Tuesday 20 September 2022

ch-5 pg 5.48

 Q22)

import math

x=int(input("enter x"))

n=int(input("Enter n"))

s=0

y=4

for i in range(2,n+1):

    if not i%2:

      s-=math.pow(x,i)/math.factorial(y)

    else:

      s+=math.pow(x,i)/math.factorial(y)

    y+=2

    

print("Sum is ",1-s)    

enter x2


Enter n3

Sum is  1.1555555555555554


Q23)

n=int(input("Enter n"))

s=0

for i in range(1,n+1):

    for i in range(1,i+1):

        s+=i

    

print("Sum is ",s)    


Enter n3

Sum is  10


ch-3 Computational Thinking and Getting Started with Python

 Pg 3.30 Unsolved Qns

1)  In order to solve a problem, some thought process is required that involves computational thinking. Computational thinking means any method that is adopted to solve a given problem based on some inputs. This requires some skills like breaking down the problem into smaller units,showing only essential details and hiding background details , recognizing pattern across all similar problems and deriving an algorithm for the problem.

2) Writing functions - Decomposition

     Writing classes - Abstraction

     Looping constructs and expressions - Pattern Recognition

     Psuedocode / Algorithm - leading to python program

3) Python is easily downloadable and the source code also is available along with the software.

4) It is not structured like C++ or other object oriented languages.

    Not much emphasis on the OOPS features 

5) script mode allows us to save the files which contain the code.

    Interactive mode is the shell mode which allows us to execute code snippets without saving it as a file.

6) Decomposition - Functions

7) To use all the four components - Decomposition, Abstraction, Pattern Recognition and Algorithm.

Q8-18 - NA

19) When a large problem is broken down into units of smaller size, it is possible to comprehend and understand smaller units individually rather than tyring to undertand the entire problem.

20) Planning is very important because the program should be robust, i.e. should be able to run with any kind of data, and should deliver the output considering the time complexity factors.For this planning is required as to what language to use, how many variables to use, where to store data, what constructs to use etc.

21-NA

22) Elipse - Start/stop of process

      parallelogram - data

     rectangle- process step

    diamond - decision - making

   arrow - flow of control

23 - 26 - NA

27) Integrated Development Learning Environment

28) Displaying is echoing on the screen in the shell window, the value of the variables.

Printing is printing the values, based on the print statement.

29) a) Interpreted and compiled code

     b) free open source software

     c) Easily portable

     d) Compatible with other languages

     e) case sensitive

     f) supports GUI

     g) Platform independent

30-36 - NA

37-39 - Already discussed 


     


Tuesday 19 March 2019

How to prepare


VOLUME 1
REVIEW OF C++ (Theory) –2  marks
1)  Give examples for the following:
Identifiers, Keywords, Constants,Operators
2) What is cascading of I/O operators?
3)What is the difference between setw() and endl?
4)Write any two objects of iostream.h and any two functions belonging to iomanip.h?
5)What is the difference between compilation and linking of C++ program?
6)What are different types of data types with examples?
7) What are the different types of literals with examples?
8) List out the type modifiers and their purpose
9)List out
a) Assignment, short hand assignment,Unary, binary, ternary, relational, and logical operators
10)What is the order of precedence of arithmetic and logical operators?
11)What is the difference between automatic type conversion and type casting? Give example for each of them.
12)What is a fall through with respect to switch case?
13) What is dangling else statement?
14) List out the header files and the necessary built-in functions for each of the following:
a)Standard input/output functions
b) Mathematical
c) String
d) Character
e) Miscellaneous(other)

15)Write  2 differences between
a)Function prototype and definition
b)default and constant argument
c) call by value and by reference
d)scope rules of variables and functions
with examples
16) Explain typedef and #define pre-processor with example for each.

REVIEW OF C++ (Applications) – Remaining 10/12 marks
Go thru the following TB worked out examples:
P-63 onwards 12,14,15,19,20,22,23,25-34,38-40,45
Unsolved problems:
P-85 onwards 4-11
Pointers
P 405 onwards 10
Short Answer Qns
P 418 onwards 8,11,12,30,34,35

Object Oriented Programming Structure (OOPS) – total – 12 marks
Theory – 2/12  marks
1)    What are the differences between
a)     Data hiding and encapsulation
b)    Class and an object
c)     Abstract class and concrete class

With example in terms of implementation in c++ code for each of these.

2)    How is polymorphism implemented? Give example.
3)    Illustrate different levels of inheritance.
4)    What is transitive nature in inheritance.
5)    What is the advantage of object oriented programming over earlier programming methodologies?
Read the following exercises
Solved problems P-183 onwards 2,3,7,8
OOPS – Applications – remaining 10/12 MARKS
Classes and Objects
Unsolved – P 242 onwards 4,5,6,9
(Try 2 problems for class definition using scope resolution operator)

Constructors and Destructors (Do the exercise given below)
1)        Define a class called EXAMINATION with the following members.
SUBJECT_CODE of type integer
SUBJECT_NAME of type string
DIFFICULTY_LEVEL of type character
NO_OF_QNS of type integer.

            Answer the following:
i)                   Define a default constructor and a parameterized constructor to initialize the data members with the values passed as parameters.
ii)                 Define a copy constructor .
iii)               Define a member function that would print the values.
iv)               Write required function calls for qns i),ii) and iii)
v)                 Define a destructor that would print a message “Completed”.
vi)               How many times the destructor would be invoked?

2)    Illustrate default constructor of a class and a constructor with default arguments.
TB exercises
P240 onwards Q19,20,21,22,23,24,25


Inheritance
Model 1
Class Base
Private, protected,public members
Class Derived (private/protected/public Base)
Private, protected, public members
Answer the following:
1)    What is the type of inheritance depicted above?
2)    List out the members accessed by the object of the class Derived if the visibility mode is
a)     Private
b)    Protected
c)     Public
3)    What will be the size of the object of class Derived?
4)    What are the members that can be accessed by the member function(s) of Derived?
5)    What will be the order of invocation of constructors and destructors.

Model 2
Class Base
Private, protected,public members
Class Derived1 (private/protected/public Base)
Private, protected, public members
Class Derived2 (private/protected/public Derived1)
Private, protected, public members

Answer the following:
6)    What is the type of inheritance depicted above?
7)    List out the members accessed by the object of the class Derived1 if the visibility mode is
d)    Private
e)     Protected
f)      Public
8)    List out the members accessed by the object of the class Derived2 if the visibility mode is
g)     Private
h)    Protected
i)       Public
9)    What will be the size of the object of class Derived2?
10) What are the members that can be accessed by the member function(s) of Derived1?
11)What are the members that can be accessed by the member function(s) of Derived2?
12)What will be the order of invocation of constructors and destructors.


Model 3
Class Base1
Private, protected,public members
Class Base2
Private, protected, public members
Class Derived (private/protected/public Base2, private/protected/public Base1)
Private, protected, public members
Answer the following:
13)What is the type of inheritance depicted above?
14)List out the members accessed by the object of the class Derived if the visibility mode is
j)       Private
k)     Protected
l)       Public
15)If no visibility mode is specified, then what would be the default visibility mode?
16)What are the members that can be accessed by the member function(s) of Derived?
17)What are the members that can be accessed by the member function(s) of Base2?
18)What will be the size of the object of class Derived?
19)What will be the order of invocation of constructors and destructors.

Model 4
Class Base1
Private, protected,public members
Class Derived1 (private/protected/public Base2, private/protected/public Base1)
Private, protected, public members
Class Derived2 (private/protected/public Base2, private/protected/public Base1)
Private, protected, public members
Class Derived(private/protected/public Derived1, private/protected/public Derived2)
Private, protected, public members
Answer the following:
20)What is the type of inheritance depicted above?
21)List out the members accessed by the object of the class Derived if the visibility mode is
m)  Private
n)    Protected
o)    Public
22)What will be the size of the object of class Derived?
23)What are the members that can be accessed by the member function(s) of Derived?
24)What will be the order of invocation of constructors and destructors.

TB – Unsolved Problems – P-292 onwards
2,3,4
P-297 21,22,23,24,25,26


DATA FILE HANDLING – 6 MARKS
TB P-354
20,21,22
P-356
1-16,18-21

DATA STRUCTURE – 14 MARKS

Arrays
TB P-492 onwards
Address calculation - 7-23
33,35,36,38,41,42,43,44
P-494
6,8,11,16,17,20-37
P-567
Stacks and Queues
P-567
1-5,7,9-11,25-36
P568
11-22


Work out Sample Paper 2019-20,west cluster 2019-20,
cssc 2019-20


Friday 16 March 2018

Final preparation

After doing the qn papers , kindly do the sample paper 2017 and board paper 2017.

Networking Notes


COMMUNICATION AND NETWORK TECHNOLOGIES
1) Define the  following:
 ARPANET - Networking started way back in 1969 with the development of the first network called the ARPANET. The U.S. department of defence sponsored a project named ARPANET (Advanced Research Projects Agency Network) whose goal was to connect computers at different universities and U.S. defence.
INTERNET - The world's largest network, the Internet. When networks at multiple locations are connected using services available from phone companies, people can send e-mail, share links to the global Internet, or conduct video conferences in real time with other remote users.
INTERSPACE - A client/server software program that allows multiple users to communicate online with real time audio, video and text chat in dynamic 3D environments.
CHANNEL - A medium that is used in the transmission of a message from one point to another.
Bandwidth(khz,mhz,ghz)- The range of frequencies available for transmission of data.
Data transfer rate(bps,kbps,mbps,gbps,Tbps)- The data transfer rate (DTR) is the amount of data in digital form that is moved from one place to another in a given time on a network.

2) Keeping in view the design of the network for an establishment or institution , in what situations would you suggest each one of the following ? Justify
a) Twisted pair cable - This is one of the common forms of wiring in networks, especially in LANs and it consists of two insulated wires arranged in a regular spiral pattern (double helix). It is generally used for telephone communications in offices and also in modern Ethernet networks. It is easy to install, can carry signal over long distances, least expensive medium.

b)  coaxial cable - It is the most commonly used transmission media for LANs. It consists of solid wire cores surrounded by one or more foil or wire shields, each separated by some kind of plastic insulator. It is widely used for television signals and also by large corporations in building security systems. Multi channel television signals can be transmitted around metropolitan areas at considerably less cost.
i) Better than twisted pair
ii) Suited for broadband transmission
iii)Higher bandwidth
iv)basis for shared cables

c) Optical fibre - These consists of thin strands of glass or glass like material which are so constructed that they carry light from a source at one end of the fibre to a detector at the other end.

i)                    immune to electrical interference
ii)                  suitable for harsh industrial environment
iii)                expensive
iv)                suitable for broadband transmission
v)                  secured transmission

d) Infrared - Infrared is the frequency of light that is not visible to human eye. It has a range of wavelengths. These shorter wavelengths are the ones used by your TV remotes. playing an important role in wireless data communication due to the popularity of laptop computers , personal digital assistants(PDAs) , digital cameras , mobile phones , pagers and other devices but being a line-of-sight transmission , it is sensitive to fog and other atmospheric conditions.
i)short range medium of communication
ii)Inexpensive

e)radio link - In case of radiowave transmission, certain radio frequencies are allocated to private/government organizations for direct voice communications. Each radio signal uses a different frequency and this differentiates it from others.
The transmitter takes some message, encodes it and then transmits it with radio wave. The receiver on
the other hand receives the radio waves and decodes it. Both the transmitter and the receiver use
antennas to radiate and capture the radio signal. Radio transmission is widely used by delivery
services, policemen, security personals etc.
1)      easy to communicate through radio waves in difficult terrains since there is no need of digging
and laying cables.
2)       Radio waves can travel through long distances in all directions. Also they can easily pass through
obstacles like a building so they can be used for both indoor and outdoor communication.
f) microwave link - This type of transmission uses high frequency radio signals to transmit
data through space. Like radio waves, microwaves can pass through obstacles viz. buildings,
mountains etc. Microwaves offer a line of sight method of communication. A transmitter and receiver of a microwave system are mounted on very high towers and both should be visible to each other (line of sight) In case of microwave transmission, curvature of the earth, mountains and other structures often block the line of sight.
i)                   Microwave transmission does not require the expense of laying cables
ii)                Signals become weak after travelling a certain distance and so require amplification. To overcome this problem, repeaters are used at regular intervals (25-30 kms). 
iii)             No cables laid down.

g)Satellite link - Satellites are an essential part of telecommunications systems worldwide today. They can carry a large amount of data in addition to TV signals. Satellite communication is a special use of microwave transmission system. A satellite is placed precisely at 36000 km above the equator where its orbit speed exactly matches the earth's rotation speed. Hence it always stays over the same point with respect to the earth. This allows the ground station to aim its antenna at a fixed point in the sky.
i)        Satellite communication is very economical keeping in mind the fact that the area covered throughsatellite transmission is quite large.
ii)      Transmission is affected by weather conditions like rain, thunderstorm etc.
iii)    Placing the satellite into its orbit involves very high cost.

3) Suggest the applications to which each of these are used. Also mention the function of each with respect to networking.
a) Modem - A modem (Modulator - Demodulator) is a peripheral device that enables a computer to transmit data over, telephone or cable lines. It modulates an analogue carrier signal to encode digital information, and also demodulates such a carrier signal to decode the transmitted information. This is why modem is an acronym of MOdulator/DEModulator.
b) RJ45 connector – RJ-45 , short form of Registered Jack - 45 , is an eight wired connector that is used to connect computers on a local area network(LAN), especially Ethernet.
c)Ethernet card- An Ethernet card is a kind of network adapter and is also known as Network Interface Card (NIC). These adapters support the Ethernet standard for high-speed network connections via cables.
d)Router - A Router is a network device that works like a bridge to establish connection between two networks but it can handle networks with different protocols. For example a router can link an Ethernet network to a mainframe or to internet. If the destination is unknown to the router, it sends the traffic to another router which knows the destination. The data is sent to the router which determines the destination address (using logical address) and then transmits the data accordingly.
e)Switch -A switch is a device that is used to break a network into different sub-networks called subnet or LAN segments. This prevents traffic overloading on the network. Switches are another fundamental part of many networks because they speed things up. They allow different nodes of a network to communicate directly with one another in a smooth and efficient manner. In simple terms, a network switch is a small hardware device that joins multiple computers together within one local area network (LAN).
f)Gateway - A gateway is a network device that establishes an intelligent connection between a local network and external networks with completely different structures i.e. it connects two dissimilar networks. In simple terms, it is a node on a network that serves as an entrance to another network.

g) Wifi card - Wi-Fi cards are small and portable cards that allow your desktop or laptop computer to connect to the internet through a wireless network. Wi-Fi transmission is through the use of radio waves. The antenna transmits the radio signals and these signals are picked up by Wi-Fi receivers such as computers and cell phones equipped with Wi-Fi cards. These devices have to be within the range of a Wi-Fi network to receive the signals. The Wi-Fi card then reads the signals and produces a wireless internet connection.
h) Firewall - A firewall is hardware or software based network security system. It prevents unauthorized access (hackers, viruses, worms etc.) to or from a network. Firewalls are used to prevent unauthorized internet users to access private networks connected to the Internet. All data entering or leaving the Intranet pass through the firewall, which examines each packet and blocks those that do not meet the specified security criteria. A firewall filters both inbound and outbound traffic. A firewall may allow all traffic through unless it meets certain criteria, or it may deny all traffic unless it meets certain criteria.

4)Illustrate the following network topologies
 Bus - Bus topology is also known as Linear Topology. In this type of topology, each node attaches directly to a common cable which acts as the backbone and therefore functions as a shared communication medium onto which various nodes are attached,
Star- A star network features a central connection point called a "hub node" to which all other nodes are connected by a single path. Each node has a dedicated set of wires connecting it to a central network hub. Compared to the bus topology, a star network generally requires more cable, but a failure in any star network cable will only take down one computer's network access and not the entire LAN. On the other hand if the hub fails, the entire network also fails.
Tree- Tree topology is a combination of bus and star topology. The network looks like an inverted tree with the central root branching and sub-branching down to the nodes. It integrates multiple star topologies together onto a bus.
   
5) Mention what factors should be kept in mind while laying out the above mentioned topology.
1)      To cut down on cable length by calculating total distance – bus is used
2)      When length is not an issue, and when a server needs to be the central node – star is used
6) What are the different types of network. Give examples of each.
PAN (Personal Area Network) A Personal Area Network is a computer network organized around an individual person. Personal area networks typically involve a mobile computer, a cell phone and/or a handheld computing device such as a PDA. You can use these networks to transfer files including email and calendar appointments, digital photos and music.
Personal area networks can be constructed with cables or be wireless. USB and FireWire technologies often link together a wired PAN, while wireless PANs typically use bluetooth or sometimes infrared connections. Bluetooth PANs generally cover a range of less than 10 meters (about 30 feet).
LAN (Local Area Network)
In a LAN, network devices are connected over a relatively short distance. They are generally privately owned networks within a single building or campus, of up to a few kilometres in size. LANs can be small, linking as few as three computers, but often link hundreds of computers used by thousands of people.
Nowadays we also have WLAN (Wireless LAN) which is based on wireless . One LAN can even be connected to other LANs over any distance via telephone lines and radio waves.
MAN (Metropolitan Area Network)
This is basically a bigger version of LAN and normally uses similar technology. It might cover few
buildings in a city and might either be private or public. This is a network which spans a physical area ( in the range of 5 and 50 km diameter) that is larger than a LAN but smaller than a WAN. MANs are usually characterized by very high-speed connections using optical fibres or other digital media and provides uplink services to wide area networks (WANs) and the Internet.
WAN (Wide Area Network)
As the term implies, WAN spans a large geographical area, often a country or a continent and uses various commercial and private communication lines to connect computers. Typically, a WAN combines multiple  LANs that are geographically separated. This is accomplished by connecting the different LANs using services such as dedicated leased phone lines, dial-up phone lines, satellite links, high speed fibre optic cables and data packet carrier services.

7) What is
TCP/IP - Transmission Control Protocol / Internet protocol(TCP/IP). The Transmission Control Protocol(TCP) breaks the data into packets that the network can handle efficiently. It manages the assembling of a message or file into smaller packets that are transmitted over the Internet. The Internet Protocol(IP)handles the address part of each packet so that it reaches to the right destination. It gives distinct address (called IP address) to each data packet.

FTP - File Transfer protocol - FTP is based on Client/Server principle. By giving the ftp command with any remote address, the file transfer can be initiated. In any FTP interface, clients identify the FTP server either by its IP address (such as 192.168.0.1) or by its host name (such as ftp.about.com). It is an efficient means to send and receive files from a remote host. You can even download programs by making FTP requests through your web browser.By logging on to an FTP server, you can delete, rename, move, or copy files at a  server.

PPP- Point to Point Protocol - PPP (Point-to-Point Protocol) is used for communication between two computers using a serial interface, mostly a personal computer connected by phone line to a server. For example, an Internet ServiceProvider(ISP) may provide you with a PPP connection so that the ISP'sserver can respond to your  requests, pass them on to the Internet, and forward your requested Internet responses back to you. It was basically designed to help communication between two systems through telephone lines as it supports transmission of network packets over a serial point to point link.
SMTPSimple Mail transfer protocol - SMTP stands for Simple Mail Transfer Protocol that allows transmission of email over the Internet. Most email software is designed to use SMTP for communication purposes when sending email. It only works for outgoing messages. So when an email has to be sent, the address of their Internet Service Provider's SMTP server has to be given.
One of the purposes of an SMTP is that it simplifies the communication of email messages between servers. It allows the server to break up different parts of a message into categories the other server can understand. Any email message has a sender, a recipient or sometimes multiple recipients - a message body, and usually a title heading.
POP3- Post Office Protocol Version 3- POP3 makes it easy for anyone to check their email if their email program is configured properly to work with the protocol. It is extremely common among most mail servers because of its simplicity and high success rate and minimumerrors. Also it can work with virtually any email program, as long as the email program is configured to host the protocol. The individuals receiving POP3 email will have to input their username and password in order to successfully receive email.
VOIP - VOIP stands for voice over internet protocol. It enables the transfer of voice using packet switched network rather than using public switched telephone network. By using VOIP software, phone calls can be done using standard internet connection.
Remote Login(Telnet) - Telnet is the main internet protocol for creating a connection with a remote machine. It allows you to connect to remote computers (called remote hosts) over a TCP/IP network (such as the Internet). Once your telnet client establishes a connection to the remote host, your client becomes a virtual terminal, allowing you to communicate with the remote host from your computer with whatever privileges you may have been granted to the specific application and data on that host computer.

Chatting

A real time informal communication over the Internet is chatting. A chat program is software which is required for chatting over the internet. AOL Instant Messenger, Campfire, Internet Messenger, MSN Messenger are some commonly used chat programs.

Internet Relay Chat (IRC)
IRC protocol is used for chatting. It provides chatting between a group or between two individuals. It is based on client/server model. The IRC client sends and receives messages to and from an IRC server. The IRC server transports the message from one client to another.

8) Wireless protocols     
GSM
The 2G system was based on GSM technology. GSM standard was defined by ETSI in 1989. GSM stands for Global System for Mobile Communication. GSM technology is a combination of FDMA and TDMA. With GSM, all subscriber and wireless provider information is stored on interchangeable modules known as SIM (Subscriber Identification Module) cards. By swapping out the SIM card, users can painlessly switch phones or providers. They used circuit switching.
CDMA
It stands for Code Division Multiple Access. In this, each user is allocated a unique code sequence. On the sender's end, the data signal is encoded using the given unique code. The receiver decodes the signal according the unique code and recovers the original data.
This allows multiple signals from different users to share the same frequency band. Because of this feature,  it is commonly called CDMA (Code Division Multiple Access).
WLL
Wireless in Local Loop(WLL) is meant to serve subscribers at homes or offices. In WLL services, the telephone provided is expected to be as good as wired phone.  WLL is analogous with local telephone service, but much more capable. A WLL system serves a local area by deploying a multiplicity of multichannel transmit/receive base stations(transceivers) that are within line-of-site of the intended customers.
GPRS - Data services have become a much more important part of the mobile phone network than they used to be, starting with text messaging and early packet data services such as GPRS (General Packet Radio Service).

9)What is the difference between 1G, 2G, 3G and 4G mobile telecommunication technologies?
1G - The first mobile system was devised in the U.S. by AT&T.AMPS (Advanced Mobile Phone System), invented by Bell Labs.It was based on the analog cellular technology. They only had voice facility available.
2G - Second-generation mobile phone systems switched to transmitting voice calls in digital form to increase capacity, improve security, and offer text messaging.It was based on GSM (Global System for Mobile communications). It used narrowband TDM (Time Division Multiplexing). The handset activated chip a SIM card, short for Subscriber Identity Module.
Data services have become a much more important part of the mobile phone network than they used to be, starting with text messaging and early packet data services such as GPRS (General Packet Radio Service) in the GSM system.
3G - The third generation of mobile phones, or 3G as it is called, is all about digital voice and data.
The following are the features:
 1. High-quality voice transmission.
2. Messaging (replacing email, fax, SMS, chat, etc.).
3. Multimedia (playing music, viewing videos, films, television, etc.).
4. Internet access (Web surfing, including pages with audio and video).

Many operators have taken cautious steps in the direction of 3G by going to what is sometimes called 2.5G, although 2.1G might be more accurate. One such system is EDGE (Enhanced Data rates for GSM Evolution), which is just GSM with more bits per symbol.

4G- 4G cellular networks that are now being standardized under the name LTE (Long Term Evolution).
While 3G cellular networks are based on CDMA and support voice and data, 4G cellular networks will be based on OFDM with MIMO, and they will target data, with voice as just one application.
4G technologies that are faster and better are on the drawing board under the name of LTE (Long Term Evolution).
Some of the features of 4G include:
      high bandwidth;
      ubiquity (connectivity everywhere);
      seamless integration with other wired and
      wireless IP networks, including 802.11 access points; adaptive resource and spectrum management;
      and high quality of service for multimedia.

10) What is the difference between
a) Circuit switching and Packet switching(different ways of sending data across the network)
Circuit switching
Packet switching
Conceptually, when you or your computer places a telephone call, the switching
equipment within the telephone system seeks out a physical path all the way
from your telephone to the receiver’s telephone.
When a call passes through a switching office, a physical connection is (conceptually) established between the line on which the call came in and one of the output lines.
Nevertheless, the basic idea is valid: once a call has been set up, a dedicated path between both ends exists and will continue to exist until the call is finished
With this technology, packets are sent as soon as they are available.
There is no need to set up a dedicated path in advance, unlike with circuit switching.
 Packet switching networks place a tight upper limit on block size, allowing the packets to be buffered in main memory instead of on disk.
They are well suited in handling interactive traffic

b) Wi-fi and Wi-max
Wi-fi
Wi-max
There is a standard for wireless LANs called IEEE 802.11, popularly known as WiFi, which has become very widespread. It runs at speeds anywhere from 11 to hundreds of Mbps.
IEEE formed a group to standardize a broadband wireless metropolitan area network.standardized as IEEE 802.16 and is popularly known as WiMAX(Worldwide Interoperability for Microwave Access).

c) Hacking and cracking
Hacking
Cracking
The term was used for people who
engaged themselves in harmless technical experiments and fun learning activities.
A computer enthusiast, who uses his computer programming skills to intentionally access a computer
without authorization is known as hacking. The computer enthusiast involved in this activity is known as a hacker.
A hacker accesses the computer without the intention of destroying data or maliciously harming the computer.
Another term commonly used with hacking is cracking. Cracking can be defined as a method by which a person who gains unauthorized access to a computer with the intention of causing damage.

11)What are the threats of computer networks? What are the damages caused? How do you prevent it?
Viruses are a  form of malicious code  that attaches itself to the host program When a virus arrives, either via a Web page, an email attachment, or some other way, it usually starts out by infecting executable programs on the disk.
Worms are like viruses that would replicate itself in seconds on every machine it could gain access to. But unlike viruses, it does not need to attach itself to a host program.
once running, it connects to the machine from which it came, uploads the main worm, and     executes it. After going to some trouble to hide its existence, the worm then looks through its new host's routing tables to see what machines that host was connected to and attempts to spread the bootstrap to those machines.
A very common practice is to write some genuinely useful program and embed the malware inside of it. Games, music players, and anything with splashy graphics are likely candidates.

  People will then voluntarily download and install the application. As a free bonus, they get the malware installed, too. This approach is called a Trojan horse attack,
When the free program is started, it calls a function that writes the malware to disk as an executable program and starts it. The malware can then do whatever damage it was designed for, such as deleting, modifying, or encrypting files.

Electronic junk mail (spam) has become a part of life because spammers have collected millions of email addresses and would-be marketers can cheaply send computer-generated messages to them. The resulting flood of spam rivals the flow messages from real people.

Phishing messages masquerade as originating from a trustworthy party, for example, your bank, to try to trick you into revealing sensitive information, for example, credit card numbers. Identity theft is becoming a serious problem as thieves collect enough information about a victim to obtain credit cards and other documents in the victim’s name.
Small files called cookies that Web browsers store on users’ computers allow companies to track users’ activities in cyberspace and may also allow credit card numbers, social security numbers, and other confidential information to leak all over the Internet.

12)What is the role of firewall in networks?
The ability to connect any computer, anywhere, to any other computer, anywhere, is a mixed blessing. While there is a lot of valuable material on the Web, being connected to the Internet exposes a computer to two kinds of dangers: incoming and outgoing.
 Incoming dangers include crackers trying to enter the computer as well as viruses, spyware, and other malware.
 Outgoing dangers include confidential information such as credit card numbers, passwords, tax returns, and all kinds of corporate information getting out.
Consequently, mechanisms are needed to keep "good" bits in and "bad" bits out. One approach is to use a firewall, which is just a modern adaptation of that old medieval security standby: digging a deep moat around your castle.
It is hardware or software based network security system. It prevents unauthorized access    (hackers, viruses, worms etc.) to or from a network.

13)What is the importance of cyber law with respect to networks?
Is a generic term which refers to all the legal and regulatory aspects of Internet and world wide web.
Cyberlaw is important because it touches almost all aspects of transactions and activities on and concerning the internet, the world wide web and cyberspace.
14)Write 2 sentences about India IT Act
In India, the cyber laws are contained in the Information Technology Act ,2000(IT Act 2000) .
It aims to provide the legal infrastructure for e-commerce in India by governing the transactions through the internet and other electronic medium.
 
15)Write one or two lines about
Digital Signature - A digital signature is a mathematical scheme for demonstrating the authenticity of digital messages or documents. A valid digital signature gives a recipient reason to believe that the message was created by a known sender (authentication), that the sender cannot deny having sent the message (non-repudiation), and that the message was not altered in transit (integrity)

Cookies - Small files called cookies that Web browsers store on users’ computers allow companies to track users’ activities in cyberspace and may also allow credit card numbers, social security numbers, and other confidential information to leak all over the Internet.
IPR issues - The Intellectual Property may be defined as a product of the intellect that has commercial value, including copyrighted property such as literary or artistic works and ideational property.

16)What is Spam? How do you avoid it?
Electronic junk mail (spam) has become a part of life because spammers have collected millions of email addresses and would-be marketers can cheaply send computer-generated messages to them. The resulting flood of spam rivals the flow messages from real people.
Filtering software is able to read and discard  the spam generated by other computers, with lesser or greater degrees of success.

17)Expand and explain the following
1.   WWW - The world wide web (www) is a set of protocols that allows you to access any document on the Net through a naming system based on URLs.
Internet is a highway that offers lot many services, features etc. WWW is a small part of Internet. It is a truck that uses this highway.

2.                  HTML-Everything that you see on the web is documents written in a special language called HTML or Hypertext Markup Language.
This language tells browsers like Chrome how to display text, pictures and links on the screen.
3.      XML – Extensible Markup Language . markup language for documents containing structured information. Provides a facility to define tags and structural relationship b/w them
4.      HTTP-One widely used application protocol is HTTP (Hyper Text Transfer Protocol), which is the basis for the World Wide Web. When a browser wants a Web page, it sends the name of the page it wants to the server hosting the page using HTTP. The server then sends the page back.
5.      URL - Each page is assigned a URL (Uniform Resource Locator) that effectively serves as the page’s worldwide name. URLs have three parts: the protocol (also known as the scheme), the DNS name of the machine on which the page is located, and the path uniquely indicating the specific page (a file to read or program to run on the machine). In the general case, the path has a hierarchical name that models a file directory structure.
As an example, the URL of the page shown as follows
http://www.cs.washington.edu/index.html
This URL consists of three parts: the protocol (http), the DNS name of the host
(www.cs.washington.edu), and the path name (index.html).

18) Web site, Web browser, Web Servers, Web Hosting
 Web site - A location on a net server is called a web site. Each web site has a unique address called URL(Uniform Resource Locator) i.e. the web site of microsoft has an address www.microsoft.com
Web browser and web server - The world wide web (www) is based on clients and servers. A WWW client is called Web browser or simply a browser and WWW server is called a Web server.
Web Hosting  -  Means of hosting web-server application on a computer system through which electronic content on the internet is readily available to any web-browser client.
Web Scripting – Client Side – software used - VBScript, Javascript
Web Scripting – Server Side – software used -  ASP, PHP, PERL, JSP etc
AJAX - Web applications need responsive user interfaces and seamless access to data stored on remote Web servers. These technologies are commonly used with several other key technologies in a combination called AJAX (Asynchronous JAvascript  and Xml).
19) What is Web 2.0 for social networking?
Web 2.0 is the term given to describe a second generation of the World Wide Web that is focused on the ability for people to collaborate and share information online.
Web 2.0 basically refers to the transition from static HTML Web pages to a more dynamic Web that is more organized and is based on serving Web applications to users.
20) Explain
https: Hypertext with security . eg: https://www.bank.com/accounts/
When the Web burst into public view, it was initially used for just distributing static pages. However, before long, some companies got the idea of using it for financial transactions, such as purchasing merchandise by credit card, online banking, and electronic stock trading. These applications created a demand for secure connections. In 1995, Netscape Communications Corp., the then-dominant browser vendor, responded by introducing a security package called SSL (Secure Sockets Layer) to meet this demand.

E-commerce - Using computer networks, manufacturers can place orders electronically as needed. This reduces the need for large inventories and enhances efficiency.
As with companies, home users can access information, communicate with other people, and buy products and services with e-commerce.
Home shopping is already popular and enables users to inspect the online catalogs of thousands of companies.
Another area in which e-commerce is widely used is access to financial institutions.
Many people already pay their bills, manage their bank accounts, and handle their investments electronically.

Mobile Processor: A CPU chip designed for laptops, tablets, smartphones and other portable devices. Mobile processors use lower voltages and are designed to run cooler than the CPUs in desktop computers.
Today’s smartphone and mobile processors are very powerful, so powerful that it is almost as powerful as a desktop computer.
Mobile Banking: Mobile banking is a service provided by a bank or other financial institution that allows its customers to conduct financial transactions remotely using a mobile device such as a smart phone or tablet. Unlike the related internet banking it uses software, usually called an app, provided by the financial institution for the purpose. Mobile banking is usually available on a 24-hour basis. Some financial institutions have restrictions on which accounts may be accessed through mobile banking, as well as a limit on the amount that can be transacted.
Online banking: A method of banking in which transactions are conducted electronically over the Internet. Online banking refers to banking services where depositors can manage more aspects of their accounts over the Internet, rather than visiting a branch or using the telephone.
Payment apps: Apple Pay
Apple Pay works with iPhone, iPad, and Apple Watch. If a POS system supports Apple Pay, when you're ready to check out, you can use your stored credit or debit card to pay with just a quick press of your fingerprint or the side button on your watch. Mac computers can use Apple Pay too.
Samsung Pay & Android Pay:Similar to Apple Pay is Samsung Pay, which works with Samsung Galaxy devices. Android Pay is an app available on all non-rooted Android devices, available on Google Play. Tons of banks are supported and you can pay in lots of stores.
Bank Apps:Lots of banks let you transfer money to other users of that same bank. Sometimes, this feature is available from within the mobile app. Bank of America, Simple, Wells Fargo and Chase are just a few examples but there are many others that work the same way
Payment Services: payment service provide .According to Wikipedia, the definition of a (PSP is a company that “offers shops online services for accepting electronic payments by a variety of payment methods including credit card, bank-based payments such as direct debit, bank transfer, and real-time bank transfer based on online banking. 

Exercises to work: P-808 Q11,12,16,17,34,35,36,37,38,41,p-827 Q19,20,9-831-Q19,20