Anjeev Singh Academy

Emerging Trends Web Application Code 803 Class 12 NCERT Book Solution

Emerging Trends Web Application Code 803 Class 12 NCERT Book Solution

Emerging Trends

I. Multiple Choice Questions

1. Which of the following statements is true about Artificial Intelligence?

a. AI is any machine that exhibits traits associated with a human mind such as learning and problem-solving.
b. AI is the ability of a machine to rationalize and take actions that have the best chance of achieving a specific goal.
c. Artificial Intelligence is used to create machines that mimic important cognitive functions
d. All of the above

Ans: d. All of the above

2. Which of these is not an application of Artificial Intelligence?

a. Plotting Graphs using data
b. Google Maps
c. Facial Detection and Recognition
d. Autocorrection and text editors

Ans: a. Plotting Graphs using data

3. Which of the following statements is NOT true about Machine Learning?

a. It is a method of data analysis using computer algorithms that automates analytical model building
b. Artificial Intelligence is a branch of Machine Learning
c. There are 7 basic steps in Machine learning
d. Deep understanding of the human genome

Ans: b. Artificial Intelligence is a branch of Machine Learning

4. Which of the following is not a service provided by Cloud?

a. Storage
b. Databases
c. Wi-fi
d. Software

Ans: c. Wi-fi

5. Which of these services allow users to store files on their servers, synchronize files across devices, and share files?

a. Google Drive
b. iCloud
c. OneDrive
d. All of these

Ans: d. All of these

6. Which of the following is not an operating system?

a. Windows
b. Linux
c. Oracle
d. DOS

Ans: c. Oracle

7. The internet-connected devices we use to perform services and processes that support our way of life is called:

a. Machine Learning
b. Cloud Computing
c. Internet of Things
d. Artificial Intelligence

Ans: c. Internet of Things

8. Which of the following is NOT an example of Application software?

a. Android
b. Photoshop
c. MS-Word
d. GIMP

Ans: a. Android

9. The primary purpose of an operating system is:

a. To make the most efficient use of the computer hardware
b. To allow people to use the computer,
c. To keep systems programmers employed
d. To make computers easier to use

Ans: d. To make computers easier to use

10. Which of the following is the correct depiction of Digital Marketing?

a. E-mail Marketing
b. Social Media Marketing
c. Web Marketing
d. All of the above

Ans: d. All of the above

11. Which of the following is incorrect about digital marketing?

a. Digital marketing can only be done offline.
b. Digital marketing cannot be done offline.
c. Digital marketing requires electronic devices for promoting goods and services.
d. In general, digital marketing can be understood as online marketing, web marketing, and email marketing.

Ans: a. Digital marketing can only be done offline.

12. In order to protect privacy and safety, you should:

a. Use a pseudonym to protect your identity.
b. Refrain from posting any information about where you are.
c. Be cautious to not reveal personal and private details, especially concerning other people.
d. Don’t worry about this – hackers and criminals don’t use social media.

Ans: c. Be cautious to not reveal personal and private details, especially concerning other people.

Note: In this questions, option (a) and (b) are also correct, but (c) is the most appropriate.

13. Ways to try to stop cyberbullying include:

a. Not replying to hurtful messages or posts.
b. Reporting the bullying behavior to someone who can help, like a parent or teacher.
c. Saving evidence of unwanted messages which can be used by a trusted adult or the police to help stop the cyberbullying behavior.
d. All of the above

Ans: d. All of the above

14. Some of the social media etiquettes that students should follow are:

a. To Post or not to Post
b. Respect others privacy
c. Make a strong password
d. All of the above

Ans: d. All of the above

15. Career opportunities that cannot be pursued in digital marketing

a. Influencer
b. Content creator
c. Chef
d. Ecommerce Manager

Ans: c. Chef

II. Very Short Answer Questions

1. List some common applications of Artificial Intelligence and Machine Learning.

Ans: Common applications of AI are

  • Google Maps,
  • Facial detection and recognition,
  • Autocorrect,
  • Recommendations based on search, etc.

Common applications of ML are

  • Self-driving cars,
  • Speech recgonition,
  • Effective web search,
  • Deep understanding of the human genome.

2. What is IoT? Give some examples of IoT devices.

Ans: All objects or things that are embedded with electronics, software, sensors and network connectivity that enables and allows these objects to collect and exchange data are collectively called the Internet of Things.

The internet-connected devices we use to perform services and processes that support our way of life is called ‘The Internet of Things (IoT)’.

For example,
Autonomous Vehicles, Smart Glasses, Smartphones, Smart speakers, Smart TV, Smart fridge, Smart Locks, Smart Lighting, Wearables, etc.

3. What is an Operating system? Give some examples of OS used in mobile devices.

Ans: An Operating System (OS) is an interface between a user and computer system. It is a software which performs all the basic tasks like file management, memory management, process management, handling input and output, and controlling peripheral devices such as disk drives and printers.

Examples of Mobile Operating Systems:
Android OS, Blackberry OS, iPhone OS /iOS, Symbian OS, Windows Mobile OS

4. Differentiate between Application Software and System Software.

Ans:

Application SoftwareSystem Software
This is designed directly from the user perspective.This acts as an interface between the
system and the applications
They have minimum involvement in the processing and functioning of the
computer device
These are responsible for the working of the system.
These are independent applications which can be download and installed in
the system.
It is the platform that allows the various
application software to run on the system
The application software can be installed as and when the user requires them.The system software is installed at the
time of installing the operating system. A
computer device cannot work without its
presence.

5. What is cloud computing?

Ans: Cloud computing are services provided over the Internet or the Cloud in terms of servers, storage, databases, networking, software, analytics, intelligence and many more.

6. Differentiate between AI and ML.

Ans: Artificial Inteeligence vs Machine Learning

Artificial IntelligenceMachine Learning
In simplest terms Artificial Intelligence is the intelligence demonstrated by a machine.ML is a branch of AI which allows a machine to automatically learn from past data without programming explicitly.
AI is used to make a smart computer system like humans to solve complex
problems.
ML helps machines to learn from data so that they can give accurate output.
Siri, customer support using chatbots, Online game playing, expert systems and intelligent humanoid robot are
some applications of AI.
Google search algorithms, online recommender system, Facebook tagging
suggestions, etc. are some applications of
ML.

7. What is digital marketing? List some of the career options one can pursue in digital marketing.

Ans: Digital marketing means using the digital channels to market products. It is also known as online marketing and it promotes brands and connects them to potential
customers via the internet.

Digital marketing can be done in various forms such as:
Search engines, Websites, social media, Email, Mobile apps, Text messaging, Web-based advertising etc.

Career Options in Digital Marketting are:-

  • Digital marketing intern
  • Photographer
  • Social media specialist
  • Graphic Designer
  • Copywriter
  • Search Engine Optimization Specialist (SEO Specialist)
  • Marketing Analyst
  • Ecommerce Manager

8. Explain the terms: Artificial Intelligence and Machine Learning.

Ans: Artificial Intelligence: In simplest terms Artificial Intelligence is the intelligence demonstrated by a machine. AI refers to the simulation of human intelligence in machines that are programmed to think like human and mimic their actions.

Machine Learning is a branch of Artificial Intelligence, based on idea that systems can learn from data, identify patterns and make deciion with minimal human intervention.

9. Explain any 2 cloud storage providers.

Ans: Google Drive, Dropbox, OneDrive, iCloud

10. Why is it harmful to spread rumors on social media?

Ans: Social networking sites or social media is a platform open to all and there is no regulation or self- checking mechanism there. So, on one hand it is useful in getting
information quickly, on the other hand it is prone to misuse by unscrupulous elements of society for their hidden agenda.

  • Rumors spread very fast on social media and by the time its authenticity is checked, it has already caused much damage to the social fabric.
  • Rumors can create division on communal lines and some groups can gain political mileage.
  • Rumors spread through social media can have devastating consequences such as depression, hostilities, enmities and even riots.

III. Short Answer Questions

1. Mention any 2 advantages and disadvantages of IoT?

Ans: Advantages of IoT:

  • (i) Improved efficiency and automation of tasks.
  • (ii) Increased convenience and accessibility of information.
  • (iii) Greater ability to gather and analyze data.
  • (iv) Improved decision-making.
  • (v) Cost savings.

Disadvantages of IoT:

  • (i) Security concerns and potential for hacking or data breaches.
  • (ii) Privacy issues related to the collection and use of personal data.
  • (iii) Dependence on technology and potential for system failures.
  • (iv) Limited battery life on some devices.
  • (v) Concerns about job displacement due to automation.

2. Explain any 3 advantages of the Operating system.

Ans: Advantages of Operating Systems are

  • (i) User friendliness: The main objective of an operating system is to provide the user ease of use. The operating system provides the user a friendly interface, which they can use to operate a computer system.
  • (ii) Resource Sharing: The operating system helps in resource management, hence it controls all the resources. The operating system allocates and deallocates resources given to different processes and this allows effective sharing of resources amongst the processes running through the operating system.
  • (iii) Data Protection: The operating system protects the data from unauthorized manipulation. The operating system enforces this through access control.
  • (iv) Multitasking: The operating system allows multiple programs to run in the computer system simultaneously

3. List four types of Operating Systems.

Ans: Four types of Operating Systems are

  • (i) Real Time Operating System: The term “real-time system” refers to any information processing system with hardware and software components that perform real-time application functions and can respond to events within predictable and specific time constraints.
    • Examples of real-time systems include air traffic control systems, process control systems, and autonomous driving systems.
  • (ii) Single-User Operating System: Single-user operating system supports single user at a time.
    • Examples: Microsoft Windows, Apple macOS, DOS
  • (iii) Multi-User Operating System: Multi-user operating system supports multiple users works simultaneously.
    • Examples: Linux and Unix
  • (iv) Mobile Operating System: Mobile Operating system is the software that is designed to run on devices like mobile phones and tablets instead of computers.
    • Examples: Android OS, Blackberry OS, iPhone OS/iOS, Symbian OS, Windows Mobile OS.

4. What are the benefits of digital marketing?

Ans: Benefits of Digital Marketing are: –

  1. Helps to reach a larger customer base with less effort regardless of the location.
  2. Digital marketing is the cheaper than traditional marketing. You can create free social media account, and you can share your ads freely there.
  3. You will get free analytics on digital marketing, that helps to analyse your business and grow your business.
  4. You have opportunity to engage with customers at various stages during the buying process.

5. What is social media etiquette?

Ans: Etiquette means conventional requirements as to social behavior; properties of conduct as established in any class or community or for any occasion.

Social media etiquette refers to the guidelines that individuals should use to preserve their reputation online. Basically, social media etiquette revolves around online guidelines to follow.

The main goal behind netiquette or mannerisms on social media is to treat others with respect and take care of intellectual property rights and associated implications.

IV. Long Answer Questions

1. Explain any 4 functions of an Operating system.

Ans: Four functions of an Operating Systems are

  • 1. Memory Management:
    The operating system manages the computer’s primary memory and provides mechanisms for optimizing memory usage.
  • 2. Processor Management:
    The operating system is responsible for starting, stopping, and managing processes and programs. It also controls the scheduling of processes and allocates resources to them.
  • 3. Device Management:
    The operating system manages input/output devices such as printers, keyboards, mice, and displays.
  • 4. File Management:
    The operating system is responsible for organizing and managing the file system, including the creation, deletion, and manipulation of files and directories.
  • 5. Network Management:
    The operating system provides networking capabilities such as establishing and managing network connections, handling network protocols, and sharing resources such as printers and files over a network.
  • 6. Backup and Recovery:
    The operating system provides mechanisms for backing up data and recovering it in case of system failures or errors.

2. What are the advantages and disadvantages of cloud computing?

Ans: Advantages of Cloud computing are –

  • Faster time to market: Cloud computing supports implement new innovations without hardware limitation.
  • Scalability and flexibility: Cloud computing allows quickly scale resources and storage as per business demand.
  • Cost savings: Cloud computing is cheaper than, becuause you have only pay for the resources you actually use.
  • Better collaboration: Cloud storage enables you to make data available anywhere, anytime, i.e. 24×7.
  • Advanced security: Cloud computing provide high security features, automatic maintennace and centralized management.

Disadvantages of Cloud Computing:

  • Internet Connectivity: Cloud computing limited to the internet connection, you can’t access anything without cloud computing.
  • Vendon lock-in: Sometime you can face problem while transferring the services from one vendor to another vendor.
  • Security: On the cloud, there may be a chance that your organization’s information is hacked by Hackers.

3. Explain any 4 social media etiquettes that a student should follow.

Ans: Social media etiquettes for students are –

  • Never share your personal information online. Personal information means your password, phone number, home address and email address.
  • Never use the same password in all your accounts. Enable the two-step identification when possible.
  • Never connect with people you do not know in real life.
  • Respect other peoples privacy the same

4. What is IIoT? How is it different from IoT?

Ans: The industrial internet of things, or IIoT, is a term used to describe the application of Internet of Things (IoT) technology in industrial settings. It encompasses the integration of advanced sensors, software, and machinery with internet connectivity to collect, analyze, and act upon vast amounts of data.

IIoT is a subset of IoT that specifically deals with industrial applications. It’s focused on industrial processes enhancing and data-driven operations through insights.

It’s about improving efficiency, productivity, and safety in industries such as manufacturing, energy, and transportation.

5. What is Edge computing? Write the difference between cloud computing and edge computing.

Ans: Edge computing is the practice of capturing, storing, processing and analyzing data near the client, where the data is generated, instead of in a centralized
data-processing warehouse.

The main difference between edge computing and cloud computing is responsiveness. Edge computing is ideal for processing data in real-time, while cloud computing is
better suited for processing voluminous information that is not time-sensitive.

6. Komal Mehta was a student in a Delhi school who was stalked by a Facebook friend whom she unfriended months ago and with whom she had shared all her personal information. Which “social media etiquettes” was Komal lacking? How did the stalker know Komal’s address? What measures should Komal take against this stalker?

Ans: Komal lacked social media etiquettes like maintaining privacy and avoiding sharing personal details with online friends.

The stalker knew her address because she had shared it earlier on Facebook.

She should block and report the stalker, inform parents or teachers, file a complaint with the Cyber Crime Cell, and avoid sharing personal information online.

7. Somebody uploads your photo without your knowledge on social media and writes a funny post about it. Can it be considered cyberbullying? Explain how?

Ans: Yes, it can be considered cyberbullying because posting someone’s photo without their permission and making fun of it can hurt their feelings, damage their reputation, and cause embarrassment. It is a form of online harassment where a person is insulted or humiliated through digital platforms like social media.

Sorry! You cannot copy content of this page. Please contact, in case you want this content.

Scroll to Top