{"id":45469,"date":"2024-02-19T09:22:08","date_gmt":"2024-02-19T03:52:08","guid":{"rendered":"https:\/\/www.aplustopper.com\/?p=45469"},"modified":"2024-02-19T15:07:14","modified_gmt":"2024-02-19T09:37:14","slug":"plus-one-computer-science-chapter-wise-previous-questions-chapter-12","status":"publish","type":"post","link":"https:\/\/www.aplustopper.com\/plus-one-computer-science-chapter-wise-previous-questions-chapter-12\/","title":{"rendered":"Plus One Computer Science Chapter Wise previous Questions Chapter 12 Internet and Mobile Computing"},"content":{"rendered":"
Question 1. Question 2. Question 3. Question 4. Question 5. Question 6. Question 7. Question 8. Disadvantages.<\/p>\n Question 9. Question 9. b) Multimedia Messaging Service (MMS): It allows sending Multi-Media(text, picture, audio and video file) content using mobile phones. It is an extension of SMS.<\/p>\n c) Global Positioning System(GPS): It is a space-based satellite navigation system that provides location and time information in all weather conditions, anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites. The system provides critical capabilities to military, civil and commercial users around the world. It is maintained by the United States government and is freely accessible to anyone with a GPS receiver. GPS was created and realized by the U.S. Department of Defense (DoD) and was originally run with 24 satellites. It is used for vehicle navigation, aircraft navigation, ship navigation, oil exploration, Fishing, etc. GPS receivers are now integrated with mobile phones. d) Smart Cards : A smart card is a plastic card with a computer chip or memory that stores and transacts data. A smart card (may be like your ATM card) reader used to store and transmit data. The advantages are it is secure, intelligent and convenient.<\/p>\n The smart card technology is used in SIM for GSM phones. A SIM card is used as identification proof.<\/p>\n Question 10. Question 11. Kerala Plus One Computer Science Chapter Wise previous Questions Chapter 12 Internet and Mobile Computing Question 1. a) Define Intranet (March – 2015) b) Write the structure of an e-mail address. Answer: a) Intranet : A private network inside a company or organisation is called an intranet, b) The structure of the email address is […]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[42728],"tags":[],"yoast_head":"\n
\na) Define Intranet (March – 2015)<\/span>
\nb) Write the structure of an e-mail address.
\nAnswer:
\na) Intranet : A private network inside a company or organisation is called an intranet,
\nb) The structure of the email address is given below username@domainname eg:jobi_cg@rediffmail.com<\/p>\n
\na) Acquiring information such as username, password, credit card details etc., using misleading websites is known as (Say – 2015)<\/span>
\nb) Pick the odd one out: Google, Safari, Mozilla Firefox, Internet explorer.
\nAnswer:
\na) Phishing
\nb) Google it is a search engine All others are web browsers<\/p>\n
\nBluetooth can be used for communication (Say – 2015)<\/span>
\ni) long distance
\nii) short distance
\niii) mobile phone
\niv) all of these
\nAnswer:
\nii) short distance \/ iii) mobile phone<\/p>\n
\nPick the odd one from the following list: (March – 2016)<\/span>
\na) Spam
\nb) Trojan horse
\nc) Phishing
\nd) Firewall
\nAnswer:
\nFirewall<\/p>\n
\nWhich one of the following technologies is used for locating geographic positions according to satellite-based navigation system? (Say – 2016)<\/span>
\na) MMS
\nb) GPS
\nc) GSM
\nd) SMS
\nAnswer:
\nb) GPS<\/p>\n
\nExplain \u201cDOS attack\u2019\u2019 on servers. (Say – 2016)<\/span>
\nAnswer:
\nDenial of Service(DoS) attack : Its main target is * a Web server. Due to this attack the Web server\/ computer forced to restart and this results refusal of service to the genuine users. If we want to access a website first you have to type the web site address in the URL and press Enter key, the browser requests that page from the web server. Dos attacks send huge number of requests to the web server until it collapses due to the load and stops functioning.<\/p>\n
\nFind the best matches from the given definitions for the terms in the given list. (Worm, Hacking, Phishing, Spam) (March – 2017)<\/span>
\na) Unsolicited emails sent indiscriminately.
\nb) A technical effort to manipulate the normal behavior of a networked computer system.
\nc) A stand-alone malware program usually makes the data traffic slow.
\nd) Attempt to acquire information like usernames and passwords by posing as the original website.
\ne) Appear to be a useful software but will do damage like deleting necessary files.
\nAnswer:
\nWorm – c
\nHacking – b
\nPhishing-d
\nSpam – a<\/p>\n
\nSocial media plays an important role in today\u2019s life. Write notes supporting and opposing its impacts. (March – 2015)<\/span>
\nAnswer:
\nAdvantages of social media.<\/p>\n\n
\n
\nOne of your friends wants to send an email to his father abroad to convey him birthday wishes with a painting done by him. Explain the structure and working of email to him. (Say – 2015)<\/span>
\nAnswer:
\nThe email message contains the following fields.<\/p>\n\n
\nBriefly explain any three mobile communication services. (March – 2016)<\/span>
\nAnswer:
\nMobile communication services.
\na) Short Message Service(SMS) : It allows transferring short text messages containing up to 160 characters between mobile phones. The sent message reaches a Short Message Service Center(SMSC), that allows \u2018store and forward\u2019 systems. It uses the protocol SS7(Signaling System No7), The first SMS message \u2018Merry Christmas\u2019 was sent on 03\/12\/1992 from a PC to a mobile phone on the Vodafone GSM network in UK.<\/p>\n
\n<\/p>\n
\nDefine Internet. Compare two types of Internet connectivities namely Dial-up and Broadband. (March – 2016)<\/span>
\nAnswer:
\nTypes of connectivity
\nThere are two ways to connect to the internet. First one dialing to an ISP\u2019s computer or with a direct connection to an ISP.<\/p>\n
\nWhat is browsing? Briefly explain the steps needed for browsing. (Say – 2016)<\/span>
\nAnswer:
\nThe process of visiting a website is called browsing.
\nWeb Browsing steps are given below,<\/p>\n\n
Plus One Computer Science Chapter Wise previous Questions<\/a><\/h4>\n","protected":false},"excerpt":{"rendered":"