Plus Two Computer Application Chapter Wise Questions and Answers Chapter 11 Trends and Issues in ICT

Kerala Plus Two Computer Application Chapter Wise Questions and Answers Chapter 11 Trends and Issues in ICT

Plus Two Computer Application Trends and Issues in ICT One Mark Questions and Answers

Question 1.
SIM is_____.
(a) Subscriber Identity Module
(b) Subscriber Identity Mobile
(c) Subscription Identity Module
(d) Subscription Identity Mobile
Answer:
(a) Subscriber Identity Module

Question 2.
The protocol used to send SMS message is______.
Answer:
SS7 (Signalling System No.7)

Question 3.
_____is a standard way to send and receive short text message using mobile phone.
Answer:
Short Message Service(SMS)

Question 4.
_____is a standard way to send and receive message with multimedia content using mobile phone.
Answer:
Multimedia Messaging Service (MMS)

Question 5.
From the following which generation network has more speed?
(a) 1G
(b) 3G
(c) 2G
(d) 4G
Answer:
(d) 4G

Question 6.
GSM stands for______.
Answer:
Global System for Mobiles.

Question 7.
CDMA stands for_____.
Answer:
Code Division Multiple Access

Question 8.
GPRS stands for______.
Answer:
Global Packet Radio Sysetm.

Question 9.
GPS stands for______.
Answer:
Global Positioning System.

Question 10.
EDGE stands for____.
Answer:
Enhanced Data rates for GSM Evolution

Question 11.
_____technology provides speed, voice quality, wider coverage, better security to the mobile network than GSM network.
Answer:
CDMA

Question 12.
Write down the popular standards introduced by 2G network.
Answer:
GSM and CDMA

Question 13.
From the following which one is used analog signals instead of digital signals.
(a) 2G
(b) 3G
(c) 1G
(d) 4G
Answer:
(c) 1G

Question 14.
Consider a person while using internet through mobile phone, it shows G on the network coverage icon. Which type of network is he using and name the communication feature.
Answer:
The network is 2G and the communication feature is GPRS.

Question 15.
Consider a person while using internet through mobile phone, it shows E on the network coverage icon. Which type of network is he using and name the communication feature.
Answer:
The network is 2G and the communication feature is EDGE.

Question 16.
Consider a person while using internet through mobile phone, it shows H on the network coverage icon. Which type of network is he using and name the technology.
Answer:
The network is 3G and the technology is WCDMA

Question 17.
_____is the technology used in 3G.
Answer:
WCDMA (Wideband Code Division Multiple Access)

Question 18.
______is the technology used in 4G.
Answer:
OFDMA (Orthogonal Frequency Division Multiple Access)

Question 19.
From the following which generation network provides good quality images and videos than TV.
(a) 1G
(b) 2G
(c) 3G
(d) 4G
Answer:
(d) 4G

Question 20.
SMS stands for_______.
Answer:
Short Message Service

Question 21.
MMS stands for_______.
Answer:
Multimedia Messaging Service

Question 22.
______is a plastic card with small chip.
Answer:
Smart card

Question 23.
MOS stands for_______.
Answer:
Mobile Operating systems

Question 24.
Name a Mobile Operating System.
Answer:
Android.

Question 25.
KitKat, Jelly Bean, Donut, Cupcake are the different versions of______OperatingSystem.
KitKat, Jelly Bean, Donut, Cupcake 4rmloi
Answer:
Android.

Question 26.
RFID stands for______.
Answer:
Radio Frequency Identification

Question 27.
_______technology helped in Business Logistics to identify, track, sort or detect objects.
Answer:
RFID technology

Question 28.
IPR stands for_______.
Answer:
Intellectual Property Right

Question 29.
WIPO stands for_______.
Answer:
World Intellectual Property Organisation

Question 30.
_______is the exclusive rights to prevent unauthorized copying of inventions by a Creator from the Unauthorised person or company.
Answer:
Patent

Question 31.
______is a unique, simple and memorable sign to promote a brand and hence increase the business and goodwill of a company.
Answer:
Trademark

Question 32.
A product or article is designed so beautifully to attract customers. This type of design is called______.
Answer:
Industrial Design.

Question 33.
Aranmuia Kannadi, Palakkadan Matta, Marayoor Sarkkara, etc are example of______.
Answer:
Geographical indications.

Question 34.
_______is the property right that arises automatically when a person creates a new work by his own and by Law it prevents the others from the unauthorized or intentional copying of this without the permission of the creator.
Answer:
Copyright

Question 35.
From the following which is the symbol for copyright.
(a)  $
(b) ©
(c) ®
(d) ™
Answer:
(b) ©

Question 36.
From the following which is the symbol for Unregistered trademark.
(a)  $
(b) ©
(c) ®
(d) ™
Answer:
(d) ™

Question 37.
From the following which is the symbol for Registered trademark.
(a)  $
(b) ©
(c) ®
(d) ™
Answer:
(c) ®

Question 38.
Unauthorized copying or use of Intellectual property rights such as Patents, Copy rights and Trademarks are called_______.
Answer:
Intellectual Property Infringement.

Question 39.
______prevents others from the unauthorized or intentional copying or use of Patent without the permission of the creator.
Answer:
Patent Infringement

Question 40.
______is the illegal copying, distribution, or use of the software.
Answer:
Piracy

Question 41.
_______prevents others from the unauthorized or intentional copying or use of the Trademark without the permission of the creator.
Answer:
Trademark Infringement

Question 42.
_______prevents others from the unauthorized or intentional copying or use of Copy right without the permission of the creator.
Answer:
Copy right Infringement

Question 43.
______is a virtual environment created by computer systems connected to the internet.
Answer:
Cyber space

Question 44.
A person committing crimes and illegal activities with the use of computer over the Internet. This crime is included as______crime.
Answer:
Cyber crime

Question 45.
State True or False.
Cyber crimes can be classified into three categories such as against individual, property, and Government.
Answer:
True

Question 46.
Phishing, hacking, denial of service attacks, etc are______crimes.
Answer:
Cyber

Question 47.
Odd one out
(a) Identity theft
(b) Harassment
(c) violation of privacy
(d) credit card fraud
Answer:
(d) credit card fraud, it is a cyber crime against individual others are cyber crimes against property

Question 48.
Odd one out
(a) Credit card theft
(b) Intellectual property theft
(c) Internet time theft
(d) Dissemination of obscene material
Answer:
(d) Dissemination of obscene material, It is cyber crime against individual, the others are cyber against property

Question 49.
Odd one out
(a) cyber terrorism
(b) Attacks against e-Governance websites
(c) Impersonation and cheating
(d) Website defacement
Answer:
(c) Impersonation and cheating, it is cyber crime against individual others are cyber crimes against Government

Question 50.
IT Act amended in_______
(a) 2015
(b) 2008
(c) 1900
(d) 1998
Answer:
(b) 2008

Question 51.
IT Act passed in Indian parliament is_______.
Answer:
2000

Question 52.
The laws to prevent cyber crimes is termed as______.
Answer:
Cyber law

Question 53.
_______ is the excessive enthusiasm for acquiring knowledge.
Answer:
Infomania

Question 54.
Phishing is an example of_______.
Answer:
Cyber crime

Question 55.
Expand the term GPRS.
Answer:
General Packet Radio Services.

Question 56.
SMS messages are exchanged using the protocol called_______.
Answer:
SS7(Signaling System No.7)

Question 57.
Pick the odd one out and justify your answer.
(A) SMS
(B) MMS
(C) GPS
(D) Android
Answer:
(D) Android. It is a mobile operating System. Others are mobile communication services.

Question 58.
Which among the following statements is wrong in relation with 2G network?
(A) It support MMS.
(B) It can provide only voice Service.
(C) GSM and CDMA are two popular standards introduced in 2G.
(D) 2G Network were later expanded to include GPRS and EDGE.
Answer:
(B) It can provide only voice service.

Question 59.
Pick the odd one out.
(A) Windows
(B) Android
(C) IOS
(D) Linux
Answer:
(D) Linux. Others are mobile Operating Systems.

Question 60.
_____refers to the exclusive right given to a person over the creation of his/her mind fora period of time.
Answer:
Patent / Intellectual Property Right

Question 61.
Which among the following are considered as violation to privacy?

  1. Keeping hidden cameras in private places
  2. Publishing private photos of individual in social media without their permission
  3. Use of unauthorized software
  4. Using simple password

(A) All the above are correct
(B) 1, 2 and 3 only
(C) 1 and 4 only
(D) 1 and 2 only
Answer:
(D) 1 and 2 only

Plus Two Computer Application Trends and Issues in ICT Two Mark Questions and Answers

Question 1.
What is mobile computing?
Answer:
The drawbacks of Desk computers are, it is heavy and power consumption rate is high and it is not portable (not mobile).

The advancements in computing technology, light weight, and low power consumption have led to the developments of more computing power in hand held devices like laptops, tablets, smart phones, etc.

Nowadays instead of desktops, light weight and low power consumption devices are used because they are cheap and common. Moreover, people are able to connect to others through internet even when they are in move.

Question 2.
Write short notes on SMS.
Answer:
It allows transferring short text messages containing up to 160 characters between mobile phones. The sent message reaches a Short Message Service Center(SMSC), that allows ‘store and forward’ systems.

It uses the protocol SS7(Signaling System No7). The first SMS message ‘Merry Christmas’ was sent on 03/12/1992 from a PC to a mobile phone on the Vodafone GSM network in UK.

Question 3.
Expand GPS? Explain?
Answer:
It is a space-based satellite navigation system that provides location and time information in all weather conditions, anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites.

The system provides critical capabilities to military, civil and commercial users around the world. It is maintained by the United States government and is freely accessible to anyone with a GPS receiver. GPS was created and realized by the U.S.

Department of Defense (DoD) and was originally run with 24 satellites. It is used for vehicle navigation, aircraft navigation, ship navigation, oil exploration, Fishing, etc. GPS receivers are now integrated with mobile phones.

Question 4.
What is a smart card? How is it useful?
Answer:
A smart card is a plastic card with a computer chip or memory that stores and transacts data. A smart card (may be like your ATM card) reader used to store and transmit data. The advantages are it is secure, intelligent and convenient. The smart card technology is used in SIM for GSM phones. A SIM card is used as identification proof.

Question 5.
How do trademark and industrial design differ?
Answer:
1. Trademark:
This is a unique, simple and memorable sign to promote a brand and hence increase the business and goodwill of a company. It must be registered. The period of registration is for 10 years and can be renewed. The registered trademark under Controller General of Patents Design and Trademarks cannot use or copy by anybody else.

2. Industrial designs:
A product or article is designed so beautifully to attract customers. This type of designs is called industrial design. This is a prototype and used as a model for large scale production.

Question 6.
Explain the exclusive right given to the owner by IPR?
Answer:
The exclusive right given to the owner by IPR is owner can disclose their creations for money.

Question 7.
What is piracy?
Answer:
It is the unauthorized copying, distribution, and use of a creation without the permission of the creator. It is against the copy right act and hence the person committed deserve the punishment.

Question 8.
What do you meant by infringement?
Answer:
Unauthorized copying or use of Intellectual property rights such as Patents, Copy rights and Trademarks are called intellectual property infringement(violation). It is a punishable offence.

Question 9.
Match the following.

(a) 1 G(i)  LTE (Long Term Evolution)
(b) 2 G(ii) GSM & CDMA
(c) 3 G(iii) Analog system which support only voice facility
(d) 4 G(iv) WCDMA

Answer:

  • (a) – (iii)
  • (b) – (ii)
  • (c) – (iv)
  • (d) – (i)

Plus Two Computer Application Trends and Issues in ICT Three Mark Questions and Answers

Question 1.
Compare GSM and CDMA standards.
Answer:
1. Global System for Mobile (GSM):
It is the most successful standard. It uses narrow band TDMA(Time Division Multiple Access), allows simultaneous calls on the same frequency range of 900 MHz to 1800 MHz. The network is identified using the SIM(Subscriber Identity Module).

2. GPRS (General Packet Radio Services):
It is a packet oriented mobile data service on the 2G on GSM. GPRS was originally standardized by European Telecommunications Standards Institute (ETSlJ GPRS usage is typically charged based on volume of data transferred. Usage above the bundle cap is either charged per megabyte or disallowed.

3. EDGE(Enhanced Data rates for GSM Evolution):
It is three times faster than GPRS. It is used for voice communication as well as an internet connection.

4. Code Division Multiple Access (CDMA):
It is a channel access method used by various radio communication technologies. CDMA is an example of multiple access, which is where several transmitters can send information simultaneously over a single communication channel.

This allows several users to share a band of frequencies To permit this to be achieved without undue interference between the users, and provide better security.

Question 2.
Differentiate GPRS and EDGE?
Answer:
1. GPRS(General Packet Radio Services):
It is a packet oriented mobile data service on the 2G on GSM. GPRS was originally standardized by European Telecommunications Standards Institute (ETSI) GPRS usage is typically charged based on volume of data transferred. Usage above the bundle cap is either charged per megabyte or disallowed.

2. EDGE(Enhanced Data rates for GSM Evolution):
It is three times faster than GPRS. It is used for voice communication as well as an internet connection.

Question 3.
Explain the features of Android OS.
Answer:
It is a Linux based OS for Touch screen devices such as smart phones and tablets.lt was developed by Android Inc. founded in Palo Alto, California in 2003 by Andy Rubin and his friends. In 2005, Google acquired this.

Ateam led by Rubin developed a mobile device platform powered by the Linux Kernel. The interface of Android OS is based on touch inputs like swiping, tapping, pinching in and out to manipulate on screen objects.

In 2007 onwards this OS is used in many mobile phones and tablets. Android SDK(Software Development Kit) is available to create applications(apps) like Google Maps, FB, What’s App.etc. It is of open source nature and many Apps are available for free download from the Android Play Store hence increase the popularity.

Question 4.
What is cyberspace?
Answer:
Earlier Traditional communication services such as postal service(Snail mail) are used for communication. It is a low speed and not reliable service. In order to increase the speed Telegram Services were used. Its speed was high but it has lot of limitations and expensive too. Latertelephoneswere used for voice communication.

Nowadays telephone system and computer system are integrated and create a virtual(unreal) environment. This is called cyber space. The result for this integration is that tremendous speed and it is very cheap.

Question 5.
Why is cyberspace called a virtual world?
Answer:
The telephone system and computer system are integrated and create a virtual(unreal) environment. This is called cyber space. The result for this integration is that tremendous speed and it is very cheap.

This is an imaginary world. We can see persons with different behaviour. Because of good and bad people we can’t believe blindly. If we search a solution fora problem thousands of answers will get instantly and may confused us.

Question 6.
What is copyright? How does it differ from patent?
Answer:
1. Copyright:
The trade mark is ©, copy right is the property right that arises automatically when a person creates a new work by his own and by Law it prevents the others from the unauthorized or intentional copying of this without the permission of the creator for 60 years after the death of the author.

2. Patents:
A person or organization invented a product or a creation can be protected from unauthorized copying or creation without the permission of the creator by law. This right is called Patent. In India the validity of the right is up to 20 years. After this anybody can use freely.

Question 7.
Why is Cyber law important?
Answer:
Just like normal crimes (theft, trespassing private . area, destroy, etc.) Cyber crimes (Virus, Trojan Horse, Phishing, Denial of Service, Pornography, etc.) also increased significantly. Due to cyber crime, the victims lose money, reputation, etc. and some of them commit suicide.

Cyber law ensures the use of computers and Internet by the people safely and legally. It consists of rules and regulations like Indian Penal Code (IPC) to stop crimes and for the smooth functions of Cyber world. Two Acts are IT Act 2000 and IT Act Amended in 2008.

Question 8.
“Infomania has became a psychological problem”. Write your opinion.
Answer:
Infomania is the excessive desire(infatuation) for acquiring knowledge from various modern sources like the Internet, Email, Social media, Instant Message Application(WhatsApp) and Smart Phones. Due to this the person may neglect daily routine such as family, friends, food, sleep, etc. hence they get tired.

They give first preference to Internet than others. They create their own Cyber World and no interaction to the surroundings and the family. They are more anxious and afraid that they will be out from the cyber world unless they updated.

Question 9.
What do you mean by big data in business? Explain big data analytics.
Answer:
Earlier before buying a product people may consult two or three shopkeepers or local friends and take decisions. But nowadays before taking decisions, people search shopping sites, social network groups(Facebook, WhatsApp, Instagram, twitter, etc), web portals etc. for the best prices. Almost all online sites have product comparison menus.

By this we can compare the price, features, etc. Earlier a product is created and customers are forced to buy. But today customer is the King of the market, so products are created for the choices of the customers.

So companies gathering information about the customers from various sources such as social medias like Internet forums, social blogs, Micro blogs, etc. The volume of such data is very large and considered as big data in business.

With the help of an s/w analysis this big data and generate a report that contains all the information such as choices, taste, needs, status, etc of a customer.

Question 10.
What do you mean by business logistics?
Answer:
It is the management of the flow(transportation) of resources such as food, consumer goods, services, animals, etc in a business between the point of origin (source) and the point of consumption (destination) in order to meet the needs of companies and customers.

Business logistics consists of many more complexities. The effective use of hardware and software reduces the complexities faced in Business logistics. For this the hardware used is RFID(Radio Frequency Identification) tag and the reader.

It is like the barcode. The RFID tag contains all the details of a product and it consists of a combination of transmitter and a receiver. The data stored in the RFID tag can be accessed by a special reader and to read the data no need of RFID tag and reader in a line of site instead both are within a range.

This tag is used in Vehicles as a prepaid tag and makes the payments easier in Toll booths. Similarly, it is useful to take the Census of wild animals also.

Question 11.
How does RFID improve the way business is done?
Answer:
The data stored in the RFID tag can be accessed by a special reader and to read the data no need of RFID tag and reader in a line of site instead both are within a range.

This tag is used in Vehicles as a prepaid tag and makes the payments easier in Toll booths. Similarly, it is useful to take the Census of wild animals also.

In business the tag(contains details about Product code, Price, Batch no., Manufacturing Date, Expiry date, etc.) is stick on the cartons and by using RFID reader process it speedily.

Question 12.
Define Mobile computing.
Answer:
1. Mobile computing:
The drawbacks of Desk computers are, it is heavy and power consumption rate is high and it is not portable(not mobile).

The advancements in computing technology, light weight, and low power consumption have led to the developments of more computing power in hand held devices like laptops, tablets, smart phones, etc.

Nowadays instead of desktops, light weight and low power consumption devices are used because they are cheap and common. Moreover, people are able to connect to others through internet even when they are in move.

Question 13.
“2G networks introduced data services for the mobile. Two popular standards of 2G systems are GSM and CDMA.”

  1. Expand CDMA.
  2. Discuss the different technologies that are used to enhance data communication features of GSM.

Answer:
1. Code Division Multiple Access.

2. different technologies:

a. GPRS (General Packet Radio Services):
It is a packet-oriented mobile data service on the 2G on GSM. GPRS was originally standardized by European Telecommunications Standards Institute (ETSI) GPRS usage is typically charged based on volume of data transferred. Usage above the bundle cap is either charged per megabyte or disallowed.

b. EDGE(Enhanced Data rates for GSM Evolution):
It is three times faster than GPRS. It is used for voice communication as well as an internet connection.

Question 14.
“Mobile communication offers many services apart from the basic voice calling facility”

  1. Name the service which helps to locate a geographical position anywhere on the earth.
  2. Differentiate SMS and MMS.

Answer:
1. GPS

2. Differentiate SMS and MMS:

a. Short Message Service(SMS):
It allows transferring short text messages containing up to 160 characters between mobile phones. The sent message reaches a Short Message Service Center(SMSC), that allows ‘store and forward’ systems. It uses the protocol SS7(Signaling System No7). The first SMS message ‘Merry Christmas’ was sent on 03/ 12/1992 from a PC to a mobile phone on the Vodafone GSM network in UK.

b. Multimedia Messaging Service (MMS):
It allows sending Multi-Media(text, picture, audio and video file) content using mobile phones. It is an extension of SMS.

Question 15.
Write a short note on GPS.
Answer:
Global Positioning System(GPS):
It is a space-based satellite navigation system that provides location and time information in all weather conditions, anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites.

The system provides critical capabilities to military, civil and commercial users around the world. It is maintained by the United States government and is freely accessible to anyone with a GPS receiver.

GPS was created and realized by the U.S. Department of Defense (DoD) and was originally run with 24 satellites. It is used for vehicle navigation, aircraft navigation, ship navigation, oil exploration, Fishing, etc. GPS receivers are now integrated with mobile phones.

Question 16.
Write a short note on Android OS.
Answer:
1. Android OS:
It is a Linux based OS for touch screen devices such as smart phones and tablets.lt was developed by Android Inc. founded in Palo Alto, California in 2003 by Andy Rubin and his friends.

In 2005, Google acquired this. A team led by Rubin developed a mobile device platform powered by the Linux Kernel. The interface of Android OS is based on touch inputs like swiping, tapping, pinching in and out to manipulate on screen objects. In 2007 onwards this OS is used in many mobile phones and tablets.

Question 17.
“In some of the states ration cards have been replaced by smart cards”. What is a smart card? List any two advantages of replacing ration card using smart cards?
Answer:
Smart Cards:
A smart card is a plastic card with a computer chip or memory that stores and transacts data. A smart card (may be like your ATM card) reader used to store and transmit data.

The advantages are it is secure, intelligent and convenient. The smart card technology is used in SIM for GSM phones. A SIM card is used as an identification proof.

Question 18.
Business firms have started watching the conversation and opinions posted in social media. Why?
Answer:
Business firms gathering information about the customers from various sources such as social medias like Internet forums, social blogs, Micro blogs, etc. The volume of such data is very large and considered as big data in business.

With the help of a s/w, analyses this big data and generate a report that contain all the information such as choices, taste, needs, status, opinions, suggestions etc of a customer.

Question 19.
“The following is a figure of a tag which helps in business logistics”
Plus Two Computer Application Chapter Wise Questions and Answers Chapter 11 Trends and Issues in ICT 3M Q19

  1. Name the tag shown in the figure.
  2. How it helps business logistics?

Answer:
1. RFID tag

2. The data stored in the RFID tag can be accessed by a special reader and to read the data no need of RFID tag and reader in a line of site instead both are within a range.

This tag is used in Vehicles as a prepaid tag and makes the payments easier in Toll booths. Similarly, it is useful to take the Census of wild animals also.

In business the tag(contains details about Product code, Price, Batch no., Manufacturing Date, Expiry date, etc.) is stick on the cartons and by using RFID reader process it speedily.

Question 20.
“IPR (Intellectual Property Right) encourages innovation” Justify.
Answer:
Some people spend lots of money, time body and mental power to create some products such as a classical movie, album, artistic work, discoveries, invention, software, etc.

These type of Intellectual properties must be protected from unauthorized access by law. This is called Intellectual Property right(IPR). It enables to earn recognition, financial benefit, can sell the innovation, etc. It motivates further innovation.

Question 21.
Write a short note on

  1. Trademark
  2. Industrial design

Answer:
1. Trademark:
This is a unique, simple and memorable sign to promote a brand and hence increase the business and goodwill of a company. It must be registered. The period of registration is for 10 years and can be renewed. The registered trademark under Controller General of Patents Design and Trademarks cannot use or copy by anybody else.

2. Industrial designs:
A product or article is designed so beautifully to attract the customers. This type of designs is called industrial design. This is a prototype and used as a model for large scale production.

Question 22.
Compare patent and Trade mark.
Answer:
1. Patents:
A person or organization invented a product or a creation can be protected from unauthorized copying or creation without the permission of the creator by law. This right is called Patent. In India the validity of the right is up to 20 years. After this anybody can use freely.

2. Trademark:
This is a unique, simple and memorable sign to promote a brand and hence increase the business and goodwill of a company. It must be registered. The period of registration is for 10 years and can be renewed. The registered trademark under Controller General of Patents Design and Trademarks cannot use or copy by anybody else.

Question 23.
Write a short note on intellectual property theft.
Answer:
Intellectual property theft: The violation of Intellectual Property Right of Copy right, Trademark, Patent, etc. In film industry crores of investment is needed to create a movie. Intellectual Property thieves upload the movies on the Releasing day itself. Hence the revenue from the theatres are less significantly and undergoes huge loss. (Eg: Premam, Bahubali, etc).

Question 24.
What is cyberspace?
Answer:
a. CyberSpace:
Earlier Traditional communication services such as postal service (Snail mail) are used for communication. It is a low speed and not reliable service. In order to increase the speed Telegram Services were used.

Its speed was high but it has lot of limitations and expensive too. Later telephones were used for voice communication. Nowadays telephone system and computer system are integrated and create a virtual (unreal) environment. This is called cyber space. The result for this integration is that tremendous speed and it is very cheap.

Question 25.
Write a short note on the importance of IT Act 2000.
Answer:
Information Technology Act 2000 (amended in 2008):
IT Act 2000 controls the use of Computer(client), Server, Computer Networks, data and Information in Electronic format and provide legal infrastructure for E-commerce, in India.

This is developed to promote IT industry, control e-commerce, also ensures the smooth functioning of E-Governance and it prevents cyber crimes.

The person those who violate this will be prosecuted. In India IT bill introduced in the May 2000 Parliament Session and it is known as Information Technology Act 2000. Some exclusions and inclusions are introduced in December 2008.

Question 26.
“Informania affects people’s lives and their loved ones” Justify.
Answer:
Infomania is the excessive desire(lnfatuation) for acquiring knowledge from various modern sources like Internet, Email, Social media, Instant Message Application(WhatsApp) and Smart Phones. Due to this the person may neglect daily routine such as family, friends, food, sleep, etc.

Hence they get tired. They give first preference to Internet than others. They create their own Cyber World and no interaction to the surroundings and the family. They are more anxious and afraid that they will be out from the cyber world unless they updated.

Plus Two Computer Application Trends and Issues in ICT Five Mark Questions and Answers

Question 1.
Explain generations in mobile communication?
Answer:
The mobile phone was introduced in the year 1946. Early stage it was expensive and limited services hence its growth was very slow. To solve this problem. Cellular communication concept was developed in 1960’ satBell Lab. 1990’s onwards cellular technology became a common standard in our country.
The various generations in mobile communication are:

a. First Generation networks (1 G):
It was developed around 1980, based on analog system and only voice transmission was allowed.

b. Second Generation networks (2G):
This is the next generation network that was allowed voice and data transmission. Picture message and MMS(Multimedia Messaging Service) were introduced. GSM and CDMA standards were introduced by 2G.

1. Global System for Mobile (GSM):
It is the most successful standard. It uses narrow band TDMA(Time Division Multiple Access), allows simultaneous calls on the same frequency range of 900 MHz to 1800 MHz. The network is identified using the SIM(Subscriber Identity Module).

(i) GPRS (General Packet Radio Services):
It is a packet oriented mobile data seivice on the 2G on GSM. GPRS was originally standardized by European Telecommunications Standards Institute (ETSI) GPRS usage is typically charged based on volume of data transferred. Usage above the bundle cap is either charged per megabyte or disallowed.

(ii) EDGE (Enhanced Data rates for GSM Evolution):
It isthree times faster than GPRS. It is used for voice communication as well as an internet connection.

2. Code Division Multiple Access (CDMA):
It is a channel access method used by various radio communication technologies. CDMA is an example of multiple access, which is where several transmitters can send information simultaneously over a single communication channel. This allows several users to share a band of frequencies To permit this to be achieved without undue interference between the users, and provide better security.

c. Third Generation networks(3G):
It allows high data transfer rate for mobile devices and offers high speed wireless broadband services combining voice and data. To enjoy this service 3G enabled mobile towers and hand sets required.

d. Fourth Generation networks(4G):
It is also called Long Term Evolution(LTE) and also offers ultra broadband Internet facility such as high quality streaming video. It also offers good quality image and videos than TV.

e. Fifth Generation networks:
This is the next generation network and expected to come in practice in 2020. It is more faster and cost effective than other four generations. More connections can be provided and more energy efficient.

Question 2.
Explain different categories of cyber crimes in detail.
Answer:
Just like normal crimes(theft, trespassing private area, destroy, etc,) Cyber crimes(Virus, Trojan Horse, Phishing, Denial of Service, Pornography, etc) also increased significantly. Due to cyber crime, the victims lose money, reputation, etc and some of them commit suicide.

A. Cyber crimes against individuals:

1. Identity theft:
The various information such as personal details(name, Date of Birth, Address, Phone number, etc.), Credit / Debit Card details(Card number, PIN, Expiry Date, CW, etc), Bank details, etc. are the identity of a person. Stealing these information by acting as the authorized person without the permission of a person is called Identity theft. The misuse of this information is a punishable offence.

2. Harassment:
Commenting badly about a particular person’s gender, colour, race, religion, nationality, in Social Media is considered as harassment. This is done with the help of Internet is called Cyber stalking (Nuisance). This is a kind of torturing and it may lead to spoil friendship, career, self image and confidence. Sometimes may lead to a big tragedy of a whole family or a group of persons.

3. Impersonation and cheating:
Fake accounts are created in Social Medias and act as the original one for the purpose of cheating or misleading others. Eg: Fake accounts in Social Medias (Facebook, Twitter, etc), fake sms, fake emails, etc.

4. Violation of privacy:
Trespassing into another person’s life and try to spoil the life. It is a punishable offence. Hidden camera is used to capture the video or picture and black mailing them.

5. Dissemination of obscene material:
With the help of hidden camera capture unwanted video or picture. Distribute or publish this obscene clips on Internet without the consent of the victims may mislead the people specifically the younger ones.

B. Cyber crimes against property:
Stealing credit card details, hacking passwords of social media accounts or mail account or Net banking, uploading latest movies, etc, are considered as cyber crimes against property.

1. Credit card fraud:
Stealing the details such as credit card number, company name, expiry date, cvv number, password, etc. and use these details to make payment for purchasing goods or transfer funds also.

2. Intellectual property theft:
The violation of Intellectual Property Right of Copy right, Trademark, Patent, etc. In film industry crores of investment is needed to create a movie. Intellectual Property thieves upload the movies on the Releasing day itself.

Hence the revenue from the theatres are less significantly and undergoes huge loss. (Eg: Premam, Bahubali, etc). Copying a person’s creation and present as a new creation is called plagiarism. This can be identified some tools (programs) available in the Internet.

3. Internet time theft:
This is deals with the misuse of WiFi Internet facility. If it is not protected by good password there is a chance of misuse our devices (Modem/Router) to access Internet without our consent by unauthorized persons. Hence our money and volume of data (Package) will lose and we may face the consequences if others make any crimes.

C. Cyber crimes against government:
The cyber crimes against Govt, websites is increased significantly. For example in 2015 the
website of Registration Department of Kerala is hacked and destroys data from 2012 onwards.

1. Cyber terrorism:
It is deals with the attacks against very sensitive computer networks like computer-controlled atomic energy power plants, air traffic controls, Gas line controls, telecom, Metro rail controls, Satellites, etc. This is a very serious matter and may lead to huge loss (money and life of citizens). So Govt is very conscious and give tight security mechanism for their services.

2. Website defacement:
It means spoil or hacking websites and posting bad comments about the Govt.

3. Attacks against e-governance websites:
Its main target is a Web server. Due to this attack the Web server/ computer forced to restart and this results refusal of service to the genuine users.

If we want to access a website first you have to type the web site address in the URL and press Enter key, the browser requests that page from the web server. Dos attacks send huge number of requests to the web server until it collapses due to the load and stops functioning.

Question 3.
Discuss various generations of mobile communication.
Answer:
The various generations in mobile communication are:

a. First Generation networks(1 G):
It was developed around 1980, based on analog system and only voice transmission was allowed.

b. Second Generation networks (2G):
This is the next generation network that was allowed voice and data transmission. Picture message and MMS(Multimedia Messaging Service) were introduced. GSM and CDMA standards were introduced by 2G.

1. Global System for Mobile(GSM):
It is the most successful standard. It uses narrow band TDMA (Time Division Multiple Access), allows simultaneous calls on the same frequency range of 900 MHz to 1800 MHz. The network is identified using the SIM(Subscriber Identity Module).

(i) GPRS (General Packet Radio Services):
It is a packet oriented mobile data service on the 2G on GSM. GPRS was originally standardized by European Telecommunications Standards Institute (ETSI) GPRS usage is typically charged based on volume of data transferred. Usage above the bundle cap is either charged per megabyte or disallowed.

(ii) EDGE(Enhanced Data rates for GSM Evolution):
It is three times faster than GPRS. It is used for voice communication as well as an internet connection.

2. Code Division Multiple Access (CDMA):
It is a channel access method used by various radio communication technologies. CDMA is an example of multiple access, which is where several transmitters can send information simultaneously over a single communication channel. This allows several users to share a band of frequencies To permit this to be achieved without undue interference between the users, and provide better security.

c. Third Generation networks (3G):
It allows high data transfer rate for mobile devices and offers high speed wireless broadband services combining voice and data. To enjoy this service 3G enabled mobile towers and hand sets required.

d. Fourth Generation networks (4G):
It is also called Long Term Evolution(LTE) and also offers ultra broadband Internet facility such as high quality streaming video. It also offers good quality image and videos than TV.

e. Fifth Generation networks (5G):
This is the next generation network and expected to come in practice in 2020. It is more faster and cost effective than other four generations. More connections can be provided and more energy efficient.

Question 4.
“Due to anonymous nature of Internet it is possible for the people to engage in variety of criminal activities”. Justify the statement with special reference to cyber crimes taking place against Individual.
Answer:
Cyber crimes against individuals:
1. Identity theft:
The various information such as personal details(name, Date of Birth, Address, Phone number, etc), Credit / Debit Card details(Card number, PIN, Expiry Date, CW, etc), Bank details, etc. are the identity of a person. Stealing these information by acting as the authorized person without the permission of a person is called Identity theft. The misuse of this information is a punishable offence.

2. Harassment:
Commenting badly about a particular person’s gender, colour, race, religion, nationality, in Social Media is considered as harassment. This is done with the help of Internet is called Cyber stalking (Nuisance). This is a kind of torturing and it may lead to spoil friendship, career, self image and confidence. Sometimes may lead to a big tragedy of a whole family or a group of persons.

3. Impersonation and cheating:
Fake accounts are created in Social Medias and act as the original one for the purpose of cheating or misleading others. Eg: Fake accounts in Social Medias(Facebook,Twitter,etc), fake sms, fake emails etc.

4. Violation of privacy:
Trespassing into another person’s life and try to spoil the life. It is a punishable offence. Hidden camera is used to capture the video or picture and black mailing them.

5. Dissemination of obscene material:
With the help of hidden camera capture unwanted video or picture. Distribute or publish these obscene clips on Internet without the consent of the victims may mislead people specifically the younger ones.

Plus Two Computer Application Chapter Wise Questions and Answers