Professional Documents
Culture Documents
3. The rights that owner of a work can prohibit or authorize certain acts in relation to a work. List them.
a. Its reproduction it in various forms
b. The distribution of copies. Its public performance
c. Its broadcasting or other communication to the public
d. Its translation into other languages
4. List the factors due to which privacy issues relating to personal data arise.
a. insecure electronic transmissions,
b. data trails and logs of email messages,
c. online transactions and the
d. tracking of web pages visited.
5. How can plagiarism be avoided?
a. Paraphrase - So you have found information that is perfect for your research paper. Read it and put it into
your own words. Make sure that you do not copy verbatim more than two words in a row from the text you
have found. If you do use more than two words together, you will have to use quotation marks.
b. Cite - Citing is one of the effective ways to avoid plagiarism. Follow the document formatting guidelines (i.e.
APA, MLA, Chicago, etc.) used by your educational institution or the institution that issued the research
request. This usually entails the addition of the author(s) and the date of the publication or similar
information. Not citing properly can constitute plagiarism.
c. Quoting - When quoting a source, use the quote exactly the way it appears. No one wants to be
misquoted. Quoting must be done correctly to avoid plagiarism allegations.
d. Citing Quotes - Citing a quote can be different than citing paraphrased material. This practice usually
involves the addition of a page number, or a paragraph number in the case of web content.
e. Citing Your Own Material - If some of the material you are using for your research paper was used by you
in your current class, a previous one, or anywhere else you must cite yourself. Treat the text the same as you
would if someone else wrote it. It may sound odd, but using material you have used before is called self-
plagiarism, and it is not acceptable.
f. Referencing - One of the most important ways to avoid plagiarism is including a reference page or page of
works cited at the end of your research paper. This information is very specific and includes the author(s),
date of publication, title, and source.
6. What is copyright and who owns it?
Ans. Copyright is a legal right created by the law of a country that grants the creator of an original work exclusive
rights for its use and distribution. Copyrights are generally owned by the people who create the works of
expression, with some important exceptions: If a work is created by an employee in the course of his or her
employment, the employer owns the copyright.
7. What is information technology security?
Ans. IT Security is the process of implementing measures and systems designed to securely protect and safeguard
information (business and personal data, voice conversations, still images, motion pictures, multimedia presentations,
including those not yet conceived) utilizing various forms of technology developed to create, store, use and exchange
such information against any unauthorized access, misuse, malfunction, modification, destruction, or improper
disclosure, thereby preserving the value, confidentiality, integrity, availability, intended use and its ability to
perform their permitted critical functions.
8. What is data security?
Ans. Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to
computers, databases and websites. Data security also protects data from corruption.
9. What is the public domain?
Ans. the state of belonging or being available to the public as a whole, especially through not being subject to
copyright or other legal restrictions.
10. What is privacy?
Ans. Privacy refers to information shared with visiting sites, how that information is used, who that information is
shared with, or if that information is used to track users.
11. Which software is commonly used by designing and manufacturing industry?
Ans. CAD /CAM
12. How does ICT benefit in healthcare sector?
Ans.
13. ICT has changed the education field. Compare it with the conventional method of teaching. Justify your answer.
Ans.
14. ____________ refers to creation of mind.
Ans. Intellectual property
15. C in ICT stands for ___________________
Ans. Communication
16. Internet uses generates:
a. Large amount of personal information
b. Information thefts
c. Information technology piracy
d. All of the above
IT BASICS QUESTIONS
1. What are the major issues of security and integrity of information?
Ans. Confidentiality, availability and integrity are the major issues
2. How are LANs distinguished from other kinds of networks?
Ans. Out of different types of Networks, LANs can be distinguished by its private ownership, its high speed, and its
low error rate.
3. Transmission lines are also called__________________
Ans. Channels, trunks,
4. The electrical signals may be in form of________________
Ans. analog or digital
5. What is the device which is used to convert digital data into analog and vice versa?
Ans. - Modem
6. Which is the special machine which allows different electronic networks to talk to internet that uses TCP/IP?
Ans. - Gateway
7. Explain the terms
a. TCP
b. IP
8. Optical fibres consist of hints strands of___________________
Ans. Glass
9. What kind of wire pairs are used to avoid noise interference in communication?
Ans. Twisted pair cables
10. What do you understand by communication protocol?
Ans. A communication protocol is a system of rules that allow two or more entities of a communications system to
transmit information via any kind of variation of a physical quantity.
11. What is multimedia application?
Ans. Multimedia applications are computer programs that use a variety of media such as video, sound, still images
and animated graphics for pre-recorded or live communications, especially mass communication.
12. TFI is planning in the office building to connect all computers each spread over within distance of 50m
a. Suggest the economical cable type having high speed data transfer which can be used to connect these
computers.
b. Which type of network will be formed by connecting these computers?
c. Which device will be used to connect all the computers?
13. Explain 4-5 advantages for networking a school
Ans.
a. File Sharing - Network file sharing between computers gives you more flexibility rather than using floppy
drives or Zip drives. you can use the network to save copies of your important data on a different
computer, examples share photos, music files and documents.
b. Sharing Devices- Sharing devices is another benefit in which a network exceeds stand-alone computers. For
example, laser printers, fax machines, modems, scanners and CD-ROM players, when these peripherals are
added to a network, they can be shared by many users.
c. Sharing Internet Access- In computer network, students can access the internet simultaneously.
d. Speed- Using a network is faster way for sharing and transferring files. Without a network, files are shared
by copying them to floppy disk.
e. Security- Files and programmes on a network are more secure as the users do not have to worry about
illegal copying of programmes. Passwords can be applied for specific directories to restrict access to
unauthorized users.
f. Centralized Software Management- One of the greatest benefits of installing a school network is the fact
that all of the software can be loaded on one computer (the server). This saves time and energy when
installing updates and tracking files.
g. Flexible Access- School networks allow students to access their files from computers throughout the school.
Some schools provide public access to students to begin an assignment in the computer lab and save then
access the file when they are at a cyber cafe or home.