Answer this fast as possible. one word answer?? 1. The first computer virus. * 2. A small computer network based on unbounded media * 3. The number of bits that can be transferred per second over a given transmission medium. * 4. A device where two different networks are linked together. * 5. It is registering, trafficking in, or using a domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else. * 6. A self-replicating computer program which does not need to attach itself to an existing program. * Define :- 7. What is computer ethics? * 8.What is data transmission? * 9. What is mobile computing? * 10. What is hardware security? * 11. what is newsgroup? * 12.What is protocol? * 13. Write any Four advantages of Email. * 14. What is digital citizen ? * 15. Write the full form of : ADSL, ICT and CIA *
Answers
1) Brain, the first PC virus, began infecting 5.2" floppy disks in 1986. As Securelist reports, it was the work of two brothers, Basit and Amjad Farooq Alvi, who ran a computer store in Pakistan.
2)Unguided medium transport electromagnetic waves without using a physical conductor. This type of communication is often referred to as wireless communication. Signals are normally broadcast through free space and thus are available to anyone who has a device capable of receiving them.
The below figure shows the part of the electromagnetic spectrum, ranging from 3 kHz to 900 THz, used for wireless communication.
Unbounded Transmission Media
Unguided signals can travel from the source to the destination in several ways: Gound propagation, Sky propagation and Line-of-sight propagation as shown in below figure.
Unbounded Transmission Media
Propagation Modes
Ground Propagation: In this, radio waves travel through the lowest portion of the atmosphere, hugging the Earth. These low-frequency signals emanate in all directions from the transmitting antenna and follow the curvature of the planet.
Sky Propagation: In this, higher-frequency radio waves radiate upward into the ionosphere where they are reflected back to Earth. This type of transmission allows for greater distances with lower output power.
Line-of-sight Propagation: in this type, very high-frequency signals are transmitted in straight lines directly from antenna to antenna.
We can divide wireless transmission into three broad groups:
Radio waves
Micro waves
Infrared waves
3) As the term implies, the speed in bps is equal to the number of bits transmitted or received each second. Larger units are sometimes used to denote high data speeds. One kilobit per second (abbreviated Kbps in the U.S.; kbps elsewhere) is equal to 1,000 bps.
4) Bridges are used to connect two or more hosts or network segments together. The basic role of bridges in network architecture is storing and forwarding frames between the different segments that the bridge connects.
5) Cybersquatting (also known as domain squatting), according to the United States federal law known as the Anticybersquatting Consumer Protection Act, is registering, trafficking in, or using an Internet domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else.
6) A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes on the network. It may do this without any user intervention. Unlike a computer virus, a computer worm does not need to attach itself to an existing program.
7) Computer ethics is a part of practical philosophy concerned with how computing professionals should make decisions regarding professional and social conduct. ... Any informal code of ethical conduct that exists in the work place.
8) Data transmission is the transfer of data over a point-to-point or point-to-multipoint communication channel. Examples of such channels are copper wires, optical fibers, wireless communication channels, storage media and computer buses
9) Mobile computing is human–computer interaction in which a computer is expected to be transported during normal usage, which allows for transmission of data, voice and video. Mobile computing involves mobile communication, mobile hardware, and mobile software.
10) A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing. ... These modules traditionally come in the form of a plug-in card or an external device that attaches directly to a computer or network server.
11) a forum on the Usenet service for the discussion of a particular topic.
12)the official procedure or system of rules governing affairs of state or diplomatic occasions.
13) Advantages
- Emails are delivered extremely fast when compared to traditional post.
- Emails can be sent 24 hours a day, 365 days a year.
- Webmail means emails can be sent and received from any computer, anywhere in the world, that has an internet connection .
- Cheap - when using broadband , each email sent is effectively free.
14) A digital citizen is a person using information technology in order to engage in society, politics, and government. As defined by Karen Mossberger, one of the authors of Digital Citizenship: The Internet, Society, and Participation, digital citizens are "those who use the internet regularly and effectively.
15) Asymmetric digital subscriber line (ADSL) is a type of digital subscriber line (DSL) technology, a data communications technology that enables faster data transmission over copper telephone lines than a conventional voiceband modem can provide.