Mba 111
Mba 111
Note : Question No. 1 is of short answer type and is compulsory for all the students.
It carries 5 Marks. (Word limits 50-100)
Ans. A digital signature is basically a way to ensure that an electronic document (e-mail,
spreadsheet, text file, etc.) is authentic. Authentic means that you know who created the
document and you know that it has not been altered in any way since that person created it.
Digital signatures rely on certain types of encryption to ensure authentication. Encryption is the
process of taking all the data that one computer is sending to another and encoding it into a form
that only the other computer will be able to decode. Authentication is the process of verifying
that information is coming from a trusted source. These two processes work hand in hand for
digital signatures.
Note: Answer any two questions. Each question carries 5 marks (Word limits 500)
Q. 2. What are Topologies? Discuss five types of topologies with suitable diagrams.
Network Topology
Computers in a network have to be connected in some logical manner. The layout
pattern of the interconnections between computers in a network is
called network topology. You can think of topology as the virtual shape or
structure of the network. Network topology is also referred to as 'network
architecture.'
Devices on the network are referred to as 'nodes.' The most common nodes are
computers and peripheral devices. Network topology is illustrated by showing
these nodes and their connections using cables. There are a number of different
types of network topologies, including point-to-point, bus, star, ring, mesh, tree
and hybrid. Let's review these main types.
Point-to-Point
Point-to-point topology is the simplest of all the network topologies. The network
consists of a direct link between two computers. This is faster and more reliable
than other types of connections since there is a direct connection. The
disadvantage is that it can only be used for small areas where computers are in
close proximity.
Bus
Bus topology uses one main cable to which all nodes are directly connected. The
main cable acts as a backbone for the network. One of the computers in the
network typically acts as the computer server. The first advantage of bus
topology is that it is easy to connect a computer or peripheral device. The
second advantage is that the cable requirements are relatively small, resulting in
lower cost.
One of the disadvantages is that if the main cable breaks, the entire network
goes down. This type of network is also difficult to troubleshoot. For these
reasons, this type of topology is not used for large networks, such as those
covering an entire building.
Star
In star topology, each computer is connected to a central hub using a point-to-
point connection. The central hub can be a computer server that manages the
network, or it can be a much simpler device that only makes the connections
between computers over the network possible.
Star topology is very popular because the startup costs are low. It is also easy to
add new nodes to the network. The network is robust in the sense that if one
connection between a computer and the hub fails, the other connections remain
intact. If the central hub fails, however, the entire network goes down. It also
requires more cable than bus topology and is, therefore, more expensive.
Ring
In ring topology, the computers in the network are connected in a circular
fashion, and the data travels in one direction. Each computer is directly
connected to the next computer, forming a single pathway for signals through the
network. This type of network is easy to install and manage.
MESH Topology
It is a point-to-point connection to other nodes or devices. All the network nodes are
connected to each other. Mesh has n(n-1)/2 physical channels to link n devices.
There are two techniques to transmit data over the Mesh topology, they are :
1. Routing
2. Flooding
Q. 3. What is the use of Encryption? Discuss public and private key encryption methods.
Ans. Encryption is the process of taking a readable plain text document or image
and scrambling that document or image to an extent that it is no longer readable.
The intent of encryption is hide and protect the contents of that file from
improper disclosure.
What is Encryption?
Basically, encryption is making sure that you're keeping a secret, well, a 'secret'!
Shhh...
More to the point, encryption is the process of hiding information that is readable
into a format that can't be read. Encryption can be used for many different
things, but you're probably most familiar with its function of transferring
information securely. However, in this lesson, we'll go over all the big
stuff: symmetric and asymmetric encryption, digital signature,
and hashing encryption methods.
In computing, encryption is the method by which plaintext or any other type of data is converted
from a readable form to an encoded version that can only be decoded by another entity if they
have access to a decryption key. Encryption is one of the most important methods for providing
data security, especially for end-to-end protection of data transmitted across networks.
Encryption is widely used on the internet to protect user information being sent between a
browser and a server, including passwords, payment information and other personal information
that should be considered private. Organizations and individuals also commonly use encryption
to protect sensitive data stored on computers, servers and mobile devices like phones or tablets.
How encryption works
Unencrypted data, often referred to as plaintext, is encrypted using an encryption algorithm and
an encryption key. This process generates ciphertext that can only be viewed in its original form
if decrypted with the correct key. Decryption is simply the inverse of encryption, following the
same steps but reversing the order in which the keys are applied. Today's most widely used
encryption algorithms fall into two categories: symmetric and asymmetric.
Q. 4. ‘Internet is widely used in business and reseach’.Justify the statement with suitable
examples.
JAIPUR NATIONAL UNIVERSITY, JAIPUR
School of Distance Education & Learning
Internal Assignment No. 2
Note : Question No. 1 is of short answer type and is compulsory for all the students.
It carries 5 Marks. (Word limits 50-100)
Note: Answer any two questions. Each question carries 5 marks (Word limits 500)
Q. 2. Write a short note on desktop publishing softwares.
Q. 3. Discuss in detail the difference between system software and application software.
Q. 4. What are the basic functions of an operating system? Describe various types of operating
systems.