Unit 6: Communication and Networking

Short Answer Questions (2-3 marks each)

  1. Define computer networking. What are its benefits?

  2. Differentiate between LAN, MAN, and WAN.

  3. What is a network topology? List three common topologies.

  4. Explain the difference between wired and wireless networks.

  5. What is a protocol? Give three examples of network protocols.

Long Answer Questions (5-8 marks each)

  1. Describe different types of networks: PAN, LAN, CAN, MAN, and WAN. Compare their characteristics and use cases. (8 marks)

  2. Explain common network topologies: Bus, Star, Ring, and Mesh. Discuss advantages and disadvantages of each. (6 marks)

  3. Describe data transmission media: twisted pair, coaxial cable, fiber optic, and wireless. Compare their characteristics. (6 marks)


Unit 7: Internet and World Wide Web

Short Answer Questions (2-3 marks each)

  1. What is the Internet? How does it differ from the World Wide Web?

  2. Explain IP addressing. Differentiate between IPv4 and IPv6.

  3. What is DNS? Why is it important?

  4. Define HTTP and HTTPS. Why is HTTPS preferred?

  5. What is e-commerce? List different types of e-commerce.

Long Answer Questions (5-8 marks each)

  1. Describe how the Internet works. Explain the roles of TCP/IP, DNS, and web servers. (8 marks)

  2. Explain client-server architecture. How do web browsers and web servers communicate? (6 marks)

  3. Discuss different types of e-commerce: B2B, B2C, C2C, and G2C. Provide examples from Nepal. (6 marks)

  4. Describe the ethical and social issues related to Internet use. Include privacy, security, and digital divide. (5 marks)


Unit 8: Multimedia

Short Answer Questions (2-3 marks each)

  1. Define multimedia. What are its components?

  2. List three applications of multimedia in business.

  3. Explain the difference between raster and vector graphics.

  4. What is streaming media? How does it work?

Long Answer Questions (5-8 marks each)

  1. Describe the components of multimedia: text, graphics, audio, video, and animation. Explain how they are used in web-based applications. (6 marks)

  2. Discuss the applications of multimedia in business: presentations, training, marketing, and customer engagement. (6 marks)

  3. Explain future trends in multimedia: virtual reality, augmented reality, and interactive media. (5 marks)


Unit 9: Security, Ethics, and Privacy

Short Answer Questions (2-3 marks each)

  1. What is computer security? Why is it important?

  2. Define malware. List three types of malware.

  3. What is a firewall? How does it protect networks?

  4. Explain encryption. Differentiate between symmetric and asymmetric encryption.

  5. What is software piracy? Why is it a concern?

  6. Define cyber law. What does Nepal’s Electronic Transactions Act cover?

Long Answer Questions (5-8 marks each)

  1. Describe major security threats: unauthorized access, malware, phishing, and denial of service. Explain countermeasures for each. (8 marks)

  2. Discuss computer ethics and professionalism in IT. Include issues like intellectual property, privacy, and professional responsibility. (6 marks)

  3. Explain network security measures: firewalls, intrusion detection, VPNs, and encryption. How do they work together? (6 marks)

  4. Discuss privacy issues in the digital age. How can individuals and organizations protect personal data? (5 marks)


Short Answer Questions (2-3 marks each)

  1. Define Artificial Intelligence. What are its applications in business?

  2. What is cloud computing? List three cloud service models.

  3. Explain blockchain technology. What are its use cases?

  4. What is the Internet of Things (IoT)? Give three examples.

  5. Define Big Data analytics. How is it used in business?

Long Answer Questions (5-8 marks each)

  1. Discuss Artificial Intelligence and Machine Learning. Explain their applications in business with examples. (8 marks)

  2. Describe cloud computing: IaaS, PaaS, and SaaS. Discuss benefits and challenges of cloud adoption. (6 marks)

  3. Explain the Internet of Things (IoT) and its impact on businesses and consumers. What are the security challenges? (6 marks)

  4. Discuss how social media and digital marketing have transformed business operations. Include examples from Nepal. (5 marks)


Case Study Questions

Case Study 1: Network Security (10 marks)

A company experienced a ransomware attack that encrypted their files and demanded payment.

a) What security measures could have prevented this attack? (3 marks) b) How should they respond to the attack? (3 marks) c) What long-term security improvements should they implement? (4 marks)

Case Study 2: Cloud Migration (10 marks)

A growing business is considering moving from on-premises servers to cloud computing.

a) What are the benefits they can expect from cloud migration? (3 marks) b) What challenges might they face during the transition? (3 marks) c) Which cloud service model (IaaS, PaaS, or SaaS) would you recommend and why? (4 marks)

Case Study 3: IoT Implementation (10 marks)

A manufacturing plant wants to implement IoT sensors for predictive maintenance.

a) What types of sensors and data would be useful? (3 marks) b) How can they use this data for predictive analytics? (4 marks) c) What security concerns should they address? (3 marks)


Comprehensive Essay Questions (15 marks each)

  1. “Technology is reshaping every aspect of modern business.” Discuss this statement with reference to networking, cloud computing, and emerging technologies. Provide examples from Nepal’s business context.

  2. Describe the challenges and opportunities of digital transformation for Nepali businesses. How can they leverage IT trends like AI, IoT, and cloud computing?

  3. Discuss the importance of cybersecurity in the digital age. What measures should individuals, businesses, and governments take to ensure a secure digital environment?


Answer Guidelines

Unit 6-7 Key Points

  • Network types: PAN, LAN, CAN, MAN, WAN
  • Topologies: Bus, Star, Ring, Mesh, Hybrid
  • TCP/IP layers: Application, Transport, Internet, Network Access

Unit 8-9 Key Points

  • Multimedia components: Text, Graphics, Audio, Video, Animation
  • Security threats: Malware, Phishing, DoS, Unauthorized access
  • Security measures: Firewalls, Encryption, IDS/IPS, Access controls

Unit 10 Key Points

  • Cloud models: IaaS (infrastructure), PaaS (platform), SaaS (software)
  • AI applications: Automation, prediction, personalization, chatbots
  • IoT components: Sensors, connectivity, data processing, actions