[go: up one dir, main page]

0% found this document useful (0 votes)
404 views8 pages

Networking and Internet Class 11 Questions and Answers

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 8

Networking and Internet Class 11 Questions and

Answers
1. What is computer network?
Answer – Computer networking is the term for a network of connected
computers that may communicate and share resources. These networked devices
transmit data through wireless or physical technologies using a set of guidelines
known as communications protocols.

2. What are the communication take place in computer network?


Answer – A computer network is made up of a number of connected nodes that
communicate over a channel. There are three types of computer network
communication:
a. Simplex
b. Half-duplex
c. Full-duplex

Simplex – Only one route of information transport is possible in simplex mode.


Unidirectional describes this mode. Simple data is transferred through numerous
fibre optics and satellites in computer networks.

Half-duplex – Only one node at a time can broadcast data in the half-duplex
mode, which allows for bidirectional communication between the two nodes. In
low-bandwidth situations, this mode is typically used to transfer files between
nodes.

Full-duplex – In full-duplex mode, both communicating parties can send and


receive at the same time. NIC Support full-duplex mode.

3. Difference between resource sharing and communication?


Answer – Difference between resource sharing and communication are –

Resource Sharing – Sharing hardware and software resources is made possible


by networking computers. Peripherals (such printers and scanners), the CPU, and
memory are a few examples of hardware resources. System and application
software, as well as files that may contain text, audio, and video content, are
examples of software resources.

Communication – Information sharing between network nodes is facilitated by


connecting computers through a network. For instance, since the printer is linked
to every network node, any of the computer systems send data to any of the
printer, the three other computers, or both.

Networking and Internet Class 11 Questions and Answers


4. What are the different transmission Medium in computer network?
Answer – A transmission medium is a channel of transmission that allows for the
signal-based transfer of data from one node to another. The data is converted into
an appropriate form for transmission on the medium via a signal.
There are two types of transmission medium –

a. Guided medium – Physical conductors like twisted pairs, coaxial cable, and
fibre optics are referred to the guided medium. The signal travels as voltage and
current in coaxial and twisted pair cable, but it travels as light in optical fibre.

b. Unguided medium – Electro-magnetic waves are used by the unguided


medium, which eliminates the need for a physical conductor. Microwave, radio
wave, and infrared are a few examples of unguided media.

5. What is the purpose of repeater?


Answer – A signal may weaken and degrade with increased distance. In order to
increase the input signal’s range, a repeater is employed to return the signal to its
original state. It is positioned between two cable segments as a result.

Networking and Internet Class 11 Questions and Answers

6. What is the purpose of HUB?


Answer – A hub joins multiple lines, which are also known as cable segments, as
opposed to a repeater, which only connects two wires. Multiple input/output
(I/O) ports on a hub each connect to a single cable.

7. What is Bridge?
Answer – A bridge is a multiport network interface used to connect two or more
LANs, sometimes at differing speeds. Therefore, a bridge can be used to combine
smaller LANs to create a larger LAN.

8. What is Switch?
Answer – Switches are used to connect individual nodes in the network with one
another, as opposed to bridges, which join two or more computers in LAN.
Each node in the network is attached to a different switch port.

Networking and Internet Class 11 Questions and Answers

9. What is Router?
Answer – LAN or WAN routers are used to link different networks together. Data
from an incoming network is sent to another network via a router. A router keeps
track of different networks’ routing tables. The router chooses which network the
incoming packet should be sent to based on the destination address.

10. What is Gateway?


Answer – A gateway enables communication across networks based on various
protocol systems. Data from one network that uses one protocol is translated to
the outgoing network’s protocol before being forwarded. As a result, a gateway
can be compared to a router that has software for protocol conversion.

11. What are the different types of Network?


Answer – Networks can be roughly characterized as PAN, LAN, MAN, and WAN
based on their geographic range.

a. Personal area network (PAN) – A personal area network (PAN) is a type of


computer network designed to connect computers and other devices that are
physically close to one person. Personal computers, printers, fax machines,
telephones, PDAs, scanners, and even gaming consoles are a few examples of the
kinds of gadgets that are utilized in a PAN.

b. Local area network (LAN) – Local Area networks can have a radius of up to 1
km and are private networks. They are typically established inside a structure or
campus. The operating speed of LANs is between 10 Mbps and 1 Gbps.

c. Metropolitan area network (MAN) – Metropolitan Area Network is the


abbreviation. It could be held by several people or groups, not just one. These
networks, which have a radius of up to 50 km, are used to create connections
within cities.

d. Wide area network (WAN) – Wide Area Network is referred to as WAN. A


WAN typically covers a distance of roughly 1000 km. They are useful for linking
isolated places and for long-distance communication. They create connections
inside a nation or continent.

Networking and Internet Class 11 Questions and Answers

12. What is topology?


Answer – The physical and logical configuration of a network’s nodes and links is
known as its topology. Devices like switches, routers, and software with switch
and router functionality are typically included in nodes. A graph is a common way
to represent network topologies.

13. Different between broadcast and point-to-point topology?


Answer – Network topology refers to the positioning of nodes in a network, often
known as their layout. Broadly speaking, there are two different topologies:
broadcast and point-to-point.

a. Broadcast topology – All nodes in a broadcast topology share a single physical


link. All nodes receive when one node sends. When multiple nodes broadcast at
once, collision may happen, and a collision resolution mechanism is in place to
deal with it. Bus and ring topologies dominate in broadcast networks.

b. Point-to-Point topologies – Every pair of nodes in a point-to-point


architecture has its own dedicated link. Star and mesh topologies are common for
point-to-point networks.

Networking and Internet Class 11 Questions and Answers

14. Types of topologies?


Answer – There are five different types of topologies?
a. Bus topologies
b. Ring topologies
c. Star topologies
d. Mesh topologies
e. Tree topologies

15. What is Bus topologies?


Answer – In a bus topology, several nodes are connected by a lengthy cable
known as the backbone cable (or just the backbone) using a connector known as
the tap. In this, every device linked to the backbone cable receives a message sent
by one. Less cabling is needed, and this topology is simple to establish and
expand the network built using it. However, isolating and locating faults is
challenging.

16. What is Ring topologies?


Answer – In a ring topology, all the devices are connected by a cable that is
shaped like a ring. The intended recipient of the message is reached by way of a
one-way transmission of the intended message. Device addition and deletion,
fault isolation, and fault detection are simple processes. The topology, however, is
constrained by single point failure, which can disrupt the entire network. It could
take longer to send a message from one node to another node (four steps when
sending from device A to device E).

Networking and Internet Class 11 Questions and Answers

17. What is Star Topology?


Answer – All of the devices in a star topology are linked to the hub, which serves
as the main controller. Any two devices can communicate with each other
through the hub that relays messages. Installation and configuration of the star
network are simple.
Furthermore, fault isolation and detection are simple. However, compared to bus
and ring topologies, it requires more cabling. Moreover, a failed hub will result in
a failed network.

18. What is Mesh Topology?


Answer – Every node in the network is connected to every other node due to
mesh topology. The topology offers secure data transfer without any traffic issues
because every conceivable pair of nodes has a dedicated point-to-point
connection. To establish the topology, several connections are necessary. As the
network expands, this makes installation more challenging as there are more
nodes.
Networking and Internet Class 11 Questions and Answers

19. What is Tree topology?


Answer – A hybrid topology that combines bus and star topologies is called tree
topology. In a bus topology, the primary backbone cable functions as the tree’s
trunk, and star networks (and even individual nodes) are connected to it like the
tree’s branches. A portion of a network built using a tree topology will not be
affected if it is damaged. In comparison to other topologies, installation and
configuration are challenging. Additionally, if the backbone cable is broken, the
network’s communication will be affected as a whole.

20. Purpose of MAC Address?


Answer – A network interface controller (NIC) is given a media access control
address (MAC address), which it can use as a network address in communications
inside a network segment.

21. What is IP address?


Answer – Every computer in a network has an additional distinctive
identification code called an IP Address. The four bytes (or 32 bits) that make up
an IP address can range in value from 0 to 255.

22. What is Domain name?


Answer – When using client software to access a website, a domain name is a
string of characters that corresponds to a numeric IP address. A domain name is
just the text that a user types into their browser to access a specific website. For
instance, Google’s domain name is “google.com”.

Networking and Internet Class 11 Questions and Answers

23. Difference between generic domain and country specific domain?


Answer – A generic domain name, like toothpaste.com or videogame.com, is
made up of one or more words that are often used in dictionaries. TLDs can
contain generic domain names, however the.com TLD is the most expensive of
them.

Generally speaking, country-specific domain extensions identify the location or


language for which the website’s content is appropriate.

Generic Domain Names:


·com – commercial business
·edu – Educational institutions
·gov – Government agencies
·mil – Military
·net – Network organizations
·org – Organizations (nonprofit)
Country Specific Domain Names:
.in – India
·au – Australia
·ca – Canada
.ch – China
.nz – New Zealand
.pk – Pakistan
.jp – Japan
.us – United States of America

24. What is digital literacy?


Answer – Raising knowledge and understanding regarding technology, such as
desktop computers, smartphones, tablets, and other electronic devices, is referred
to as digital literacy. Internet and software tool familiarity are also included.
People may more easily and effectively obtain, evaluate, exchange, create, and
transmit information because to this expertise.

Networking and Internet Class 11 Questions and Answers

25. What is the purpose of Internet Services?


Answer – Network services are programmes that are hosted by servers on a
computer network and offer functionality to network users. The Internet has
several uses, including e-mail, file sharing, remote login, and the World Wide
Web (WWW).

26. What is Telnet?


Answer – Telnet is a network protocol that allows for two-way, collaborative,
text-based communication between two computers as well as remote computer
access. It uses the Transmission Control Protocol/Internet Protocol (TCP/IP)
networking protocol to create remote sessions in response to user commands.

27. What are the different TCP/IP model.


Answer – The TCP/IP Model are –
a. Application Layer
b. Transport Layer
c. Internet Layer
d. Link Layer

Networking and Internet Class 11 Questions and Answers

28. What do you mean by Application Layer?


Answer – Data or a message is created at the sending end and reviewed and
processed at the receiving end. The message that will be sent with the header
must likewise be enclosed by this layer. On this layer, a number of protocols like
HTTP (HyperText Transfer Protocol) and POP3 (Post Office Protocol version 3)
operate. POP3 enables you to download emails to your local computer so you
can read them offline.

29. What are the different types of Malware?


Answer – Malicious software (programmes) created with the purpose of
interfering with system performance by harming the system, gaining
unauthorised access to the system, or preventing legitimate users from using
computing resources are referred to as malware. Malware includes viruses,
worms, and Trojan horses.

30. What is Virus?


Answer – A virus is a piece of software code that can damage your computer by
corrupting or overwriting system data.

Networking and Internet Class 11 Questions and Answers

31. What is worm virus?


Answer – A worm is frequently acquired via a network, and it floods the hard
disc by automatically producing several copies of itself there. It causes network
congestion when a worm is received as an email attachment and automatically
forwarded to the recipients.

32. What is Trojan Horse?


Answer – A Trojan Horse Virus is a form of malware that instals itself on a
computer by impersonating a trustworthy application. The delivery technique
often involves an attacker hiding malicious malware in genuine software using
social engineering in an effort to get users’ system access.

33. What is Eavesdropping?


Answer – The act of surreptitiously or covertly listening to another person’s
private discussion or communications without that person’s agreement is known
as eavesdropping. Telephone lines, cellphone networks, email, and instant
messaging are all used for eavesdropping.

34. What is Denial of Service?


Answer – A cyberattack known as a denial-of-service (DoS) attack renders a
system or network resource inaccessible to its users by temporarily or
permanently interrupting services.
In order to overwhelm systems and prevent requests from being fulfilled, denial
of service is often achieved by flooding the targeted computer or resource with
unnecessary requests. A DoS attack is comparable to a crowding of customers at a
store’s entrance, making it difficult for actual customers to enter.

Networking and Internet Class 11 Questions and Answers

35. What are the different types Cyber Crime.


Answer – The different type of Cyber Crime activity are –
a. Cyber bulling
b. Cyber stalking
c. Online Job Fraud
d. Vishing
e. SMSing
f. SIM Swap scam
g. Creadit card fraud
h. Identity theft
i. Spamming
j. Ransomware

36. What is the purpose of Firewalls?


Answer – An enterprise, home, or individual’s internal network is protected by a
firewall from malicious traffic coming from other networks. This can be
accomplished by installing a router or a computer (typically designated to act as a
firewall) between the internal network and the external network. Firewall
examines network traffic and permits only data that does not contravene security
constraints to travel through the network. A router-based hardware firewall stops
harmful malware from entering your network from the outside.

37. How to protect our self from measures while accessing internet?
Answer – To protect our self from measures activity –
a. Never click on a suspicious link specified on a web page or send through a
mail.
b. Make sure that passwords are strong and are changged frequently.
c. Never disclose personal information
d. Report phishing issues to the concerned authorities
e. Ensure that the web browser is updated and secure.

You might also like