{"id":45469,"date":"2024-02-19T09:22:08","date_gmt":"2024-02-19T03:52:08","guid":{"rendered":"https:\/\/www.aplustopper.com\/?p=45469"},"modified":"2024-02-19T15:07:14","modified_gmt":"2024-02-19T09:37:14","slug":"plus-one-computer-science-chapter-wise-previous-questions-chapter-12","status":"publish","type":"post","link":"https:\/\/www.aplustopper.com\/plus-one-computer-science-chapter-wise-previous-questions-chapter-12\/","title":{"rendered":"Plus One Computer Science Chapter Wise previous Questions Chapter 12 Internet and Mobile Computing"},"content":{"rendered":"

Kerala Plus One Computer Science Chapter Wise previous Questions Chapter 12 Internet and Mobile Computing<\/h2>\n

Question 1.
\na) Define Intranet (March – 2015)<\/span>
\nb) Write the structure of an e-mail address.
\nAnswer:
\na) Intranet : A private network inside a company or organisation is called an intranet,
\nb) The structure of the email address is given below username@domainname eg:jobi_cg@rediffmail.com<\/p>\n

Question 2.
\na) Acquiring information such as username, password, credit card details etc., using misleading websites is known as (Say – 2015)<\/span>
\nb) Pick the odd one out: Google, Safari, Mozilla Firefox, Internet explorer.
\nAnswer:
\na) Phishing
\nb) Google it is a search engine All others are web browsers<\/p>\n

Question 3.
\nBluetooth can be used for communication (Say – 2015)<\/span>
\ni) long distance
\nii) short distance
\niii) mobile phone
\niv) all of these
\nAnswer:
\nii) short distance \/ iii) mobile phone<\/p>\n

Question 4.
\nPick the odd one from the following list: (March – 2016)<\/span>
\na) Spam
\nb) Trojan horse
\nc) Phishing
\nd) Firewall
\nAnswer:
\nFirewall<\/p>\n

Question 5.
\nWhich one of the following technologies is used for locating geographic positions according to satellite-based navigation system? (Say – 2016)<\/span>
\na) MMS
\nb) GPS
\nc) GSM
\nd) SMS
\nAnswer:
\nb) GPS<\/p>\n

Question 6.
\nExplain \u201cDOS attack\u2019\u2019 on servers. (Say – 2016)<\/span>
\nAnswer:
\nDenial of Service(DoS) attack : Its main target is * a Web server. Due to this attack the Web server\/ computer forced to restart and this results refusal of service to the genuine users. If we want to access a website first you have to type the web site address in the URL and press Enter key, the browser requests that page from the web server. Dos attacks send huge number of requests to the web server until it collapses due to the load and stops functioning.<\/p>\n

Question 7.
\nFind the best matches from the given definitions for the terms in the given list. (Worm, Hacking, Phishing, Spam) (March – 2017)<\/span>
\na) Unsolicited emails sent indiscriminately.
\nb) A technical effort to manipulate the normal behavior of a networked computer system.
\nc) A stand-alone malware program usually makes the data traffic slow.
\nd) Attempt to acquire information like usernames and passwords by posing as the original website.
\ne) Appear to be a useful software but will do damage like deleting necessary files.
\nAnswer:
\nWorm – c
\nHacking – b
\nPhishing-d
\nSpam – a<\/p>\n

Question 8.
\nSocial media plays an important role in today\u2019s life. Write notes supporting and opposing its impacts. (March – 2015)<\/span>
\nAnswer:
\nAdvantages of social media.<\/p>\n