Page 156 - Webapplication11_C11_Flipbook
P. 156

16.   Aryan plays online games. He plays it with online friends who are strangers to him in multiplayer games. One of the
                     player named “The changer” becomes his good companion. They both, together, win multiple games. Thus, become
                     very good friends. “The changer” asks him to meet him at a place in their colony.   [CBSE Sample Paper, 2022]
                      What should Aryan do?
                      i.  He should be happy his friend called him up to meet him.
                     ii.  He should ask him to come to his house instead of going there.
                     iii.  He should immediately inform his parents and agree not to go to meet him.
                     iv.  He should not inform anyone.
                 17.  Which of the following type of data, phishers cannot steal from its target?    [CBSE Sample Paper, 2022]
                      i.  Bank details                                ii.  Phone numbers
                     iii.  Passwords                                  iv.  Apps installed in the mobile
                 18.  ................................ is a connecting device used to interlink computers with the network. These cards are of two types:

                      Internal network cards                                                     [CBSE Sample Paper, 2022]
                      External network cards
                      i.  Network Interface Card                      ii.  RJ 45 jack
                     iii.  Power plug                                 iv.  HDMI
                 19.   Dr. Navjot has a beautiful idea of integrating Artificial Intelligence into Cyber Security to protect individuals from spam
                     messages. She has safeguarded her idea by proposing the correct method to the authorities. Which of the following
                     method she must have chosen?                                                [CBSE Sample Paper, 2022]
                      i.  Patent                                      ii.  Copyright
                     ii.  Trademark                                   iv.  License
              B.  Fill in the blanks.
                  1.  ................................ is an amendment to the Information Technology Act of 2000.
                  2.  Malicious malware is prevented from entering your network using .................................
                  3.  ................................ use electromagnetic waves for transmission without the need of any physical medium.
                  4.  A ................................ can be used to combine smaller LANs to create a larger LAN.
                  5.  In comparison to other topologies ................................ network topology is quite slow.

              C.  State whether the following statements are true or false:
                  1.  Narrowband is the fastest and used for transmitting large amounts of data at high speeds.   .................
                  2.  The Internet is the most fundamental type of WAN.                                       .................
                  3.  A protocol converter is another name for RJ-45.                                         .................
                  4.  The data transfer rate is commonly measured in baud per minute.                         .................
                  5.   Packet-switching allows packets from many sources to share a single line, allowing for more efficient
                     use of the communication medium.                                                         .................

                                                              Section B
                                                     (Subjective Type Questions)

              A.  Short answer type questions.
                  1.  List three preventive measures that must be followed which surfing on the Internet.
                  2.  Differentiate between guided and unguided media.
                  3.  List any two advantages and disadvantages of mesh topology.
                  4.  Briefly explain the following protocols:
                      i.  HTTPS                                       ii.  SMTP
                  5.  Differentiate between hacker and cracker.
                  6.   A person who gains unauthorized access to a computer with the intention of causing damage. What is the name of this
                     crime?                                                                             [CBSE Handbook]


                154     Touchpad Web Applications-XI
   151   152   153   154   155   156   157   158   159   160   161