Easy2Siksha.com
GNDU QUESTION PAPERS 2023
B.com 6
th
SEMESTER
WINDOWS AND NETWORKING
(Group III: Computer Applicaons & E-Business)
Time Allowed: 3 Hours Maximum Marks: 50
Note: Aempt Five quesons in all, selecng at least One queson from each secon. The
Fih queson may be aempted from any Secon. All quesons carry equal marks.
SECTION-A
1. What is an Operang System ? Discuss various types of Operang Systems.
(a) Write a note on the following:
2.(i) Computer Virus
(ii) Control Panel.
(b) Dierenate between cold and hot boong.
SECTION-B
3. (a) Discuss the role of recycle bin in Windows.
(b) What all sengs can the user congure using Windows display sengs?
4. (a) What are the dierent ways to open run command?
Easy2Siksha.com
(b) Explain the signicance of Windows search command.
SECTION-C
5. (a) Dierenate between half-duplex and full-duplex.
(b) Dierenate between analog transmission and digital transmission.
6. Write a note on dierent network topologies.
SECTION-D
7. Explain the concept of rewall. Also, share its benets.
8. Write a short note on the following:
(a) Malware
(b) Hacking
(c) Spoong
Easy2Siksha.com
GNDU ANSWER PAPERS 2023
B.com 6
th
SEMESTER
WINDOWS AND NETWORKING
(Group III: Computer Applicaons & E-Business)
Time Allowed: 3 Hours Maximum Marks: 50
Note: Aempt Five quesons in all, selecng at least One queson from each secon. The
Fih queson may be aempted from any Secon. All quesons carry equal marks.
SECTION-A
1. What is an Operang System ? Discuss various types of Operang Systems.
(a) Write a note on the following:
Ans: What is an Operating System?
Imagine you have a smartphone or a laptop. You open apps, play games, watch videos, or
type assignments. But have you ever thoughthow does the device actually work behind
the scenes?
This is where the Operating System (OS) comes in.
Definition
An Operating System is a special type of system software that acts as a bridge between the
user and the computer hardware. It controls all the hardware (like CPU, memory, keyboard)
and allows users to run applications smoothly.
In simple words:
Operating System = Manager of the computer
Real-Life Example
Easy2Siksha.com
Think of a restaurant:
You (user) give an order
Waiter (Operating System) takes your request
Kitchen (hardware) prepares food
Waiter delivers it back to you
Without the waiter, communication would be messy. Similarly, without an OS, you cannot
use a computer properly.
Examples of Operating Systems
Some popular operating systems you may already use:
Microsoft Windows
macOS
Linux
Android
iOS
Basic Functions of an Operating System
An OS performs many important tasks:
1. Process Management Runs programs and manages CPU usage
2. Memory Management Allocates RAM to different tasks
3. File Management Organizes files and folders
4. Device Management Controls hardware like printer, keyboard
5. Security Protects system from unauthorized access
Diagram of Operating System
Here’s a simple diagram to understand how OS works:
USER
APPLICATION SOFTWARE
OPERATING SYSTEM
HARDWARE
(CPU, RAM, Devices)
Easy2Siksha.com
The OS sits in the middle and connects everything.
Types of Operating Systems
Operating systems are not all the same. They are designed for different purposes. Let’s
understand each type in a simple way:
1. Batch Operating System
In early computers, users did not interact directly with the system. Jobs were collected and
executed in batches.
Features:
No direct user interaction
Tasks processed one by one
Faster than manual processing
Example:
Payroll systems in old organizations
Think of it like submitting multiple assignments together and getting results later.
2. Time-Sharing Operating System
This type allows multiple users to use the system at the same time.
Features:
Each user gets a small time slice
Fast response time
Multi-user environment
Example:
Unix systems
Modern multi-user servers
Like many people using one computer, but each gets a quick turn.
Easy2Siksha.com
3. Single User Operating System
Only one user can operate the system at a time.
Types:
Single-task (e.g., old systems)
Multi-task (modern PCs)
Example:
MS-DOS
Personal computers
Like using your own laptop.
4. Multi-User Operating System
Multiple users can use the system simultaneously.
Features:
Resource sharing
Security between users
Efficient system usage
Example:
Unix
Like many students using one computer lab server.
5. Real-Time Operating System (RTOS)
These systems respond instantly to inputs.
Features:
Fast processing
Time-critical operations
Used in machines and control systems
Example:
Easy2Siksha.com
Air traffic control systems
Medical equipment
Even a small delay can cause serious problems here.
6. 🖧 Distributed Operating System
Multiple computers work together as one system.
Features:
Resource sharing across systems
High reliability
Better performance
Like a group project where everyone works on different parts but submits one final
result.
7. Network Operating System
Used to manage network resources and communication.
Features:
File sharing
Printer sharing
User management
Example:
Windows Server
Helps computers communicate in a network.
8. Mobile Operating System
Specially designed for smartphones and tablets.
Features:
Touch interface
Easy2Siksha.com
Power efficiency
App management
Example:
Android
iOS
Conclusion
An Operating System is the heart of a computer system. Without it, a computer is just a
machine with no usability. It manages everythingfrom running applications to controlling
hardware.
Different types of operating systems are designed to meet different needswhether it's
personal use, large organizations, real-time systems, or mobile devices.
2.(i) Computer Virus
(ii) Control Panel.
(b) Dierenate between cold and hot boong.
Ans: (i) Computer Virus
Imagine your computer is like your body. Just as humans can catch viruses that make them
sick, computers can also catch “viruses” that disrupt their normal functioning.
What is a Computer Virus?
A computer virus is a type of malicious software program designed to enter your computer,
replicate itself, and cause harm. It can delete files, steal information, slow down
performance, or even crash the system.
How Does It Spread?
Through infected files or software downloads.
Via email attachments.
By plugging in infected USB drives.
Sometimes even through malicious websites.
Analogy: Think of a virus as a prankster who sneaks into your classroom, copies himself, and
starts messing with everyone’s notebooks.
Easy2Siksha.com
Types of Computer Viruses
1. File Infector Virus Attaches itself to executable files (.exe).
2. Macro Virus Targets documents like Word or Excel.
3. Boot Sector Virus Infects the part of the computer that starts up.
4. Polymorphic Virus Changes its code to avoid detection.
Effects of a Virus
Slows down your computer.
Deletes or corrupts files.
Steals sensitive information.
Displays annoying pop-ups.
Prevention
Install antivirus software.
Avoid suspicious downloads.
Keep your system updated.
Don’t click on unknown email links.
(ii) Control Panel
Now, let’s shift gears. Imagine your computer is like a car. The Control Panel is the
dashboardit lets you manage and adjust all the important settings.
What is Control Panel?
The Control Panel in Windows is a central place where users can configure system settings.
It’s like the “command center” of your computer.
Functions of Control Panel
1. System and Security Manage firewalls, updates, and backups.
2. Network and Internet Set up Wi-Fi, LAN, or VPN connections.
3. Hardware and Sound Adjust printers, speakers, or mouse settings.
4. Programs Install or uninstall software.
5. User Accounts Create or manage accounts and passwords.
6. Appearance and Personalization Change themes, wallpapers, or display settings.
Analogy: If your computer were a house, the Control Panel would be the control room
where you adjust electricity, water supply, and security cameras.
Why is Control Panel Important?
Without it, you’d struggle to manage your system. It gives you easy access to customize your
computer according to your needs.
Easy2Siksha.com
(b) Difference Between Cold Booting and Hot Booting
Now comes the interesting partbooting. Booting simply means starting up your computer.
But there are two types: cold booting and hot booting.
1. Cold Booting
Definition: Starting the computer when it is completely switched off.
Process: You press the power button → BIOS runs → Operating System loads →
Computer is ready.
Example: When you come home, press the power button, and your PC starts from
scratch.
Analogy: Cold booting is like waking up in the morningyou start fresh after being
completely asleep.
2. Hot Booting
Definition: Restarting the computer without turning off the power.
Process: You press “Restart” → System reloads the OS → Computer starts again.
Example: When your computer hangs, you press Ctrl+Alt+Del and restart without
shutting down.
Analogy: Hot booting is like taking a short nap in the afternoon—you don’t go into deep
sleep, but you refresh yourself.
Key Differences Between Cold and Hot Booting
Feature
Cold Booting
Hot Booting
Starting Point
From complete power-off state
From already powered-on state
Trigger
Power button
Restart command (software or keys)
Speed
Slower (loads everything fresh)
Faster (reloads OS only)
Use Case
First time starting the computer
Restarting after updates or errors
Analogy
Morning wake-up
Afternoon nap
Diagram: Cold vs Hot Booting
Booting Process
|
---------------------------
| |
Cold Booting Hot Booting
(Power ON from OFF) (Restart from ON)
| |
BIOS → OS loads OS reloads directly
A Relatable Story
Easy2Siksha.com
Let’s imagine Ananya, a college student.
One day, she downloads a free game from a shady website. Suddenly, her laptop
slows down, files disappear, and strange pop-ups appear. She realizes it’s a
computer virus. Luckily, she had antivirus software, which removes the virus.
Later, she wants to connect her printer. She opens the Control Panel, goes to
“Devices and Printers,” and sets it up easily.
Finally, her laptop freezes during an assignment. She doesn’t want to shut it down
completely, so she chooses hot booting (restart). The system refreshes, and she
continues her work. The next morning, when she powers it on from scratch, that’s
cold booting.
Through this story, you can see how these concepts play out in everyday life.
Conclusion
A computer virus is harmful software that disrupts your system.
The Control Panel is the central hub for managing computer settings.
Cold booting means starting from complete shutdown, while hot booting means
restarting without turning off power.
Together, these concepts show how computers work, how they can be protected, and how
users interact with them daily.
SECTION-B
3. (a) Discuss the role of recycle bin in Windows.
(b) What all sengs can the user congure using Windows display sengs?
Ans: 3. (a) Role of Recycle Bin in Windows
What is the Recycle Bin?
The Recycle Bin in Microsoft Windows is like a temporary dustbin on your computer.
Whenever you delete a file (like a photo, document, or video), it doesn’t disappear
immediately. Instead, it goes into the Recycle Bin. This gives you a chance to recover it if you
deleted it by mistake.
Think of it like this:
Easy2Siksha.com
Imagine you throw a paper into a dustbin at home. If you realize later that it was important,
you can still take it out—as long as the trash hasn’t been taken away.
The Recycle Bin works exactly like that!
How the Recycle Bin Works
Here is a simple flow:
File Created → File Deleted → Goes to Recycle Bin →
→ Restore (if needed) OR Permanently Delete
Diagram to Understand
+------------------+
| Your Files |
+------------------+
|
| Delete
+------------------+
| Recycle Bin |
+------------------+
| |
Restore Empty Bin
| |
↓ ↓
File Returns Permanently Deleted
Key Functions of the Recycle Bin
1. Temporary Storage
Deleted files are stored here instead of being permanently erased.
2. File Recovery (Restore)
If you delete something by mistake, you can restore it easily.
3. Permanent Deletion
When you empty the Recycle Bin, files are deleted permanently.
4. Storage Management
Easy2Siksha.com
Recycle Bin has a size limit. When it gets full, older files are removed automatically.
Important Features
Restore Option → Brings file back to original location
Empty Recycle Bin → Deletes all files permanently
Right-click Options → Manage files easily
Shortcut Delete (Shift + Delete) → Skips Recycle Bin (permanent delete)
Limitations
Files deleted using Shift + Delete don’t go to Recycle Bin
Files deleted from external drives may not go into it
Once emptied, recovery becomes difficult (requires special software)
Conclusion (Part A)
The Recycle Bin acts as a safety net in Windows. It protects users from accidental deletion
and gives them a second chance to recover important files. Without it, losing data would be
much more common and stressful.
3. (b) Windows Display Settings
Now let’s talk about how you can control how your screen looks.
What are Display Settings?
Display settings in Microsoft Windows allow you to customize your screen’s appearance,
resolution, brightness, and more.
Why Are Display Settings Important?
They help you:
Make text easier to read
Adjust brightness for comfort
Improve visual quality
Easy2Siksha.com
Connect multiple monitors
Main Settings You Can Configure
1. Screen Resolution
Controls how sharp your display looks
Higher resolution = clearer images
Example: 1920×1080 (Full HD)
2. Scaling (Size of Text & Apps)
Makes text and icons bigger or smaller
Useful if things look too tiny on screen
3. Brightness and Night Light
Adjust brightness for eye comfort
Night Light reduces blue light for better sleep
4. Orientation
Change screen direction:
o Landscape (default)
o Portrait (vertical)
5. Multiple Display Settings
Connect more than one monitor
Options:
o Duplicate (same screen)
o Extend (extra workspace)
o Second screen only
Easy2Siksha.com
6. Background and Themes
Change wallpaper
Customize colors and themes
7. Refresh Rate
Controls how smooth the screen looks
Higher refresh rate = smoother experience (good for gaming)
8. Advanced Display Settings
View graphics details
Adjust color calibration
Manage GPU settings
Diagram of Display Settings
Real-Life Example
Imagine you are studying at night:
You reduce brightness
Turn on Night Light
Increase text size for easy reading
Or if you're designing or gaming:
Increase resolution
Easy2Siksha.com
Set higher refresh rate
Use multiple screens
Conclusion (Part B)
Windows display settings give you full control over how your screen looks and behaves.
Whether you want comfort, clarity, or performance, these settings help you customize your
experience according to your needs.
Final Combined Summary
The Recycle Bin protects your files by storing deleted items temporarily and allowing
recovery.
The Display Settings help you control how your screen looks, making your computer
more comfortable and efficient to use.
4. (a) What are the dierent ways to open run command?
(b) Explain the signicance of Windows search command.
Ans: Part (a) Different Ways to Open the Run Command
Imagine your computer as a big city. The Run command is like a shortcut alleywayit lets
you jump straight to a destination without wandering through the main roads. Instead of
clicking through menus, you type a command, and boom—you’re there.
What is the Run Command?
The Run command in Windows is a small dialog box where you can type instructions (like
cmd, notepad, or control) to quickly open programs, files, or system settings. It saves time
and makes you feel like a computer wizard.
Ways to Open the Run Command
There are several ways to open this magical shortcut:
1. Keyboard Shortcut (Most Popular)
o Press Windows Key + R.
o Instantly, the Run dialog box appears. Analogy: It’s like pressing the horn in a
carquick and direct.
2. Start Menu Search
o Click on the Start Menu.
Easy2Siksha.com
o Type “Run” in the search bar.
o Click on the Run app. Analogy: It’s like asking Google Maps for directions
instead of remembering the shortcut.
3. Right-Click Start Menu (Windows 10/11)
o Right-click the Start button.
o Select “Run” from the menu. Analogy: Like opening a toolbox and picking the
right tool.
4. Task Manager Method
o Press Ctrl + Shift + Esc to open Task Manager.
o Click “File” → “Run new task.”
o This opens the Run dialog. Analogy: It’s like entering through the back door
of a building.
5. Command Prompt or PowerShell
o Open Command Prompt.
o Type start run.
o The Run dialog appears. Analogy: It’s like using a secret code to unlock a
hidden door.
6. Desktop Shortcut
o Create a shortcut on your desktop with the target
C:\Windows\System32\run.exe.
o Double-click it anytime. Analogy: Like keeping a spare key under the
doormat.
Why Is the Run Command Useful?
Saves time (no need to click through menus).
Lets you access hidden system tools (like msconfig, regedit).
Makes troubleshooting faster.
Helps advanced users feel in control.
Story Example: Imagine your computer is misbehaving, and you need to quickly open the
Task Manager or Registry Editor. Instead of searching endlessly, you press Windows + R,
type taskmgr, and you’re there in seconds. That’s the power of Run.
Part (b) Significance of Windows Search Command
Now let’s talk about the Windows Search command. If the Run command is a shortcut alley,
the Search command is like Google Maps for your computerit helps you find anything,
anywhere.
What is Windows Search?
Windows Search is a built-in feature that lets you look for files, folders, apps, or even
settings on your computer. You type a word, and Windows digs through its “library” to show
you results.
Why Is It Significant?
Easy2Siksha.com
1. Saves Time
o Instead of browsing through hundreds of folders, you type the name and find
it instantly. Analogy: Like asking Siri or Alexa instead of flipping through a
dictionary.
2. Universal Access
o Search doesn’t just find files—it also finds apps, emails, settings, and even
web results (in newer versions). Analogy: It’s like a Swiss Army knife—one
tool, many uses.
3. Helps in Troubleshooting
o Need to open “Device Manager”? Just type it in Search.
o No need to remember exact paths. Analogy: Like asking a librarian instead of
wandering through shelves.
4. Integration with Cortana/AI (Windows 10/11)
o Search is integrated with voice assistants.
o You can ask questions like “Weather today” or “Open Calculator.” Analogy:
It’s like having a personal assistant inside your computer.
5. Indexing for Speed
o Windows creates an index (like a catalog) of your files.
o This makes searches lightning-fast. Analogy: Imagine a library with a card
catalog—you don’t search every book, you check the index.
Diagram: Run vs Search Command
Windows Tools
|
---------------------------------
| |
Run Command Search Command
(Shortcut Alley) (Google Maps for PC)
| |
Quick access to apps, Find files, apps, settings,
tools, and system tasks and even web results
A Relatable Story
Let’s imagine Rohit, a student preparing for exams.
His laptop is slow, so he wants to check startup programs. He presses Windows + R,
types msconfig, and instantly opens the System Configuration tool. That’s the Run
command saving his day.
Later, he forgets where he saved his project file. Instead of panicking, he clicks the
Search bar, types “Project.docx,” and Windows finds it in seconds. That’s the Search
command acting like a detective.
Together, Run and Search make Rohit’s life easier. One gives shortcuts, the other finds lost
treasures.
Key Takeaway
Easy2Siksha.com
The Run command is a quick way to open programs and system tools directly.
The Windows Search command is a powerful tool to locate files, apps, and settings
across the computer.
Both save time, reduce frustration, and make you feel in control of your machine.
Think of Run as a secret shortcut and Search as a detectiveboth working together to make
your computing experience smooth and efficient.
SECTION-C
5. (a) Dierenate between half-duplex and full-duplex.
(b) Dierenate between analog transmission and digital transmission.
Ans: (a) Half-Duplex vs Full-Duplex Communication
Imagine you and your friend are talking using a walkie-talkie. Only one person can speak at a
timeif both try to talk together, the message gets disturbed. This is exactly how half-
duplex communication works.
Now imagine a normal phone call. You and your friend can talk and listen at the same time
without any interruption. This is called full-duplex communication.
Half-Duplex Communication
In half-duplex mode, communication happens in both directions, but not at the same time.
Key Idea:
One at a time communication.”
Examples:
Walkie-talkies
CB radios
Some older communication systems
How it works:
One device sends data → the other receives
Then the roles switch
Easy2Siksha.com
Simple Diagram:
Device A -----> Device B
Device A <----- Device B
(But NOT at the same time)
Advantages:
Simpler system
Lower cost
Less complexity
Disadvantages:
Slower communication
Waiting time required
Not efficient for continuous data transfer
Full-Duplex Communication
In full-duplex mode, communication happens in both directions simultaneously.
Key Idea:
Both can talk and listen at the same time.”
Examples:
Mobile phone calls
Video calls
Modern computer networks
How it works:
Both devices send and receive data at the same time
Simple Diagram:
Device A <-----> Device B
(Simultaneous communication)
Advantages:
Faster communication
No waiting
Easy2Siksha.com
Efficient and smooth
Disadvantages:
More complex system
Higher cost
Quick Comparison Table
Feature
Half-Duplex
Full-Duplex
Direction
Both directions
Both directions
Simultaneous?
No
Yes
Speed
Slower
Faster
Example
Walkie-talkie
Phone call
Cost
Lower
Higher
(b) Analog Transmission vs Digital Transmission
Now let’s move to the second part. This is about how data is sent.
Think about sound and signals around you.
When you speak naturally, your voice is smooth and continuous → Analog
When you send a message using numbers (like 0 and 1 in computers) → Digital
Analog Transmission
Analog transmission sends data in the form of continuous signals.
Key Idea:
Smooth and continuous signals.”
Example:
Human voice
Old radio signals
Traditional telephone lines
How it looks:
Signal: ~~~~~~~~ (smooth wave)
Easy2Siksha.com
Characteristics:
Signal varies continuously
Represents real-world data directly
Advantages:
Natural representation of sound and video
Simple technology
Disadvantages:
More noise and distortion
Signal quality decreases over distance
Less secure
Digital Transmission
Digital transmission sends data in the form of binary values (0 and 1).
Key Idea:
Discrete signals (ON/OFF).”
Example:
Computers
Internet data
Mobile communication
How it looks:
Signal: _|‾|_|‾|_ (step-like signals)
(Binary: 0 and 1)
Characteristics:
Data is converted into binary
Easy to process and store
Advantages:
Less noise interference
High accuracy
Easy error detection and correction
Easy2Siksha.com
Secure communication
Disadvantages:
Requires conversion (analog → digital)
Slightly complex system
Simple Real-Life Analogy
Analog = Like drawing a smooth curve with a pencil
Digital = Like drawing using small blocks or pixels
Quick Comparison Table
Feature
Digital Transmission
Signal Type
Discrete (0 and 1)
Noise
Low
Accuracy
High
Example
Internet, computers
Security
High
Final Understanding (In Simple Words)
Half-duplex vs Full-duplex → Focuses on how communication flows
o Half = One at a time
o Full = Both at the same time
Analog vs Digital Transmission → Focuses on how data is represented
o Analog = Continuous signals
o Digital = Binary (0 & 1)
Conclusion
Communication systems are designed based on efficiency and purpose. Half-duplex systems
are simple but slower, while full-duplex systems provide fast and real-time interaction.
Similarly, analog transmission is natural but affected by noise, whereas digital transmission
is more reliable, accurate, and widely used in modern technology.
Easy2Siksha.com
6. Write a note on dierent network topologies.
Ans: What is Network Topology?
Network topology refers to the structure or layout of how computers, servers, and other
devices are connected in a network. It’s like the “map” of the network. Just as roads connect
houses in different patterns (straight line, circle, star-shaped), network topologies define
how data travels between devices.
Different Types of Network Topologies
1. Bus Topology
Structure: All devices are connected to a single central cable (the “bus”).
How it works: Data travels along the cable, and all devices see it, but only the
intended recipient accepts it.
Advantages: Simple, cheap, easy to set up.
Disadvantages: If the main cable fails, the whole network goes down.
Analogy: Imagine a single street with houses lined up. If the street is blocked, no one can
travel.
2. Star Topology
Structure: All devices connect to a central hub or switch.
How it works: The hub acts like a traffic controllerdata goes from one device to
the hub, then to the destination.
Advantages: Easy to manage, if one device fails, others are unaffected.
Disadvantages: If the hub fails, the whole network collapses.
Analogy: Think of a classroom where all students talk to the teacher, and the teacher passes
messages around.
3. Ring Topology
Structure: Devices are connected in a circular fashion.
How it works: Data travels in one direction (or both, in dual-ring) around the circle
until it reaches the destination.
Advantages: Equal access for all devices, predictable performance.
Disadvantages: If one device fails, the whole ring can break.
Analogy: Imagine friends sitting in a circle, passing a note around until it reaches the right
person.
4. Mesh Topology
Structure: Every device is connected to every other device.
How it works: Data can take multiple paths to reach its destination.
Easy2Siksha.com
Advantages: Very reliableif one path fails, another is available.
Disadvantages: Expensive and complex to set up.
Analogy: Like a spider’s web—lots of connections, very strong, but takes effort to build.
5. Tree Topology
Structure: A combination of star and bus. Devices are arranged in a hierarchy, like
branches of a tree.
How it works: Central “root” connects to hubs, which connect to devices.
Advantages: Scalable, easy to expand.
Disadvantages: If the root fails, large parts of the network are affected.
Analogy: Think of a family treegrandparents at the top, then parents, then children.
6. Hybrid Topology
Structure: A mix of two or more topologies (like star + ring, or star + mesh).
How it works: Combines strengths of different layouts.
Advantages: Flexible, can be customized.
Disadvantages: Complex design, higher cost.
Analogy: Like mixing two recipesyou get the best of both, but it takes skill.
Diagram: Common Network Topologies
A Relatable Story
Imagine you and your friends are planning a group study session:
If you all sit in a line (bus), you pass notes down the row.
Easy2Siksha.com
If you all talk to one leader (star), that leader distributes information.
If you sit in a circle (ring), notes go around until they reach the right person.
If everyone is connected to everyone (mesh), you can talk directly to anyone.
If you organize like a family tree (tree), one person passes info to their group, who
pass it further down.
If you mix styles (hybrid), you get flexibility.
That’s exactly how computers communicate in different network topologies.
Conclusion
Bus: Simple but fragile.
Star: Centralized, easy to manage, but hub-dependent.
Ring: Equal access, but one break can stop everything.
Mesh: Strong and reliable, but costly.
Tree: Hierarchical, scalable, but root-dependent.
Hybrid: Flexible, combines strengths, but complex.
Network topologies are like different ways of organizing communication among friends.
Each has its strengths and weaknesses, and the choice depends on the size, budget, and
purpose of the network.
SECTION-D
7. Explain the concept of rewall. Also, share its benets.
Ans: Firewall: Concept and Benefits
Imagine your house. You have doors and windows, right? Now, do you allow everyone to
enter your house freely? Of course not. You keep the doors locked, you check who is
knocking, and only trusted people are allowed inside.
In the world of computers and the internet, a firewall works exactly like that security guard
or gatekeeper. It protects your computer or network from unwanted visitors (like hackers,
viruses, or harmful data).
󹺟󹺠󹺡󹺞 What is a Firewall? (Concept)
A firewall is a security system (it can be software, hardware, or both) that controls
incoming and outgoing network traffic based on a set of predefined rules.
Easy2Siksha.com
In simple words:
󷷑󷷒󷷓󷷔 A firewall decides what is allowed in and what should be blocked.
󼩏󼩐󼩑 How does it work?
Whenever your computer connects to the internet, data flows in and out. This data travels
in small units called packets.
The firewall checks these packets and asks:
Is this data safe?
Where is it coming from?
Does it follow the rules?
If the answer is YES → it allows the data
If the answer is NO → it blocks the data
󹵍󹵉󹵎󹵏󹵐 Simple Diagram of Firewall Working
󷷑󷷒󷷓󷷔 Think of the firewall as a checkpoint between the internet and your system.
󹺖󹺗󹺕 Types of Firewalls (Basic Understanding)
Even though the question doesn’t require deep technical detail, knowing types helps
understanding:
Easy2Siksha.com
1. Hardware Firewall
o Installed as a physical device
o Used in offices or organizations
o Protects entire network
2. Software Firewall
o Installed on your computer
o Example: Windows Defender Firewall
o Protects a single device
3. Packet Filtering Firewall
o Checks packets based on rules
o Fast but basic
4. Stateful Inspection Firewall
o More advanced
o Tracks ongoing connections
󷈷󷈸󷈹󷈺󷈻󷈼 Benefits of Firewall
Now let’s understand why firewalls are so important.
1. Protection from Hackers
The biggest benefit of a firewall is security.
Hackers try to enter your system to:
Steal data
Damage files
Control your system
A firewall blocks unauthorized access and keeps your system safe.
󷷑󷷒󷷓󷷔 Without a firewall, your system is like a house with no doors.
2. Prevents Viruses and Malware
Many harmful programs try to enter your computer through the internet.
A firewall:
Stops suspicious downloads
Blocks infected websites
Prevents malware from spreading
Easy2Siksha.com
3. Controls Network Traffic
Firewalls allow you to control what goes in and out of your system.
For example:
You can block certain websites
You can restrict apps from accessing the internet
This is very useful in schools, colleges, and offices.
4. Protects Personal Data
Your computer contains:
Photos
Passwords
Bank details
Documents
A firewall ensures that this sensitive information is not leaked to outsiders.
5. Helps in Monitoring Activity
Firewalls keep a record of:
Incoming traffic
Blocked attempts
Suspicious activity
This helps in:
Detecting threats early
Understanding attack patterns
6. Improves Network Performance
By blocking unwanted traffic, a firewall:
Reduces unnecessary load
Makes your internet faster
Prevents system slowdown
Easy2Siksha.com
7. Provides Layered Security
A firewall is part of a multi-layer security system.
Along with:
Antivirus
Encryption
Strong passwords
It makes your system highly secure.
󷘹󷘴󷘵󷘶󷘷󷘸 Real-Life Example
Suppose you are using Wi-Fi in a café.
Without a firewall:
Anyone on the same network could try to access your system
With a firewall:
Only trusted connections are allowed
Unknown access attempts are blocked
󽁔󽁕󽁖 Limitations of Firewall (Important for Exams)
Even though firewalls are powerful, they are not perfect.
Cannot stop attacks if user downloads harmful files manually
Needs proper configuration
Cannot protect against internal threats
󷷑󷷒󷷓󷷔 So, it should be used along with other security tools.
󼫹󼫺 Conclusion
A firewall is one of the most important tools in computer security. It acts like a security
guard, standing between your system and the internet, making sure only safe and trusted
data is allowed.
Easy2Siksha.com
In today’s digital world, where cyber threats are increasing every day, using a firewall is not
optionalit is essential. Whether you are using a mobile phone, laptop, or a large network,
a firewall helps protect your data, privacy, and system from harm.
󷄧󼿒 In One Line (For Revision):
A firewall is a network security system that monitors and controls incoming and outgoing
traffic to protect a computer or network from unauthorized access and threats.
8. Write a short note on the following:
(a) Malware
(b) Hacking
(c) Spoong
Ans: 󷇳 Introduction: Why These Topics Matter
Imagine your computer or smartphone as your personal home. You keep valuables inside
photos, documents, passwords, even bank details. Just like in real life, there are threats:
burglars, tricksters, and vandals. In the digital world, these threats take the form of
malware, hacking, and spoofing. Understanding them is like learning how to lock your
doors, install alarms, and spot scams.
󻛟󻛠󻛡󻛢󻛣󻛤󻛥󻛦󻛪󻛧󻛨󻛩󻛫󻛬󻛭󻛮 (a) Malware
What is Malware?
The word malware comes from “malicious software.” It’s any program designed to harm
your computer, steal information, or disrupt operations. Think of malware as an unwanted
intruder who sneaks into your house and causes trouble.
Types of Malware
1. Viruses Attach themselves to files and spread when those files are shared.
Analogy: Like a contagious flu spreading among classmates.
2. Worms Spread automatically across networks without needing a host file. Analogy:
Like termites quietly spreading through wooden furniture.
3. Trojan Horses Disguise themselves as useful software but secretly cause harm.
Analogy: Like a gift box with a hidden snake inside.
4. Spyware Secretly monitors your activities, like keystrokes or browsing habits.
Analogy: Like someone peeking through your window to see what you’re doing.
5. Ransomware Locks your files and demands payment to unlock them. Analogy: Like
a kidnapper holding your belongings hostage until you pay.
Easy2Siksha.com
Effects of Malware
Slows down your computer.
Deletes or corrupts files.
Steals sensitive information.
Displays unwanted ads or pop-ups.
Prevention
Install antivirus software.
Keep systems updated.
Avoid suspicious downloads.
Don’t click on unknown email links.
󹳾󹳿󹴀󹴁󹴂󹴃 (b) Hacking
What is Hacking?
Hacking is the act of breaking into a computer system or network, often without permission.
Hackers exploit weaknesses in software or human behavior to gain access.
Analogy: Imagine a burglar picking the lock of your house to sneak inside.
Types of Hackers
1. Black Hat Hackers The “bad guys.” They break into systems for theft, damage, or
fun.
2. White Hat Hackers The “good guys.” They test systems to find weaknesses and
help fix them.
3. Grey Hat Hackers Somewhere in between. They may break rules but not always
with bad intentions.
Common Hacking Techniques
Password Cracking: Guessing or stealing passwords.
Phishing: Tricking users into revealing information.
SQL Injection: Exploiting databases through malicious queries.
Denial of Service (DoS): Flooding a system with traffic to make it crash.
Real-Life Example
In 2017, the “WannaCry” ransomware attack spread worldwide, locking computers in
hospitals, banks, and companies. Hackers demanded payment in cryptocurrency to unlock
files. It showed how hacking can disrupt entire industries.
Prevention
Use strong, unique passwords.
Easy2Siksha.com
Enable two-factor authentication.
Keep software updated.
Be cautious with emails and links.
󷘧󷘨 (c) Spoofing
What is Spoofing?
Spoofing is when someone pretends to be someone else to trick you. It’s about deception
making fake identities to gain trust.
Analogy: Imagine receiving a phone call that looks like it’s from your bank, but it’s actually a
scammer pretending to be them.
Types of Spoofing
1. Email Spoofing Fake emails that look like they’re from trusted sources. Example:
An email claiming to be from PayPal asking you to “verify your account.”
2. IP Spoofing Hackers disguise their computer’s IP address to hide their identity.
Analogy: Like wearing a mask to avoid being recognized.
3. Caller ID Spoofing Fake phone numbers appear on your screen. Analogy: Like a
prankster changing their voice to sound like your friend.
4. Website Spoofing Fake websites that look identical to real ones. Example: A fake
banking site designed to steal your login details.
Why Spoofing is Dangerous
It tricks people into revealing sensitive information.
It spreads malware through fake links.
It can lead to identity theft.
Prevention
Always check sender details in emails.
Look for “https” in website addresses.
Don’t trust unexpected phone calls asking for personal info.
Use spam filters and security software.
󹵍󹵉󹵎󹵏󹵐 Diagram: Malware, Hacking, Spoofing
Cyber Threats
|
---------------------------------
| | |
Malware Hacking Spoofing
(Harmful (Breaking in) (Pretending)
software)
Easy2Siksha.com
󷈷󷈸󷈹󷈺󷈻󷈼 A Relatable Story
Let’s imagine Riya, a college student.
She downloads a free game from a shady website. Suddenly, her laptop slows down,
files disappear, and strange pop-ups appear. That’s malware at work.
Later, she hears about hackers stealing passwords from social media accounts. That’s
hackingbreaking into systems without permission.
Finally, she receives an email that looks like it’s from her bank, asking her to click a
link. Luckily, she notices the sender’s address is suspicious. That’s spoofing
pretending to be someone else to trick her.
By understanding these threats, Riya learns to protect herself: installing antivirus software,
using strong passwords, and being cautious with emails.
󷘹󷘴󷘵󷘶󷘷󷘸 Conclusion
Malware is harmful software that damages systems or steals data.
Hacking is unauthorized access to systems, sometimes for theft or disruption.
Spoofing is deceptionpretending to be someone else to trick users.
Together, these are major cybersecurity threats. Knowing them is like learning self-
defense—you can’t stop criminals from existing, but you can protect yourself from
becoming a victim.
This paper has been carefully prepared for educaonal purposes. If you noce any
mistakes or have suggesons, feel free to share your feedback.