Mobile Telecommunication Technologies, (Network Security and Internet Services)

This page contains the CBSE Computer Science with Python class 12 Unit-5 chapter 4 Mobile Telecommunication Technologies, (Network Security and Internet Services). You can find the solutions for chapter 4 of CBSE class 12 Computer Science with Python Exercise. So is the case if you are looking for CBSE class 12 Computer Science with Python related topic Mobile Telecommunication Technologies, (Network Security and Internet Services) questions and answers for the Exercise.
Exercise
Question 1
1. Differentiate between SMTP and POP3.
Answer 1
Basis
SMTP
POP3
Full form
Simple Mail Transfer Protocol
Post Office Protocol version 3
Main function
Used for sending email.
Used for receiving/downloading email.
Flow
Client to mail server / server to server.
Mail server to client mailbox access.
In short, SMTP pushes outgoing mail, while POP3 pulls incoming mail from server to user device.
Question 2
2. Give the full forms of the following terms:
CDMA
TDMA
FDMA
Answer 2
CDMA
Code Division Multiple Access
TDMA
Time Division Multiple Access
FDMA
Frequency Division Multiple Access
These are multiple-access techniques used to allow many users to share the same communication channel efficiently.
Question 3
3. Briefly explain the generations in Mobile technologies.
Answer 3
1G: Analog voice communication (basic mobile telephony).
2G: Digital voice and SMS (better quality and basic data).
3G: Mobile internet/data services with improved speed for multimedia use.
4G: High-speed mobile broadband for streaming, apps, and VoIP.
5G: Very high speed, low latency, and stronger support for IoT, smart devices, and real-time services.
Question 4
4. Differentiate between Worm and Virus.
Answer 4
Basis
Virus
Worm
Dependency
Needs a host file/program.
Self-contained malicious program.
Activation
Usually activates when infected file is executed.
Can start spreading automatically once active on a system/network.
Spread
Spreads when infected file/program runs.
Self-replicates over network automatically.
Impact
Infects files/system areas.
Consumes network resources rapidly.
Question 5
5. Explain different types of viruses briefly.
Answer 5
Boot sector virus: infects boot sector of storage devices and may affect system startup.
File infector virus: infects executable files/programs and spreads when such files run.
Macro virus: infects documents using macro scripts (common in office documents).
Multipartite virus: infects multiple targets (for example, boot sector + files), making removal harder.
Question 6
6. Explain the following terms:
Spam
Cookies
Firewall
Answer 6
Spam
Unsolicited bulk messages, usually sent through email.
It can waste bandwidth/time and may contain phishing or malicious links.
Cookies
Small data files stored by browser to remember user/session information.
They improve user convenience (login/preferences) but should be managed for privacy.
Firewall
Security system that monitors and controls incoming/outgoing network traffic.
It helps block unauthorized access based on predefined security rules.
Question 7
7. Explain the significance of IT Act.
Answer 7
The IT Act provides legal recognition to electronic records and digital signatures, and defines cyber crimes with penalties, giving legal framework for e-commerce and cyber security in India. It also supports legal validity of online transactions and helps in prevention/control of cyber offences.
Question 8
8. Explain the following terms:
Patent
Copyright
Trademark
Answer 8
Patent
Legal right granted to inventor over an invention for a limited period.
It prevents others from making/using/selling the invention without permission.
Copyright
Legal right that protects original creative works (books, music, software, etc.).
It controls copying, distribution, and reuse of creative content.
Trademark
Legal protection for brand identity such as name, logo, symbol, or slogan.
It helps distinguish one company/product from others in the market.
Question 9
9. Differentiate between hacking and cracking.
Answer 9
Basis
Hacking
Cracking
Intent
Can be ethical/authorized testing.
Usually malicious and unauthorized.
Purpose
Find and fix security weaknesses.
Break security for misuse/damage.
Outcome
Improves security when done ethically.
Causes data theft, misuse, or system harm.
Legality
May be legal with permission.
Illegal activity.
Question 10
10. Mona is confused between the terms Domain name and URL. Explain the difference with the help of suitable example.
Answer 10
Domain name is the website name/address (for example, abcschool.in).
URL (Uniform Resource Locator) is the complete web address including protocol and path (for example, http://www.abcschool.in/home/aboutus.html).
So, domain name is a part of URL, while URL identifies the exact resource/location on that domain.
Question 11
11. Identify the Domain name and URL from the following: http://www.ABCSchool.in/home.aboutus.hml
Answer 11
URL: http://www.ABCSchool.in/home.aboutus.hml
Domain name: ABCSchool.in
Here, URL includes protocol + host + path, while domain name is only the core site address.
Question 12
12. Mr. Rohan wants to prevent unauthorized access to/from his company’s local area network. Write the name of the system, which he should install to do the same.
Answer 12
Firewall.
A firewall filters incoming and outgoing network traffic based on security rules to block unauthorized access.
Question 13
13. Define the following with reference to threats to network security.
(i)
Worm
(ii)
Trojan Horse
Answer 13
(i)
Worm: A self-replicating malware that spreads across networks without needing a host file.
It can quickly consume bandwidth/resources and slow down network performance.
(ii)
Trojan Horse: Malicious software disguised as useful/legitimate program to trick users and compromise system security.
After installation, it may create backdoor access, steal data, or damage files.