Page 227 - PYTHON-12
P. 227
28. What is hacking?
Ans. Hacking is a process of accessing a computer system or network without knowing the access authorization
credential of that system. Hacking can be illegal or ethical depending on the intention of the hacker.
29. What are cookies?
Ans. Cookies are messages that a web server transmits to a web browser so that the web server can keep
track of the user’s activity on a specific website. Cookies are saved in the form of text files in the client
computer.
30. Differentiate between cracking and hacking.
Ans. Cracking is defined as an attempt to remove the copy protections inserted into software programs. A
program successfully stripped of protections is then known as having been “Cracked”. Hacking can be
ethical/legal but cracking is a totally illegal method and is also called piracy.
31. What is web scripting?
Ans. A script is a small bit of code that enables web browsers to do something rather than just displaying static
results. Scripts are used in web design to create dynamic pages. There are two categories of web scripts:
Client-Side Script which can be written by using JavaScript, VBScript, and Server-Side Script, which can
be written in PHP (used for client-side scripting also) and JSP.
32. Name some web scripting languages.
Ans. There are many scripting languages available today. Most common are VBScript, JavaScript, ASP, PHP,
PERL and JSP.
33. What is Cyber Crime?
Ans. When any crime is committed over the internet, it is referred to as Cyber Crime.
34. What is Web 2.0?
Ans. Web 2.0 is a concept that takes the network as a platform for information sharing, interoperability, user-
centred design, and collaboration on the internet or World Wide Web. A Web 2.0 site allows users to
interact and collaborate with each other. Examples of Web 2.0 include social networking sites, facebook,
google+, twitter, etc.
35. Give one advantage of bus topology of network. Also state how four computers can be connected with
each other using star topology of network.
Ans. In bus topology, the workstations can easily be extended or removed. In star topology, four computers
can be connected with each other through a server.
36. Write two advantages of using an optical fibre cable over an Ethernet cable to connect two service
stations which are 200m away from each other. [CBSE D 2013]
Ans. Optical fibre cable guarantees secure transmission and a very high transmission capacity. Optical fibre
cable is immune to electrical and magnetic interference.
37. Write two characteristics of Wi-Fi. [CBSE D 2014]
Ans. (a) It allows an electronic device to exchange data or connect to the internet wirelessly using microwaves.
(b) Network range of Wi-Fi is much less than other network technologies like wired LAN.
38. What is the difference between Email and Chat? [CBSE D 2014]
Ans. (a) Chat is a type of software while Email is a protocol.
(b) Chat requires the permission of both parties while Email does not.
(c) Chat is typically software dependent while Email is not.
(d) Chat needs accounts on the same provider while Email does not.
39. What are VoIP?
Ans. VoIP are communication protocols and transmission technologies for delivery of voice communication
Computer Networks
and multimedia sessions over Internet Protocol (IP) networks, such as the internet. Also, we can say that
VoIP are IP technology, internet telephony and broadband telephony.
8.73