Important Announcement
PubHTML5 Scheduled Server Maintenance on (GMT) Sunday, June 26th, 2:00 am - 8:00 am.
PubHTML5 site will be inoperative during the times indicated!

Home Explore Digital Book Class-10 2nd edition

Digital Book Class-10 2nd edition

Published by Memorica Graphics, 2023-03-19 00:00:01

Description: Digital Book Class-10 2nd edition

Search

Read the Text Version

["Smart Computer Science Book-10 Terms to Know Intranet\t: \t A local private communication network created using World Wide Web software. Back-door attack\t : \t Unauthorized remote access to harmful or attack system.\t Algorithm\t : Set of rules to be followed in calculations or other problem-solving operations. Quarantine\t : \t A separate and restricted place in the drive where virus-infected files are placed. Dust build-up\t :\t Dust is made up of all kinds of particles. Malfunction\t:\tFail to function normally. Credential\t : \t Evidence of authority, status, rights, entitled to privileges Spike guard\t:\tAn appliance or device designed to protect electrical devices from voltage spikes. Power surge\t :\t An unexpected interruption to the flow of electricity. Electronic hazard\t :\t Loose or improper connection, such as electrical outlets or switches Vandalism\t: \t Action involving deliberate destruction of or damage to public or private property. Disk drives\t : \t A device which allows a computer to read from and write on to computer disks. Key algorithms\t : \t A cryptographic algorithm that uses the same key to encrypt and decrypt data. Plug-ins\t:\t A software component that adds a specific feature to an existing computer program. Security breaches\t :\t Any incident that results in unauthorized access to computer data, applications, networks or devices. DDoS attacks\t :\t A malicious attempt to disrupt normal traffic of a targeted server. Impersonate\t:\t Copies the behavior or actions of another. Deceptively\t:\t In a way that gives a misleading impression by hiding the truth. Masquerading\t:\t Be disguised or passed off as something else. Sniffing\t :\t A process of monitoring and capturing all data packets passing through given network. Snooping\t:\t Unauthorized access to another person's or company's data. Botnet\t:\t A collection of internet-connected devices infected by malware that allow hackers to control them. Penetration Test\t :\t Examines network, application, device, or physical security to identify vulnerabilities and areas to improve. Ethical hacking\t :\t An authorized practice of bypassing system security to identify potential data breaches. Vulnerability\t:\t The state of being exposed to the possibility of being attacked or harmed, either physically or emotionally. Intrusions\t:\t Detection system or software program that monitors a network or systems for malicious activity or policy violations. Intruder\t:\t An individual or software program that enters a computer system without authorization. Network Sniffer \t :\t The tool used for monitoring the flow of data packets over the computer networks. Approved by Curriculum Development Center (CDC) 101","Computer Security Questions types marked by * are just for testing Worksheet higher ability but can Objective Questions enhance the knowledge 1. Fill in the blanks: for SEE. a.\t ...................... is the identifying weakness in computer systems or networks to exploit its weakness to gain access. b.\t Hacking is performed by ........................................ c.\t ........................................ threats include fire, unstable power supply, humidity in the rooms housing the hardware, etc. d.\t ...................................... is the ability to identify a unique user of a system. e.\t ..................................... is the ability to prove that a user or application is of genuine identity. f.\t ............................ is a technology used to identify, analyze and measure an individual\u2019s physical and behavioral characteristics. g.\t Strong ........................ is of at least ........................ characters in length. h.\t ............................. is the process of transforming the original information into an unrecognizable form. i.\t .................... is a process of converting encrypted data into a readable form. j.\t .......................... software can clean, delete, or quarantine any infected files. 2. \tWrite 'T' for true and 'F' for false statements: a. \tComputer security is also known as cyber security or IT security. b.\t Ethical hackers transparently report all the identified weaknesses of the system. c.\t\tPhishing is typically carried out by e-mail or instant messaging. d.\t Phishing is an example of social engineering attack. e.\t \u2018QWERTY\u2019 is a suitable example of a password. f.\t Keystroke logger is one of the latest forms of cyber threat. g.\t Data encryption is the best way to be being safe from eavesdropping attacks. i.\t Malicious code may not be blocked by antivirus software on its own. j.\t Information security is also known as software security and data security. 102 Approved by Curriculum Development Center (CDC)","Smart Computer Science Book-10 k.\t Password policy is an identification and authentication system. l.\t Firewall can be installed in hardware form only. m. \tBackup copies allow data to be restored from an earlier point. n.\t An alternate backup system can be in a remote location only. o.\t Move your computer away from doors and windows to protect them from dust. 3. \tMark the correct option: a. \t Malicious code includes: i) Virus \t\t\t ii) Worm\t\t iii) Trojan horse \t\t iv) All of these b. \t Malicious code can activate itself along with: \t Java Applets \t\t\t\tii) ActiveX Controls\t \t iii) Plug-ins \t\t\t\t iv) All of these\t c. \t Information security is concerned with \t i) Confidentiality \t\t\t\t ii) Integrating\t\t \t iii) Availability \t\t\t\t iv) All of the these \t d. \t Physical security mechanism consists of: \t i) CCTV\t\t ii) Alarm System\t\t iii) Both i) & ii) \t\t iv) None of these\t e. \t The recommended computer room temperature is : \t i) 21 - 24o c\t\t\t\t ii) 15 - 20 o c\t\t \t iii) 20 - 35 o c\t\t\t\t iv) 40 - 50 o c\t f. \t Security devices that are used to protect a computer system from fire: \t i) Fire detectors\t ii) fire extinguisher\t iii) Both i) & ii) \t iv) None of these\t g. \t Power protection devices are: \t i) UPS\t\t ii) Volt guard\t\t iii) Spike guard\t\t iv) All of the these\t h. \t Cryptography technology comprises of: \t i) Encryption\t ii) Decryption\t\t iii) Both i) & ii) \t\t iv) None of these 4. Write the full forms: e.\tUSB ............................................... a.\tPC .............................................. b. CCTV ...........................................\t f. \tDDoS ............................................. c. UPS ................................................ g. SQL ................................................ d. CPU ............................................... h. DoS ............................................... Approved by Curriculum Development Center (CDC) 103","Computer Security i. \tA system designed to prevent unauthorized access to or from a private network. 5. Write the terms for the following: a. \tThe policy that provides economic support for Ans:......................................... the damage of a computer system. j. The process of converting an ordinary plain text into an unintelligible text and vice-versa. Ans:......................................... Ans:......................................... b. The protection of hardware components used in the computer system. k. \tA word, phrase, or string of characters that is memorized and kept a secret. Ans:......................................... Ans:......................................... c. \tA copy of data that can be recovered in the event of primary data failure. l.\t Only authorized users can access the data, resources, and information. Ans:......................................... Ans:......................................... d. \tA type of program designed and developed to protect computers from malware. m. \tA destructive computer code or web script designed to create system vulnerabilities. Ans:......................................... Ans:......................................... e. \tThe identities of a sender and a receiver are confirmed. n. \tA type of monitoring software designed to record keystrokes made by a user. Ans:......................................... Ans:......................................... f. \t Meaningful information that is transformed into unintelligible data. o. \tUnintentional download of malicious code to your computer or mobile device that leaves Ans:......................................... you open to a cyber attack. g. \t Information cannot be altered in storage or Ans:......................................... transition between a sender and an intended receiver p. \tA person who gains unauthorized access to computer systems for personal gain. Ans:......................................... Ans:......................................... h. \tA process of converting encoded data to a readable form. Ans:......................................... 6. Match the following: Availability a.\t Physical security CCTV b.\t Identify and verify a person Hardware security c.\t Data should be available to users when needed DDoS d.\t Only authorized users can access the data resources Confidentiality e.\t Computer threat Biometric f.\t Security mechanism 104 Approved by Curriculum Development Center (CDC)","Smart Computer Science Book-10 Descriptive Questions 1. Write very short answer of the following questions: a.\t What is computer security? b.\t What is information security? c.\t What is hacking? d.\t Who is hacker? e.\t Define the term \u2018ethical hacker.\u2019 f.\t What is phishing attack? g.\t What is keylogger? h.\t What is botnet? i.\t What is rootkit? j.\t What is malicious code? k.\t What is social engineering? l.\t What is biometric system? m.\t What is cryptography? n.\t What is hardware security? o.\t What are logical threats? 2.\t Write short answer of the following questions: a. \t Why is information security needed? b.\t Why is computer security important? c.\t Why are the ethical hackers hired by well-known companies? d.\t Why is phishing called a social engineering fraud? e.\t Why are malicious codes developed? f.\t Why is social engineering attack technique developed? g.\t What is firewall? Why is it used? h.\t Why is cryptography important? i.\t Why is antivirus software developed? j.\t How does an updated operating system software protect from harmful activities? k.\t Why is hardware important? l.\t Why is insurance of computer systems important? m.\t Why are fire detectors and fire extinguishers important for hardware security? n.\t Why is an air-conditioned room ideal for computers? o.\t List down the types of computer security and explain them briefly. p.\t Give brief explanation of computer threats. q.\t Differentiate between physical and logical threats. r.\t What are the common types of logical threats? Explain briefly. s.\t What are the information security mechanism? Approved by Curriculum Development Center (CDC) 105","Computer Security t.\t What is password? Write the characteristics of a strong password. u.\t What are encryption and decryption? v.\t Briefly explain 'antivirus software'. w.\t What are the common techniques and tools used for hardware security? x.\t Why should a computer system be regularly maintained? y.\t Why is cleanliness an important factor for the well functioning of a computer system? z.\t What is physical security mechanism? za.\tWhat is the role of power protection devices in the computer system? zb.\tWhat is malware? What is its purpose? zc.\tDefine computer virus and briefly explain common types of computer viruses. Case Study and Application-based Questions* 1. \tJanaki School has created user accounts for all the students on the school's website. The class teacher has assigned a unique user name and password to each student to login to their accounts but the teacher has asked the students to change their respective password. Why are they asked to change their respective password? Present your logic. Ans: ............................................................................................................................ ..................................................................................................................................... ..................................................................................................................................... ..................................................................................................................................... ..................................................................................................................................... 2. \tRasmita Balampaki is trying to open a website on her computer. However, she is not able to open because the computer is displaying a \u2018Please wait..\u2019 message as shown in the image. a. What could be the cause of this problem? Ans: ............................................................................................................................ ..................................................................................................................................... ..................................................................................................................................... ..................................................................................................................................... ..................................................................................................................................... b. What would you suggest to solve this problem? 106 Approved by Curriculum Development Center (CDC)","Smart Computer Science Book-10 Ans: ............................................................................................................................ ..................................................................................................................................... ..................................................................................................................................... 3. Sundar Budhathoki got the following e-mail. a. \t If you get such an e-mail, would you respond immediately? State the reason behind your decision. Ans: ........................................................ ................................................................. ................................................................. ................................................................. ................................................................. ................................................................. b. \t Sundar has found out this is a fake message intending to harm his system. What is the clue for Sundar to find this? Ans: ............................................................................................................................. c.\t If the given e-mail is fake and harmful, what type of threat does this e-mail message lead to? Ans: ............................................................................................................................. d. \t What is the purpose behind sending this e-mail? Ans: ............................................................................................................................. e.\t Who might have sent this message? Ans: ............................................................................................................................. 4. \tThe principal of a well-reputed school had given instructions to the office incharge, to make a duplicate copy of data such as fee collection, students result, salary details, etc. daily after the end of school hours. a.\t Why did the principal give such instruction? Ans: ............................................................................................................................. ..................................................................................................................................... b. \t Which technique should be used by the office incharge to solve this probelm? Ans: ............................................................................................................................. Approved by Curriculum Development Center (CDC) 107","Computer Security ..................................................................................................................................... 5. \tPallavi Ghale completed project work on 'Threats of ICT' and saved in MS-Word format. She opens her project at a later time but the text is in unreadable form. After that, she tries restarting the MS-Word application but a message appeared such as .exe file is not working. a. What could have happened to Pallavi's computer? Ans: ............................................................................................................................ ..................................................................................................................................... b. What measures would you suggest her in this case? Ans: ........................................................................................................................... .................................................................................................................................... 6. \tSivani Gupta is a computer operator in a well-reputed school. She has typed all the questions of each subject for the upcoming examination and stored on the hard disk. a. \t What would you suggest her to be safe from hard disk failure? Ans: ............................................................................................................................ ..................................................................................................................................... b. What should she do so that nobody could view the examination questions on the computer? Ans: ............................................................................................................................ ..................................................................................................................................... 7. \tBased on the given picture, answer the asked questions. The given image shows a friend request sent by an unknown person. a. \t If you get an unknown friend request in your social network, would you accept instantly? State your reason. Ans: ...................................................................... ............................................................................. ............................................................................. ............................................................................. b. \t What might be the reason behind this unknown friend request? Ans: ............................................................................................................................ 108 Approved by Curriculum Development Center (CDC)","Smart Computer Science Book-10 .................................................................................................................................... c. \t Would you trust your friend, after accepting the unknown request? Give reason. Ans: ............................................................................................................................ .................................................................................................................................... d.\t If this request was sent by someone with a bad intention, what type of behavior might the person show? Ans: ............................................................................................................................. ..................................................................................................................................... ..................................................................................................................................... e. \t Under which category threat does a friend request sent with bad intention fall? Ans: ............................................................................................................................. ..................................................................................................................................... 8. \t Study this given image, and answer the asked questions: a. \t What does this diagram represent? Ans: ................................................................................... ........................................................................................... b. \t Explain the activities performed in each step. Ans: ................................................................................... ........................................................................................... ........................................................................................... ........................................................................................... ..................................................................................................................................... .................................................................................................................................... .................................................................................................................................... c. \t Which type of technology is used to perform this task? Ans: ............................................................................................................................. d.\t How to be safe from such crime? Ans: ............................................................................................................................. e. \t How can an e-banking service provider guarantee safety against such crime? Ans: ............................................................................................................................. Approved by Curriculum Development Center (CDC) 109","Computer Security School Bulletin Activity* 1. \tOrganize an intra-class speech competition on the topic 'Importance of Information Security' . 2. \tWrite an article for your school's news bulletin based on the given image with the suitable heading. 3. \tIn the reference of this chapter, organize a debate competition on the topic 'Prevention is Always better than cured'. 110 Approved by Curriculum Development Center (CDC)","Digital Commerce Smart Computer Science Book-10 Chapter Includes CHAPTER \u2022\t Introduction to Digital commerce \u2022\t E-commerce 5 \u2022\t E-commerce Models \u2022\t M-commerce \u2022\t E-governance and its Models \u2022\t Online Payment INTRODUCTION Digital commerce, it is also called D-commerce. It is a digital business platform of buying, selling, policy-making, and advertising of goods and services using digital channels, such as Internet, mobile networks, and commerce infrastructures. It includes e-business, e-commerce, e-governance and m-commerce. E-COMMERCE E-commerce, also known as electronic commerce or internet commerce. It refers to the buying and selling of goods or services using electronic networks i.e. internet, and the transfer of money and data to execute these transactions. No doubt e-commerce refers to the buy and sale of physical products and services online, but it also describes any kind of commercial transaction that is facilitated through the Internet, such as online auctions, payment gateways, online ticketing, and internet banking. Whereas e-business refers to all aspects of operating an online business, e-commerce refers specifically to the transaction of goods and services. So, e-commerce can be viewed as a subset of e-business. E-business allows companies to link their internal and external processes more efficiently and effectively and works more closely with suppliers and partners to better satisfy the needs and expectations of their customers which leads to improve in overall business performance. Approved by Curriculum Development Center (CDC) 111","Digital Commerce Technology Behind the E-commerce There are a lot of technologies related to e-commerce, some of them are as follows: a) Web\t\t b) Mobile and computing\t c) Internet\t\t d) Network e) E-Wallet\t f) Social media\t\t g) Digital security\t\t h) Online payment gateway E-COMMERCE MODELS Electronic commerce can be classified into four main models. The base for this simple classification are the parties involved in the transactions. The four basic electronic commerce models are as follows: Business to Business (B2B) In this model, the companies do business with each other. The final consumer is not involved in this model. So, online transactions only involve manufacturers, wholesalers, and retailers. For example, a car manufacturing company sells to distributor. Business to Consumer (B2C) In this model, the company will sell its goods and\/or services directly to the consumer. The consumer can browse products and services through website or application and study and review on available products. Here, a customer places an order, and the company ships the goods directly to them. An example of this mode is buying a pair of shoes from an online retailer. Popular examples of the B2C model are Amazon, Flipkart, Daraz, etc. This model is also booming in our country. Consumer to Consumer C2C In this model, the consumers are in direct contact with each other, hence no company is involved. It helps people sell their goods and assets directly to an interested party. Usually goods traded in this model are personal property 112 Approved by Curriculum Development Center (CDC)","Smart Computer Science Book-10 like land, home, car, bike, electronic devices, etc. as well as services. OLX, Quikr, Hamrobazaar are followed this model. A good example of this model is a consumer selling a furniture to another consumer by posting it on hamrobazar.com. Consumer to Business Wants to sell Website Wants to buy Consumers This model is the reverse Receives Money Business Organization of B2C. Therefore, the Receives Products consumer provides goods or service to the company. For example, an IT freelancer who develops and sells software to a company. Advantages of E-Commerce The advantages of e-commerce are as follows: \u2022\t Global Business : E-commerce provides sellers with a global outreach. It removes the constraints of geography. For example without hassles of physical meetings, e-commerce allows sellers and buyers to meet in a virtual world. \u2022\t Low cost : E-commerce substantially reduces the transaction cost. It eliminates many fixed cost of maintaining brick and mortar shops. It plays the role for the companies to enjoy a much higher profit. \u2022\t Fast Service: E-commerce provides quick delivery of goods with very little effort for the customer. Customer complaints are also addressed quickly. It also saves time, energy, and effort for both the consumers and the company. \u2022\t Convenient : One of the great advantages of e-commerce is the convenience offers. A customer can shop 24\u00d77 because the website is functioning at all times, it does not have any fixed working hours like a traditional brick and mortar shop. \u2022\t Independent of intermediaries: Electronic commerce always allows the customer and business organization or service provider to be in touch directly without any intermediaries. It also carries out for quick communication and transactions. Limitations of E-Commerce \u2022\t Set-up cost is high: The start-up costs of e-commerce portals are very high. The setup of hardware and software, the training cost of employees, the constant maintenance and servicing cost are quite expensive. \u2022\t Uncertainty about the product quality: Online stores provide product descriptions but the customers at any way cannot feel the item before purchasing. As a result, customer cannot make sure whether the provided description is accurate or not. \u2022\t Delivery hassles: Even after the order is placed, there can be problems with shipping, delivery, mix-ups, etc. which may lead the customers unhappy and dissatisfied. Approved by Curriculum Development Center (CDC) 113","Digital Commerce \u2022\t Complex taxation guidelines : As a store owner, you may be more willing to sell your products worldwide. But you need to act with the taxation guidelines adopted by each country which can be difficult. \u2022\t Security issue : Recently, we have witnessed many security breaches where the information of customers were stolen. Like, credit card theft and identity theft can be big concerns while opting e-commerce. E-COMMERCE VS TRADITIONAL COMMERCE E-commerce is perfectly based on digital systems which creates a virtual market, whereas traditional commerce excessively relies on physical and real- time markets. Though they are two different types of commerce with various dissimilarities, but they also have some similarities, both of which are mentioned below: Similar concerns: \u2022\t The main motive of e-commerce as well as tra- ditional commerce is to reach and attract maxi- mum numbers of customers to increase sales and make more profit. \u2022\t All the transactions done in these two types of commerce are monetary. \u2022\t Both have an intention of providing quality prod- ucts and services to customers. \u2022\t Both of these attract the customers through the attractive presentation and display of the prod- ucts.\t Dissimilar concerns: \u2022\t E-commerce is completely digital and con- ducted online, whereas traditional commerce is offline and conducted through face-to-face interactions. \u2022\t E-commerce has a global outreach whereas traditional commerce is limited to a particular geographical area. \u2022\t E-commerce can have one-to-one marketing, whereas traditional commerce can have one-way marketing only. \u2022\t E-commerce can have several payment modes such as online transactions, digital wallets, or cash on delivery, whereas traditional commerce generally supports cash payment in person only. \u2022\t The delivery of goods in e-commerce is either on the same day or another day depending on the availability of the logistics whereas in traditional commerce the delivery of goods is instant. 114 Approved by Curriculum Development Center (CDC)","Smart Computer Science Book-10 MOBILE COMMERCE Mobile commerce is also known as m-commerce. It is the use of wireless handheld devices like cell phones and tablets to conduct business and commercial transactions online. This includes various factors like the purchase and sale of products, online banking, etc. Here, WAP (Wireless Application Protocol) is used to conduct sales of goods and financial transactions, provide services, make payments, and exchange information. In Nepal, mCommerce is getting popular day to day. Popular examples of mCommerce are banking applications like MoBank, digital wallets such as PayPal, eSewa, and Khalti, etc. Applications of mCommerce Apart from straightforward transaction of buying and selling goods services of m-commerce, it has other applications too. Popular applications of M-commerce are as follows: \u2022\t Mobile banking: Using a mobile website or application, we can perform all banking functions. It is one step ahead than online banking and has become common these days. In Nepal, banking transactions on mobile phones are rising day to day. \u2022\t Mobile ticketing and booking: The users can make any types of bookings like air ticket, train ticket, hotel, cinema hall ticket, etc and instantly receive respective confirmation slip on their mobile. The digital ticket or boarding pass is sent directly to the user\u2019s device after the payment. \u2022\t E-bills: m-Commerce includes process of paying and receiving bills online. It is secure and convenient way of delivering the bills of online transactions. \u2022\t Auctions: Now, bids at several auctions can be placed via mobile devices with the help of mCommerce. \u2022\t Manage stock market business: Stock market reports are generated and trading is performed over mobile devices via the use of mCommerce. Approved by Curriculum Development Center (CDC) 115","Digital Commerce Advantages of mCommerce \u2022\t Easy to conduct : Provides very convenient and easy-to-use system to conduct business. \u2022\t Global reach: Mobile commerce has a wide reach. A huge part of the world\u2019s population has access to mobile phones. Hence, the size of the market of m-commerce is tremendously huge. \u2022\t Marketing tool: M-commerce also helps businesses to find target customers according to their location, service provider, the type of device they use, and various other criteria. \u2022\t Low operating cost: Due to the streamlined processes, transaction cost, carrying cost, and order processing cost is just nominal. So, over all operating cost is very low. Limitations of mCommerce \u2022\t Initial Cost high : The technology to set up a mCommerce business is very expensive. The start-up cost is high and many complications can arise. \u2022\t Reliability issue : In developing countries, network and service providers are not reliable. It is not suitable for data transfer. \u2022\t Security issue: There are many concerns about the safety of the customer\u2019s private information and the possibility of a data leak is very daunting. E-commerce Vs m-Commerece \u2022\t Devices Used: E-commerce, which stands for electronic commerce, it is involved to conduct buying and selling products or services over the Internet using devices like personal desktop computers and laptops. On the other hand, M-commerce, stands for mobile commerce and involved to conduct the same activities through mobile and tablet devices. \u2022\t Year Introduced: E-commerce came into existence in the 1970s. Whereas, m-commerce came into existence late 1990s. \u2022\t Reachability: E-commerce has a narrower reach than m-commerce. M-commerce\u2019s reachability is wider due to a large number of mobile users globally. \u2022\t Cost : E-commerce is generally a less costly method. The set up of websites and the use of the Internet is both relatively cheaper methods. M-commerce, on the other hand, is more expensive due to the creation of mobile apps and the possibility of the use of cellular data for customers. \u2022\t Connectivity : Due to non-portability, e-commerce devices can be used only at places where both electricity and the Internet are available. On the other side, m-commerce gadgets are very portable and thus connectivity options are endless. Also, to operate mobile devices, electricity is not required all the time. 116 Approved by Curriculum Development Center (CDC)","Smart Computer Science Book-10 E-GOVERNANNCE Electronic governance or e-governance is the application of IT for delivering government services, exchange of information, communication transactions, integration of various stand-alone systems. Through e-governance, government services are made available to the citizens in a convenient, efficient, and transparent manner. The three main target groups that can be noted in government concepts are: i) government, ii) citizens, and iii) businesses\/interest groups. Therefore, four service models are formed to provide the convenient services for the target group which are government to citizen (G2C), government-to-business (G2B), government- to-government (G2G), and Government-to-employees (G2E). Government-to-Citizen(G2C) Government-to-citizen refers to the government Government Website Citizen services that are accessed by familiar people. Most of the government services fall under G2C. Likewise, the primary goal of government- to-citizen is to provide facilities to the citizen. It helps ordinary people to reduce the time and cost in a transaction. A citizen can have access to the services anytime from anywhere. Furthermore, many services like license renewals, and paying tax are essential in G2C. Online bill payment for services of telephone and electricity are examples of G2C. Government-to-business (G2B) Government-to-business Website Business Organization refers to the exchange Government of services between government and business organizations. It is efficient for both government and business organizations. G2B provides access to relevant forms for service achiever to provide the service. The G2B consists of many services which are exchanged between business sectors and the government. Similarly, G2B provides timely business information. Hence, a business organization can have easy and convenient online access to government agencies. G2B plays a crucial role in business development. It enhances the efficiency and quality of communication and transparency of government projects. In the context of Nepal, online tax payment, online company update, and online notice are examples of G2B. Approved by Curriculum Development Center (CDC) 117","Digital Commerce Government-to-Government (G2G) Government-to-government refers to the interaction Government Website Government between different government departments, organizations, and agencies. This increases the efficiency of government processes. In G2G, multiple government agencies can share the same database using online communication. The government departments can work together. This service can increase international diplomacy and relations. Likewise, G2G services can be at the local level or the international level. It facilitates communication with global governments as well as local governments. It provides secure inter-relationship between domestic or foreign governments. G2G constructs a universal database for all member states to enhance service. Government-to-Employee (G2E) Government-to-employee is an internal part of the G2G Government Website Employee sector. Furthermore, G2E aims to bring employees under a roof and improve their knowledge sharing process. G2E provides online facilities like applying for leave, reviewing salary payment records, etc. to the employees. The G2E sector also provides human resource training and development. Hence, G2E is the relationship between employees, government institutions, and their management. BENEFITS OF E-GOVERNANCE \u2022\t Direct participation of constituents \u2022\t Reduced corruption \u2022\t Reduction in overall cost. \u2022\t High transparency \u2022\t Expanded reach of government \u2022\t Increased convenience \u2022\t Growth in GDP (Gross Domestic Product) LIMITATION OF E-GOVERNANCE \u2022\t Loss of interpersonal communication \u2022\t High setup cost and technical difficulties \u2022\t The entire population may not be familiar with technology \u2022\t Cybercrime\/Leakage of personal information \u2022\t Technology may not be accessible in rural area 118 Approved by Curriculum Development Center (CDC)","Smart Computer Science Book-10 Online Payment Online payment is an electronic exchange of currency for purchasing goods or services. Online payments are facilitated by 'payment gateways' or 'payment service providers.\u2019 Commonly online payment is made through smart card which includes credit cards and debit cards. Likewise we also can use e-wallet, fund transfers and cryptocurrency. Online payments should be secured by encrypted connection to mitigate the dangers of online thefts. Some of the popular online payment gateway or service providers in Nepal are IME pay, e-Sewa, Khalti, Connect IPS, etc. Points to Know \u2022\t Digital commerce, it is also called D-commerce. It is a digital business platform of buying, selling, policy-making, and advertising of goods and services using digital channels, such as Internet, mobile networks, and commerce infrastructures.. \u2022\t E-business refers to all aspects of operating an online business, whereas e-commerce refers specifically to the transaction of goods and services. Therefore, e-commerce can be viewed as a subset of e-business. \u2022\t E-commerce refers to the buying and selling of goods or services using electronic networks i.e. internet, and the transfer of money and data to execute these transactions. \u2022\t Basic e-commerce models are B2B, B2C, C2C, and C2B. \u2022\t M-commerce is the use of wireless handheld devices like cell phones and tablets to conduct commercial transactions online. \u2022\t Mobile banking, mobile ticketing and booking, e-bills, auctions, stock business are the most common applications in the field of m-Commerce. \u2022\t Popular e-governance models are G2C, G2B, G2G, and G2E. \u2022\t An online payment is an electronic exchange of currency for purchasing goods or services. Online payments are facilitated by 'payment gateways' or 'payment service providers.\u2019 \u2022\t E-governance is the application of IT for delivering government services and exchange of information, communication transactions, etc. \u2022\t Popular online payment gateway or service providers in Nepal are IME pay, e-Sewa, Khalti, Connect IPS, etc. Approved by Curriculum Development Center (CDC) 119","Digital Commerce Terms to Know Online payment\t : \t Payment for goods and services through an electronic medium. Consumer\t : \t A person who purchases goods and services for personal use.\t Transaction\t : \t An instance of buying or selling something. Online auctions\t : \t A sales event wherein potential buyers place competitive bids on assets or services through the Internet. Payment Gateway\t :\t Use of bank accounts and credit card accounts online at stores that offer both online and in-person retail purchasing. Brick and Mortar\t :\t Physical presence of business in a building or structure. Virtual Market\t : \t Amarketplace based on the Internet where numerous companies execute transactions. Offline\t:\tNot connected to the Internet. Online\t:\tConnected to the Internet or using the Internet. Digital Wallet\t :\t A software-based system for making e-commerce transactions. Worksheet Questions types marked by * are just for testing Objective Questions higher ability but can 1. Fill in the blanks: enhance the knowledge for SEE. a.\t In the ........................ model, the companies do business with each other. b.\t In the ........................ model, the company sells their goods and\/or services directly to the customer. c.\t In the ................... model, the consumers are in direct contact with each other. d.\t In the ....................... model, the consumer provides goods or services to the company. e.\t In the ...................... model, they exchange services between the government and business organizations. f.\t ....................... model is an internal part of the G2G sector. g.\t Traditional ............................ is completely offline and conducted in person or face-to-face. h.\t .................. protocol is used to conduct activities in M-commerce devices. 2. \tWrite 'T' for true and 'F' for false statements: a.\t E-commerce refers to buying and selling goods or services using an electronic network. 120 Approved by Curriculum Development Center (CDC)","Smart Computer Science Book-10 b.\t E-business refers to all the aspects of operating a face-to-face business. c.\t E-commerce is a subset of e-business. d.\t The end consumer is not involved in B2B. e.\t The company is involved in selling and buying goods and services in C2C model. f.\t Online license renewals and paying taxes are services of e-governance. h.\t A citizen can have access to available services any time from anywhere \t in G2C model. i.\t G2G services can be only at the local level. j.\t E-commerce is completely digital and online where the customers can shop 24x7 using e-commerce technology. 3. \tMark the correct option: ii) e-governance \t \t iv) All of these a. \t D-commerce includes: i) e-commere\t\t\t\t iii) m-Commerce\t\t\t\t b. \t B2B online transactions only involve: \t i) Manufactures\t\t\t\t ii) Whole sellers\t\t \t iii) Retailers\t\t\t\t iv) All of these\t c. \t Advantages of e-commerce: ii) Global business\t\t \t i) Low cost\t\t\t\t iv) All of the these\t \t iii) Convenient\t\t\t\t d. \t Applications of m-Commerce: ii) E-bills\t iv) All of these\t \t i) Mobile banking\t\t\t\t \t iii) Mobile ticketing \t\t\t e. \t E-commerce came into existence in the: \t i) 1970s \t\t ii) 1960s\t\t iii) 1990s\t iv) 2010s\t f. \t M-commerce came into existence late: \t i) 1970s \t\t\t\t\tii) 1960s\t\t \tiii) 1990s\t\t\t\t\tiv) 2010s g. \t The three main target groups of e-governance are: \t i) Government\t\t\t\tii) Citizen\t\t \t iii) Business group\t\t\t iv) All of the these\t Approved by Curriculum Development Center (CDC) 121","Digital Commerce 4. Write the full forms: a.\tB2B ............................................... f.\t WAP ............................................... b. B2C ..............................................\t. g. IT .................................................... c. C2C ................................................ h. G2C ................................................ d. C2B ................................................ i. G2B ............................................... e.\tG2G .............................................. j.\t G2E ................................................. 5. Write the terms for the following: d. \t Make bookings and receive tickets on your digital device. a. \t An electronic exchange of currency for purchasing goods or services. Ans:......................................... e. \t secure and convenient way of delivering the Ans:......................................... b. \tThe application of IT for delivering bills of online transactions. government services and exchange of Ans:......................................... information, communication, transactions, f. \t The use of wireless handheld devices like cell as well as integration of various stand-alone systems. phones and tablets to conduct commercial transactions online. Ans:......................................... c. \t Using a mobile website or application to Ans:......................................... g. \t Physical presence of business in a building perform all your banking functions. or structure. Ans:......................................... Ans:......................................... 6. Match the following: a.\t Viewing bank statements through mobile phones C2C b. \t Relationship between the government and business org. e-wallet c. \t Online buying and selling of goods B2B d. \tUsing the Internet B2C e. \tCheque payment m-commerce f. \t The company directs sales to the customers Online g. \tThe manufactures sell to distributing organization e-commerce h. \tOnline payment gateway G2B i. \t Intermediary doesn't involve in selling and buying of Traditional commerce goods and services 122 Approved by Curriculum Development Center (CDC)","Smart Computer Science Book-10 Descriptive Questions 1. Write very short answer of the following questions: a.\t What is digital commerce? b. \tWhat is e-commerce? c. \tWhat is the primary goal of G2C model? d.\t What is e-governance? 2.\t Write short answer of the following questions: a.\t Why does G2B play a crucial role in business development? b.\t Why is the concept of e-governance developed? c.\t Why is G2G model developed? d.\t How does G2G model increase the efficiency of the government processes? e.\t How does G2E improve the knowledge of the employee? f. \t Differentiate between e-commerce and e-business. g.\t List out the technology related to e-commerce. h. \tWrite the features of e-commerce. i.\t Write the limitations of e-commerce. j. \t What are the common models of e-commerce? k.\t Write the common models of e-governance. l. \t Write the similarities between e-commerce and traditional commerce. Case Study and Application-based Questions* 1. \tHari Krishna Chaudhary always buys necessary goods from online stores who offer attractive discount. a. \t What can be the suitable term for this activity of Harikrishna? Ans: ............................................................................................................................. b.\t How would Harikrishna pay for the goods? Ans: ............................................................................................................................. c. \t Mention any two advantages and limitations for Hari Krishna regarding this activity. Ans: ............................................................................................................................ ..................................................................................................................................... 2. \tManik Lal Majhi is using his cell phone to buy and sell products, view bank statements, pay electricity bills and telephone bills, etc. a. \t What can be suitable term for this activity of Manik Lal? Ans: ............................................................................................................................. b. \t How can Manik Lal pay through mobile? Approved by Curriculum Development Center (CDC) 123","Digital Commerce Ans: ............................................................................................................................ ..................................................................................................................................... c.\t What is the term used to describe the activity of viewing bank statements online through mobile phones? Ans: ............................................................................................................................. 3. \tPandit Rudra Narayan is a retail businessman, he uses the Internet and its technologies along with electronic gadgets to perform his day-to-day transactions. He is very much familiar with e-commerce, m-commerce, and e-governance and respective business and service transaction models. a. \tIn which situation should he use e-commerce technology? Ans: ............................................................................................................................ ..................................................................................................................................... b. \t When should he use m-commerce technology? Ans: ............................................................................................................................ ..................................................................................................................................... c. \t Which model of e-commerce is suitable for Pandit Rudra Naryan? Ans: ............................................................................................................................. d. \t He has to pay tax online to the government, in this case, which e-technology and its model would be useful for Pandit Rudra Narayan? Ans: ............................................................................................................................. 4. \tJigme has posted an ad to sell his motorbike on onlinebazar.com with detailed information. Lakpa, a visitor of the website, is interested to buy Jigme\u2019s motorbike. They both have a phone conversation and agree on the price to sell the motorcycle. They perform the financial transaction through online banking system, whereas motorbike registration is accomplished online from the authorized government website. a. What is this business called? Ans: ............................................................................................................................. b. When and how would Lakpa pay Jigme? Ans: ............................................................................................................................. ..................................................................................................................................... c. Write the possible suitable terms of major activity? Also, specify the models. Ans: ............................................................................................................................. 124 Approved by Curriculum Development Center (CDC)","Smart Computer Science Book-10 d. Is this possible to perform this business remotely? Mention your logic. Ans: ............................................................................................................................ ..................................................................................................................................... 5. \tRupmati Khatun is a graphic designer, she has posted online a lot of design templates that meet different business organizations\u2019 requirements. When a party likes her template, he\/she request her to slightly modify and send the design for which she is paid accordingly. a. \tWhat can be the suitable term and the model of this business? Ans: ............................................................................................................................. b.\t When does she send the final design work? Ans: ............................................................................................................................ ..................................................................................................................................... c. \t How can be she get the payment? Ans: ............................................................................................................................ ..................................................................................................................................... d. \t What would be the delivery method of this business? Ans: ............................................................................................................................ 6. Write the short note on the following pictures: Ans: ............................................................................................................................ ..................................................................................................................................... ....................................................................................................... ....................................................................................................... ........................................ ....................................... ....................................... ........................................ ........................................ ........................................ Approved by Curriculum Development Center (CDC) 125","Digital Commerce Activity* 1. \tOrganize an intra-class speech competition on the topic 'Importance of e-commerce'. G2B G2C e-Governance G2E G2G 2.\t Arrange your class into two groups and organize a chart paper or digital presentation on the following topics. \t a. e-Governance\t b. m-Commerce 3. \tWrite an article for your school's news bulletin School Bulletin on the topic 'D-Commerce'. 4. \tOrganize the debate competition in the topic of 'Traditional Commerce is better than E-commerce'. 5. \tInterview the public for the TV program 'Public Thought' in the topic 'How would we make Digital commerce reliable and secured?' 126 Approved by Curriculum Development Center (CDC)","Contemporary Technology Smart Computer Science Book-10 Chapter Includes CHAPTER \u2022\t Introduction to Contemporary Technology \u2022\t Artificial Intelligence 6 \u2022\t Cloud Computing \u2022\t Virtual Reality \u2022\t Mobile Computing \u2022\t IoT (Internet of Things) \u2022\t Big Data INTRODUCTION In today's world, technologies are growing rapidly, and we are getting familiar with them day to day. Contemporary technology is known as modern or new technology. Modern technology is the advancement of old technology with new additions and modifications. For example, it is impossible for the people in this decade to live with a wired telephone placed on the table. So, the mobile phone which can be taken with us anywhere is the perfect example of technological advancement or simply, modern technology. Any machine or device we see around us is the product of modern technology. So, it can be defined, the technologies which rapidly exist at present time period are called contemporary technologies. In the field of computing and information processing; data processing, e-mail, chatting, social media network, e-commerce are of modern technology for this decade. Nowadays, this information technology is emerging and integrating as a contemporary technology with new additional features. The common contemporary technology in the fields of IT (Information Technology) are: i) Artificial intelligence\t\t ii) Cloud computing\t\t iii) Mobile Computing iv) IoT\t\t\t\t v) Virtual reality \t\t\t vi) Bigdata AI(Artificial Intelligence) Artificial Intelligence is composed of two words Artificial and Intelligence, where Artificial defines \\\"man-made,\\\" and intelligence defines \\\"thinking power\\\", hence, AI means a man-made thinking power. So, we can define: \\\"AI is a branch of computer science by which we can create intelligent machines which can behave like humans, and able to make decisions as specified.\\\" If artificial Intelligence exists in machine that can Approved by Curriculum Development Center (CDC) 127","Contemporary Technology have human-based skills such as learning, reasoning and problemssolving . With Artificial Intelligence you do not need to preprogram a machine to do some work, despite that you can create a machine with programmed algorithms which can work with own intelligence, and that is the awesomeness of AI. AI or artificial intelligence is the simulation of human intelligence processed by machines, especially computer systems. These processes include learning, reasoning and self-correcting fetures. Some of the applications of AI are included expert system, speech recognition and machine vision. Self-driving cars, autopilots, manufacturing robots, natural language processing (NLP) tools, disease mapping, Google Maps, face detection and recognition are common examples of AI. Application of AI Artificial Intelligence has various applications in today's society. It is becoming essential for today's time because it can solve complex problems with an efficient way in multiple industries, such as healthcare, entertainment, finance, education, etc. AI is making our daily life more comfortable and fast. Following are some sectors which have the application of Artificial Intelligence: 128 Approved by Curriculum Development Center (CDC)","Smart Computer Science Book-10 CLOUD COMPUTING The term \\\"cloud\\\" refers to servers that are accessed over the Internet, and the software and databases that run on those servers. Cloud servers are located in data centers all over the world. The data centers are big buildings filled with powerful computers(Servers). Their main purpose is to sell their computers as a service. Cloud computing is the delivery of different IT (Information Technology) resource ser- vices through the Internet (Cloud). These resources include tools and applications like data storage, servers, databases, networking, and software. Rather than keeping files on a personal hard drive or local storage device, cloud- based storage makes it possible to store them to a remote server. As long as an electronic device is connected to the internet, it can access the data and software programs to run. Organizations of every type are using the cloud for a wide variety of uses, such as data backup, disaster recovery, e-mail, virtual desktop, software development and testing, big data analytic, banking transaction, etc. . Video game makers are also using the cloud to deliver online games to millions of players around the world. Cloud Service Provider Cloud companies, sometimes referred to as Cloud Service Providers (CSPs), are companies that offer services or applications on the cloud. These cloud companies essentially host tools and data that allow customers to retrieve and utilize information in a flexible, manageable and cost- effective manner. Through cloud companies, users can easily access their cloud- based data via internet network connection. Some of the cloud computing service providers are: i) Google Cloud\t\t ii) Amazon Web Services (AWS)\t\t iii) Microsoft Azure\t\t iv) IBM Cloud\t\t v) Alibaba Cloud\t\t\t\t vi) Adobe creative cloud Approved by Curriculum Development Center (CDC) 129","Contemporary Technology Benefits of Cloud Computing: Cost Saving Cloud computing is a popular option for people and businesses due to the following reasons: Cost savings: It does not need any Increase Productivity physical hardware investment. It does Speed & Efficiency not need trained personnel to maintain the hardware. The buying and managing of equipment is done by the cloud service provider. Increased productivity: Data can be Performance & Security accessed anywhere and anytime. An Internet cloud infrastructure always maximizes enterprise productivity and efficiency by ensuring application is always accessible. Speed & efficiency : Cloud computing allows you to deploy your service quickly in fewer clicks. This faster deployment allows you to get the resources required for your system within a few minutes. Performance & security: Cloud computing delivers faster and more accurate retrievals of applications and data. Once data is stored in the cloud, it is easier to get its back-up and recovery instantly. It has the highest level of security of the data where a user can set a proper audition, password, and encryption. Limitation of Cloud Computing: Some limitations of the cloud computing are presented in the figure. Despite all the pros and cons, we can't deny the fact that cloud computing is the fastest growing part of network- based computing. It offers a great advantage to customers of all sizes simple users, developers, enterprises and all types of organizations. So, this technology here to stay for a long time. Cloud Deployment Models Once you understand the basic premises of cloud computing, which in simple terms is the delivery of computing services over the Internet, you will find different ways to deploy cloud resources. There are three cloud deployment modes. All 130 Approved by Curriculum Development Center (CDC)","Smart Computer Science Book-10 three scenarios provide similar benefits like cost-effectiveness, performance, reliability, scalability, and flexibility. The deployment method you choose out of the three options depends on your business needs. Private Cloud: A private cloud consists of computing resources used exclusively by one business or organization. The private cloud can be physically located at your organization's on-site data center or it can be hosted by a third-party service provider. But in a private cloud, the services and infrastructure are always maintained on a private network and the hardware and software are dedicated solely to your organization. In this way, a private cloud can make it easier for an organization to customize its resources to meet specific IT requirements. Private clouds are often used by the government agencies, financial institutions and any other mid to large-size organizations with business critical operations seeking enhanced control over their environment. IBM Smart Cloud Foundation, Microsoft Private Cloud and Cisco Private Cloud solutions are examples of private cloud platforms. Public Cloud: The cloud services are exposed to the public and can be used by anyone. Virtualization is typically used to build the cloud services that are offered to the public. Amazon Web Services (AWS), Microsoft Azure and Google cloud are popular examples of a public cloud. Google drive, One drive and Drop box are some of public cloud storage services. In a public cloud, you share the same hardware, storage and network devices with other organizations or cloud rented. You access services and manage your account using a web browser. Public cloud deployments are frequently used to provide web-based e-mail, online office applications, storage and testing and development environments. Hybrid Cloud: The cloud services can be distributed among public and private clouds, where sensitive applications are kept inside the organization\u2019s network (by using a private cloud), whereas other services can be hosted outside the organization\u2019s network (by using a public cloud). Users can use them interchangeably private as well as public cloud services in every day operations. Types of Cloud Computing Services Cloud computing is not a single piece of technology like a microchip or a cell phone. Approved by Curriculum Development Center (CDC) 131","Contemporary Technology Rather, it is a system primarily comprised of three services. Software-as-a-Service (SaaS) : In this SaaS model, Service provider provides the ap- plication software on a subscription basis over the Internet. In this model, cloud pro- viders host and manage the software application and underlying infrastructure, and handle any maintenance, like software upgrades and security patching. This service is fruitful for end user. This type of system can be found in Microsoft Office's 365, Adobe creative cloud suit, Google\u2019s G Suite, Google Drive, Salesfroce.com, etc. Platform-as-a-Service (PaaS) : In this model, Service provider provides services on demand for developing, testing, delivering, and managing software applications. Basically, this service is fruitfull for developers. PaaS makes easier for developers to quickly create web or mobile apps, without worrying about setting up or managing the underlying infrastructure of servers, storage, network, and databases needed for development. Infrastructure-as-a-Service (IaaS): This IaaS is a most basic category of cloud computing services. In this service, Service provider provides just IT infrastructure which includes servers and virtual machines (VMs), storage, networks, operating systems on a pay as you go basis. 132 Approved by Curriculum Development Center (CDC)","Smart Computer Science Book-10 VIRTUAL REALITY The definition of \u2018virtual\u2019 is near and 'reality' is what we experience as human beings. So the term \u2018virtual reality\u2019 basically means \u2018near-reality\u2019. Virtual Reality (VR) is the use of computer technology to create a simulated environment. The computer-generated simulation of a three-dimensional image or environment can be interacted with in a seemingly real or physical way by a person using special electronic equipment, such as a helmet with a screen inside or gloves fitted with sensors. Unlike traditional user interfaces, VR places the user inside an experience. Instead of viewing a screen in front of them, users are involved actively and become able to interact with 3D worlds. By simulating as many senses as possible, such as vision, hearing, touch, even smells, the computer is transformed into a gatekeeper to this artificial world. Application of Virtual reality One of the most arising technology in this decade is the virtual reality (VR) technology. Nowadays, It is not limited only in games and entertainment. VR applications are expanding to many other fields as mentioned below: Healthcare Education Tourism Construction Engineering Architecture & Manufacturing Interior design Training Sports Marketing & Ad- vertising Approved by Curriculum Development Center (CDC) 133","Contemporary Technology MOBILE COMPUTING A technology that is capable of providing an environment which enables users to transmit data, image, voice and video from one device to another device without the use of any physical link\/cable link is known as Mobile Computing. It means, data transmission is carried wirelessly with the help of wireless devices such as mobile phones, laptop, tablets, etc. It is a very much portable and easy accessible technology. Since portability is the main factor, this type of computing ensures that users are not tied or pinned to a single physical location. It can be accessed from any part of the globe within a second. Cell phone service is a common example of mobile computing. Key Features of Mobile Computing There are number of benefits of mobile computing, including the ability to get directions, entertain yourself when bored, conducting business, communicating, and many more. The key fetaures of mobile computing are as follow: Portability : Can be easily taken from one place to another. Connectivity: You can stay connected to all sources at all times. Social Interaction: You can interact with a variety of users via the Internet. Personalization: You can tailor your mobile computing to your individual needs. Components of Mobile Computing The mobile computing includes the major three components: i) Mobile Computing devices : \t \\\"Mobile computing device\\\" is a generic term refers to a wide range of devices. It allows people to access data and information from anywhere at any time wirelessly. These devices are inbuilt with a receptor medium that can send and receive signals. These devices come in a range of sizes that fit in your pocket and are portable, such as cell phones, tablets, laptops, handheld gaming devices, digital notebook, PDA (Personal Digital Assistant), etc. Mobile computing devices can be connected with cell phone, blutooth and internet for multi purpose. 134 Approved by Curriculum Development Center (CDC)","Smart Computer Science Book-10 ii) Mobile Computing Software\t Mobile computing software is the actual program that runs on the mobile computing devices. It deals with the characteristics and requirements of mobile devices. Mobile computing software is the fuel of the mobile device because it brings life to the hardware device. So, It is called essential component that operates the mobile device. It incorporates all aspects of wireless communications. There are two types of mobile computing software: i) Operating system (Windows Mobile, Android, Blackberry, iOS (iPhone Operating System), etc.) ii) Application program (Apps) iii) Mobile Communication networks Mobile Communication Network (MCN) is a type of telecommunication network with a collection of terminals, entities, and nodes connected to each other through wireless links that enables telecommunication between the users of the terminals. The entities represent people using portable mobile devices, and at the same time, they are communicating with each other by messages or voice call signals. MCN is supported and offered by many technologies such as Internet technology, Global System for Mobile Communications (GSM), General Packet Radio Service (GPRS), and Enhanced Data Rates for GSM Evolution (EDGE), Code Division Multiple Access (CDMA), Universal Mobile Telecommunications System (UMTS), High-Speed Downlink Packet Access (HSDPA), and Long-Term Evolution (LTE). Instead of these, mobile communication devices use IR (Infrared) and Bluetooth communication network technology to establish the connection in short range terminals and devices. Applications of Mobile Computing Some of the major fields in which mobile computing can be applied are: i) Web or Internet access.\t ii) Global Positioning System(GPS).\t iii) Emergency services. iv) Entertainment services v) Educational services.\t\t vi) e-services Approved by Curriculum Development Center (CDC) 135","Contemporary Technology IOT (INTERNET OF THINGS) The Internet of things is a system of interrelated computing devices, mechanical and digital machines provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. This is possible due to the arrival of super cheap computer chips and being common wireless networks. It is possible to turn anything as small as a pill and as big as an aeroplane into a part of the IoT. Due to connecting all these different objects with the internet and adding sensors adds a level of digital intelligence to devices, and enable them to communicate in real-time without involving a human being. If there is no sensors and internet connection, these devices will be dumb. The IoT is making the world around us smarter and more responsive, and merging the digital and physical universes. IOT Device: IOT devices are basically smart devices which support for internet connectivity and are able to interact with the other devices over the internet. They grant remote access to a user for managing the device as per their need. There are several top devices in the market. Smart cell phones, smart refrigerators, smart watches, smart fire alarm, smart door lock, smart bicycle, medical sensors, fitness trackers, smart security system, etc. are few examples of IoT products. Benefits Of IoT Devices There are several advantages of these smart devices, some of them are given below. \u2022\t IoT performs machine to machine interaction. \u2022\t IOT provides good automation and control. \u2022\t Integrated with more technical information, so it is better to operate. \u2022\t IoT possesses strong monitoring feature. \u2022\t IOT saves a lot of time. \u2022\t IoT helps to save more money by reducing manual task and time. \u2022\t Automating daily life tasks makes good monitoring of devices. \u2022\t Increasing efficiency and time-saving. \u2022\t With good features make a better quality of life. Limitations of IoT Devices Though there are several advantages, there are certain limitations too. Enlisted 136 Approved by Curriculum Development Center (CDC)","Smart Computer Science Book-10 below are the various demerits: \u2022\t IOT devices does not have any international compatibility standard. \u2022\t They may become highly complex resulting in failure. \u2022\t IOT devices may get affected by privacy and security breach. \u2022\t Reduced safety for users. \u2022\t Reduction in the employment of manual tasks thus increase the unemployment rate. \u2022\t IOT device may take control of life. BIG DATA The 'big data' refers to the large size of data. Nowadays, large size of data is produced due to massive use of Information technology. It is hard to stock, investigate, and transform with traditional tools of management. According to Gartner,\u201c 'Big data' is high-volume, velocity, and variety information assets that demand cost-effective, innovative forms of information processing for enhanced insight and deci- sion making.\u201d We need 'big data' processing technology to analyze this huge amount of real- time data and come up with conclusions and predictions to reduce the risks in the future. The Sources of Big Data Black Box Data : Such data could be generated by airplanes, including jets and helicopters. Black box data includes flight crew voices, microphone recordings, and aircraft performance information. Social Media Data : Social media such as Facebook and Twitter hold information and the views posted by millions of people across the globe. Stock Exchange Data : The stock exchange data holds information about the \u2018buy\u2019 and \u2018sell\u2019 decisions made on a share of different companies made by the customers. Power Grid Data : The power grid data holds information consumed by a particular node with respect to a base station. Search Engine Data: This is one of the most significant sources of big data. Search engines have vast databases where they get their data. Transport Data : Transport data includes model, capacity, distance and availability of a vehicle. Besides of these, marketing, weather forecasting, time series analysis, and med- ical-health records are some of other examples of sources of big data. Approved by Curriculum Development Center (CDC) 137","Contemporary Technology Big Data Technology Big Data Technology can be defined as a software-utility that is designed to ana- lyze, process and extract the information from an extremely complex and large data sets. The traditional data processing software could never deal with this big data. Examples of big data technology Apache Spark, NoSQL databases, Micro- soft HDInsight, Presto, etc. Advantages of Big Data Limitations of Big Data \u2022\t Better decision-making \u2022\t Privacy and security concerns \u2022\t Increased productivity \u2022\t Need for technical expertise \u2022\t Reduce costs \u2022\t Data quality concern \u2022\t Improved customer service \u2022\t Hardware needs \u2022\t Increased revenue \u2022\t Limitation of budget \u2022\t Faster speed to market \u2022\t Sometimes results are misleading \u2022\t Greater innovation \u2022\t Not useful in short run. Points to Know \u2022\t Contemporary technology is known as modern or new technology, which is the advancement of the old technology with new additions and modifications. \u2022\t AI is the simulation of human intelligence processes by machines, especially computer systems. These processes include learning, reasoning and self-correction features. \u2022\t Cloud computing is the delivery of different IT (Information Technology) resource services through the Internet, like data storage, servers, databases, networking, and software. \u2022\t Cloud companies essentially host tools and data centers that allow customers to retrieve and utilize information in a flexible, manageable and cost-effective manner. \u2022\t Virtual Reality (VR) is the use of computer technology to create a simulated environment. \u2022\t A technology that is capable of providing an environment which enables users to transmit data, image, voice and video from one device to another device without the use of any physical link\/ cables is known as Mobile Computing. \u2022\t The Internet of things is a system of interrelated computing devices, mechanical and digital machines provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. \u2022\t The big data refer to the large size of data, nowadays large size of data is produced due to massive use of Information technology. 138 Approved by Curriculum Development Center (CDC)","Smart Computer Science Book-10 Terms to Know Simulation\t: \t The re-creation of a real world process in a controlled environment. Database\t : \t Organized and structured set of data stored in a computer. Data Center\t : \t Dedicated space within a building used to house computer systems to store, access and distribute data. Scalability\t : \t The capacity to be changed in size or scale. Deployment\t:\tThe activities that make a software system available for use. Virtual\t:\tSeems almost real. Bluetooth\t : \t Wireless technology for sharing data between fixed and mobile devices over short distances. Three dimensional\t:\tAppearing to have length, breadth, and depth. Sensors\t:\tA device that detects and responds to some type of input from the physical environment. Telecommunication\t:\t The transmission of information by various types of technologies over wire, radio, optical or other electromagnetic systems. Mechanical\t:\t Operated by a machine or machinery. Apps\t:\t An application, especially designed for the mobile device. Digital\t:\t Expressed as series of the digits 0 and 1 Worksheet Questions types marked by * are just for testing Objective Questions higher ability but can 1. Fill in the blanks: enhance the knowledge for SEE. a. \t ........................ technology is known as modern or new technology. b. \t ........................ machine can have human base skill. c. \t A ...................... cloud consists of computing resources used by one business or organization. d. \t The ....................... cloud services are exposed to the public and can be used by anyone. e. \t You can access services and manage your account using .............................. f. \t ............... cloud is the combined features of ................. cloud and ................... cloud. g.\t In the ...................... computing data transmission is done wirelessly with Approved by Curriculum Development Center (CDC) 139","Contemporary Technology the help of ........................devices. h. \t Mobile communication devices use ....................... and ........................ communication network technology to establish the connection in short range terminals and devices. i. \t IoT is possible due to the arrival of .................... cheap computer ................. j.\t The ....................... ..................... refers to large size of data. 2. Write 'T' for true and 'F' for false statements: a. \tMachines which can behave like us and take decisions called AI. b. \tCloud base storage makes it possible to save data to a remote database. c.\t Cloud companies are essential host tools and data center. d.\t User can easily access cloud based data via internet network connection. e. \tPrivate cloud is always hosted by third party service providers. f.\t In a private cloud, the services and infrastructure are always maintained by own. g.\t You get separate hardware, storage and network devices in public cloud. h. \tIaaS is an IP based connectivity as part of on-demand service. i. \t PaaS is a three layer set of cloud-based computing. j.\t Virtual reality creates the simulated environment . k.\t VR technology is imitated to games. l.\t Cell phone device is a common example of mobile computing. m.\t Mobile computing is the fuel of the Mobile computing. n. IoT devices are able to connect to the Internet. 3. \tCircle for the correct option: a. \t Contemporary technology: i) AI\t\t\t ii) IoT\t \t iii) Cloud Computing\t\t iv) All of these iv) Both i) & ii)\t b. \t Today's common contemporary technology: \t i) e-mail\t\t\t ii) Chatting\t iii) Big data\t\t c. \t AI has the skills of: \t i) Learning\t\t\t\tii) Reasoning\t \t iii) Solving Problem\t\t\t iv) All of the these\t 140 Approved by Curriculum Development Center (CDC)","Smart Computer Science Book-10 d. \t Which is the cloud service provision? \t i) AWS\t\t\t\t\tii) Microsoft Azure\t \t iii) Both i) and ii) \t\t\t\t iv) None of these\t e. \t Examples of private cloud platforms are: \t i) IBM Smart Cloud \t\t\t ii) Microsoft Private Cloud\t\t \t iii) Cisco Private Cloud\t\t\t iv) All of these\t f. \t Examples of public clouds are: \t i) AWS \t\t\t\t\tii) Microsoft Azure\t \t iii) Google Cloud\t\t\t\t iv) All of these g. \t VR technology includes the electronic equipment: \t i) Helmet with screen inside\t\t ii) Gloves fitted with sensors\t \t iii) Both i) & ii)\t\t\t\t iv) None of the these h. \t SaaS cloud computing services are: \t i) Microsoft Office's 365\t\t\t ii) Adobe creative cloud suit\t \t iii) Google's G suit\t\t\t iv) All of the these\t 4. Write the full forms: a.\tIoT .................................................. b.\tIT .................................................... c. AI ................................................... d. VR .................................................. e. NLP ................................................ f. CSPs .............................................. g. AWS ................................................ h. SaaS .............................................. i.\t PaaS .............................................. j.\t IaaS ................................................ k.\t iOS ............................................... l.\t MCN ............................................... m. GPRS ............................................ n. GSM ............................................... o. CDMA ............................................. p. UMTS ............................................. q. HSDPA ............................................ r. LTE ................................................ s. IR .................................................. t.\tGPS ................................................ u. PDA ................................................ v.\tGCE ................................................ Approved by Curriculum Development Center (CDC) 141","Contemporary Technology 5. Write the terms for the following: puting devices. a. \t A software-utility that is designed to analyze, Ans:......................................... process and extract the information from g. \t Transmit data from one device to another extremely complex and large data sets. device without the use of any physical link\/ Ans:......................................... cables. b. \t The data generated by airplanes, including Ans:......................................... jets and helicopters. h. \t Technology which creates a simulated envi- Ans:......................................... ronment. c. \t Devices which have support for internet Ans:......................................... connectivity and are able to interact with i. \t Cloud services are exposed to the public and other devices over the internet. can be used by anyone. Ans:......................................... d. \t A system of interrelated computing devices, Ans:......................................... j. \t Cloud consists of computing resources used mechanical and digital machines. exclusively by one business or organization. Ans:......................................... e. \t A type of telecommunications networks with Ans:......................................... k. \t The delivery of computing services over the a collection of terminals, entities, and nodes connected to each other through wireless Internet. links. Ans:......................................... Ans:......................................... f. \t Software designed to run on the mobile com- l. A man-made thinking power. Ans:......................................... 6. Match the following: a. \tLarge size of data APPs b. \tSocial media Android c. \t Sources of big data Hybrid Cloud d.\t Gloves fitted with sensors AWS e. \tMobile computing hardware IoT device f. \t Mobile computing software Big data g.\t Mobile computing operating system Instagram h.\t Combination of public & private cloud Search engine i.\t Public Cloud VR equipment j. \t Smart watches PDA 142 Approved by Curriculum Development Center (CDC)","Smart Computer Science Book-10 Descriptive Questions 1.\t Write very short answer of the following questions: a.\t What is contemporary technology? b.\t What is AI? . c.\t What can AI machine do? d.\t What is cloud computing? e. \t What is cloud service provider? f. \t What is hybrid cloud? g. \t What is virtual reality? h.\t What is mobile computing? i.\t What is mobile computing device? j.\t What is mobile computing software? k.\t What is mobile computing network? l. \t What do you mean by IoT devices? . m.\t What is 'Big Data'? . 2.\t Write short answer of the following questions: a. \t Why is AI becoming essential for today's time? b. \t Why is cloud computing becoming popular? c.\t Why is mobile computing easy to access ? Write the key features of Mobile computing. d.\t How do dumb devices become intelligent? e.\t Why is IOT becoming more essential? f. \t Why do we need Big data? g.\t How is IoT devices possible to become intelligent ? h.\t Why is mobile computing software the fuel for this technology? i.\t Write the benefits and limitations of cloud computing. j.\t Differentiate between public and private cloud. k.\t Differentiate between SaaS and PaaS. l.\t List out the application fields of VR. m.\t Write the application fields of mobile computing. n. \t What is IoT? Write the advantages and limitations of IoT. o.\t Write the advantages and disadvantage of 'Big Data'. List out the sources of big data. Case Study and Application-based questions* 1. \tLaxmi Narayan is typing Nepali script on his laptop by speaking. Rabi Kanta is messaging in English to his Spanish friend, that is translated in Spanish and vice versa. It's amazing and fun. a. Which technology is used by Laxmi Narayan and Rabi Kanta for these tasks? Ans: ............................................................................................................................ ..................................................................................................................................... Approved by Curriculum Development Center (CDC) 143","Contemporary Technology b. \t What is such process called? Ans: ............................................................................................................................ 2. Basudeu Katuwal stores his project work in the Google drive instead of storing in his personal computer. a. \t What is the technology used by Basudeu called? Ans: ............................................................................................................................ b. \t Which type of deployment model is used by this technology? Ans: ............................................................................................................................ c.\t Are there any other such storage technology except Google drive? Ans: ............................................................................................................................ 3. \tSuvaprava saving and credit cooperative Ltd. is planning to implement the cloud based computing for the financial transaction. \t a. \t Which type of deployment model is suitable for Suvaprava? Ans: ............................................................................................................................ b. \t Is it the right decision of Suvaprava to use cloud base computing instead of local computing? Give your strong logic. Ans: ............................................................................................................................ ..................................................................................................................................... ..................................................................................................................................... 4. \tOn the basis of given image, answer the asked questions. a. \t What does this image represent? Ans: ....................................................................... ................................................................................ b.\t Why are they using such technology in this field? Ans: ............................................................................................................................. ..................................................................................................................................... ..................................................................................................................................... c. \t Is there any other field where this technology is used? Ans: ............................................................................................................................ 144 Approved by Curriculum Development Center (CDC)","Smart Computer Science Book-10 5. \tOn the basis of given image, answer the asked questions. a. \t What does this image represent? Ans: ........................................................................ ................................................................................. b.\t Which technology is used in these activities? Ans: ......................................................................... ................................................................................. c. \t Which type of network and software are used in this technology? Ans: ............................................................................................................................ d.\t Is there any other devices to use this technology? Ans: ............................................................................................................................ 6. \tOn the basis of given image, answer the asked questions. This is the home of Baibhab Chaudhary at Motigada. a. \t What does this image represent? Ans: ..................................................................... ............................................................................. b.\t Which technology is used in this home? Ans: ..................................................................... c. \t How are these equipment controlled? Ans: ............................................................................................................................. ..................................................................................................................................... ..................................................................................................................................... d.\t Why did Baibhab use this technology in his home? Ans: ............................................................................................................................ ..................................................................................................................................... e. \t Is there any harm in using this technology? Mention your view. Ans: ............................................................................................................................. ..................................................................................................................................... Approved by Curriculum Development Center (CDC) 145","Contemporary Technology Activity* 1. \tOrganize an intra-class speech competition on the topic 'Contemporary technology leads evolution of the new system' . G2B G2C e-Governance G2E G2G 2.\t Arrange your class into four groups and organize the chart paper or digital presentation about the given topics. \t a. Cloud computing.\t b. Mobile Computing\t \t c. AI\t\t\t d. Virtual Reality 3. \tWrite an article for your school's news bulletin School Bulletin on the topic 'Dependency in technology makes us dumb in future'. 4. \tOrganize a debate competition on the topic of 'IoT is boon not Bane' . 5. \tGet interview the public for the TV program 'Public Thought' in the topic: a) How do you use IOT devices? b) Are you looking any drawbacks with IOT? 146 Approved by Curriculum Development Center (CDC)","Number System Smart Computer Science Book-10 Chapter Includes CHAPTER \u2022\t Introduction to Number System \u2022\t Binary addition, subtraction, multiply and division 7 \u2022\t Binary to decimal, octal and hexadecimal and vice versa \u2022\t Octal to hexadecimal and vice versa \u2022\t Binary Coding technique \u2022\t Data measurement in memory INTRODUCTION The number system is a method of counting, calculating, comparing, naming or representing quantities. It started with the beginning of human civilization. In the ancient period, people used different tools such as fingers, finger knots, stone pieces, sticks, etc. for counting and keeping records of their property. In course of time, people felt the necessity of effective and fast calculating process. It is said that the necessity is the invention of mother. So, people invented the different types of counting of the number system. Decimal number system is discovered by Hindu philosophers, since then, we have been using it in our daily life. Binary number system is developed by Francis bacon in 1623 AD, which is used in computing system. It is also called mother tongue of computing. When we type some letters or words, the computer translates them in numbers as computers can understand. A computer can understand the positional number system with certain symbols called digits and these symbols represent different values depending on the position they occupy in the number. Decimal Number System: The decimal number system is a popular counting number system. It is consisted by ten unique notation that is 0 to 9. So, its base value is 10. It was developed by the Hindu philosophers in the 15th century. Binary Number System The binary number system is very popular in the computer. Computer always works on the basis of the binary number system. The binary number system consists of two unique notations: 0 and 1. So, its base is 2. 1 represents 'ON' state and 0 represents 'OFF' state. Each digit of binary number is called 'bit'. Approved by Curriculum Development Center (CDC) 147","Number System Computers, in general, use binary numbers 0 and 1 to keep the calculations simple and to keep the amount of necessary circuitry less, which results in the least amount of space, energy consumption and cost. Octal Number System The octal number system consists eight unique notations: 0 to 7. So, its base is 8. It is also used to calculate in data processing of the computer. Hexadecimal Number System The hexadecimal number system is also used in the computer data processing task. It consists 16 different unique notations: 0 to 9 and A to F. So, its base is 16. Specially, it is used to represent long binary digits in a single notation, eg. 1010=A. EQDeUcIiVmAalLNEuNmTbeCr ONVBiEnRarSy INOuNmbTeAr BLEOctal Number Hexadecimal System System System Number System 000 0 1 111 2 3 2 10 2 4 5 3 11 3 6 7 4 100 4 8 9 5 101 5 A B 6 110 6 C D 7 111 7 E F 8 1000 10 9 1001 11 10 1010 12 11 1011 13 12 1100 14 13 1101 15 14 1110 16 15 1111 17 148 Approved by Curriculum Development Center (CDC)","Smart Computer Science Book-10 Binary Addition Example - 1 Example - 2 10110 11110 Rules for binary addition: +11011 +11101 A B A+B 110001 111011 0 11 1 01 Example - 1 Example - 2 0 00 10110 11110 1 1 0 with carry over 1 +11011 +11101 Binary Subtraction 110001 111011 Rules for binary subtraction: Example - 1 Example - 2 10110 10111 A B A-B 0 00 \u00d7 10 \u00d7 11 1 01 00000 10111 1 10 0 1 Borrow 1 from left +10110 +10111 101100 1000101 Binary Multiplication Example - 1 Rules for binary multiplication: 110 \u00f7 10 10)110(11 A B A xB 0 00 - 10 1 00 \u00d710 1 11 0 10 \t10 Quotient = 11 \u00d7 Remainder = 0 Binary Division Rules for binary division: A B A \/B 0 0 Undefined (error) 1 0 Can't divide (error) 1 11 0 10 Approved by Curriculum Development Center (CDC) 149","Number System Example - 2 Example - 3 Quotient = 11 10010 \u00f7 10 10010 \u00f7 110 Remainder = 100 10)10010(1001 Quotient = 1001 110)10110(11 - 10 Remainder = 0 - 110 \u00d7\u00d7010 \u00d71010 \t 110 \t 10 \u00d7 \u00d7100 Conversion of Decimal to Binary Follow the points to convert decimal to binary number: \u2022\t Divide the given decimal number by the base of binary number 2. \u2022\t Note down the remainder in the right hand side as shown in the example. \u2022\t Continue this process until the quotient is obtained zero (0) \u2022\t Collect all the remainders from bottom to top. The obtained value is the final result. Example - 1 2 19 Example - 2 2 14 (19)10 = (?)2 29 (14)10 = (?)2 27 1 Remainder 0 24 1 Remainder231 22 0 21 21 0 1 0 1 1 \t\t 0 \t\t= 1110 \t\t\u2e2b (14)10 = (1110)2 Ans. \t\t= 10011 \t\t\u2e2b (19)10 = (10011)2 Ans. Conversion of Binary to Decimal Follow the following points to convert binary to decimal number. \u2022\t Multiply each digit of the given number by 2 with raised to the power of positional notation value. \u2022\t The positional notation value starts from zero that must be positioned from right to left. \u2022\t Add all the products obtained after multiplying. Example - 1 Example - 2 (1011)2 = (?)10 (1001)2 = (?)10 = 1 \u00d7 23 + 0 \u00d7 22+ 1 \u00d7 21+1 \u00d7 20 = 1 \u00d7 23 + 0 \u00d7 22+ 0 \u00d7 21+1 \u00d7 20 =8+0+2+1 =8+0+0+1 = 11 =9 \u2e2b (1011)2 = (11)10 Ans. \u2e2b (9)2 = (8)10 Ans. 150 Approved by Curriculum Development Center (CDC)"]


Like this book? You can publish your book online for free in a few minutes!
Create your own flipbook