Beruflich Dokumente
Kultur Dokumente
Wireless Media
Radio Waves, Bluetooth LOS (Line of sight) is not required and is omni-directonal
Microwave, Infrared (used in remote controls), Satellite LOS is required and is uni-
directional.
Network Devices
1. An NIC (Network Interface Card) is a device that enables a computer to connect to a
network and communicate.
2. A Hub is an electronic device that connects several nodes to form a network and
redirects the received information to all the connected nodes in broadcast mode.
3. A Switch is an intelligent device that connects several nodes to form a network and
redirects the received information only to the intended node(s).
4. A Repeater is a device that is used to regenerate a signal which is on its way
through a communication channel. A repeater regenerates the received signal and
re-transmits it to its destination.
5. A Gateway is a device, which is used to connect different types of networks and
perform the necessary translation so that the connected networks can communicate
properly.
Network Topologies
A Topology is an arrangement of physical connections among nodes in a network.
1. Bus Topology In bus topology all the nodes are connected to a main cable called
backbone. If any node has to send some information to any other node, it sends the
signal to the backbone. The signal travels through the entire length of the backbone
and is received by the node for which it is intended.
2. Star Topology In star topology each node is directly connected to a hub/switch.
3. Tree Topology Tree topology is a combination of bus and star topologies. It is
used to combine multiple star topology networks.
Page 1 of 11
Network Protocols
A network protocol is a set of rules for communication among networked devices.
Protocols generally includes rules of how and when a device can send or receive the
data, how is the sent data packaged, and how it reaches its destination.
1. HTTP (Hyper Text Transfer Protocol) HTTP is used to transfer all files and other
data (collectively called resources) from one computer to another on the world wide
web.
2. TCP/IP (Transmission Control Protocol / Internet Protocol) It is the basic
protocol of the Internet. Communication between two computers on internet is done
using TCP/IP protocol. TCP/IP can also be used as a communications protocol in a
private network. TCP/IP is a two-layer protocol.
3. PPP (Point to Point Protocol) It is a protocol for direct communication between
two computers, typically a personal computer connected by phone line to a server.
Most Internet service providers (ISPs) use PPP for customer dial-up access to the
Internet.
Types of Networks
1. PAN - Personal Area Network
2. LAN - Local Area Network
3. MAN - Metropolitan Area Network
4. WAN -Wide Area Network
Network Threats
1. Denial of service attacks A Denial of Service (DoS) attack is an attempt to make
one or more network resources unavailable to their legitimate users.
2. Intrusion Problems An Intrusion problem is an attempt to mischievously steal
some information from someone's computer. Examples of Intrusion are:
a. Snooping refers to gaining unauthorised access to another person's or
organization's data.
b. Eavesdropping refers to gaining unauthorised access to another person's or
organization's data while the data is on its way on the network
Network Security
1. Assign login names and strong passwords to the users of a system.
2. Firewall A firewall is a hardware device or a software that is installed to monitor
the data entering the computer/Network or leaving it. A firewall permits only that
data to enter or leave a computer/Network for which permissions have been granted
by the computer/network administrator.
Page 2 of 11
3. install Antivirus softwares
4. Give appropriate file permission.
NRCFOSS
National Resource Centre for Free and Open Source Software (NRCFOSS) is an initiative of
the Department of Information Technology, Ministry of Communications & Information
Technology, Government of India. NRCFOSS contributes to the growth of FOSS in India.
Examples of Open Source Softwares:
1. GNU/Linux: The GNU Project was launched in 1983 by Richard Stallman of
Free Software Foundation (FSF) to develop a complete Unix-like operating
system which is free software: the GNU operating system.
2. Firefox: Firefox is a free and open source web browser produced by
Mozilla Foundation. Firefox runs on various versions of GNU/Linux, Mac OS
X, Microsoft Windows and many other Unix-like operating systems.
3. Open Office: Open Office is the leading open source office suite for word
processing, spreadsheets, presentations, databases etc. It is available in
many languages. It stores files in open document format (ODF) for data
interchange that is its default file format.
4. NetBeans: NetBeans refers to both a platform framework for Java desktop
applications, and an IDE for developing applications with Java, JavaScript,
PHP, Python, Ruby, C, C++, and others.
5. BOSS( Bharat Operating Systems Solutions): BOSS is a free Indian
Operating System based on GNU/LINUX developed by C-DAC(Center for
Development of Advance Computing).
Page 3 of 11
bit form (UTF-32), a 16-bit form (UTF-16), and an 8 bit form (UTF-8).
Advantages of Unicode:
1. With the usage of Unicode, single versions of software were developed
instead of language-specific versions that reduced the complexity.
2. UNICODE is supported by most OS and application vendors. This ensures
platform, vendor and application independence.
3. Incorporating Unicode into applications and websites offers significant
cost savings than proprietary solutions.
4. It allows data to be transported through several different systems
without distortion.
Page 4 of 11
Networking and OSS Questions
1. Tara Nathani wants to upload and download files from/to a remote internet server, write the
name of the relevant communication protocol, which will let her do the same.
Ans. FTP ( File Transfer Protocol)
2. Two doctors in the same room have connected their Palm Tops using Bluetooth for working on a
Group presentation. Out of the following, what kind of Network they have formed? LAN, MAN,
PAN, WAN Ans. PAN (Personal Area Network)
3. Arrange the following communication channels in ascending order of their data transmission
rates. Ethernet Cable, Optical Fiber, Telephone Cable, Co-axial Cable
Ans. Telephone Cable Ethernet Cable Co-axial Cable Optical Fiber
4. Which of the following is not a characteristic of Open Source Software?
• Its source code is available for modification
• It is owned by a company or an individual
• It can be downloaded from internet
Ans. It is owned by a company or an individual, as open source software is not owned by any
company.
5. Jai Khanna is confused between the terms Domain Name and URL. Explain the difference with
the help of appropriate examples of each.
Ans.
URL Domain Name
URL is a uniform resource locator, which is a Domain name is a name assigned to server in
complete path to a resource over internet. DNS.
URL has 4 parts: Domain name has usually different parts eg.
Protocol, domain name, path, resource name top level domain name or primary domain
name and sub-domain name(s)
Example: Example:
http://www.cbse.nic.in/sp/ip.pdf www.cbse.nic.in
Here http is a protocol, www.cbse.nic.in is facebook.com
domain name, sp is the path and ip.pdf is google.com
resource name
6. Define any two threats to Network Security.
Ans.
1. Denial of service attacks A Denial of Service (DoS) attack is an attempt to make one
or more network resources unavailable to their legitimate users.
2. Intrusion Problems An Intrusion problem is an attempt to mischievously steal some
information from someone's computer. Examples of Intrusion are:
c. Snooping refers to gaining unauthorised access to another person's or
organization's data.
d. Eavesdropping refers to gaining unauthorised access to another person's or
organization's data while the data is on its way on the network
7. Differentiate between Star and Bus Topology of networks.
Ans.
STAR TOPOLOGY BUS TOPOLOGY
In a star topology, all the nodes in a network In bus topology all the nodes are connected
are connected using a hub or a switch. using a single wire known as bus.
It is costlier than the bus topology as we It is cheaper as compared to star topology.
require more wire.
It is easier to diagnose problem in star It is difficult to diagnose problem in bus
topology. topology.
8. Which protocol is used for the transfer of hyper text documents on the internet? Ans. HTTP
9. Which transmission medium should be used to transfer data across two continents at very high
speed. Ans. Satellite (Wireless) or Fiber Optic (Wired)
10. Two neighbourhood schools, at a distance of 120 metres from each other, decide to join their
LANs using UTP cable so that they can share their e-learning resources. But after joining their
LANs they are not able to share the resources due to loss of signal in between. Which device
should they use so that signal is amplified in-between? Ans. Repeater
Page 5 of 11
11. Which of the following software’s are Open Source:
Linux, MS Windows 7, Photoshop, MySql. Ans. Linux, MySQL
12. Distinguish between Open Source software and Proprietary software with reference to
customizability of the software.
Ans.
Open Source Software Proprietary Software
Open softwares are available with the source Proprietary softwares are not available with
code. the source code.
Open Source softwares can be modified but Proprietary softwares can only be modified
only when we know the language. by the owner.
13. Name any four Indian scripts included in Unicode.
Ans. Assamese, Bengali, Devanagari, Gujarat, Gurmukhi, Kannada, Malayalam, Oriya, Tamil
and Telugu
14. Sujata says that the following numbers indicate an address: 208.77.188.166
What is the above address called? To which object/device is it assigned?
Ans. It is an IP address and it is assigned to NIC in a node. It can be changed.
15. Mr. Kant Sengupta wants to prevent unauthorized access .to/from his company,'s local. area
network. Write the name of a system (software/hardware), which he should install to do the
same. Ans. Firewall
16. Beauty Lines Fashion Inc. is a fashion company with design unit and market unit 135 meters
away from each other. The company recently connected their LANs using Ethernet cable to
share the stock related information. But, after joining their LANs, they are not able to share
the information due to loss of signal in between. Which device out of the following should you
suggest to be installed for a smooth communication?
(i) UPS (ii) Modem (iii) Repeater Ans. (iii) Repeater
17. Which of the following is not a feature of Networking?
(i) Resource sharing (ii) Uninterrupted power supply (iii) Reduced cost (iv) Reliability
Ans. (ii) Uninterrupted power supply
18. Name any two Indian scripts included in Unicode.
Ans. Assamese, Bengali, Devanagari, Gujarat, Gurmukhi, Kannada, Malayalam, Oriya, Tamil and
Telugu
19. Mr. Jayanto Das is confused between Shareware and Open source software. Mention at least
two points of differences to help her understand the same.
Ans.
Shareware Open Source Software
Shareware are proprietary software available Open source softwares are free softwares
free of cost for a limited time. which are available for unlimited time.
They are not available along with source They are available along with the source
code. code.
Example: Kaspersky antivirus (trial version) Example: Mysql, Netbeans
20. Identify the type of Topology from the following:
(i) If each node is connected with the help of independent cable with the help of a central
switching (communication controller)
(ii) If each node is connected with the help of a single co-axial cable.
Ans. (i) Star topology (ii) Bus topology.
21. Define the following with reference to Threats to Network Security.
(i) Trojan Horse (ii) Worm
Ans.
(i) Trojan horses are designed to allow a hacker to target a remote computer system. Once
a Trojan horse has been installed on a target computer system, it is possible for a hacker
to access it remotely and perform various operations and it may do so without any user
intervention at the remote end.
(ii) Worms: It is a program made to replicate automatically. A worm replicates continuously
until the entire hard disk space and memory are eaten up and it may do so without any
user intervention. This kind of self replicating programs spread over the entire hard disk
and memory consequently and slow down the system.
22. Raj Kamal International School is planning to connect all computers, each spread over distance
within 45 meters. Suggest an economical cable type having high-speed data transfer, which can
Page 6 of 11
be used to connect these computers. Ans. Ethernet cable
23. Write examples of one Proprietary and one Open Source Software.
Ans.
Open Source Software Proprietary Software
Example: MySQL, Netbeans Example: MS Windows, MS Office
24. Name any two most popularly used internet browsers. Ans. Google Chrome, Mozilla firefox
25. Ms. Rani Sen, General Manager of Global Nations Corporate recently discovered that the
communication between her company's accounts office and HR office is extremely slow and
signals drop quite frequently. These offices are 125 metres away from each other and
connected by an ethernet cable.
(i) Suggest her a device, which can be installed in between the offices for smooth
communication.
(ii) What type of network is formed by having this kind of connectivity out of LAN, MAN and
WAN? Ans. (i) Repeater (ii) LAN
26. Give an advantage of using Star topology over Bus topology. Show a network layout of Star
topology to connect 5 computers.
Ans. Advantages of Star topology over bus topology:-
1. Fault diagnosis is easy to find in star topology.
2. It is easier to connect nodes in star topology.
Node-1 Node-2 Node-3 Node-4 Node-5
Switch/Hub
Page 10 of 11
computer continue to work in a network.
(ii) The complete network fails, when the hub or a switch fails.
76. Write the purpose of http.
Ans. It is Hyper Text Transfer Protocol to transfer files / images over the internet.
77. How does Open source software emphasize collaboration and sharing ?
Ans. Open source software’s are available with the source code so anybody can make the
updation in the software and submit it to the open source community. So open source software
comes with the up-gradation quickly. Open source softwares can be easily shared as it comes
with GNU General Public License, so there is no limitation of copyright.
78. Mr. Ravi, an IT Help Desk executive needs to remotely login a customer’s PC to provide him
technical support. Suggest a remote access software to him.
Ans. Teamviewer, VNC, Microsoft Remote Desktop software
79. Discuss the significance of Bluetooth technology.
Ans. 1) It is limited to 10m 2) Line of sight is not required and it is omni directional
80. I. Write down any two advantages of Open Source Software over Proprietary
software.
II. Ms. Sita trying to log into your Internet Banking account for online transaction
activity. However, as strange as it may seem, she is denied of an access to the bank’s
website, in spite of having a swift internet connection.
What do you think the reason behind this problem is and suggest her few simple precautions in
order to overcome any such type of network security threats.
Ans. II. It is a denial of service attack and she should use i. firewall software ii. Install antivirus
Page 11 of 11