00000 to 9ffff(16).
A. IBM.
B. Seagate.
C. Microsoft.
D. Magnetic Optical Disk.
A hard disk drive is a non-volatile storage device that stores digitally encoded data. Seagate technology is the largest manufacturer of Hard Disk Drives.
A. floppy disk.
B. hard disk.
C. compact disk.
D. magnetic optic disk.
A hard disk drive is a non-volatile storage device which stores digitally encoded data on rapidly rotating platters with magnetic surfaces. It stores the maximum amount of data.
A. mechanical.
B. electrical.
C. electro magnetic.
D. laser.
A laser is a device that emits light (electromagnetic radiation) through a process called stimulated emission. The term laser is an acronym for Light Amplification by Stimulated Emission of Radiation. This technology is used in compact disks.
A. floppy disk.
B. hard disk.
C. tape drive.
D. CDROM.
CD-ROM is a pre-pressed compact disc that contains data accessible to, but not writable by a computer.
A. 2.
B. 10.
C. 16.
D. 32.