Tuesday, 2 June 2020

2076-Solution of Computational Course (Computer Science) : Short Answer Question

Long Answer Question

Attempt any five questions.


4) What is computer network? Discuss LAN, MAN and WAN with suitable examples of each. (1+5)

Ans:
A computer network is a group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network nodes. The interconnections between nodes are formed from a broad spectrum of telecommunication network technologies.

Local Area Network (LAN) : A Local Area Network (LAN) is a group of computer and peripheral devices which are connected in a limited area such as school, laboratory, home, and office building. It is a widely useful network for sharing resources like files, printers, games, and other application. The simplest type of LAN network is to connect computers and a printer in someone's home or office.

Characteristics of a LAN network:
  • It is a private network, so an outside regulatory body never controls it.
  • LAN operates at a relatively higher speed compared to other WAN systems.
  • There are various kinds of media access control methods like token ring and ethernet.

Metropolitan Area Network (MAN) : A Metropolitan Area Network or MAN is consisting of a
computer network across an entire city, college campus, or a small region. This type of network is 
larger than LAN, which is mostly limited to a single building or site. Depending upon the type of
configuration, this type of network allows you to cover an area from several miles to tens of miles.

Characteristics of the MAN network:
  • It mostly covers towns and cities in a maximum 50 km range
  • Mostly used medium is optical fibers, cables
  • Data rates adequate for distributed computing applications.

Wide Area Network (WAN) : WAN (Wide Area Network) is another important computer network
that which is spread across a large geographical area. WAN network system could be a
connection of a LAN which connects with other LAN's using telephone lines and radio waves. It is 
mostly limited to an enterprise or an organization.

Characteristics of WAN network:
  • The software files will be shared among all the users; therefore, all can access to the latest files.
  • Any organization can form its global integrated network using WAN.

5) What is protocol? Discuss TCP/IP protocol suite. (2+4)

Ans:
Protocol, in computer science, a set of rules or procedures for transmitting data between electronic devices, such as computers. In order for computers to exchange information, there must be a preexisting agreement as to how the information will be structured and how each side will send and receive it. Without a protocol, a transmitting computer, for example, could be sending its data in 8-bit packets while the receiving computer might expect the data in 16-bit packets. Protocols are established by international or industrywide organizations. Among the most important sets of Internet protocols are TCP/IP, OSI, HTTPS, SMTP, and DNS.

Communications between computers on a network is done through protocol suites. The  most widely used and most widely available protocol suite is TCP/IP protocol suite. A protocol suite consists of a layered architecture where each layer depicts some functionality which can be carried out by a protocol. Each layer usually has more than one protocol options to carry out the responsibility that the layer adheres to. TCP/IP is normally considered to be a 4 layer system. The 4 layers are as follows:
  1. Application layer
  2. Transport layer
  3. Network layer
  4. Data link layer

TCP/IP (Transmission Control Protocol/Internet Protocol, standard Internet communications protocols) allow digital computers to communicate over long distances. The Internet is a packet-switched network, in which information is broken down into small packets, sent individually over many different routes at the same time, and then reassembled at the receiving end. TCP is the component that collects and reassembles the packets of data, while IP is responsible for making sure the packets are sent to the right destination. TCP/IP was developed in the 1970s and adopted as the protocol standard for ARPANET (the predecessor to the Internet) in 1983.

6) What is data mining? Discuss different applications of database. (2+4)

Ans:
Data mining is the process of analyzing hidden patterns of data according to different perspectives for categorization into useful information, which is collected and assembled in common areas such as data warehouses. It is done for efficient analysis of data to facilitate business decision making and other information requirements to ultimately cut costs and increase revenue. Data mining is also known as data discovery and knowledge discovery.

Different applications of database are:
  • Telecom: There is a database to keeps track of the information regarding calls made, network usage, customer details etc. Without the database systems it is hard to maintain that huge amount of data that keeps updating every millisecond.
  • Industry: Where it is a manufacturing unit, warehouse or distribution centre, each one needs a database to keep the records of ins and outs. For example distribution centre should keep a track of the product units that supplied into the centre as well as the products that got delivered out from the distribution centre on each day; this is where DBMS comes into picture.
  • Banking System: For storing customer info, tracking day to day credit and debit transactions, generating bank statements etc. All this work has been done with the help of Database management systems.
  • Sales: To store customer information, production information and invoice details.
  • Airlines: To travel though airlines, we make early reservations, this reservation information along with flight schedule is stored in database.
  • Education sector: Database systems are frequently used in schools and colleges to store and retrieve the data regarding student details, staff details, course details, exam details, payroll data, attendance details, fees details etc. There is a hell lot amount of inter-related data that needs to be stored and retrieved in an efficient manner.
  • Online shopping: You must be aware of the online shopping websites such as Amazon, Flipkart etc. These sites store the product information, your addresses and preferences, credit details and provide you the relevant list of products based on your query. All this involves a Database management system.
  • Social media sites: We all are on social media websites to share our views and connect with our friends. Daily millions of users signed up for these social media account like facebook, twitter, instagram, etc.With the help of database all the information of users are stored and we are able to connect to other people.

7) Discuss different applications of multimedia. (6)

Ans:
Multimedia is any mixture of text, graphics, art, sound, animation and video with links and tools that let the person navigate, interact and communicate with computer. The different applications of multimedia are:

  1. Multimedia in Education field: Multimedia is used to instruct as a master (guide) because knowledge can be easily obtained by using multimedia as it includes text, pictures, sound and film which helps the students to understand more easily and clearly than the text books.
  2. Multimedia in Entertainment: The first application of multimedia system was in the field of entertainment and that too in the video game industry. The integrated audio and video effects make various types of games more entertaining. It is also used in movies for entertainment, especially to develop special effects in movies and animations.
  3. Multimedia in Advertising: Multimedia technology is commonly used in advertisement. To promote the business and products multimedia is used for preparing advertisement.
  4. Multimedia in Business: The business application of multimedia includes, product demos, training employees using projectors, presenting sales, educating customers etc. It helps for the promotion of business and new products.
  5. Science and Technology: Multimedia had a wide application in the field of science and technology . It reduces the time and cost and can be arranged at any moment even in emergencies. It is enough for communication and meetings. It is useful for surgeons as they can use images created from imaging scans of human body to practice complicated procedures.
  6. Multimedia in software: Software Engineers may use multimedia in computer from entertainment to designing digital games; it can be used as a learning process.
  7. Multimedia on the Web: Webpages featuring multimedia makes webpages more attractive and user friendly.
  8. Video conferencing and virtual reality: Virtual reality is truly fascinating multimedia application. In this, the computer creates an artificial environment using hardware and software.
  9. Software: Multimedia is used for training purpose or as a guide in using software applications so user can operate software without the help of trainer.

8) What is hacking? Discuss about security awareness and policy. (2+4)

Ans:
Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator’s original purpose. The person who is inconsistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice is called a hacker.

Computer Security Awareness is the knowledge and attitude that members of an organization possess regarding the protection of the physical and, especially, information assets of that organization. Computer Security Awareness is necessary in today's computing environment. Computers, smartphones, and other mobile devices provide us with the ability to access and share information, connect socially, and work productively. Some of the computer security risks that we should be aware so as to prevent our information from being misused are:
  1. Disclosure of sensitive information by accident or neglect.
  2. Theft of personal and financial information through fraudulent means.
  3. The intentional or unintentional damage to computers and network systems by viruses and various forms of malware.
  4. The legal consequences associated with copyright infringement including the illegal downloading of music, videos, games, and software.

A security policy is a document t at outlines the rules, laws and practices for computer network access. This document regulates how an organization will manage, protect and distribute its sensitive information (both corporate and client information) and lays the framework for the computer-network-oriented security of the organization.
Policies are divided into two categories:
  1. User policies - User policies generally define the limit of the users towards the computer resources in a workplace. Eg. What are they allowed to install in their computer, if they can use removal storages, etc.
  2. IT policies - IT policies are designed for IT department, to secure the procedures and functions of IT field.

9) How conversion from octal to decimal and decimal to octal number is done? Illustrate with an example. (6)

Ans:
Decimal number can be converted to octal by following procedure:
  1. Divide the given number by 8,
  2. Write the quotient under the number. Now it becomes new number,
  3. Write the remainder in right side,
  4. Repeat step (a) to (c) until 0 is produced as the new number,
  5. The number written as remainder in reverse order (i.e. bottom to the top) is the required octal number.
Example:
Convert 128 to octal form.
Solution:
8
128

8
16
0 ( as 8*16 is 128 so remainder is zero)
8
2
0 (as 8*2 is 16 so remainder is zero)

0
2 (as 8*0 is 0 so remainder is two)
 So, the octal form of decimal (128)10 is (200)8. (from bottom to the top)


Octal number can be converted to decimally following procedure:
  1. Write the octal digit as power of 8 increasing from right to left starting from zero.
  2. Convert each power of 8 into its decimal equivalent term.
  3. Add these terms to give the decimal number.
Example:
Convert 200 to decimal form.
Solution:
=2*82+0*81+0*80
=2*64+0*8+0*1
=128+0+0
=128
So, the decimal form of octal (200)8 is (128)10.

10) Write short notes on,
  1. Computational biology
  1. Digital Signature

Ans:
Computational biology: 
Computational biology, a branch of biology involving the application of computers and computer science to the understanding and modeling of the structures and processes of life. It entails the use of computational methods (e.g., algorithms) for the representation and simulation of biological systems, as well as for the interpretation of experimental data, often on a very large scale.
Computational biologists are tasked with the development and application of data-analytical tools, theoretical methods, mathematical modeling and software simulation techniques to explore biological systems. Computation is now an essential part of biological research projects. For example, protein data banks, genomic databases and brain MRI images contain massive amounts of raw data that can be translated into insightful information about all aspects of biology.

Computational biologists use their math and computational skills to translate biological processes into computational models. Computational biologists actually work in very different interdisciplinary sub-fields, such as systems biology, population genetics, molecular networks and medical, functional, comparative, agricultural genomics. Students must obtain a broad, interdisciplinary knowledge of the basic principles of math, biology and computational science.
Digital signature: 
Digital Signature is a process that guarantees that the contents of a message have not been altered in transit. When you, the server, digitally sign a document, you add a one-way hash (encryption) of the message content using your public and private key pair. Your client can still read it, but the process creates a "signature" that only the server's public key can decrypt. The client, using the server's public key, can then validate the sender as well as the integrity of message contents. Whether it's an email, an online order or a watermarked photograph on eBay, if the transmission arrives but the digital signature does not match the public key in the digital certificate, then the client knows that the message has been altered.
Different document processing platforms support and allow the creation of different types of digital signatures.
  • Adobe supports - certified and approval digital signatures
  • Microsoft Word supports - visible and non-visible digital signatures

No comments:

Post a Comment