0 ratings0% found this document useful (0 votes) 55 views26 pagesCS Chapter-6 (Computer Network)
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
formed an agency named ARPANET
(Advanced Research Projects Agency
NETwork) to connect computers studies
today at various universities and defence
agencies. The main objective of
ARPANET was to develop a network that
could continue function efficiently even in
the event of a nuclear attack.
2. Internet (INTERconnection NETwork): The
Intemet is a worldwide network of computer
networks. It is not owned by anybody.
3. Interspace: Interspace isa client/server software
Program that allows multiple users to
communicate online with real - time audio, video
and text chat in dynamic 3D environments.
+ Introduction to Computer Networks :
The collection of interconnected computers is called
a computer network. Two computers are said to be
interconnected. if they are capable of sharing and
exchanging information or resources.
Advantages of Computer Networks :
1. Resource Sharing means to make all
Programs, data and peripherals available to
anyone on the network irrespective of the
physical location of the resources and the user.
2. Reliability means to keep the copy of a file on
‘wo or more different machines, so if one of
them is unavailable (due to some hardware
crash or any other) them its other copy can be
used
Cost factor_means it greatly reduces the cost
since the resources can be shared.
4. Communication Medium means one can
send messages and whatever the changes at
one end are done can be immediately noticed
at another.
Types of Networks :
1. PAN (Personal Area Network)
A Personal Area Network is computer
network organized around an individual
person. It generally covers a range of less than
Question bank ~ Class Xi! (Computer Science)
By Swati Chawla
10 meters. Personal Area Networks can
constructed with cables or wirelessly
2, LAN (Local Area Network)
Tt is a network that is confined to a Felativg)
small area. It is generally limite to
geographic area such as schoo! labora
building. It is generally privately OWney
networks over a distance not more than § kn
MAN (Metropolitan Area Network):
MAN is the networks cover a group of nay
corporate offices or a city and might be cihy
private or public. It refers to the network thy
is spread over an area as big as city
4. WAN (Wide Area Network) :
These are the networks spread over large distances
say across countries or even continents. through
cabling or satellite uplinks are called WAN, It cay
even be a group of LANs that are spread acros
several locations and connected together. The largest
WAN is INTERNET.
> DataC
Channel is the medium used to cary
information or data from one point to another
Physical medium like cables over which the
information is exchanged is called channel.
Baud & bits per second (bps) :- It is used
measurement for the information carry of 2
communication channel.
Measurement Units :- [bps (bits per second), kbps
mbps, gbps, tbps]
| Byte= 8 bits
1 KBPS ( Kilo Byte Per Second) 1024 Bytes
1 Kbps (kilobits Per Second) = 1024 bits
| Mbps ( Mega bits Per Second )=1024 Kbps
Bandwidth :- It is amount of information transmitted
or receives per unit time.
IP address : An IP address is a unique address tt
idemifies a device on the internet ora local netwo
IP stands for "Internet Protocol,” which is the S*°
ules governing the format of data sent via the intem*
or local network.
+ Switching Techniques Switching techni’?
are used for transmitting data across networks|, iret Swi
itching : In the Circuit Sw
technique, first, the complete end-to-end
transmission path between the source and the
destination computers is established and tien the
message is transmitted through the path
The main advantage of this technique js
guaranteed delivery of the message. Mostly ie)
for voice communication.
packet Switching : In this switching technique
fixed size of packet can be transmitted across the
network.
Message Switching : In the Message switching
technique, no physical path is established
between sender and receiver in advance. ‘Thos
each node receives the entire message stores in it
entirely on disk and then transmits the Message to
the next node, if it is not destination node. This
type of network is also called store-and-forward
network.
Transmission_media_; Transmission media is
what medium over the Messages are transmitted,
A communication channel is also called as a
medium. Different media have different properties
and used in different environments for various
purposes.
Guided / Wired Media :
1. Twisted Pair Cable s_It consists of two
identical 1 mm thick copper wires insulated
and twisted together. The twisted pair cables
are twisted in order to reduce crosstalk and
electromagnetic induction.
Advantages ;
* — Itis easy to install and maintain.
It is very inexpensive.
Disadvantages :
* — Itis incapable to carry a signal over long,
distances without the use of
repeaters,
Due to low bandwidth, these are not
suitable for broadband applications.
itching
2. Co-axial Cables : It consists of a solid wire
Core surrounded by one or more foil or braided
Wire shields, each part is from the other by
some kind of plastic insulator. It is mostly
used in the cable wires.
Advantages :
* Data transmission rate is better than
‘twisted pair cables.
* It provides a cheap means of
transporting multi-channel television
signals around metropolitan areas.
Disadvantages:
* Expensive than twisted pair cables.
ors bank - Class xi! (Computer Science)
Chawla
~~
91
Unguided / Wireless Medi:
Difficult to manage and reconfigure.
Optical fibre : An optical fibre consists of
thin glass fibres that can carry information in
the form of visible light
Advantages :
* Transmit dat
security
over long distance with high
* Data transmission speed is high.
* Provide better Noise immunity.
* Bandwidth is up to 10 Gbps.
Disadvantages :
Expensive as compared to other guided media.
Need special care while installation
1. Infrared : The infrared light transmits data
through the air and can Propagate throughout
@ room, but will not penetrate walls. It is a
secure medium of signal transmission. The
infrared transmission has become common in
TV remotes, automotive garage doors,
wireless speakers etc.
2, Radio Waves : an electromagnetic wave with
a wavelength between 0.5 cm and 30,000m.
The transmission making use of radio
frequencies is
termed as__radio-wave
transmission.
3. Microwave : The Microwave transmission is
a line of sight transmission. Microwave
signals travel at a higher frequency than radio
waves and are popularly used for transmitting
data over long distances.
4.
Satellite link : The satellite transmission is
also kind of line of sight transmission that is
used to transmit signals throughout the world.
Network Devices: Networking hardware, also
known as network equipment or computer
networking devices, are electronic devices which
are required for communication and interaction
between devices on a computer network.
* Modem : Full form of Modem is Modulator or
Demodulator. A modem is a hardware device
that allows a computer or another device , such
as router or switch , to connect to the Internet.
As we know, phone lines work on Analog
Signals, while Computer works on digital
signal.
So the role of modem is to convert Digital
Signal to Analog so that it can be carried by
telephone lines and other side it convert Analog
signal to Digital Signals, so that it can be
carried by computer.© RJ-45: RJ in RJ-45 stands for Registered Jack.
It is a standard type of physical connector for
network cables. RJ4S connectors are most
commonly seen with Ethernet cables feature
small plastic plugs on each end that are inserted
into the RJ 45 jacks of Ethernet devices.
© Ethernet Card : It is also known as NIC
(Network Interface Card).
It is a device that is attached to each of the
workstations and the server and helps the
workstations establish all important connection
with the network. It contain RJ-45 slot to
connect ethernet cable with RJ45 connector.
Each NIC attached to workstation has a unique
number identifying it, known as MAC address.
It is also known as network interface unit
* Hub: A hub is a hardware device used to
connect several computers together. A hub is a
networking device having multiple ports that
are used for connecting multiple computers or
segments of LAN together. It sends the
incoming data to all destinations.
Types of Hub:
Active Hub : It amplifies the signal as it
moves from one connected device to another.
These are like repeaters to extend the length
of anctwork.
Passive Hub : It allows the signal to pass
from one computer to another, without any
change.
Hub is multiport repeater, which broadcasts all
information to all other ports. Hence, it is
called as Non intelligent or dumb device.
Causes unnecessary traffic. Hub can send or
receive information, but it can not do both at a
same time,
* Switch : A switch is a device that is used to
segment networks into different subnetworks or
LAN Segments. A switch is responsible for
filtering, i.e. transforming data in a specific way
and for forwarding packets between LAN
Segments. A switch has same job as that of a
hub’s, i.e. to connect multiple computers, But, a
switch is a smart device. It can identify the
intended destination and send the information
only to the target computers. No unnecessary
traffic generated. It can send and receive
information at same time.
‘© Repeater : A repeater is a device that amplifies
and restore signals for long distance transmission,
© Router : A device that works like a bridge but
can handle different protocols.
Question bank - Class Xil (Computer Science)
By Swati Chawla
92
nsible for forwa
The router 18 respot different ding a
from one network to a different network,
destination is unknown (0 a router, it seng, th
traffic to another router which knows the
destination.
Gateway : A gateway is a device that cone
Gresimilar networks. It establishes an in
Connection between 10cal ATCA Networks ip
completely different structures.
WiFi Card = Similar to Ethernet card but jt
allows our computers {0 connect With other
devices without wite, 1c. for Wireleg,
connectivity. It may be internal or extemal With
built-in wireless radio and antenna the Pie
common i card used in desktop compute,
fre PCI express Wi-Fi card made it fit the p¢y
express card slot on the motherboard.
connecting different computers in a network. The
way in which the computers / devices ar
physically interconnected to form a network js
called a Topology.
1. Bus Topology : In bus topology, all the
nodes are connected to a main cable called
backbone. If any node has to send some
information to any other node, it sends the |
signal to the backbone. The signal traves
through the entire length of the backbone and
Network Topologies : Topology is an an of
|
|
is received by the node for which it is
intended.
“ooo
Advantages :
+ Itis easy to install.
* It requires less cable length and hence
it is cost effective.
* Failure of a node does not affect the
network.
Disadvantages :
* In case of a cable fault, the entire
network goes down.
+ Ata time, only one node can transmit
data.
2. Star Topology : In Star topology, each node
is directly connected to a hub/ switch. Ifa
node has to send any information to any oe
node, it sends the signal to the hub/switch
The star topology uses a separate cable
—each node / workstation
€ Cable connect
the node toa central device's Pica omees
Advantages :
* Itis easy to install,
* Itis easy to diagnose the fault in Star
Topology.
* Tf one link fai
function,
Disadvantages :
* Failure of Hub
failure of entire network.
* It requires more cable
compared to Bus Topology.
Ring Topology : In ring topology, every
computer is connected to the next computer
inthe ring and each transmit the signal what
receives from the previous computer. The
Messages flow around the ring
direction
Switch leads to the
length as
in one
Advantages :
* Easy to install and configure.
* Easy to detect the problem.
* All data flows in one direction,
reducing the chance of packet collisions.
Disadvantages :
* All. data being transferred over
the network must pass through each
workstation on the network, which can
make it slower than a star
topology.
+ Theentire network will be impacted if
one workstation shuts down.
Question bank ~ Class xi (Computer Science)
Swati Chawla
~~
93
~ Network Protocols
4. Tree Topology : Tree Topology is a
combination of Bus and Star Topology. It is
used to combine multiple star topologies.
Advantages
+t offers
expansion.
* Even if one network fails, the other
network remains connected and working,
easy way of network
In network there are variety
of computers connected to each other and share
data in many ways. For interaction among these,
some rules are applied like how and when a devi
can send and receive data how to send the data
Packet and how to receive,
* HTTP :_Hypertext’ Transfer Protocol
(HTTP) is a communications protocol for
the transfer of information on the internet
and the World Wide Web, HTTP is a
Tequest/response standard between a client
and a server. A client is the end-user: the
server is the web site. HTTP is used to
transfer all the files and other data from one
computer to another on the World Wide
Web.
* FTP: FTP stands for File Transfer Protocol,
It allows transferring of files from one
system to another like uploading of file from
local machine to web server using FTP
client.
* TCP/IP:
TCP - is responsible for verifying the
correct delivery of data from client to server.
Data can be lost in the intermediate network
TCP adds support to detect errors or lost data
and to trigger retransmission until the data is
correcily and completely received,
IP - is responsible for moving packet of data
from node to node. IP forwards each packet
based on a four byte destination address (the
IP number). The Internet authorities assign
ranges of numbers to different organizations,
The organizations assign groups of their
numbers to departments. IP operates on
gateway machines that move data fromQe
7 nd
department to organization (© region &
then around the world. |
nt to Point
PPP ; PPP stands for Poi ada
It is a communication protocol © the daté
ink layer that is used to
protocol data between two
connected point-to-point computers:
SMTP : SMTP stands for simple ail
Transfer Protocol. S p js a set o
communication guidelines that allows
software to tr
the internet. It is @ program 0
messages t0 other computer USeTS
email address.
pops : POP3 stand for Post Office Protocol.
It is a client-server protocol in which email
is received and held for you by your internet
cover Periodically, you check your mailbox
on the server ‘and download any email
probably using POP3. It also allows to
Frwaload the received messages on 1O=!
machine using tool like Outlook so that user
can read them even when they are not
iser choose t0
connected to the internet. The us
Teave copies of the mails on the server 38
advantage is that es
the user can cut the
are downloaded ,
Trtemet Connection and read his/her Email
urring further
at own leisure without int
communication costs
HTTPS : Hypertext Transfer Protocol
Secure is an extension of the Hypertext
Transfer Protocol. It is used for secure
communication over a computer network,
and is widely used on the Intemet. In
HTTPS, the communication protocol is
encrypted using Transport Layer Security or,
formerly, Secure Sockets Layer.
VolP : VoIP stands for Voice over Internet
Protocol. It is a protocol that enables voice
communication over the internet through the
compression of voice into the data packets
that can be efficiently transmitted over data
network and then convert back into voice at
receiving end. It uses packet switching (store
‘and forward). It is an alternative to
traditional telephone Network,
Telnet : Telnet is one of the earliest remote
Jogin protocols on the Internet.
Through telnet, an administrator or another
user can access someone as computer
remotely. On the web, HTTP and FTP
protocols allow you to request specific files
ansmit and electronte ma
se
estion bank - Class XI! (Computer Science)
y Swati Chawla
from remote computers but not to actually
as a user of that computer, \W;
fou logon a8 8 TeEsat user =
teever privileges YOu MY have bee
ranted 10 specific application and data gy
that computer.
www for World Wid
ve term WWW was coined by Te
Bemers Lee It is @ collection of inked
nts oF pages, stored on millions of
docume ;
computers and distributed across the
Internet. It is a set of protocols that allows
ess any document on the ne,
through 2 naming system called the URi(
Uniform resource Locator) .
Telnet : It is an Internet utility that allows
you to log onto remote computer systems,
Web Browser = ‘A web browser is a WWW
client that navigates through the World wide
web and display pages. A web browser is a
software used to access the websites. Eg
Internet explorer, Firefox, Google Chrome.
Web Server : A web server is a WWW
server that responds to the requests made by
web browser
URL (Uniform Resource Locetor) : Each
website has a unique address called URL
URL looks like this : type:!/ ‘address//path
type-> refers type of server in which the file
is located(FTP, HTTP)
address -> address of the server
path->location ofthe file inthe server
Domain Name : Refers to the Pe of
domain in which they are categorized ino:
com, edu, mil, net, tv, biz, Or8, 20% °°
Webpage : A single page in @ website 8
called as the webpage.
Website : A collection of related web pages
is called web sites.
Homepage : The first page which is open
sna website is called as the Home PE
Web Portal : It is a website that ost othe
Ferrey er words 2 600 FON Po
hyperlinks to many other ‘websites. Exam?
: yahoo.com. google.com, indiatimes
Web Hosting : It is a way of hs
server application on 2 COMPUT agi
through which the contents are rou
available to any web browser: thei
Basically, the web hosts @ woh 3
customers to place web docume” she
HTML pages. ics andmedia files to g
ji Special
ater called a Web server! 'YPe of
¢ (TML : The web document 18 writte
* gecial language called HTM Ting
ells the browser, how the data, te,
veld be displayed, “Xt image
XML : It stands for Exte sible
vanguage. It is @ language for go
gtructured information, In XM
create Our OWN tags,
Markup
fining a
+ We can
Objective Type Questions
1. Amitused a pen drive to Copy files from his
friend's laptop to his office computer, Soon his
office computer started abnormal functioning,
Sometimes it would restart by itself and
sometimes it would stop functioning totally,
Which of the following options out of (i) to (iv),
vould have caused the malfunctioning of the
computer.
Justify the reason for your
(i) Computer Worm
i) Computer Virus
(ii) Computer Bacteria
(iv) Trojan Horse
As,
chosen option:
4) Computer Virus
OR
"Trojan Horse
122 drive containing Computer Virus / Trojan
fore was used before the abnormal functioning
“Ats4. which might have corrupted the system files
‘omputer Virus/ Trojan Horse affects the system
‘sand start abnormal functioning in the computer
2 dai is an IT expert and a freelancer. He
Tecently used his skills to access the
Administrator password for the Seed
*erver of Megatech Corpn Ltd. And provi i
Gitfidential data of the organization to the
irector, informing him SET
Vulnerability of their network security. aes
* following options (i) to (iv), which one
ston bank
= Class Xl (Computer Science)
ati Chawa
95
aPPropriately defines Jai,
"T YOUF chosen option,
r
(i) Mackey
Justify the reason
V) Network Admit
ANS: (i) Hacker "
A Hacker igs
Or kets a person who breaks into the network
3 tademig ization without any malicious mn
™ Wdentity the type ,
Of (opology on the basis of the
® Since every node
Server, a large amo
following:
tar T opology
b. thas a single common data
all the nodes,
ANS: Bus Topology
4. Expand the following:
a. VO}
~~ Voice Over Internet Protocol
b.SMTP — Simple Mail Transfer Protocol
©. WLL Wireless in Local Loop
4. TCPAP — ‘Transmission Control Protocol
Internet Protocol,
© URL --— Uniform Resource Locator
5. The following is a 32 bit binary number usually
Fepresented as 4 decimal values, each
Fepresenting 8 bits, in the range 0 to 255 (known
8 octets) separated by decimal points.
140.179.220.200 What is it? What is its
importance?
Ans. Itis an IP Address,
It is used to identify the computers
network.
6 Daniel has to share the data among various
Computers of his two offices branches situated in
the same city. Name th
fe network (out of LAN,
WAN, PAN and MAN) which is being formed in
this process,
Ans. MAN (Metropolitan Area Network)
7. Give two examples of PAD
networks.
Ans. Example:
path connecting
ona
\N type of Ni
© Small Office or Intemet caf
Two or mote computers connected in few
distances,
© Networking — in
buildings.
Examples of PAN type of Network are
© Upload the photo from your cell phone to
your desktop computer.
© Watch movies from an online streaming
service to your TV.
Home Offices/Schooldata vis?Bluetooth.
© Sharing of
© Creating hotspot. prowse
. i helps us
8 Which protocol c M8 rowers?
through web pages us
Name any one internet browser |
‘Ans, WWW (World Wide Web) oF HTTP Ce
Tens Transfer Protocol) is used. for searching
information from Internet using li
Examples of Intemet Browser:
‘© Mozilla Firefox
Microsoft Internet Explorer
© Google Chrome
© Opera
internet browser
9. Which protocol helps us to transfer files to and
from a remote computer?
Ans: FTP or Telnet or TCP
10. Name the protocol:
i. Used to transfer voice using
network.
Ans : VOIP
ii, Used for chatting between 2 groups or between
two _ individuals.
Ans : IRC
11. (a) Which of the following crime(s) does not
‘come under cybererime?
* Copying some important data from a
computer without taking permission from the
owner of the data.
«Stealing keyboard and mouse from a shop.
© Getting into unknown person’s social
networking account and start messaging on
his behalf.
‘Ans: Stealing keyboard and mouse from a shop.
(b) Out of the following which one comes under
cybercrime?
© Stealing away a brand new computer from
a showroom.
© Getting in someone’s social networking
account without his consent and posting
pictures on his behalf to harass him.
«Secretly copying files from server of a call
centre and selling it to the other
organisation.
Viewing sites on an internal browser
‘Ans: getting in someone's social networking account
without his consent and posting pictures on his behalf
to harass him.
12. What term we use for a software/hardware
device, which is used to block,
unauthorised access while permitting authorised
nications? This term is also used for a
device or set of devices configured to
packet switched
comm:
Question bank ~ Class Xl (Computer Science)
By Swati Chawla
96
, crypt, decrypt, or pr
ermit, deny, ener Ory a
and out) computer traffic between gj fer
security domains based upon a set of rule
¥ a
r ct
Firewall. i
mission media for nety,
ind Satellite
o
‘Answer?
13. Name two trans}
‘Ans: Optical Fibre a
tk
Practice Questions (Solved)
1, Differentiate between Radio Link ;
Microwave in context of ri
communication technologies.
‘Ans : Radio Link: Data is transmitted outwarg fio,
the antenna through free space inal direction
is a slow means of communication;
Microwave: Data is transmitted based on lng,
sight principle, faster thang
communication.
Amit used a pen drive to copy files from
friend’s laptop to his office computer Soo
office computer started abnormal functioning
Sometimes it would restart by itself an
Sometimes it would stop functioning totaly
Which of the following options out of () to (iy
would have caused the malfunctioning of th
Pr
computer.
Justify the reason for your chosen option:
) Computer Worm
i) Computer Virus
Computer Bacteria
(iv) Trojan Horse
‘Ans: (ii) Computer Virus
OR
(iv) Trojan Horse
© Pen drive containing Computer Virus / Tre
Horse was used before the abnormal functions
started, which might have corrupted the system fils
© Computer Virus/ Trojan Horse affects the system
files and start abnormal functioning in.
computer
3. Jai is an IT expert and a freelancer He
recently used his skills to access OF
ye network
Administrator password for the 0°
server of Megatech Corpn Ltd. And provi
confidential data of the organization (©
Director, informing him about a
vulnerability of their network security. 8
the following options (i) to (iv), which "©
appropriately defines Jai. Justify the
for your chosen option:
(i) Hacker
ii) Cracker(iv) Network Admin
) Hacker
‘A Hacker is a person who
network of an organizaticy
malicious intent.
4, Write two advantages of using
"cable over an ethernet cable
service stations, which are 1
each other.
Hi
Ans +
breaks into the
M without any
an optical fibre
to connect two
'90 m away from
A Low power: Because signals in optical fibres
degrade less, lower power transmitters can ke
used.
«Higher data rate: Due to hi
rate of optical fibre is more than the data rate at
ethernet cable (upto 1 Gbps).
+ Digital signals: Optical fibres are
for carrying digital information wi
useful in computer networks,
5. Identify the type of topology on the basis of the
following:
a Since every node is directly connected to the
server, a large amount of cable is needed which
increases the installation cost of the network.
Ans: Star Topology
b.Ithas a single common data
the nodes.
‘Ans: Bus Topology
6. Expand the following:
2. VOIP — Voice Over Internet Protocol
b.SMTP_ —— Simple Mail Transfer Protocol
7. Who is a hacker?
Ans. A Hacker is a person who breaks into the
network of an organization without any
malicious intent. A hacker accesses the
‘omputer without the intention of destroying data
or maliciously harming the computer.
The following is a 32 bit binary number
Usually represented as 4 — decimal
Values, each representing 8 bits, in the range 0
to 255 (known as octets) separated by
decimal points. 140.179.220.200 What is it?
What is its importance? |
ABS. It is an IP Address. It is used to identity the
puters on a network. .
* Daniel has to share the data among various
“omputers of his two offices branches
situated in the same city. Name the network
(out of LAN, WAN, PAN and MAN) which is
being formed in this process.
Ans, MAN (Metropolitan Area Network)
"©. Give two examples of PAN and LAN type of
Networks,
igher bandwidth, data
ideally suited
hich is specially
Path connecting all
Heston bank ~ Class xi1 (Computer Science)
"Swati Chawla
ae
7
Ans.Examples of LAN ,pe of Network are :
* Small Office or Internet café
Two or more computers connected in few
distances,
Networking in
buildings
Examples of PAN type of Network are :
* Upload the photo from your cell phone to your
desktop computer.
o Home/Offices’School
Watch movies from an online streaming service
to your TV.
Sharing of data via Bluetooth
Creating hotspot.
~ What is protocol? Whi
browse
browsers?
ich protocol helps us to
through web pages using internet
Name any one internet browser.
Ans : Protocol: Protocol is a set of rules that two or
more computers
must follow to communicate
on
network
WWW (World Wide Web) or HTTP (Hyper Text
Transfer Protocol) is used for searching
information from Intemet using Internet
browser,
Examples of Internet Browser
* Mozilla Firefox
* Microsoft Internet Explorer
*© Google Chrome
© Opera
12,
(a) What is the basic difference between
Trojan Horse and Computer Worm?
Trojan Horse Computer Worm
It is a "Malware" It is a self-replicating
computer program computer program
Presented as useful or which uses a network to
hamnless in order to send copies of itself to
induce the user to other computers on the
install and run them. network
and it may do so without
any user interventi
(b) What is worm and how is it removed?
Ans: A worm is a self-replicating computer
program which uses a network to send copies of
itself to other computers on the network and it may
do so without any user intervention
Womms can be removed by installing antivirus.
13. Categories the following under Client side
and Server Side script category?
(i) VB Script -——— Client Side
(ii) ASP —— Server Side
JSP ——— Server Side
(iv) Java Script— Client Sideypes of
14, Differentiate between PAN and LAN types
networks,
Ans: a
——
PAN stands for| LAN stands for Local |
Personal Area Network. | Area Network. , i}
PAN is a computer | LAN interconnects @
high number of nodes
| network organised d
around an individual | within a confines
person. physical area up [©
kilometre.
"Examples of LAN type | Examples of PAN type
of Network are : of Network are
© Small Office or| © Upload the photo |
Internet café | from your cell
© Two or more | phone to your
computers desktop computer.
connected in few
distances. © Sharing of data via
© Networking in Bluetooth.
Home/Offices/Scho | ¢ Creating hotspot.
ol buildings.
15. Which protocol helps us to transfer files to
and from a remote computer?
Ans: FTP or Telnet or TCP
16. Write one advantage of bus topology of
network. Also, illustrate how —four
computers can be connected with each other
using star topology of network?
Ans. Advantage of bus topology: In bus
topology, computers canbe connected with
each other using server (host) along a single
length of cable.
Four computers can be connected with each
other using server in the following way:
5 ,
Comp 1 gil Comes
a. =x
cme hme
17. (a) What is VoIP?
Ans: VoIP (Voice over Internet Protocol) is
simply the transmission of voice traffic over IP-
based networks. VoIP has been around in one form
or another, since 1973 when it began as an
experiment by US
OR
Voice-over-Internet Protocol( VoIP) is a methodology
and group of _ technologies for the delivery of voice
communications and multimedia sessions over
Internet Protocol (IP) networks, such as the Internet
(b) Name the protocol:
Question bank - Class Xil (Computer Science) 98
By Swati Chawla
i. Used to transfer voice using packer tn
“ i
network.
Ans :VOIP
ii, Used for chatting between 2 groups o,
between two individuals.
‘Ans : IRC
18, What is an IP Address?
‘Ans: AnIP address is a unique identifier fy.
or host connection on an IP network 4”
address is a 32 bit binary number Us,
represented as 4 decimal value
representing 8 bits, inthe range 0 to
(known as octets) separated by decima| oi:
This: is known as "dotted deci,
notation.
Example:140.179.220.200
19, What is HTTP?
Ans: HTTP — (Hyper = Text Trang
Protocol): HTTP is used to transfer all fies «
other data (collectively called resources) fy
‘one computer to another on the world wide wei
20. Explain the importance of Cookies,
Ans: — Cookies are files stored temporarily on w
browser's computer, — which allow the
‘www server to store persistent information
associated with browsing user on
user's system.
OR
Cookies are files that store user informatio
that is used to identify the user when he
logs into the system.
+ What is the different between HTT? and
FTP?
Ans: FTP, is a protocol used to upload files from
workstation toa FTP server or downlo
files from a FTP server to a worksatoe
whereas, HTTP, is a protocol used tons
files from a Web server onto a browse i
order to view a Web page that is on te
Internet.
22. Write two advantages of using open sou"
software over proprietary software:
Ans: Open source software is a software, ™™ i
source code is available to customer 3 5
can be modified and can be redistrib’
without any limitations whereas source
is not available in proprietary software. ©
source software are generally free of °°,
One need an authorized license paid i”,
touse this proprietary software while °F
source software can be used by any" ig
are usually free. One can use ths sof #F
their personal use. After giving any "™
a”,
2wa
or code in this Type one cannot change the
code or modify it.
(a) Which of the following crime(s)
* qoes not come under cybercrime?
¢ Copying some important data
from a computer without taking
permission from the owner of the
data.
«Stealing keyboard and mouse from
a shop.
¢ Getting into unknown person's
social networking account and
start messaging on his behalf.
ans: Stealing keyboard and mouse from a shop,
(b) Out of the following which one comes
ander cybercrime?
+ Stealing away a brand new computer from a
showroom.
+ Getting in someone’s social networking
account without his consent and posting
pictures on his behalf to harass him.
« Secretly copying files from server of a call
centre and selling it to the other
organisation.
«© Viewing sites on an internal browser
Ans: getting in someone's social networking
account without his consent and posting pictures on
his behalf to harass him.
(c) Which of the following crimes are covered
under cyber crime?
* Stealing brand new hard disc from a shop.
* Getting into unknown person's social
networking account and start messaging on
his behalf
Copying some important data from a
computer without taking permission from the
owner of the data.
Ans: Getting into unknown person's social
Networking account and start messaging on his
halt
(a)
Which of the following come under cyber
crime?
* Operating someone's internet banking
Account without his knowledge.
Stealing a keyboard from someone's
computer.
Working on someone's computer with his or
her permission. ;
Answer. Operating someone's internet banking
“count without his knowledge
Q ;
by ation bank - Class xi! (Computer Science)
"Swati Chawla
~~
(©) Which of the following will come under
cyber crime?
* Theft of a brand new sealed pack laptop. —
* Access to a bank account for getting
unauthorised money transaction. |
* Modification in a company data with
unauthorised access.
Photo copying a printed copy.
Answer : Access to a bank account for getting
unauthorised money transaction.
24. Give one suitable example of each URL and
Domain Name.
Ans: URL :
http://www.Gabsclasses.cem/aboutus
Domain name: www.Gabs:
25. Name two Proprieta
their ap
Ans: (i) Microsoft Office — Microsoft Office belongs
to Microsoft Corporation. This
software is used for office automation and also can be
used other than office productivity at personal level.
Microsoft. Office contains following —_ other
applications like Microsoft Word, Microsoft Excel,
Microsoft PowerPoint, etc.
(ii) Oracle — Oracle Corporation is the owner of
Oracle software. Oracle is one of most popular
RDBMS software in world.
26. Define the term Bandwidth. Give unit of
Bandwidth.
Ans: Bandwidth is referred as the volume of
.
software along with
information per unit of time that a
transmission medium (like an internet
connection) can handle.
OR
The amount of data that can be transmitted in a fixed
amount of time is known as bandwidth. For digital
devices, the bandwidth is usually expressed in bits per
second (bps) or bytes per second. For analog devices,
the bandwidth is expressed in cycles per second, or
Hertz (Hz).
27. Expand the following terminologies:
a. HTML - Hyper Text Markup Language
b. XML - Extensible Markup Language
e. GNU -GNU's Not UNIX
d. FTP - File Transfer Protocol
¢. FSF- Free Software Foundation
f GSM - Global System for Mobile
Communication
g. WiFi- Wireless Fidelity
h.
CDMA - Code Division Multiple Access
i, HTTP - Hyper Text Transfer Protocoli, ARPANET— Advanced research Project
Agency of Network
MODEM - Modulator Demodulator
WLL - Wireless in Local Loop
TCPAP - Transmission Control Protocol
Internet Protocol
PPP Point to Point Protocol
WWW - World Wide Web
URL - Uniform Resource Locator
GPRS - General Packet Radio Service
VoIP - Voice over Internet Protocol
SMTP - Simple Mail Transfer Protocol
POP - Post Office Protocol
- Telnet - Teletype Network
4G - Fourth Generation
- ASP- Active Server Pages
- ISP- Java Server Pages
VB- Visual Basic
PHP - Personal Home Page
IPR - Intellectual Property Rights
28. (a) Define the term firewall.
Ans: Firewall is a security system that prevents an
unauthorised access to a private network. No
information can leave or enter the private network.
(b) How does firewall protect our network?
Ans: A firewall is a part of a computer system or
network that is designed to block
unauthorised access while permitting authorised
communications. It is a device or set of devices
configured to permit, deny, encrypt, decrypt or proxy
all (in and out) computer traffic between different
security domains based upon a set of rules and other
criteria,
(c) What term we use for a software/hardware
device,which is used to block,
unauthorised access while permitting
authorised communications? This
term is also used for a device or set of
devices configured to permit, deny,
encrypt, decrypt, or proxy all (in and out)
computer traffic between different
security domains based upon a set of rules
and other criteria,
Ans: Firewall
29. What is the importance of URL j
networking?
‘Ans : A Uniform Resource Locator (URL) is used to
specify, where an identified resource is
available in the network and the mechanism
for retrieving il. A URL is also referred
a web address.
30. What was the role of ARPANET in the
Computer Network?
Ber
Baers ceryvnepe?®
toas
Question bank ~ Class il (Computer Science)
100
By Swati Chawla
Ans: In 1969, ARPANET was ser 4
American goverment for defenor ™ t,
ARPANET stands for Advanceg
Projects agency Network. “y
31. Which of the following is not an 4,
transfer rate?
(i) bps (ii) abps (iii) gps
Ans: (ii) abps
32, What is the difference between Trojan y
and Virus in terms of computers? me
‘Ans: A trojan horse isa term used to descrite
malware that appears to the USET, to perf
a desirable function but, in fact, facilitates
unauthorized access, to the User's
computer system.
A computer virus is a self-replicating
computer program. It uses a Network to
send copies of itself to the other nodes
(computers on the network) and it May do 9
without any user intervention,
33. What term we
Nit for ty
(iv) kbps
use for
a
software/hardware device, which is used to
block,
unauthorized
authorized
communications. This term is also used
for a device or set of devices configured
deny, encrypt, decrypt, or proy
all (in and out) computer traffic between
different security domains based upon +
set of rules and other criteria.
Ans: Firewall
34. What is the difference between Virus and
Worms in the computers?
VIRUS directly effects the system by
Corrupting the useful data. A computer
virus attaches itself to a program or file
enabling it to spread from one computer
to another.
‘A WORM is similar to a virus by design s
considered to be subclass. ofa vinvs
Worm spread from computer to computer
but unlike a virus, it has the capability ®
travel without any human action.
35. What is difference between Star Top?!
access — while
Ans:
and Bus Topology of network?
Ans,
Bus Topology Star Topology
() | Bus Sur Toe
Topology is is non ~ lin
(ii) (i)
computers36. What is protocol? Which Protocol
to search information
using an internet browser?
ans: Protocol: Protocol is a set of rule.
: more computers
Used
from internet
S that two or
mpl MUSt follow tg
communicate on netw
WWW (World Wide Web) or HTTP (th nm
Text Transfer Protocol) js ee
used for Searchi
information from Intern ne
let using Internet
browser.
37, Name two switching techniques used to
transfer data between two
terminals(computers),
Ans: Switching techniques used to transfer data
between two terminals are:
© Circuit switching
* Packet switching
38. What is the difference between LAN and
WAN?
Ans: The network which connect:
countries network is known as W AN. It
can be a group of LANs. The largest existing
WAN is Interet. LAN is a group of
computers and network devices connected
together, usually within the same building
whereas WAN is not Testricted to
geographical location, although it might be
confined within the bounds of state or
is the different
Protocol? Which protocol is used
tocopyafile from/to a remotely located
server?
Ans: Protocol: Protocol is a set of rules that two or
more computers must follow to
communicate on network.
FTP is used to copy a file from/to a remotely
located server.
40. What is a Hub?
Ans: A hub is a hardware device used to connect
Several computers together.
41. How is Coaxial cable different from
Optical Fibre? ;
Ans: The data transmission characteristics of co-
axial cable are considerably better than
twisted pair but not better in relation to
optical fibre. The co-axial eave
being used as a shared cable network, wit
Part of the bandwidth being used for sts
traffic. Optical fibre is difficult to i
because they are fragile and Ee
special care to install. One ce in
Major advantage of optical fibre over oe on
Cable is its complete immunity to :
RUestion bank - 101
8y Swati ch
~~
Class XII (Computer Science)
lawl
45.
46.
. How
because the information is travelled on a
modulated light beam,
- What is a Modem?
Function of modem is to convert analog
Signals into digital signals. Modem
also converts digital signal into analog signal
Itis also. used to connect Internet.
is a Hacker different from a
Cracker?
Hackers are the ones who get into someone's
code or computer without any
malicious intentions, where as Crackers are
the one’s who get into someone’s code
or computer with malicious intentions.
OR
Hackers These are the persons who get
unauthorised access to the websites and
replace them with other websites or unlawful
information.
Crackers The person who uses certain
software to trap authenticated information or
to crack the security codes such as
uuser names and password to illegally
access the information of computers is called
a cracker.
Which of the following unit measures the
speed with which data’ can
transmitted from one node to
node of a network? Also, give the
expansion of the suggested unit.
i) Mbps ii) KMps iii) MGps
(Megabytes per second)
Suggest network —type(out- of
LAN,MAN,WAN) for connecting each of
the following set of their offices: Back
Office and Work Office Back Office
and south Office
Back Office and Work Office - LAN
Back Office and South Office - WAN
Which device you will suggest to be
Produced by the company for
connecting all the computers with in each
of their offices out of the following
devices?
Switeh/Hub
Modem
Telephone
Switch / Hub
. Which of the following communication
medium, you will suggest. to be
produced by the company for connectingNew Delhi for very
their offices in >
effective and fast communication
Telephone Cable Optical Fil
Ethernet Cable
Ans: Optical Fibre
48. Which of the following unit measures a
speed with which data can
transmitted from one node to another
node ofa network? Also, give the
expansion of the suggested unit Im
i) KMpsii) Mbps —_iii) MGps
Ans) (ii) Mbps Mega bits per second
49. Differentiate between Internet
Intranet. |
Internet is a vast intemational network that is
the most preferred WAN across the
globe by joining computer networks together
with telephone lines to form a backbone.
Intranet is a network that exists exclusively
within an organisation and that is based on
Internet technology.
50. (a) Name two transmission media for
networking.
Optical Fibre and Satellite
(b) Name any two
required for networking.
Ans: — Switch/Hub and Repeaters.
and
Ans:
Ans:
components
51. What is the difference between Message
and
Switching technique
Switching technique?
Packet
Ans.
Message Switching
In message
switching, there is
no upper limit.
|There is a tight
upper limit on the
| block size. A fixed
size of packet is
specified.
Alll the packets are
In Message
Switching, packets | stored in main
are stored on disk. | memory in
This increases the | switching office,
performance as |
access time is
reduced.
52. What do you understand
Cookies and Firewall?
Ans: Cookies: Cookies are the bits of data put on a
hard disk when some on visit certain we
sites. The cookies on the hard disk have the
username and password init, so people don't
have to log in.
| by the terms
Firewall: It isthe system to prevent
unauthorized access to / form @ network.
Question bank ~ Class XII (Computer Science)
By Swati Chawla
102
(a) Write two advantages
53. dvantages for STAR topolo a by
Ans: Advantage = Easy to replace;
remove hosts or other devices,
Disadvantage : If the central system
corrupted , whole network stops.
Hac, insay
o
Bl og,
(b) Differentiate between Bus
Bus Topology
(i) | Bus
Topology is |
Linear.
(ii) | No Switch is \s S used
[= to connec, the
_t omputers,
5:
2
|. What is the purpose of using a repeat, in
the context of networking?
Repeaters are networking devices, tha
receive a signal and retransmit it aa
higher level so that the signal covers longer
distance. It’s required if the distance
between source and destination is 70 to 199
m or more.
If someone has hacked your Website,
whom you lodge the Complaint?
Ans: The complaint has to be lodged with the police
under IT Act.
OR
We can report to Cyber cell also.
56. What do you mean by IP Address? Howis
it useful in Computer Security?
Ans: An Inteet Protocol (IP) address is a numerical
identification and logical address that
is assigned to devices connected in a
computer network.
An IP address is used to uniquely identify
devices on the internet. and so one ca
Quickly know the location of the system inthe
network,
- What do you mean by Spam Mails? How
can you protect your mailbox from Spa™
Spam mails, also known as junk e-mail, is?
subset of spam that involves
identical messages sent to numerous
recipients by e-mail. ty
We can protect our mailbox from spams °)
creating appropriate filters. ML
When do you prefer XML over H
and why? 5
The first benefit of XML is that because)”
are writing your own markup _languae
You are not restricted to a limited set of HE
defined by proprietary Yen,
Rather than waiting for standards bod
55.
58.
Ans:adopt tag set enhancements (a
can take quite some time),
companies to adopt each other's standard:
(yeah right!) with XML, you can create sno
‘own set of tags at your own pace °
59, Which type of network (out of LAN, PAN
and MAN )is formed, when you connect
mobiles
Process which
or for browser
ay using Bluetooth to
transfer a picture file?
‘Ans: When two mobiles are connected using
Bluetooth to transfer a picture files
PAN(Personal Area Network) is created,
60. (a) Write one advantage of bus topology of
network. Also, illustrate fa
how four
computers can be connected with each
other using star topology of
network?
Ans: Advantage of bus topology
In bus topology, computers can be connected
with each other using server (host) along a
single length of cable.
one:
(b) ference between star topology
and bus topology of network?
Ans: In star topology, nodes are connected to server
individually whereas in bus topology all
nodes are connected to server along a single
length of cable.
Node 1
Node 2 a
. :
4
“ Node 1 Node 3
Node 3
Star topology Bus toplogy
61,
What is the advantage of using SWITCH over
HUB?
Ans: Switch provides a dedicated line at full
bandwidth between two devices but hub
doesn’t provide a dedicated line. Hub share the
6, bandwidth
© Write any two characteristics of Wifi
Ns: 1. Itis a wireless solution for getting connected
phe Intemea.
“is handy as well as available throughout the
Joumey
‘. (@) Whats the difference between E-Mail and
Chat?
Ques
By go" Bank ~ Class xu (Computer Science)
la
*Wati haw
a
103
Ans: In order to chat, you need to have an account
onthe same Services as the person you
are chatting with. On the other hand, in case
of E-Mail, it is not necessary, ie. you can
have an account from any provider and you
can establish your own.
(b) What is the difference
conferencing and chat?
Ans: Chat generally involves to one
communication on the other hand_-video
conferencing means more than two persons
are involved in a discussion.
What is the difference between domain
name and IP address?
IP address is an identifier for a computer or a
device ona TCP/IP network. Example:
1.160.10.240 could be an IP address where as
a domain name is a name that
identifies one or more IP addresses.
Example the domainname
microsoft.com represents about a dozen IP
addresses,
between video
‘one
2
R
'. Out of the following which is the fastest
wired and wireless medium of
communication:
Infrared, coaxial cable, ethernet cable,
microwave, optical fibre
Ans: Wired: Optical fibre
Wireless — infrared
66. What out of the following you will use to
have an audio visual chat with an expert
ing in a far away place to fix up
technical issue :
EMAIL , VoIP,
FTP.
Ans: VoIP
67. Differentiate between bus and_ star
topology of network.
Ans: In Star topology, nodes are connected to
server individually where as, in bus
topology, all the nodes are connected along a
single length of cable
68. Differentiate between HTML and XML.
—
stands for | XML __ stands
HTML for |
Hyper text Transfer | eXtensible Markup |
Protocol. | Language.
A standard mark up
—___|
‘A markup language |
language for creating
that specifies a set of
web pages and web | rules for encoding
applications. documents in a
| format that_is both |[Ti a ate
readable.
| —
Case Insensitive. | Case Sensitive
Ml has | Programmers defin
| HTML y .
| predefined tags. __| their own tas
Some tags don’t | It is ‘mandatory ae
| require a closing tag. close each tag that
been used. ___——
[Focuses on | Focuses on carrying
| displaying data. __ information. ——__—
| Helps to develop the | Helps to exchange
structure of web | data between
pages. different platforms. _|
69. Distinguish between website and web
browser.
‘Ans: Website is a collection of related web pages
served from a single web domain, while
web browser is a software that is used to
accept and display the web pages.
70. How is it easier to diagnose fault in Star
topology than in Bus topology?
‘Ans :In Star topology each node is directly connected
to a central hub / switch, hence fault diagnosis
becomes easy. In bus topology all the nodes are
connected to the backbone cable. The signal travels
through the entire length of the backbone and is
received by the node for which it is intended. Hence,
fault diagnosis is difficult.
Case Study Based Questions
TIPS TO SOLVE QUESTIONS BASED ON
CASE STUDY (5 MARKS)
2. Name the most suitable wing where the
server should be installed. Justify.
Server is to be placed in the building/wing, where
number of computers are maximum.
3. Draw the cable layout.
(a) use star topology
OR
(b) Use the 80-20 rule (connect the
buildings having shortest distance. For N
buildings, n-1 wires are required. No
loops
4. Suggest the placement of networking devices.
(a) Hub/Switch : In all building’ office’ wing to
connect all the computers.
(b) Repeaters: In between the building/office/wing
where distance is more than 70 0100 meter to
regenerate the signals.
(c) Modem (Internet Connecting device) : Should be
installed at wing/building/office that have
Question bank - Class Xil (Computer Science)
By Swati Chawla
maximum number of computers (OF Where sen
is installed). i : e
oe eof software)
Firewall (Hardwar 2 ety
(d) security device 0 prevent unauthorized acces
for from the network. ; tg
5, Which communication medium OF Inter
> connecting Technology is used for connect
%
offices:
Internet Connecting Technology
Compromise with
Speed
Not with Cost
‘Compromise with
Cost
Not with speed
Cable connection
possible
(Dial-up connection)
Cable connection
possible
{Optical Fibre)
Cable connection
Cable connection not
not possible
possible
(Hilly area, Long. (Hilly area, Long
distance etc.) distance etc.)
Satellite Radiowave
communication)
Communication
In case of wireless connection take care of the
following points:
(a) If compromise on speed but not on cost,
then broadband connection will be
suitable.
(b) Moderate Economical wireless
connection is Radio wave / Microwave.
If area is hilly, then radio wave is
preferred.
(c) The best wireless medium is Satelite
(d) The best wired medium for high speed
connectivity is Optical Fiber.
Question 1:
Intelligent Hub India is a knowledge community
aimed to uplift the standard of skills and knowleds®
in the society. It is planning to setup its training
centres in multiple towns and villages pan India with
its head offices in the nearest cities. They have
created a model of their network with a city, 210"
and 3 villages as given.
As a network consultant, you have to suggest the
best network related solution for thelr
issues/problems raised in (i) to (iv) keeping in mind
104
ed