0% found this document useful (0 votes)
146 views37 pages

Ch-01: Computer System - Short Question Answers - PDF

The document provides a comprehensive overview of computer systems, detailing the relationship between hardware and software, the functions of the CPU, RAM, and logic gates, and their roles in digital computing. It explains concepts such as binary code, truth tables, and various logic gates (AND, OR, NOT, NAND, NOR, XOR) along with their operations and applications in digital circuits. Additionally, it discusses the significance of logic gates in areas like digital signal processing, home automation, and traffic management.

Uploaded by

shahzad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
146 views37 pages

Ch-01: Computer System - Short Question Answers - PDF

The document provides a comprehensive overview of computer systems, detailing the relationship between hardware and software, the functions of the CPU, RAM, and logic gates, and their roles in digital computing. It explains concepts such as binary code, truth tables, and various logic gates (AND, OR, NOT, NAND, NOR, XOR) along with their operations and applications in digital circuits. Additionally, it discusses the significance of logic gates in areas like digital signal processing, home automation, and traffic management.

Uploaded by

shahzad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

Computer Science Class-11

Chapter
01 Computer System
SHORT QUESTION AND ANSWERS
1. What Is computer system?
Ans: A computer system is a combination of hardware and software components
that work together to perform various tasks. Hardware and software enable the
computer to process data, perform calculations, run applications, and deliver
results to the user.
2. How does software Interact with hardware in a computer system?
Ans: Software consists of a set of instructions that tell the hardware what to do.
Hardware executes these instructions to perform tasks as directed by the
software.
3. Describe the relationship of software and hardware.
Ans: The hardware cannot perform any task without software. Software cannot be
executed without hardware. Computer becomes useful when hardware and
software are combined.
4. Why Is a computer system considered essential in modern life?
Ans: A computer system is considered essential in modern life as it helps to perform
different easily and efficiently. It has revolutionized the way people live, work,
learn and interact with the world. It is used to solve real-word problems in
various fields of our life such as education, health
care, transportation and economics etc.
5. Why Is a computer considering a digital machine?
Ans: A computer is considered a digital machine because it processes data digitally
by converting the input into binary code that consists of Os and 1 s.
6. How does a computer system handle data from Input to output?
Ans: Data is first converted into binary form during input process. The binary data is
stored in computer memory called RAM. CPU reads the binary data from
memory and follows the instructions to process it. The results are converted
back to human-readable form after the processing. The results are presented
to the user via output devices.

1|P age
Computer Science Class-11

7. What role does the CPU play In a computer system?


Ans: The CPU (Central Processing Unit) executes binary-based instructions. It
performs etic, logical and control operations on binary data. It also coordinates
the activities of other hardware components.
8. What are the specialized units within the CPU and what are their functions?
Ans: The specialized units within the CPU include Arithmetic and Logic Unit (ALU)
and control unit (CU). The ALU performs arithmetic and logical operations. The
control unit manages the
ion of instructions and coordinates data flow.
9. Explain how the ALU and control unit work together to perform a Calculation.
Ans: The ALU performs the actual arithmetic or logical operations required for the
calculation. The other Control unit manages the execution of instructions and
directs data flow between ALU and proper components. The control unit
ensures that ALU operates on correct data and follows sequence of operations.
10. What Is the function of RAM In a computer system?
Ans: RAM (Random Access Memory) temporarily stores binary data and instructions
that CPU to access quickly while performing different tasks.
11. What Is the purpose of converting binary data into a human-readable form?
Ans: The purpose of converting binary data into a human-readable is to allow users
to understand the results easily. The binary form of
12. Explain the role of output devices in the data cannot be understood easily
Ans: The output devices are used to present the processed results in a format that
can be understood by the users easily such as test, images or sound.
13. What is binary code used in computers?
Ans: Binary bode is used because it simplifies the design and operation of digital
circuits. It can easily represent two states (0 and 1) and perform reliable and
efficient processing.
14. How is data represented in computer?
Ans: Data is represented in computer using electronic switches. An electronic switch
has only two states called ON or OFF. The ON state means that electricity is
flowing whereas OFF state means that electricity is not flowing. The ON state
represents that digit 1 and OFF state represents that digit 0. The binary number

2|P age
Computer Science Class-11

system also consists of two digits 0 and 1. The binary digits 0 and 1 are
represented in computer using two states of a switch.
15. What is the purpose of the ASCII coding scheme?
Ans: The ASCII (American Standard Code for Information Interchange) coding
scheme is used to represent characters in binary form. It assigns unique binary
codes to different characters. It allows the computer to interpret and display
text. It provides a common way to encode characters such as letters, numbers
and symbols.
16. How many characters can a 7-bitand an 8-bit ASCII code represent?
Ans: A 7-bit ASCII code can represent 128 characters. An 8-bit ASCII code can
represent 256 characters.
17. What is binary number system?
Ans: Binary number system consists of two digits 0 and 1 and its base 2. Each digit or
bit in binary number system can be 0 or 1.
18. What is the meaning of the term bit?
Ans: The term bit stands for binary digit. It is the smallest unit to store data in the
memory. A bit can represent 0 or 1.
19. What is byte?
Ans: Byte is a collection of 8 bits. At least one byte is required to store any piece of
information in computer storage.
20. What is the difference between bit and byte?
Ans: A bit is the smallest unit of data represent a single binary digit 0 or 1. A byte
consists of 8 bits and represents a single character in the computer.
21. Write any three differences between digital and analog signals?
Ans: Digital signal is represented in a continuous waveform whereas analog signal is
represented in discrete values of 0s and 1s. Digital signal can have any value
within a range whereas analog signal has specific limited discrete values of 0s
and 1s. Digital signal can be affected by noise and interference whereas analog
signal is generally less affected by noise and interference.
22. What is digital logic and why is it fundamental to digital computing?
Ans: Digital logic is the foundation of digital computing. It involves representing and
manipulating information using two discrete states 0 and 1. It is fundamental

3|P age
Computer Science Class-11

to digital computing because it is used to design digital circuits are used in


electric devices such as computer, smart TV and digital watches.
23. What is a truth table?
Ans: A truth table represents a Boolean function or digital logic circuit in a table form.
It shows all possible input combinations for a logic circuit or Boolean
expressions and their corresponding outputs. It uses the logic 1 for HIGH and 0
for low.
24. What does each row in a truth table represent?
Ans: Each row in a truth table represents one possible combination of input values
and the corresponding output of the digital logic circuit or Boolean function for
that combination.
25. Where are the input combinations listed in a truth table?
Ans: The input combinations are listed in columns on the left side of truth table. Each
column represents a different input variable.
26. How is the relationship between inputs and outputs shown in a truth table?
Ans: the relationship between inputs and outputs in a truth table is showing by listing
all possible combinations of input values in the columns on the left and
displaying the corresponding output for each combination in the rightmost
column. It clearly shows how different inputs affect the output.
27. If a digital circuit has 3 inputs, how rows will be there in truth table?
Ans: If a digital circuit has 3 inputs, the truth table can have 23=8 rows. This is because
each input can be either 0 or 1 and there can be 8 possible combinations of
input values.
28. What is a logic gate and does it operate?
Ans: Logic gate is the basic building block of a digital circuit to perform logical
operations. It operates on one or more input signals to produce on output signal
based on a specific logical function. The input and output signals are in the form
of digital signals. Its output will be HIGH (1) or LOW (0) depending on input.
29. What are the three basic logic gates and what operations do they perform?
Ans: The three basic logic gates are OR gate, AND gate and NOT gate. The OR gate
gives the output of HIGH (2) if at least one input is HIGH (1). The AND gate gives

4|P age
Computer Science Class-11

the output HIGH (1) only if all inputs are HIGH (1). The NOT gage reverses the
input. It give the output of HIGH (1) if input is LOW (0) and vice versa.
30. Explain the function of AND gate?
Ans: The AND gate preforms a logical multiplication operation. It produces HIGH
output only when all of its inputs are HIGH. The output is LOW when any input
is LOW.
31. Describe the operation of an OR gate?
Ans: An OR gate performs a logical addition operation. It produces a HIGH output
when any of the inputs is HIGH. The output is LOW only when both inputs are
LOW.
32. Describe the operation of a NOT gate?
Ans: The NOT gate performs a logical negation. The output of NOT gate is HIGH when
the input is LOW. The output of NOT gate is LOW when the input is HIGH.
33. What is the different between NAND and NOR gate?
Ans: NAND and NOR gates are inversions of AND and OR gates respectively. A NAND
gate gives LOW (0) only when all inputs are HIGH (1), otherwise it gives HIGH
(1). A NOT gate gives HIGH (1) only when all input are LOW (0), otherwise it
gives LOW (0). They are represented F = . and F = + respectively.
34. When is the output of an AND gate HIGH and LOW?
Ans: The output of AND gate is HIGH only if the inputs are HIGH. The output of AND
gate is LOW when one or more inputs are LOW.
35. When is the input of an OR gate HIGH and LOW?
Ans: The output of OR gate is HIGH if any of the inputs in HIGH. The output of OR
gate is LOW when all inputs are LOW.
36. How is the OR operation represented in a logic expression?
Ans: The OR operation is shown with a plus sign (+) between variables. For example,
the logic expression for 2-input OR gate of variables A and B is written as X = A
+B
37. What is difference between OR and AND gate?
Ans: AND gate gives a HIGH output only when both inputs are HIGH, whereas OR
gate gives an output of HIGH if at least one of the inputs is HIGH. AND gate

5|P age
Computer Science Class-11

implements logical AND operation and OR gate implements logical OR


operation.
38. Give three representations of a NOT gate?
Ans: A is the input signal and X is the output signal.

Boolean expression: X = A
Truth Table: A X
0 1
1 0
39. What is the input of an inverter when 1 is given as the input?
Ans: The output of an inverter is 0 when the input is 1.
40. Determine the total number of possible input combinations for 3 input AND
gate.
Ans: The total number of possible input combinations are eight (23=8) for a 3-input
AND gate.
41. Give the two representations of an AND gate.
Ans: A and B are the input of signals and
X is the output signal.
Boolean expression: A.B (A AND B)
42. Write a truth table for 2-input AND gate.
Ans: A B X
0 0 0
0 1 0
1 0 0
1 1 1
43. Give two representations of an OR gate
Ans: A and B are the input signals and
X is the output of signs
Boolean expression A + B (A OR B)

6|P age
Computer Science Class-11

44. Give two representations of an XOR gate


Ans: A and B are the input signals and
X is the output signal.
Boolean expression: A  B (A XOR B)
45. Give two representations of a NAND gate
Ans: A and B are the input signals and
X is the output signal.
Boolean expression: ( . ) (NOT (A AND B))
46. Draw a 2-input logic diagram for NAND gate
Ans:

Output X =
47. Give two representations of a NOR gate
Ans: A and B are the input signals and
X is the output signal.
Boolean expression: ( + ) (NOT (A AND B)
48. Draw and label the symbol for three input AND gate and write its truth table.
Ans: A B C X
0 0 0 0
0 0 1 0
0 1 0 0
0 1 1 0
1 0 0 0
1 0 1 0
1 1 0 0
1 1 1 1

7|P age
Computer Science Class-11

49. Draw and label the symbol for three-input OR gate and write its truth table.
Ans: A B C X
0 0 0 0
0 0 1 1
0 1 0 1
0 1 1 1
1 0 0 1
1 0 1 1
1 1 0 1
1 1 1 1
X=A+B+C
50. Which digital circuits are built using logic gates for memory storage?
Ans: Flip-flops are latches are built using logic gates. A flip=flop is a digital circuit that
stores binary data. It is widely used in digital electronics to build memory
elements such as registers. A latch is another type of digital circuit that stores
binary data.
51. What is the role of logic gates in an Arithmetic & Logic Unit (ALU)?
Ans: The ALU is an important part of CPU that performs arithmetic and logical
operations. The logic gates are used to create circuits that perform these
operations. For example, a circuit made of logic gates can add binary numbers
that is a fundamental operation in computing.
52. How do logic gates help in clock synchronization for digital systems?
Ans: Logic gates in clock synchronization ensure all parts of digital system work
together at the same time. They control timing signals to coordinate the actions
of different components. It prevents timing errors and keeps the system
running smoothly.
53. What tasks are performed by logic circuits in Digital Signal Processing (DSP)?
Ans: Logic circuits perform various tasks in digital signal processing such as filtering,
modulation and demodulation. Filtering is the process of removing noise from
signal. Modulation is the process of converting the signal in a format that
suitable for transmission. Demodulation is the process of converting the signal
block to the original form at the receiver.

8|P age
Computer Science Class-11

54. Define home automation. How are logic gates used in home automation
system?
Ans: Home automation means using technology to control and automate various
household tasks such as turning lights on / off or adjusting the temperature.
The logic gates are used in home automation systems to process inputs from
sensors. This makes homes more efficient and convenient.
55. How logic gates can help to manage traffic?
Ans: Logic gates are used in traffic light control systems. They process inputs from
sensors to manage the flow of traffic. Logic gates ensure the correct sequence
of red, yellow and green lights. This helps prevent accidents and manage the
traffic smoothly.
56. How do logic gates assist in decision-making in robotics?
Ans: Logic gates are used in robotics to make decisions based on sensor inputs. They
help robots determine actions such as moving, stopping or picking up objects.
This allows robots to interact with the environment intelligently. Logic gates
ensure the robot operates correctly and efficiently.
57. How are logic gates used in security systems?
Ans: The logic gates are used in security systems to control access to certain areas.
They process input from keycards or codes. They activate alarms when sensors
detect unauthorized entry. Logic gates are also used to manage security
cameras to monitor and record activities.
58. How logic gates are used to improve the safety and efficiency in vehicle
operations?
Ans: Logic gates are used in automotive electronics for making quick and reliable
decisions control engine, open airbags and manage braking. They also manage
anti-lock brake system to prevent wheel lockup during braking. It improves
safety and efficiency in vehicle operations.
59. What is the use of logic gates in aerospace applications?
Ans: The logic gates are used to perform logical operations to control and manage
various systems in aircraft and spacecraft. They ensure that aircraft operate
safely and efficiently. They process signals from GPS and other sensors to
accurately determine the location of the aircraft.

9|P age
Computer Science Class-11

60. Compare data encoding and data decoding.


Ans: Date encoding is the process of converting information into a specific format or
transmission. Data decoding is the process of converting the transmitted data
back into its original format.
61. What is Boolean function?
Ans: A Boolean function is an expression that can be formed by binary variables.
Logical operators, parenthesis and = sign. The Boolean variable can be
represented by different alphabets such as A, B, C …. x, y, z. The value of
Boolean variable can be either 0 or 1. The result of the Boolean function can
also be 0 or 1.
62. Given the Boolean function F(x, y) = x + y, what are the possible values of F?
Ans: The Boolean function F(x, y) = x + y can have following output values using OR
operator:
If x = 0 and y = 0, then F = 0.
If x = 0 and y = 1, then F = 1.
If x = 1 and y = 0, then F = 1.
If x = 1 and y = 1, then F = 1.
63. Define Boolean Identities. How do Boolean Identities help in understanding
digital circuits?
Ans: Boolean identities are the basic rules and properties used to simplify and
manipulate the expressions of Boolean algebra. Boolean identities help in
reducing complex Boolean expressions into simpler forms. This makes it easier
to analyze and understand digital circuits and logical operations.
64. List three commonly used Boolean identities.
Ans: Three commonly used Boolean identities include identity law (OR), identity law
(AND) and domination law (OR). The identity law (OR) can be represented as
A+0=A. The identity law (AND) can be represented as A.1=A. The domination
law (OR) can be represented as A+1=A.
65. What does the identity law (OR) state, an dhow is it expressed?
Ans: The identity law (OR) states that any Boolean variable ORed with 0 is the
variable itself. It is expressed as: A+0=A

10 | P a g e
Computer Science Class-11

66. What is the Complement Law (OR), and how is it expressed?


Ans: The Complement Law (OR) states that a Boolean variable ORed with its
complement is equal to 1. It is expressed as A + ̅ = 1.
67. What does the Associative Law (OR), and how is it expressed?
Ans: The Associative Law (OR) states that the grouping of variables in an OR
operation does not affect the result. It is expressed as: (A+B)+C=A+(B+C)
68. How can you obtain the dual of a Boolean expression using the Principle of
Duality?
Ans: The dual of a Boolean expression is obtained as follows:
 Replace each AND operator (.) with an OR operator (+)
 Replace each OR operator (+) with an AND operator (.)
 Replace each 0 with 1.
 Replace each 1 with 0.
69. Provide an example of a Boolean expression and its dual using the Principle of
Duality.
Ans: For the Boolean expression A+0=A
Dual expression: A.1=A
Both expressions are true according to the Principle of Duality.
70. What is a Karnaugh Map (K-Map) and who introduced it?
Ans: Karnaugh Map was introduced by Maurice Karnaugh in 1953. It is a graphical
method used to simplify Boolean expressions. It consists of square boxes called
cells. Each cell corresponds to a possible combination of input variables.
71. How many cell 2-variable and 3-variable K-Map require?
Ans: The number of cells in K-map is equal to the total number of possible input
variable combinations. A 2-variable map requires 22=4 cells. A 3-variable map
requires 23=8 cells.
72. What is the primary purpose of using a Karnaugh Map in Boolean algebra?
Ans: The primary purpose of using a Karnaugh Map is to simplify Boolean functions
by grouping together adjacent cells that contain 1s. It helps to minimize the
Boolean expression that reduces the complexity of the digital circuit.

11 | P a g e
Computer Science Class-11

73. What do the rows and columns in a two-variable K-map represent?


Ans: In a two-variable K-map, the rows represent one variable and its complement.
For example, the rows can be labeled as A and ̅. the columns represent the
other variable and its complement. For example, the columns can be labeled as
B and . Each cell in the K-map corresponds to a specific combination of these
variables.
74. In a two-variable K-map, what product term is placed in the cell located at row
A and column B?
Ans: In a two-variable K-map, the cell located at row A and column B contains the
product term AB. This term represents the combination where both variables A
and B are 1.
75. What is the complement of a variable in a Karnaugh map?
Ans: In a Karnaugh map, the complement of a variable refers to the variable in its
inverted or negated form. For example, if the variable is A, its complement is ̅.
The complement is used to represent the opposite state of the variable and it
helps to identify and group terms to simply Boolean expressions.
76. What is a stakeholder? List some important stakeholders of SDLC.
Ans: A stakeholder refers to any person or group who is affected by the software
directly or indirectly. The stakeholders can be within the organization or outside
of the organization. Some important stakeholders of SDLC include project
manager, system analyst, programmer, software tester and end user.
77. What do you know about software development life cycle?
Ans: Software Development Life Cycle is the process of creating a software or
system. It is an organized way of developing high-quality software. It consists of
different steps or phases. Each phase is used to perform different processes and
activities.
78. Why software development life cycle is important? Give any three reasons:
Ans: Software Development Life Cycle is important because it provides an organized
and systematic approach to software development. It improves project
organization and efficiency. It ensures the software meets user needs and
works well including design and testing phases. It also helps manage time and
resources effectively to ensure projects are completed on schedule and within
budget.

12 | P a g e
Computer Science Class-11

79. Why is important to identify project requirements?


Ans: It is very important to identify all requirements in order to develop to project
successfully. The project is designed and developed according to these
requirements. All requirements related to the project are documented and
approved by the customer.
80. What is the purpose of planning phase of SDLC?
Ans: The purpose of planning phase of the software development life cycle is to
determine the objective of the proposed system or project.
81. List different types of feasibility studies?
Ans: Different feasibility studies include technical feasibility, economical feasibility,
operational feasibility, legal feasibility and schedule feasibility.
82. What is determined in different types of feasibility studies?
Ans: Technical feasibility determines if the system can be successfully developed and
implemented using current technologies and resources. Economic feasibility
determines if the system can be developed within the budget. Operational
feasibility determines if the system can be effectively integrated into the
existing operational environment. Legal feasibility determines legal issues
related to the system such as cyber law and copyright etc. schedule feasibility
determines if the system can be developed within given time period.
83. What is the purpose of analysis phase in SDLC?
Ans: The analysis phase of SDLC is used to determine the requirements of system
users. The current system is studied in detail to find how it works and how to
improve it. If is typically done by interacting with system users. They provide an
explanation of their needs and expectations from the new system.
84. What is requirement engineering?
Ans: The requirement engineering is the process of determining user expectations
for a new or modified system. It is used to identify and communicate the
purpose of a software system and the framework in which it will be used.
85. What is the use of requirement validation?
Ans: The requirement validation is used to examine the requirements to ensure they
meet the needs of the stakeholders. It reviews requirements to check they are
complete and accurate.

13 | P a g e
Computer Science Class-11

86. What do you mean by requirement management?


Ans: The requirements management tracks the changes to the requirements
throughout the project. It ensures that any changes are properly documented
and communicated. This process gathers new requirements that arise from
changing expectations, new regulations or any other changes.
87. What is requirement gathering in the Software Development Life Cycle
(SDLC)?
Ans: Requirement gathering is the phase in SDLC where the needs and expectations
of stakeholders are identified and documented. It involves collecting detailed
information to ensure the final software product meets the users needs.
88. What is the purpose of using interviews in requirement gathering?
Ans: Interviews are used in requirement gathering to have direct conversations with
stakeholders to understand their needs, expectations and preferences. This
helps to gather detailed and specific requirements for the project.
89. Suppose a college needs a new Student Management System. How can you
use interview to gather requirements?
Ans: In order to gather requirements for Student Management System, interviews
can be conducted with teachers and school administrators to find the required
features. It can help to gather the feedback on current problems and desired
features. It will ensure the new system is developed according to user
requirements.
90. How surveys and questionnaires help in requirement gathering? Give an
example
Ans: Surveys and questionnaires help to gather information from a large group of
stakeholders quickly and efficiently. For example, in order to develop and
Students, teachers and administration.
91. What is the purpose of document analysis in requirement gathering?
Ans: Document analysis is used to review existing documentation, reports and
manuals to get relevant information about current system or processes.
92. Design phase is considered as the “architectural” phase of SDLC. Give reasons.
Ans: The design phase is the architectural phase of system design because is used to
plan the system architecture and create detailed specifications based on

14 | P a g e
Computer Science Class-11

requirements. It is used to determine the most logical design and structure for
data flow and storage. It is also used to design user interface screen layout.
93. Design phase is considered as the “architectural” phase of SDLC. Give reasons.
Ans: The design phase is the architectural phase of system design because is used to
plan the system architecture and create detailed specifications based on
requirements. It is used to determine the most logical design and structure for
data flow and storage. It is also used to design user interface screen layout.
94. What is the use of Unified Modelling Language (UML) in the design phase?
Ans: A flowchart is a type of diagram that represents on algorithm or a process.
Flowchart is important for writing computer program because it helps to
understand the logic of problem solution. The program can be written easily in
any programming language after flowchart has been designed.
95. Define flowchart. Why flowchart is important for writing computer program?
Ans: A flowchart is a type of diagram that represents an algorithm or a process.
Flowchart is important for writing computer program because it helps to
understand the logic of problem solution. The program can be written easily in
any programming language after flowchart has been designed.
96. What are different flowchart symbols?
Ans: The flowchart symbols are used to show the steps of the algorithm. The oval
symbol represents Start and End. The parallelogram symbol represents input
and output. The rectangle symbol represents process. The diamond symbol
represents decision step. The connector symbol connects two or more flow
lines. The arrow shows the flow of flowchart steps.
97. What is the use of development / coding phase of SDLC?
Ans: The development/coding phase is used to execute the plan that is prepared in
design phase. The developers write the code for data flow process. They also
design the actual user interface screens. The code is written in programme
languages.
98. What is the purpose of testing / verification phase of SDLC?
Ans: The primary goal of testing is to assess specific attributes or capabilities of a
software or system. It ensures that it is developed according to the required
specifications. The results are compared with predetermined requirements.

15 | P a g e
Computer Science Class-11

99. What is the purpose of black box testing?


Ans: The purpose of black box testing is to verify that system produces correct
outputs for the given input based on the specified requirements. It ensures that
the software works according to the user expectations.
100. What is examined in white box testing?
Ans: White box testing examines the internal structures, code path and logic of a
software. It ensures that the system works correctly and meets the design
specifications. This approach helps in evaluating the quality and functionality of
the code by focusing on its internal workings.
101. Why is it important for software testers to use both black box and white box
testing methods?
Ans: It is important for software testers to use both black box and white box testing
methods because it provides a comprehensive evaluation of the software. Black
box testing ensures that the software meets functional requirements from a
user’s perspective. The white box testing verifies the internal logic and code
quality. It helps to identify and fix hidden issues.
102. In what scenario would you prefer to use black box testing over white box
testing?
Ans: Black box testing is preferred where the internal workings or logic of a system
are not known to the tester. The focus is on evaluating the system’s
functionality from the user perspective without needing any knowledge of the
internal code.
103. Differentiate between black box testing and white box testing?
Ans: Black box testing evaluates a system’s functionality without knowledge of its
internal code or logic. It focuses on inputs and outputs. In contrast, white box
testing involves testing the internal code, logic and architecture of the system.
It requires knowledge of its internal workings.
104. How would you test the login functionality of a web application using black
box testing?
Ans: The testing of login functionality using black box testing involves creating test
cases based on expected behavior of the login process. It includes testing
various input combinations such as valid and invalid usernames and passwords
and checking if the system responds as expected.

16 | P a g e
Computer Science Class-11

105. Give main activities of implementation phase?


Ans: The activities involved in deployment / implementation phase include the
installation of hardware, software and training of the users and computer
operation personnel.
106. List different types of implementation methods.
Ans: Different types of implementation methods are direct, parallel, phased and
pilot.
107. Which is the most risky method of implementation?
Ans: Direct implementation is the most risky implementation. It is a type of
implementation in which old system is directly replaced by new system. It may
be used when time is very short.
108. Which is the safest method of implementation?
Ans: Parallel implementation is the safest type of implementation. It is a type of
implementation in which both new and old systems operate together for a
period of time. It is the safest but most expensive type of implementation. The
results of both systems are compared. The old system can be used until all
problems in the new system are removed.
109. What is phased implementation?
Ans: Phased implementation is a type of implementation in which the individual
components of new system are implemented one by one.
110. What is pilot implementation?
Ans: Pilot implementation is a type of implementation in which one part of the
organization uses the new system and the rest of the organization uses the old
system. The system is implemented in the whole organization after satisfied
working of the new system.
111. Why do we need to train the users for a new system?
Ans: The training of users for a new system is very important. It allows users to get
familiar with the use of new system. It ensures that the new system is used
properly and effectively.
112. Give two reasons why documentation of a system is crucial?
Ans: Firstly, the documentation is required to install and operate a new system or
modify an existing system. Secondly, if the system analysts who developed a

17 | P a g e
Computer Science Class-11

system leaves the organization, the documentation can help the new analyst to
understand the system.
113. Define software developmental model. List two software development
models.
Ans: Software development model refers to fundamental activities and approaches
used in software development. It includes planning, designing, building, testing,
implementing and maintaining software systems. These processes provide
structured way to manage software projects. Two software development
models include waterfall model and agile model.
114. What is waterfall model? Why is it given this name?
Ans: The waterfall model is sequential or linear development approach. It is one of
the earliest and simplest process models used in software development. It is
given this name because development in this model flows downwards like a
waterfall through different phases.
115. When is Waterfall model a good choice for software development?
Ans: The Waterfall model is a good choice for software development when the
project requirements are well-defined and resources are available. It is suitable
for projects where a structured, step-by-step approach is beneficial.
116. What does corrective maintenance involve?
Ans: The corrective maintenance involves identifying and fixing errors or bugs that
were not detected during the initial development and testing phase of the
software lifecycle.
117. What is the goal of perfective maintenance?
Ans: The goal of perfective maintenance is to improve the working of software
product after it has been deployed. It may be based on the user feedback or
changing requirements etc.
118. What is Agile model in software development?
Ans: The Agile model is a flexible and iterative approach to software development.
It focuses on collaboration and customer feedback. Software is developed in
small and manageable units called iteration or sprints. The software is reviewed
and feedback is gathered at the end of each sprint. It allows frequent
reassessment and change in the software based on user feedback and changing
requirements.

18 | P a g e
Computer Science Class-11

119. How does Agile model differ from Waterfall model?


Ans: The Waterfall model follows a sequential and linear approach whereas Agile
model is iterative and incremental. Agile allows changes and adaptations
throughout the development process based on continuous feedback whereas
Waterfall requires completing one phase before moving to the next.
120. What are the key characteristics of the Agile model?
Ans: Key characteristics of the Agile model include iterative development,
incremental progress, flexibility, regular customer feedback, and collaboration
among cross-functional teams.
121. Why is Agile model not ideal for projects with stable and well-defined
requirements?
Ans: The Agile model is not ideal for the projects with stable and well-defined
requirements because its iterative and flexible nature in designed to
accommodate changes and evolving needs. The traditional waterfall model
suits the projects with fixed requirements that follows a sequential approach.
122. What is bandwidth?
Ans: Bandwidth is a measurement of the capacity of the communication channel. It
indicates how much information can move across the communication channel
in a given amount of time. For example, a slow bandwidth can be acceptable to
transmit text documents. However, a higher bandwidth is required to transmit
video and audio.
123. Define a computer network. Give an example.
Ans: A computer network consists of computers and other devices connected
together to share information and resources. The resources may include
printers, hard disks, scanners or program etc. The internet is a popular of
computer network. It allows millions of users to share information.
124. How the computers in a network are connected?
Ans: The computers in the network are connected together through communication
media. The communication media can be a physical cable or a wireless
connection.

19 | P a g e
Computer Science Class-11

125. What do you know about internet?


Ans: Internet is the largest network in the world. It allows millions of users in the
work to share information. The users from different locations can communicate
with each other.
126. What do you mean by protocol?
Ans: A protocol is a set of rules that governs data communication. It is a format
agreement between communication devices to send and receive information.
127. Why protocols are essential for communication between computers?
Ans: Protocols are essential for communication between computers because they
are the rules that governs data communication. They provide a set of standards
for transmission of data. The devices cannot communicate without protocol.
128. What is node in network?
Ans: A node refers to any device that is connected to a network. A node can receive,
process and transmit data in a network. Some examples of not include
computers, smartphone, servers, routers, switches and printers etc.
129. What is client?
Ans: Client is a computer in the network that is connected with a server to access
different resources. The client sends request to server for resources. The server
provides requested resource to client. The client is typically less powerful than
server.
130. Give three examples of clients?
Ans: Three examples of clients include desktop computers, mobile phones and
laptops.
131. Compare server and client?
Ans: Server provides services and resources to clients while client requests and uses
these services. Server manages and maintains shared resources while client
interacts with resources via requests and responses. Server has more computer
power and storage than clients.
132. What is a switch. How does it work?
Ans: Switch is a communication device that connects several devices in a network. It
receives a message from any device connected to network. It transmits the

20 | P a g e
Computer Science Class-11

message only to that device for which the message was sent. It improves the
efficiency of the data transfer in a network.
133. Define network topology. Write any three types of network topology?
Ans: The physical layout or arrangement of connected devices in a network is called
network topology. Three types of network topology are Bus, Ring and Star
topology.
134. Why is network topology important in network design?
Ans: Network topology is important in network design as it determines the layout of
computers and other devices in a network. It is the backbone of any networking
application. It describes how devices are interconnected and how data is
transmitted between them.
135. What is bus topology?
Ans: Bus topology is the simplest type of network. It supports a small number of
computers. In bus topology, all computers or devices are connected to a
common communication medium. This medium is known as bus or backbone.
136. Why terminators are used in bus topology?
Ans: When the signal reaches the end of the wire, it bounces back and travel up to
wire. The terminators are used at the end of a bus to absorb signals and stop
them to travel backwards.
137. What happens if a bus topology has too many computers?
Ans: Bus topology typically supports a small number of computers. The network of
bus topology becomes slower if it has too many computers in it.
138. What challenges can an organization face when using a bus topology?
Ans: An organization using a bus topology might face challenges such as limited
scalability and network performance degradation with increased traffic. A
failure in central cable can disrupt the entire network since all nodes share the
same communication line.
139. How does star topology work?
Ans: Each computer in star network communicates with the central device. The
sending computer sends the data the central device. The central device sends
data to the receiving computer. In this way, data is transferred from one
computer to another in star network.

21 | P a g e
Computer Science Class-11

140. How is a star topology suitable for the network that needs frequent changes?
Ans: The star topology is suitable for the network that needs frequent changes
because each device connected to a central hub or switch. It allows to add or
remove any device without disrupting the rest of the network.
141. What are the main advantages of using star topology in a network?
Ans: Star topology allows easy management and centralized of the network. The new
devices can be added easily without disrupting the existing network. If one
device fails, it does not affect the other devices on the network.
142. Why star topology is more reliable than bus or ring topology?
Ans: Star topology is more reliable than bus or ring topology. It allows the user to
remove or add a device without affecting the network. It is easier to
troubleshoot than other topologies. If one computer fails, it does not affect the
other computers in the network.
143. Differentiate between a bus topology and a star topology.
Ans: In a bus topology, all computers are connected to a common communication
medium called bus. A star topology includes a central device such as switch or
hub to connect all computers together. Star topology is more expensive to
implement than bus topology.
144. How does data transmission work in ring topology?
Ans: Each computer in ring topology receives data from the previous computer and
transmits it to next computer. The data is passed from one computer to other
until the destination computer receives it. The destination computer sends
acknowledgement to sending computer to indicate that the data has been
received.
145. What is the use of token ring protocol in ring topology?
Ans: The ring topology uses token ring protocol to control access to the network. A
special data packet called a token circulates continuously around the ring. A
device must possess the token before it can send data. It helps to prevent
collisions by ensuring that only one device can send data at a time.
146. How can you handle data collisions in a ring topology network?
Ans: Data collisions are generally handled in a ring topology using the token ring
protocol. It ensures that only one device can send data at a time.

22 | P a g e
Computer Science Class-11

147. What is dual ring topology?


Ans: A dual ring topology is a variation of ring topology where each node is
connected to two rings. Data can travel in both clockwise and anticlockwise
directions around the rings. It provides redundancy and improves network
reliability
148. How does dual ring topology improve network reliability?
Ans: Dual ring topology improves the reliability of the network as each device has an
alternate route in case of a failure. The network automatically transfers data
through other ring if there is a failure in one ring.
149. What is Fiber Distributed Data Interface and how is it related to dual ring
topology?
Ans: Fiber Distributed Data Interface (FDDI) is a networking standard that uses dual
ring topology. It is designed to provide high-speed data transfer and
redundancy by using two rings for data transmission. It allows increased
reliability and fault tolerance.
150. In which scenario the mesh topology is preferable?
Ans: A mesh topology is preferable in a scenario that requires high reliability and
fault tolerance such as in critical network infrastructures. Each node is
connected to every other node. It ensures that if one connection fails, data can
still be transmitted through alternative routes.
151. What are the key advantages of using mesh topology in a network?
Ans: Mesh topology provides the advantages of high redundancy as each node is
connected to all others that prevents single points of failure. The network
remains operational even if some nodes fail. It can be easily scaled to
accommodate larger networks.
152. What types of networks typically use mesh topology?
Ans: Mesh topology is commonly used in large-scale networks such as corporate
network and military applications due to its high redundancy and reliability. It
is also suitable for wireless networks where flexibility and scalability are
required.
153. What challenges can occur when implementing mesh topology in a network?
Ans: The challenges that can occur when implementing mesh topology in a network
include high cost of hardware and the complexity of installation. It requires
23 | P a g e
Computer Science Class-11

many connections. It is also more complicated to manage and maintain a mesh


network than simpler topologies. It requires advanced network skills.
154. Categorize Star, Ring, Bus and Mesh topologies according to their
characteristics.
Ans: Expensive (most expensive to least expensive) Least Cabling (least to most)
Mesh Bus
Star Ring
Ring Star
Bus Mesh
155. How can a tree topology improve network management in a large
organization?
Ans: Tree topology can improve network management in a large organization by
providing a hierarchical structure that simplifies network design and
management. It allows segmentation into smaller and management sub-
networks. It helps in troubleshooting issues more effectively.
156. What are scalability and reliability characteristics of bus topology?
Ans: Bus topology is not highly scalable. All devices share the same cable and the
cable length is limited. adding more devices can slow down the network as they
need to wait for using the cable. the signal degradation occurs if the cable is too
long. bus topology is less reliable. The entire network disrupts if the main cable
is damaged.
157. How scalable and reliable the ring topology can be?
Ans: Ring topology is moderately scalable. The devices can be added to the ring but
it can become complex to manage as the number of devices increases. Dual ring
topology can be highly reliable. If one ring fails, data can still be transmitted
using the other ring.
158. What is the primary advantage of mesh topology in terms of scalability?
Ans: Mesh topology offers high scalability. The devices can be added easily. Each
device has multiple paths to communicate with others that reduces congestion.

24 | P a g e
Computer Science Class-11

159. How does mesh topology ensure high reliability?


Ans: Mesh topology is highly reliable. Each device is connected to multiple other
devices. It provides multiple paths for data to travel. If one connection fails,
data can take another path.
160. What is the purpose of load testing in network scalability?
Ans: Load testing is conducted to evaluate the network’s performance under heavy
traffic conditions. Different tools are used to stimulate a large number of users
or devices accessing a network simultaneously.
161. What is stress testing and why is it important in assessing network scalability?
Ans: Stress testing involves pushing the network beyond its capacity to identify
breaking points. It is important because it helps determine the maximum load
the network can handle before experiencing significant latency or failure.
162. What is the role of disaster recovery testing to ensure network reliability?
Ans: Disaster recovery evaluates how quickly and effectively the network can
recover from major failure such as hardware failures, natural disasters or cyber-
attacks. It ensure that disaster recovery plans and procedures are effective in
restoring network operations and minimizing downtime. As a result, it
maintains the network’s reliability.
163. What is continuous monitoring essential in testing the scalability and
reliability of a network?
Ans: Continuous monitoring is essential as it tracks network performance metrics to
identify and solve issues that can affect the reliability. The network monitoring
tools are used to detect potential issues in real-time. It helps to maintain and
improve the network.
164. What testing approach should be used if a company experiences latency
during peak traffic times?
Ans: The company should conduct load testing to stimulate peak traffic conditions
and identify the network’s performance. It may also perform scalability testing
by adding resources such as servers or switches to handle the increased
demand.

25 | P a g e
Computer Science Class-11

165. How can a network administrator ensure that a network remains operational
during a server crash?
Ans: The network administrator can ensure continued operation by performing
redundancy testing and implementing effective load balancing and failover
mechanisms. They should simulate server crashes and verify that network
switches to backup systems without downtime.
166. What is cloud computing and how does it differ from traditional computing?
Ans: Cloud computing refers to an infrastructure that provides different computing
services over the internet. These services include data storage, databases,
servers, networking and software etc. Cloud computing is different from
traditional computing as it eliminates the need of storing everything on
personal computer. It allows the user to access pictures, music, files and
programs from any device via the internet.
167. Write some advantages of cloud computing.
Ans: The advantage of cloud computing is that it offers unlimited processing and
storage capacity. It provides access to applications and data anywhere in the
world via the internet. It also reduces the cost of buying computers and
peripheral devices.
168. Write some disadvantages of cloud computing.
Ans: The disadvantage of cloud computing is that the data is stored on remote
servers that can be a security and privacy concern. It requires reliable
broadband internet connection. It is not possible to access the data if there is
any problem with the internet connection.
169. What are the key characteristics of cloud computing?
Ans: The key characteristics of cloud computing including on-demand self-service,
broad network access, resource pooling, rapid elasticity, measured service and
security.
170. How does resource pooling in cloud computing benefit organizations?
Ans: Resource pooling in cloud computing offers shared servers and storage to serve
multiple customers at the same time. It means resources are shared and
managed efficiently. It leads to efficient utilization of resources, cost savings
and the ability to scale up or down as needed without wasting resources.

26 | P a g e
Computer Science Class-11

171. What are the three primary service models in cloud computing?
Ans: The three primary service models in cloud computing are infrastructure as a
Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS).
172. A company needs to develop an application without managing the underlying
infrastructure. Which cloud service model should they use and why?
Ans: The company should use Platform as a Service (PaaS). It provides a platform
that includes tools, services and frameworks for application development
without the complexity of managing the underlying infrastructure. It allows
developers to focus on writing code and developing the application.
173. What are the four deployment models of cloud computing?
Ans: The four deployment models of cloud computing are public cloud, private
cloud, hybrid cloud and community cloud.
174. If a company wants to use cloud resources but needs to ensure data is only
accessible within its organization, which deployment model should they
choose?
Ans: The company should choose a Private Cloud. A private cloud provides exclusive
cloud resources for a single organization. It offers more control and
customization over the infrastructure to ensure that data is only accessible
within the organization.
175. An organization is considering a hybrid cloud model. What advantage does
this model offer in terms of data management?
Ans: A hybrid cloud model offers the advantage of combining public and private
clouds. It uses the technology that allows data and applications to be shared
between public and private clouds. The organizations use public cloud for
performing certain tasks. They store the critical data and applications on private
cloud for fast access and security reasons.
176. Give some examples of cloud computing services provided by major
companies.
Ans: Some examples of cloud computing services include Amazon Web Services
(AWS), Microsoft Azure, Google Cloud Platform (GCP) and IBM cloud.
177. What is scalability in cloud computing?
Ans: Scalability refers to the ability of a cloud system or service to handle increasing
workloads. It is either done by scaling out or scaling up. The scaling out means
27 | P a g e
Computer Science Class-11

expanding resources whereas scaling up means upgrading existing resources.


Scalability ensures that cloud infrastructure can meet the demand as the
computing resources grows without affecting the performance or service
quality.
178. What are the two main types of scalability in cloud computing?
Ans: The two main types of scalability in cloud computing are horizontal and vertical
scalability. Horizontal scaling means increasing the number of servers and
distributing workload among them. it can enhance the scalability and
availability of applications to users. vertical scaling means increasing the
capacity of a server by adding more resources such as CPU, RAM or storage.
This approach enhances the performance and capacity of an existing system
without adding additional systems or servers.
179. A business wants to improve performance of its cloud-based application by
upgrading its current server’s resources. Which type of scalability is this and
what are its limitations?
Ans: This approach represents vertical scalability where the business increases the
capacity of a single server by adding more resources like CPU or RAM. The
limitations of vertical scaling is the physical limit to how much a single server
can be upgraded, potential downtime during upgrades and increased costs.
180. For a mission-critical application that requires near-zero downtime, which
type of scalability would be more beneficial and why?
Ans: Horizontal scalability is more beneficial for a mission-critical application that
requires near-zero downtime. It increases the number of servers and distributes
the workload among them. It improves availability and fault tolerance for the
server that minimizes the risk of downtime.
181. What does reliability in cloud computing mean?
Ans: Reliability in cloud computing refers to the ability of a cloud system to
consistently deliver services as expected without interruptions of failures. It
ensures that applications and services hosted in the cloud are accessible and
working. It ensures minimized downtime and disruptions.
182. What are key components that contribute to reliability in cloud computing?
Ans: Key components of reliability in cloud computing include redundancy, fault
tolerance, disaster recovery and failover mechanisms. They help to ensure
availability and consistency.

28 | P a g e
Computer Science Class-11

183. Provide an example of how reliability is maintained in cloud computing.


Ans: An example of reliability in cloud computing is a financial institution using cloud-
based storage for critical customer data. The cloud provider may employ
redundancy by storing data in multiple data centers across different
geographical regions. if one data center experiences an outage, the data
remains accessible from other locations, ensuring continuous service.
184. How can cloud provider ensure that customer data remains accessible even if
one data center fails?
Ans: A cloud provider can ensure customer data remains accessible by implementing
redundancy. It involves storing data in multiple data centers in different
geographical regions. If one data center fails, data can be accessed from other
locations to ensure continuous service.
185. What is cybercrime and cybercriminal?
Ans: Cybercrime refers to illegal activities carried out using computers and the
internet. Cybercriminal is a person who commits illegal activities using
technology. Most cybercriminals use email, social media websites and pirated
software to commit these cybercrimes.
186. What is hacking and hacker?
Ans: An act of unauthorized access to the computer or network is called hacking. The
person who gains unauthorized access to the computer system is called hacker.
The hackers are computer experts and use their knowledge to break into the
computer system and network.
187. Identify some risks that hacking can cause.
Ans: Hacking can cause the identity theft and misuse of personal data. The identity
can be used to commit cybercrimes. The data can be deleted, changed or stolen.
188. What is cybersecurity?
Ans: Cybersecurity is the protection of the internet-connected systems, networks,
programs and data from malicious attacks. These attacks are conducted to
access, change or destroy sensitive data or disrupt regular business operations.
Cybersecurity is used by individuals and business to protect data and computer
systems for unauthorized access. It is also known as information technology
security or electric information security.

29 | P a g e
Computer Science Class-11

189. What types of cyber-attacks can cybersecurity help prevent?


Ans: cybersecurity can prevent many types of cyberattacks such as phishing,
ransomware, fraud and Distributed Denial of Service (DDoS).
190. What is the role of cybersecurity in protecting critical infrastructure?
Ans: Cybersecurity is very important protect critical infrastructure. The
infrastructure mostly relies on interconnected computer systems. The
protection of these systems from cyber threats is essential to ensure the
smooth functioning of essential services. It prevents potential disruptions that
can impact the public safety and national security.
191. How does cybersecurity contribute to business continuity?
Ans: Business use technology to store sensitive data and conduct different
transactions. Cyberattacks can cause significant disruption to business. It can
result in financial loss, damage to reputation and shutting down the business.
Cybersecurity helps to ensure that businesses continue to operate smoothly
without interruptions.
192. What is a cybersecurity threat?
Ans: Cybersecurity threat is an action or event that can harm computer systems,
networks or data. It can be performed by an individual or group with destructive
intent. Cybersecurity threats include malicious attacks such as malware,
phishing scams and hacking attempts. The purpose of these threats is to disrupt
operations or gain unauthorized access to sensitive data.
193. What are some common types of malware?
Ans: Some common types of malware include viruses, worms, Trojans, ransomware
and spyware. Each of these has different characteristics and methods of attacks.
194. Write any five symptoms of malware.
Ans: The speed of the computer may become slower than usual. The computer may
crash and stop responding. The programs may load very slowly. Antivirus
software may be disabled or may not run properly. The access to the internet
may be blocked partially or completely.
195. What is the difference between virus and worm?
Ans: Worm can spread copies of itself from one computer to another without being
activated by users. A virus attaches itself to a program or file to spread from

30 | P a g e
Computer Science Class-11

one computer to another. Virus cannot spread without a human action such as
running an infected program.
196. What is phishing, and how does it work?
Ans: Phishing is a type of social engineering attack where cybercriminals pretend as
trusted people or companies. It is used to trick people and get important
information such as usernames and passwords, credit card information or
personal details.
197. What is email phishing, and what are its common tactics?
Ans: Email phishing is an email that appears to be from a legitimate source such as
banks or social media platforms. It typically asks recipients to click on malicious
links or download infected attachments. It often has an urgent message asking
to update credit card or account information. It contains links that take user to
a fake website that is designed to steal login credentials, credit card information
or other sensitive data.
198. How can we avoid from phishing attack?
Ans: Do not click on links or download attachments from unsolicited or suspicious
emails. Always install reliable antivirus and anti-malware software on devices.
Ensure that operating system, antivirus software and web browsers are up to
date with the latest security patches.
199. How does a Denial of Service (DoS) attack differ from a Distributed Denial of
Service (DDoS) attack?
Ans: A DoS attack occurs when single device floods another computer or network
data or requests. It can make the target computer slow down or stop working
for legitimate users. A DDoS attack occurs when multiple devices work together
to flood a computer or network with data or request. It is more powerful than
DoS because it uses many sources and causes more severe disruptions.
200. What is ransomware and how does it typically affect its victims?
Ans: Ransomware is a type of malicious software that blocks access to computer or
files until a ransom is paid to the attacker. It causes financial loss to individuals,
organizations or businesses. It usually encrypts data that makes it unreadable
until ransom is paid to get a decryption key.

31 | P a g e
Computer Science Class-11

201. What is spyware? How can it be harmful?


Ans: Spyware is a malicious software that blocks access to computer or files until a
ransom is paid to the attacker. It causes financial loss to individuals,
organizations or businesses. It usually encrypts data that makes it unreadable
until ransom is paid to get a decryption key.
202. what are insider threats and how do they differ from external threats?
Ans: The insider threats are the individuals in an organization such as employees,
contractors or business partners who misuse their access to systems and data
for malicious purposes. Insider threats differ from external threats as they are
from within the organization. They are more difficult to detect and prevent.
203. How can insider threats lead to data breaches and financial losses?
Ans: Insider threats may share sensitive information with the external parties. It may
result in data breaches, financial losses and damage to the company’s
reputation.
204. What is the importance of using strong passwords?
Ans: The use of strong password is very important. It helps to protect user accounts
and sensitive data from unauthorized access. A strong password is difficult for
attackers to guess or crack that reduces the risk of cyberattacks such as hacking
or data breaches.
205. Differentiate between authorized and unauthorized access.
Ans: The process of accessing a computer system and its resources legally is called
authorized access. The process of accessing a computer system and its
resources illegally is called unauthorized access.
206. How can you create a strong password?
Ans: A strong password can be created by using a combination of uppercase and
lowercase letters, numbers and special characters like !, @, #, $, %. It makes a
password complex and unpredictable.
207. Write any three characteristics of strong password?
Ans: A strong password consists of at least 12 characters. It does not contain
username, real name, children name or company name. It is different from
previous passwords.

32 | P a g e
Computer Science Class-11

208. Why is password uniqueness important in cybersecurity?


Ans: Password uniqueness is important because using the same password across
multiple accounts increases the risk of a security breach. If one account is
compromised, the attackers can use the same password to access other
accounts that can lead to a broader security breach.
209. Give some examples of strong passwords.
Ans: P@sswOrd$securiT Gr33nH0lid@y$R0ck!
Op!f@8@2002aug 9@Qn&$@v%KpLW4!@x
210. What should be avoided when creating a password?
Ans: The easily guessable information should be avoided when creating a password
such as name, common words, birthdates or simple patterns like “123456” or
“password”.
211. Why is it important to keep software up to date in cybersecurity?
Ans: It is very important practice in cybersecurity to keep the software up to date. It
involves regularly updating software including operating systems, applications
and security tools. These updates often contain security patches that fix
vulnerabilities in software. It ensures protection against latest security threats.
212. How does authentication differ from authorization?
Ans: Authentication is the process of verifying the identity of a user. Authorization is
the process of verifying the rights of a user to access computer resources. It
determines user’s level of access for different resources of the system. The
authorization occurs after authentication.
213. What is Two-Factor Authentication (2FA), and why is it used?
Ans: Two-Factor Authentication (2FA) is an authentication method that requires
users to provide two different forms of verification before granting access. It is
used to enhance security by adding an additional layer of protection that makes
it more difficult for unauthorized users to gain access even if they know the
password.
214. What are the typical factors involved in Two-Factor Authentication (2FA)?
Ans: Two-Factor Authentication (2FA) typically involves two factors. The first factor
is something the user knows that is usually the password. The second factor is

33 | P a g e
Computer Science Class-11

something the users has that can be unique code sent to the user’s phone, a
biometric identifier like a fingerprint.
215. How does Two-Factor Authentication (2FA) enhance security for online
accounts?
Ans: Two-Factor Authentication (2FA) enhances security by requiring two separate
forms of verification. Even if someone knows the password, they cannot access
the account without the second factor. It can be a code sent to user’s phone.
This additional step significantly reduces the risk of unauthorized access.
216. What is a firewall and what role does it play in network security?
Ans: A firewall is a security system designed to protect computer networks from
unauthorized access and malicious attacks. It acts as a barrier between a trusted
internal network and untrusted external networks such as internet. It monitors
and controls the incoming and outgoing network traffic. It uses a set of rules to
decide which traffic is allowed and which is blocked.
217. How do antivirus and anti-malware software protect a system?
Ans: Antivirus and anti-malware software can detect and remove malicious software
such as viruses, trojans and spyware etc. the software provides real-time
scanning of files and applications. It ensures that malware is not allowed to
execute on the system.
218. What is the purpose of encryption in cybersecurity?
Ans: The purpose of encryption is to transform plaintext into unreadable format
called cipher text. It makes data unusable for the unauthorized persons even if
they access it. The cipher text can only be deciphered with decryption key.
219. Why are regular backups and disaster recovery plans important in
cybersecurity?
Ans: Backup is the process of creating copies of data. The backup can be used if the
data is lost or damaged due to any cyberattack. A disaster recovery is a written
plan that describes the steps to restore the operations after a cyberattack. A
regular data backup and disaster recovery plans ensure that critical data is
restored quickly after a cyberattack.

34 | P a g e
Computer Science Class-11

220. Why is encryption becoming increasingly important in modern cybersecurity?


Ans: Encryption is becoming increasingly important due to growing digital threats
and privacy concerns. It helps to protect sensitive data from being accessed or
stolen by unauthorized individuals.
221. How does encryption ensure that customer’s financial details are secure in
online transaction?
Ans: During an online transaction, encryption converts the customer’s financial
details into cipher text before transmitting them over the internet. It ensures
that even if the data is intercepted, it cannot be read or misused by
unauthorized parties.
222. What is plaintext in the context of encryption?
Ans: Plaintext is the original, human readable form of data that needs to be
protected. It can be include any type of digital information such as text, files or
communication messages.
223. What is an encryption key and why is it important?
Ans: An encryption key is a piece of information used by the encryption algorithm to
control the transformation of plaintext into cipher text and vice versa. The
strength of the key determines the security of the encryption process.
224. How does the strength of an encryption key influence the security of
encrypted data?
Ans: The strength of the encryption key directly influences the security of the
encrypted data. A strong key makes it significantly more difficult for attackers
to decrypt the cipher text without authorization.
225. What is cipher text?
Ans: Cipher text is the unreadable version of original plaintext by using encryption
algorithm.
226. What are the three main goals of cryptography?
Ans: The three main goals of cryptography are confidentially, integrity and
authenticity. Confidentially means keeping data private and preventing
unauthorized access. integrity means ensuring that data is accurate and has not
been altered. Authenticity means verifying that data comes from a reliable
source.

35 | P a g e
Computer Science Class-11

227. How does encryption relate to cryptography?


Ans: Cryptography and encryption are related concepts but they are not same.
Cryptography is a technique to secure information by transforming it into a
format that is unreadable for unauthorized persons. it is a broader field of study
that focuses on securing information and communication. it includes various
techniques and methods. encryption is a specific method used in cryptography
to convert readable data into an unreadable format.
228. Differentiate between cryptographic key and password?
Ans: The cryptographic key is used to read an encrypted message whereas password
is used for authentication to enter a system. A key is not same as a password in
computer security but a password can be used as a key. A password is
generated, read, remembered and reproduced by humans but a key is used by
software or humans to process a message.
229. What is symmetric encryption?
Ans: Symmetric encryption is a type of encryption in which data is encrypted and
decrypted using a single, secret cryptographic key. The single key is used to
encrypt plaintext and decrypt cipher text. It is one of the most widely used
encryption techniques. Its objects is to secure sensitive information. It is used
in many major industries such as defense, aerospace, banking and healthcare
etc.
230. What is asymmetric encryption?
Ans: Asymmetric encryption is a type of encryption that uses two separate keys
called public key and private key. The public key is used to encrypt data and the
private key is required to decrypt data. The public key is freely distributed and
can be used by anyone to encrypt data. The private key is only given to the users
with authorized access. Asymmetric encryption can be more effective but it is
also more costly.
231. What is the primary difference in key usage between symmetric and
asymmetric encryption?
Ans: Symmetric encryption uses a single shared key for both encryption and
decryption. In contrast asymmetric encryption uses a pair of keys. It uses public
key for encryption and private key for decryption.

36 | P a g e
Computer Science Class-11

232. How can asymmetric encryption facilitate secure communication between


two parties who have never met before?
Ans: Asymmetric encryption facilitates secure communication between two parties
who have never met before by using public and private key pairs. It eliminates
the need for secure key distribution. Each users has a pair of public and private
keys. It simplifies key management because each party only needs to keep its
private key secret while public keys can be openly shared.

37 | P a g e

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy