Sie sind auf Seite 1von 11

Networking & OSS

A computer network is a collection of interconnected computers and other devices which


are able to communicate with each other and share hardware and software resources.

advantages of networked computers:-


 Resource Sharing
 Cost saving
 Collaborative user interaction
 Time saving
 Increased storage

A transmission medium is a medium of data transfer over a network. It can be wired


or wireless.
Wired Media  A number of various types of cables are used to transfer data over
computer networks. These are Twisted Pair Cable, Co-axial Cable, and Optical Fiber Cable.
1. Twisted Pair Cable  This is probably the most widely used cable for creating small
computer networks. It contains four twisted pairs covered in an outer shield. It is of
two types UTP (Unshielded Twisted Pair), STP (Shielded Twisted Pair). It is the
cheapest cable available. They can transmit data at a length of 100 m.
2. Co-axial cable (or coax)  coaxial cable consists of two conductors that share a
common axis. The inner conductor is a straight wire and the outer conductor is a
shield that might be braided or a foil. It is costlier than twisted pair but cheaper
than optic fiber. They can transmit data at a length of 185 – 500 m.
3. Optical Fiber cable  Optical Fibers are long, thin strands of glass about the
thickness of a human hair. They are arranged in bundles called optical fiber cables
and used to transmit data through light signals over long distances. It is the costliest
cable and have no limitation over the range.

Wireless Media
Radio Waves, Bluetooth  LOS (Line of sight) is not required and is omni-directonal
Microwave, Infrared (used in remote controls), Satellite  LOS is required and is uni-
directional.

Network Devices
1. An NIC (Network Interface Card) is a device that enables a computer to connect to a
network and communicate.
2. A Hub is an electronic device that connects several nodes to form a network and
redirects the received information to all the connected nodes in broadcast mode.
3. A Switch is an intelligent device that connects several nodes to form a network and
redirects the received information only to the intended node(s).
4. A Repeater is a device that is used to regenerate a signal which is on its way
through a communication channel. A repeater regenerates the received signal and
re-transmits it to its destination.
5. A Gateway is a device, which is used to connect different types of networks and
perform the necessary translation so that the connected networks can communicate
properly.

Network Topologies
A Topology is an arrangement of physical connections among nodes in a network.
1. Bus Topology  In bus topology all the nodes are connected to a main cable called
backbone. If any node has to send some information to any other node, it sends the
signal to the backbone. The signal travels through the entire length of the backbone
and is received by the node for which it is intended.
2. Star Topology  In star topology each node is directly connected to a hub/switch.
3. Tree Topology  Tree topology is a combination of bus and star topologies. It is
used to combine multiple star topology networks.

Page 1 of 11
Network Protocols
A network protocol is a set of rules for communication among networked devices.
Protocols generally includes rules of how and when a device can send or receive the
data, how is the sent data packaged, and how it reaches its destination.
1. HTTP (Hyper Text Transfer Protocol)  HTTP is used to transfer all files and other
data (collectively called resources) from one computer to another on the world wide
web.
2. TCP/IP (Transmission Control Protocol / Internet Protocol)  It is the basic
protocol of the Internet. Communication between two computers on internet is done
using TCP/IP protocol. TCP/IP can also be used as a communications protocol in a
private network. TCP/IP is a two-layer protocol.
3. PPP (Point to Point Protocol)  It is a protocol for direct communication between
two computers, typically a personal computer connected by phone line to a server.
Most Internet service providers (ISPs) use PPP for customer dial-up access to the
Internet.

Types of Networks
1. PAN - Personal Area Network
2. LAN - Local Area Network
3. MAN - Metropolitan Area Network
4. WAN -Wide Area Network

Identification of computers and users over a network


1. MAC (Media Access Control) address A MAC (Media Access Control) address is a
unique 12 digit (6 digits for manufacturer code and 6 digits for serial number)
hexadecimal number assigned to each NIC. MAC address of an NIC never changes. By
convention, MAC addresses are usually written in one of the following two formats:
MM:MM:MM:SS:SS:SS
MM-MM-MM-SS-SS-SS
The first half (MM:MM:MM) of a MAC address contains the ID number of the adapter
manufacturer. The second half (SS:SS:SS) of a MAC address represents the serial
number assigned to the adapter (NIC) by its manufacturer.
2. IP Address  An IP (Internet Protocol) address is a unique 4 digit hexadecimal
number assigned to each node on a network. IP address settings of a node can be
changed by the user. A typical IP address looks like this:
59.177.134.72
3. Domain Name  In context of internet, a Domain Name is a name assigned to a
server through Domain Name System (DNS). A domain name usually has more than
one parts: top level domain name or primary domain name and sub-domain
name(s).
Domain Name Resolution is the process of getting corresponding IP address from a
domain name.

Network Threats
1. Denial of service attacks  A Denial of Service (DoS) attack is an attempt to make
one or more network resources unavailable to their legitimate users.
2. Intrusion Problems  An Intrusion problem is an attempt to mischievously steal
some information from someone's computer. Examples of Intrusion are:
a. Snooping refers to gaining unauthorised access to another person's or
organization's data.
b. Eavesdropping refers to gaining unauthorised access to another person's or
organization's data while the data is on its way on the network
Network Security
1. Assign login names and strong passwords to the users of a system.
2. Firewall  A firewall is a hardware device or a software that is installed to monitor
the data entering the computer/Network or leaving it. A firewall permits only that
data to enter or leave a computer/Network for which permissions have been granted
by the computer/network administrator.
Page 2 of 11
3. install Antivirus softwares
4. Give appropriate file permission.

Open Source Software (OSS):


Freedom 0: The freedom to run the program for any purpose.
Freedom 1: The freedom to study how the program works, and change it to make it do what
you wish.
Freedom 2: The freedom to redistribute copies so as to help your neighbour.
Freedom 3: The freedom to improve the program, and release your improvements (and
modified versions in general) to the public, so that the whole community benefits.

NRCFOSS
National Resource Centre for Free and Open Source Software (NRCFOSS) is an initiative of
the Department of Information Technology, Ministry of Communications & Information
Technology, Government of India. NRCFOSS contributes to the growth of FOSS in India.
Examples of Open Source Softwares:
1. GNU/Linux: The GNU Project was launched in 1983 by Richard Stallman of
Free Software Foundation (FSF) to develop a complete Unix-like operating
system which is free software: the GNU operating system.
2. Firefox: Firefox is a free and open source web browser produced by
Mozilla Foundation. Firefox runs on various versions of GNU/Linux, Mac OS
X, Microsoft Windows and many other Unix-like operating systems.
3. Open Office: Open Office is the leading open source office suite for word
processing, spreadsheets, presentations, databases etc. It is available in
many languages. It stores files in open document format (ODF) for data
interchange that is its default file format.
4. NetBeans: NetBeans refers to both a platform framework for Java desktop
applications, and an IDE for developing applications with Java, JavaScript,
PHP, Python, Ruby, C, C++, and others.
5. BOSS( Bharat Operating Systems Solutions): BOSS is a free Indian
Operating System based on GNU/LINUX developed by C-DAC(Center for
Development of Advance Computing).

Common open standards


1. Open Document Format  The Open Document format (ODF) is a format for office
documents, such as spreadsheets, databases, presentations and word-processing
documents. Open Document is a free and open format. Open Document's main file
extensions are .odt (for text documents), .ods (for spreadsheets), and .odp (for
presentations).
2. Ogg Vobris  Ogg Vorbis is a new audio compression format developed by Xiph.org.
3. Character Encoding  A character encoding system consists of a code that
associates each character from a given system with something else, such as a
sequence of natural numbers, binary numbers or electrical pulses, in order to
facilitate the transmission of data
a. BCD: BCD is a 4 bit encoding system. BCD code is not sufficient enough to
accommodate even all the characters of English alphabet and digits.
b. ASCII code (American 7 Standard Code for Information Interchange). It is a 7
bit code that can store 2 = 128 characters. Later ASCII was 8 bit. It allowed
computer developers lot of empty spaces which was used for different
purposes
c. ISCII Code (Indian Script Code for Information Interchange) It is a 8 bit
character encoding system which stores all ASCII characters as well as 10
Indian scripts (Assamese, Bengali, Devanagari, Gujarat, Gurmukhi, Kannada,
Malayalam, Oriya, Tamil and Telugu)
d. UNICODE  Unicode was developed with the aim to conceive a single
standard code which could manage to represent all languages of the world.
Unicode characters are represented in one of the three encoding forms: a 32-

Page 3 of 11
bit form (UTF-32), a 16-bit form (UTF-16), and an 8 bit form (UTF-8).
Advantages of Unicode:
1. With the usage of Unicode, single versions of software were developed
instead of language-specific versions that reduced the complexity.
2. UNICODE is supported by most OS and application vendors. This ensures
platform, vendor and application independence.
3. Incorporating Unicode into applications and websites offers significant
cost savings than proprietary solutions.
4. It allows data to be transported through several different systems
without distortion.

Different Types of Fonts


1. Post Script: This font format was developed by Adobe in 1980's. This font consists of
two parts which are both necessary for the font to be properly printed and displayed
on screen.
2. True Type: This format was jointly developed by Apple and Microsoft in the late 80s.
These fonts contain both the screen and printer font data in a single component,
making the fonts easier to install.
3. Open Type: This is the latest font format which is a joint effort by Apple and
Microsoft. Like True Type fonts, this contains both the screen and printer font data
in a single component. However, open type fonts support multiple platforms and
expanded character sets. Additionally, open type format allows the storage of upto
65,000 characters.
Static and Dynamic fonts
1. Static fonts: In these types of fonts the characters are designed and digitized and
then stored in font files. Every time printing takes place, same character will appear
with same shape e.g. Times New Roman, Arial etc.
2. Dynamic fonts: Dynamic font is a web browser technology used when visiting any
website that uses fonts which are not installed on client's machine.

Entering Indian language text


1. Phonetic Text Entry (Transliteration)  In this type of text entry, traditional
keyboards with English keys are used. But while typing, the Indian alphabets are
written phonetically (i.e., the way they sound as per the pronunciation)
2. Keymap based Text Entry  In this method the keyboard keys are mapped to
specific characters using a keymap.

Page 4 of 11
Networking and OSS Questions

1. Tara Nathani wants to upload and download files from/to a remote internet server, write the
name of the relevant communication protocol, which will let her do the same.
Ans. FTP ( File Transfer Protocol)
2. Two doctors in the same room have connected their Palm Tops using Bluetooth for working on a
Group presentation. Out of the following, what kind of Network they have formed? LAN, MAN,
PAN, WAN Ans. PAN (Personal Area Network)
3. Arrange the following communication channels in ascending order of their data transmission
rates. Ethernet Cable, Optical Fiber, Telephone Cable, Co-axial Cable
Ans. Telephone Cable  Ethernet Cable  Co-axial Cable  Optical Fiber
4. Which of the following is not a characteristic of Open Source Software?
• Its source code is available for modification
• It is owned by a company or an individual
• It can be downloaded from internet
Ans. It is owned by a company or an individual, as open source software is not owned by any
company.
5. Jai Khanna is confused between the terms Domain Name and URL. Explain the difference with
the help of appropriate examples of each.
Ans.
URL Domain Name
URL is a uniform resource locator, which is a Domain name is a name assigned to server in
complete path to a resource over internet. DNS.
URL has 4 parts: Domain name has usually different parts eg.
Protocol, domain name, path, resource name top level domain name or primary domain
name and sub-domain name(s)
Example: Example:
http://www.cbse.nic.in/sp/ip.pdf www.cbse.nic.in
Here http is a protocol, www.cbse.nic.in is facebook.com
domain name, sp is the path and ip.pdf is google.com
resource name
6. Define any two threats to Network Security.
Ans.
1. Denial of service attacks  A Denial of Service (DoS) attack is an attempt to make one
or more network resources unavailable to their legitimate users.
2. Intrusion Problems  An Intrusion problem is an attempt to mischievously steal some
information from someone's computer. Examples of Intrusion are:
c. Snooping refers to gaining unauthorised access to another person's or
organization's data.
d. Eavesdropping refers to gaining unauthorised access to another person's or
organization's data while the data is on its way on the network
7. Differentiate between Star and Bus Topology of networks.
Ans.
STAR TOPOLOGY BUS TOPOLOGY
In a star topology, all the nodes in a network In bus topology all the nodes are connected
are connected using a hub or a switch. using a single wire known as bus.
It is costlier than the bus topology as we It is cheaper as compared to star topology.
require more wire.
It is easier to diagnose problem in star It is difficult to diagnose problem in bus
topology. topology.
8. Which protocol is used for the transfer of hyper text documents on the internet? Ans. HTTP
9. Which transmission medium should be used to transfer data across two continents at very high
speed. Ans. Satellite (Wireless) or Fiber Optic (Wired)
10. Two neighbourhood schools, at a distance of 120 metres from each other, decide to join their
LANs using UTP cable so that they can share their e-learning resources. But after joining their
LANs they are not able to share the resources due to loss of signal in between. Which device
should they use so that signal is amplified in-between? Ans. Repeater
Page 5 of 11
11. Which of the following software’s are Open Source:
Linux, MS Windows 7, Photoshop, MySql. Ans. Linux, MySQL
12. Distinguish between Open Source software and Proprietary software with reference to
customizability of the software.
Ans.
Open Source Software Proprietary Software
Open softwares are available with the source Proprietary softwares are not available with
code. the source code.
Open Source softwares can be modified but Proprietary softwares can only be modified
only when we know the language. by the owner.
13. Name any four Indian scripts included in Unicode.
Ans. Assamese, Bengali, Devanagari, Gujarat, Gurmukhi, Kannada, Malayalam, Oriya, Tamil
and Telugu
14. Sujata says that the following numbers indicate an address: 208.77.188.166
What is the above address called? To which object/device is it assigned?
Ans. It is an IP address and it is assigned to NIC in a node. It can be changed.
15. Mr. Kant Sengupta wants to prevent unauthorized access .to/from his company,'s local. area
network. Write the name of a system (software/hardware), which he should install to do the
same. Ans. Firewall
16. Beauty Lines Fashion Inc. is a fashion company with design unit and market unit 135 meters
away from each other. The company recently connected their LANs using Ethernet cable to
share the stock related information. But, after joining their LANs, they are not able to share
the information due to loss of signal in between. Which device out of the following should you
suggest to be installed for a smooth communication?
(i) UPS (ii) Modem (iii) Repeater Ans. (iii) Repeater
17. Which of the following is not a feature of Networking?
(i) Resource sharing (ii) Uninterrupted power supply (iii) Reduced cost (iv) Reliability
Ans. (ii) Uninterrupted power supply
18. Name any two Indian scripts included in Unicode.
Ans. Assamese, Bengali, Devanagari, Gujarat, Gurmukhi, Kannada, Malayalam, Oriya, Tamil and
Telugu
19. Mr. Jayanto Das is confused between Shareware and Open source software. Mention at least
two points of differences to help her understand the same.
Ans.
Shareware Open Source Software
Shareware are proprietary software available Open source softwares are free softwares
free of cost for a limited time. which are available for unlimited time.
They are not available along with source They are available along with the source
code. code.
Example: Kaspersky antivirus (trial version) Example: Mysql, Netbeans
20. Identify the type of Topology from the following:
(i) If each node is connected with the help of independent cable with the help of a central
switching (communication controller)
(ii) If each node is connected with the help of a single co-axial cable.
Ans. (i) Star topology (ii) Bus topology.
21. Define the following with reference to Threats to Network Security.
(i) Trojan Horse (ii) Worm
Ans.
(i) Trojan horses are designed to allow a hacker to target a remote computer system. Once
a Trojan horse has been installed on a target computer system, it is possible for a hacker
to access it remotely and perform various operations and it may do so without any user
intervention at the remote end.
(ii) Worms: It is a program made to replicate automatically. A worm replicates continuously
until the entire hard disk space and memory are eaten up and it may do so without any
user intervention. This kind of self replicating programs spread over the entire hard disk
and memory consequently and slow down the system.
22. Raj Kamal International School is planning to connect all computers, each spread over distance
within 45 meters. Suggest an economical cable type having high-speed data transfer, which can
Page 6 of 11
be used to connect these computers. Ans. Ethernet cable
23. Write examples of one Proprietary and one Open Source Software.
Ans.
Open Source Software Proprietary Software
Example: MySQL, Netbeans Example: MS Windows, MS Office
24. Name any two most popularly used internet browsers. Ans. Google Chrome, Mozilla firefox
25. Ms. Rani Sen, General Manager of Global Nations Corporate recently discovered that the
communication between her company's accounts office and HR office is extremely slow and
signals drop quite frequently. These offices are 125 metres away from each other and
connected by an ethernet cable.
(i) Suggest her a device, which can be installed in between the offices for smooth
communication.
(ii) What type of network is formed by having this kind of connectivity out of LAN, MAN and
WAN? Ans. (i) Repeater (ii) LAN
26. Give an advantage of using Star topology over Bus topology. Show a network layout of Star
topology to connect 5 computers.
Ans. Advantages of Star topology over bus topology:-
1. Fault diagnosis is easy to find in star topology.
2. It is easier to connect nodes in star topology.
Node-1 Node-2 Node-3 Node-4 Node-5

Switch/Hub

27. Give suitable example of URL and Domain name.


Ans.
URL Domain Name
URL is a uniform resource locator, which is a Domain name is a name assigned to server in
complete path to a resource over internet. DNS.
URL has 4 parts: Domain name has usually different parts eg.
Protocol, domain name, path, resource name top level domain name or primary domain
name and sub-domain name(s)
Example: Example:
http://www.cbse.nic.in/sp/ip.pdf www.cbse.nic.in
Here http is a protocol, www.cbse.nic.in is facebook.com
domain name, sp is the path and ip.pdf is google.com
resource name
28. Which communication channel is suitable when very fast communication between two offices in
two different countries is required? Ans. Wired  Fiber Optic, Wireless  Satellite.
29. Given below are two addresses:
(i) 59.177.134.72
(ii) http://www.ccc.nic.in/welcome.htm
Identify which one of the above is an IP address and which one is a URL?
Ans. (i) 59.177.134.72 is IP address
(ii) http://www.ccc.nic.in/welcome.htm is URL.
30. What is the purpose of a repeater in a computer network?
Ans. A Repeater is a device that is used to regenerate a signal which is on its way through a
communication channel. A repeater regenerates the received signal and re-transmits it to its
destination.
31. Why is switch called an intelligent hub?
Ans. Switch is called intelligent hub because switch transmits the data only to the intended
node whereas hub broadcasts the data.
32. Write the advantage of using UNICODE. Ans. See Notes above
33. List 2 kinds of threats to data in a computer network. Ans. see notes above
34. How is Open Source software different from Proprietary software? Write two points.
Ans.
Page 7 of 11
Open Source Software Proprietary Software
Open softwares are available with the source Proprietary softwares are not available with
code. the source code.
Open source softwares are available free of Proprietary softwares are not available free
cost. of cost.
Example: MySQL, Netbeans Example: MS Office, Adobe Photoshop
35. Which wireless communication channel is most appropriate in each of the following situations ?
(i) Communication in a hilly area.
(ii) Very fast communication between two offices in two different countries.
(i) Radio Waves / Satellite.
(ii) Satellite
36. With what aim UNICODE was developed?
Ans. Unicode was developed with the aim to conceive a single standard code which could
manage to represent all languages of the world.
37. Expand the following file extensions :
(i) ODF (ii) XML Ans. (i) Open Document Format (ii) Extensible Markup Language
38. What is the use of repeater in a Network ? How is it different from Hub ?
Ans.
Repeater Hub
Repeater regenerates the signal and Hub is used to connect multiple nodes.
retransmits it to destination.
39. Give two characteristics of Star Topology. Also, show it using a diagram with interconnection of
5 computers.
Ans.
1. In star topology each is connected to the switch or hub.
2. In star topology, it is easier find the fault and it is also easier to set it up.
40. What is Snooping?
Ans. Snooping refers to gaining unauthorised access to another person's or organization's data.
41. State two advantages of networking computers instead of having standalone computers.
Ans.
 Resource Sharing
 Cost saving
 Collaborative user interaction
 Time saving
 Increased storage
42. Expand the following terms :
(i) WAN (ii) OSS Ans. WAN  Wide Area Network (ii) OSS  Open Source Software
43. What is the purpose of switch in a network? Ans. To connect multiple nodes.
44. Identify the following devices :
(i) An intelligent device that connects several nodes to form a network and redirects the
received information only to intended node(s).
(ii) A device that regenerates (amplifies) the received signal and re-transmits it to its
destination. Ans. (i) Switch (ii) Repeater
45. What is the name of the network topology in which each node is connected independently using
a switch ?
Ans. Star topology.
46. What is meant by "Denial of Service" with reference to Internet service?
Ans. A Denial of Service (DoS) attack is an attempt to make one or more network resources
unavailable to their legitimate users.
47. Expand (i)ODF (ii) HTTP
Ans. (i) Open Document Format (ii) Hyper Text Transfer Protocol
48. How is a Trojan Horse harmful to a network ?
Ans. Trojan horses are designed to allow a hacker to target a remote computer system. Once a
Trojan horse has been installed on a target computer system, it is possible for a hacker to
access it remotely and perform various
49. What do the following top level domains signify ? (i) .edu (ii) .org
Ans. (i) educational institutes (ii) Organizations (nonprofit)
50. List two measures to secure a computer network.
Page 8 of 11
Ans. 1. Install antivirus software 2. assigning login names and strong passwords to the users of
a system 3. Install firewall
51. What is common in all of the following software(s) ? Firefox, Perl, PHP, OpenOffice.org
Write one feature of the above category of software.
Ans. They all are open source softwares.
Open Source softwares are available free of cost and that too along with the source code.
52. Draw a network layout of bus topology to connect 5 client computers and 1 server computer.
Ans. Terminator
BUS

Node-1 Node-2 Node-3 Node-4 Node-5 Server


53. Mr. John wants to prevent unauthorized access to/from his company's local area network. Write
the name of a system (software/ hardware), which he should install to do the same.
Ans. Firewall
54. Which of the following are open source softwares : GNU, MS-Office, BOSS, Windows OS
Ans. GNU, BOSS
55. Name the government organization that contributes to the growth of FOSS in India.
Ans. NRCFOSS (National Research Center for Free and Open Source Software)
56. Read the given activities carefully and mention whether the activity is snooping or
eavesdropping:
i. Getting someone’s login information by casually watching what he/she is typing.
ii. Setting up unauthorized parallel telephone lines
iii. Installing some software/hardware which captures the data while on its way.
iv. Reading the files on someone’s computer in an unauthorized manner.
Ans. (i) Snooping (ii) Eavesdropping (iii) Eavesdropping (iV) Snooping
57. Kristen has typed the following text in the address bar:
http://www.cbse-international.com/help.htm
Identify and differentiate the URL and Domain name with reference to the example given
above.
Ans. In the above example: http://www.cbse-international.com/help.htm is URL and cbse-
international.com is a domain name.
58. Chanakya has to write a paragraph in English on nobel laureates as a part of his holiday
homework. He is using a software in which he types the text in Hindi and the software
automatically converts the text into English. For example, if he types “ननोबबेल पप्राइज इस गगिवबेन इन
ससक्स ककैटटबे ररीज” the software converts it into “Nobel Prize is given in six categories”.
What kind of text entry is it – phonetic text entry OR keymap based text entry? How is it
different from the other kind of text entry?
Ans. It is a phonetic text entry.
Phonetic Text Entry Keymap Based Text Entry
In this type of text entry, traditional In this method the keyboard keys are mapped
keyboards with English keys are used. But to specific characters using a keymap.
while typing, the Indian alphabets are
written phonetically (i.e., the way they
sound as per the pronunciation)
59. A company has 3 departments namely Administrative, Sales, Production. Out of telephone
cable, Optical Fiber, Ethernet Cable, which communication medium is best for high speed
communication between departments?
Ans. Optical Fiber
60. Name one open source Indian operating system.
Ans. BOSS (Bharat Operating System Solution)
61. What is the purpose of a Server in a network ?
Ans. To serve specific task or provide facility to other nodes in a network. It could be a mail
server, file server, print server or web server
62. What do the following top level domains signify ? (i) .com (ii) .org
Page 9 of 11
Ans. (i) .com  commercial business (ii) .org  organization (non-profit)
63. List 2 measures to secure a network.
Ans. (i) Install firewall (ii) Install antivirus software.
64. Distinguish between MAC address and IP address with the help of example of each.
Ans.
MAC Address IP Address
It is a unique 12 digit (6 digits for It is a 4 digit hexadecimal number assigned
manufacturer code and 6 digits for serial to each node on a network.
number) hexadecimal number assigned to
each NIC.
Example: 22:90:AB:56:32:A3 Example: 59.179.9.8
65. The ‘Chalchitra’ theatre has a computer network. The network is in one building.
(i) Name this type of network( out of LAN/MAN/WAN).
(ii) Name one communication channel that can be used for fast communication between
workstations of the network.
Ans. (i) LAN (ii) Optical Fiber cable
66. Two doctors have connected their mobile phones to transfer a picture file of a person
suffering from a skin disease. What type of network is formed ? Which
communication media out of Coaxial cable, Optical fiber, Bluetooth, Satellite link
should be used to transfer the file ?
Ans. Bluetooth
67. State reason why Star topology requires more cable length than Bus topology.
Ans. Because in a star topology all the nodes are connected directly to switch and so lot of
cable is used whereas in bus topology a single wire is used to connect nodes, so lee cable is
used.
68. “Open Source Software developers work for the good of community”. Is this statement
true ? Give reason.
Ans. Yes, this is true statement as the people who cannot afford to purchase software can
download and use Open source softwares. Moreover the people can use the OSS to get the
actual code through which the software is developed and hence learn many new things and also
can remodify them as per their needs.
69. What happens during ‘Domain Name Resolution’ ?
Ans. Domain Name Resolution is the process of getting corresponding IP address from a
domain name.
70. How is ‘Denial of service’ attack, a threat to Network security ?
Ans. Denial of service attack restricts legitimate users to use their resources like internet, files
etc.
71. After realizing the issues with proprietary software, Ms. Sunita has decided to use only Open
Source Software. Suggest any one suitable open source software to her, for each of the
following categories: i. Operating System ii. Browser
Ans. (i) Operating System  Linux (ii) Browser  Mozilla firefox, Google chrome.
72. Expand the following: i. ODF ii. PPP
Ans. (i) Open Document Format (ii) Point to Point Protocol
73. How do Computer networks reduce hardware costs of an organization ? Explain with the help of
example.
Ans. (i) By sharing the hard disk space over network, it reduces the cost to buy new hard disk, if
any node hard disk is full.
(ii) By sharing the printer installed in one computer, it reduces the cost to buy separate printer
for each node in a network.
74. Explain the term Firewall and Cyber Law.
Ans. Firewall is a hardware/software device that restricts unauthorized access to/from a
network.
Cyber Law is a set of laws to protect the users against the cyber crimes over cyber space.
75. What happens to the Network with Star topology if the following happens :
(i) One of the computers on the network fails ?
(ii) The central hub or switch to which all computers are connected, fails ?
Ans. (i) Only the computer which fails gets disconnected from the network. The rest of the

Page 10 of 11
computer continue to work in a network.
(ii) The complete network fails, when the hub or a switch fails.
76. Write the purpose of http.
Ans. It is Hyper Text Transfer Protocol to transfer files / images over the internet.
77. How does Open source software emphasize collaboration and sharing ?
Ans. Open source software’s are available with the source code so anybody can make the
updation in the software and submit it to the open source community. So open source software
comes with the up-gradation quickly. Open source softwares can be easily shared as it comes
with GNU General Public License, so there is no limitation of copyright.
78. Mr. Ravi, an IT Help Desk executive needs to remotely login a customer’s PC to provide him
technical support. Suggest a remote access software to him.
Ans. Teamviewer, VNC, Microsoft Remote Desktop software
79. Discuss the significance of Bluetooth technology.
Ans. 1) It is limited to 10m 2) Line of sight is not required and it is omni directional
80. I. Write down any two advantages of Open Source Software over Proprietary
software.
II. Ms. Sita trying to log into your Internet Banking account for online transaction
activity. However, as strange as it may seem, she is denied of an access to the bank’s
website, in spite of having a swift internet connection.
What do you think the reason behind this problem is and suggest her few simple precautions in
order to overcome any such type of network security threats.
Ans. II. It is a denial of service attack and she should use i. firewall software ii. Install antivirus

Page 11 of 11

Das könnte Ihnen auch gefallen