Chapter 14: Networking and Open Source Concepts Class 12 Computer Science NCERT Solutions

Chapter 14 focuses on the basics of computer networking, including various types of networks, network devices, and protocols. It also introduces the concept of open-source software, which has a significant impact on software development and distribution. Students will gain an understanding of how networks operate and the importance of open-source software in modern technology.

What You Will Learn in Chapter 14

This chapter provides a foundation in networking concepts such as LAN, WAN, protocols, and the OSI model. Additionally, it explains the advantages of open-source software, licensing models, and popular open-source tools. By the end of this chapter, students will understand how networks are structured, how data is transmitted, and how open-source software contributes to technology development.

Key Topics Covered

Introduction to Networking

Networking allows computers and devices to communicate with each other and share resources. It involves transmitting data across physical mediums like cables, wireless signals, and satellites. The key components of a network include computers, servers, switches, and routers.

Types of Networks

  • LAN (Local Area Network): A network limited to a small geographical area like a home or office.
  • WAN (Wide Area Network): A network that spans a large geographical area, such as the internet.
  • MAN (Metropolitan Area Network): A network that covers a city or a large campus.
  • PAN (Personal Area Network): A small network for personal devices like smartphones, laptops, and tablets.

Network Devices

  • Router: Connects multiple networks and directs data packets between them.
  • Switch: Connects devices within a LAN and facilitates communication between them.
  • Hub: A basic networking device that transmits data to all devices in a network.
  • Modem: Converts digital data into analog signals for transmission over telephone lines (for internet access).

Network Topologies

Network topology defines the arrangement of various devices in a network. Common types of topologies include:

  • Bus Topology: A single central cable (bus) connects all devices.
  • Star Topology: All devices are connected to a central hub or switch.
  • Ring Topology: Devices are connected in a circular manner.
  • Mesh Topology: Devices are interconnected with multiple paths.

OSI Model

The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a network into seven layers. These layers are:

  • Layer 1: Physical Layer – Handles the transmission of raw data bits over a physical medium.
  • Layer 2: Data Link Layer – Manages communication between devices on the same network.
  • Layer 3: Network Layer – Routes data packets between different networks (IP).
  • Layer 4: Transport Layer – Ensures reliable data transfer (TCP/UDP).
  • Layer 5: Session Layer – Manages sessions between applications.
  • Layer 6: Presentation Layer – Handles data translation, encryption, and compression.
  • Layer 7: Application Layer – Supports network applications (HTTP, FTP, etc.).

Protocols

  • TCP/IP (Transmission Control Protocol/Internet Protocol): A set of protocols used to connect devices on the internet.
  • HTTP (Hypertext Transfer Protocol): Used for transferring web pages over the internet.
  • FTP (File Transfer Protocol): Used for transferring files between a client and server.
  • SMTP (Simple Mail Transfer Protocol): Used for sending emails.

Introduction to Open Source Software

Open-source software is software whose source code is available to the public for free modification, distribution, and use. Open-source software fosters community collaboration and innovation. Examples include the Linux operating system, Apache server, and Mozilla Firefox browser.

Benefits of Open Source Software

  • Cost-Effective: Open-source software is free to use, eliminating licensing fees.
  • Security: Open-source software is transparent, allowing developers to identify and fix vulnerabilities quickly.
  • Customization: Users can modify open-source software to meet their specific needs.
  • Community Support: Open-source software is supported by a large community of developers who contribute to its improvement.

Popular Open-Source Tools

  • Linux: A powerful open-source operating system widely used in servers and embedded systems.
  • Apache HTTP Server: A popular open-source web server.
  • MySQL: An open-source relational database management system (RDBMS).
  • LibreOffice: A free and open-source office suite.

Licensing Models in Open Source Software

Open-source software is typically distributed under licenses that specify how the software can be used, modified, and shared. Common licenses include:

  • GPL (General Public License): Allows users to freely use, modify, and distribute software as long as the same license applies to the modified version.
  • MIT License: Permits users to use, modify, and distribute software with minimal restrictions.
  • Apache License: Provides users with freedom to use, modify, and distribute software while protecting contributors from liability.

Setting Up a Simple Network

To set up a basic home network, you need a router to connect devices (computers, smartphones, etc.) and an internet modem for internet access. The devices are connected via wired (Ethernet) or wireless (Wi-Fi) connections. The router acts as the central point for managing data transmission across devices.

Common Networking Tools

  • Ping: A tool used to check the connectivity between two devices on a network.
  • Traceroute: A network diagnostic tool to trace the path taken by data across the internet.
  • nslookup: A command-line tool used to query domain name system (DNS) records.
  • Wireshark: A network protocol analyzer that captures and inspects network traffic.

Download PDF – Networking and Open Source Concepts Solutions

Includes:

  • Complete NCERT solutions with diagrams
  • Steps to configure a simple home network
  • Open-source software examples and their usage
  • Sample questions on protocols, OSI model, and network devices

Preparation Tips for Networking and Open Source Concepts

  • Understand the layers of the OSI model and their functions.
  • Familiarize yourself with common network devices and their roles.
  • Learn the differences between types of networks (LAN, WAN, etc.).
  • Explore open-source software and its applications in real-world scenarios.
  • Study network protocols like TCP/IP, HTTP, FTP, and SMTP in depth.

Additional Resources

  • Networking Tutorials: Detailed guides on setting up and troubleshooting networks.
  • Open Source Community Projects: Contribute to open-source projects to get hands-on experience.
  • Sample Networking Problems: Practice problems related to OSI model, network configuration, and protocols.

Conclusion

Networking and open-source software are fundamental concepts in the modern tech industry. Understanding how networks function and how open-source software powers much of today’s technology is essential for aspiring computer scientists. Mastery of this chapter will help students navigate the world of computer networking and open-source development, laying a strong foundation for future studies in IT and software engineering.

TOPIC-1 Communication Technoiogies Very Short Answer Type Questions [1 mark each]

Question 1: Identify the Domain name and URL from the following:
http://www.income.in/home.aboutus.hml

Domain name: income.in
URL: http://www.income.in/home.aboutus.hml

Question 2: What is Web Hosting?

Web hosting is the service that makes our website available to be viewed by others on the Internet. A web host provides space on its server so that other computers around the world can access our website by means of a network or modem.

Question 3: What is the difference between packet & message switching?

Packet SwitchingMessage Switching
There is a tight upper limit on the block size. A fixed size of packet is specified. In message switching, there was no upper limit.
All the packets are stored in main memory in the switching office. Packets are stored on disk, which increases performance as access time is reduced.

Question 4: Which protocol is used in creating a connection with a remote machine?

Answer: Telnet – It is an older internet utility that allows us to log on to a remote computer system. It also facilitates terminal emulation purposes.

Question 5: Which protocol is used to create a connection with a remote machine? Give any two advantages of using Optical Fibers.

Protocol: Telnet
Advantages of Optical Fibers:

  • Capable of extremely high speed
  • No Electromagnetic interference

Question 6: What is cloud computing?

Cloud computing refers to the sharing of computer resources (dedicated, time-shared, or dynamically shared servers) and related infrastructure components (load balancers, firewalls, network storage, developer tools, monitors, and management tools) to facilitate the deployment and operation of web and network-based applications. It relies on resource sharing to achieve coherence and economies of scale, similar to utilities like electricity over a network.

Question 7: Write two characteristics of Wi-Fi.

  • It is a wireless network.
  • It is for short range.

Question 8: Expand the following:

  • GSM: Global System for Mobile Communication
  • GPRS: General Packet Radio Service

Question 9: Which type of network out of LAN, PAN, and MAN is formed when you connect two mobiles using Bluetooth to transfer a video?

Answer: PAN (Personal Area Network)

Question 10: Write one characteristic each for 2G and 3G mobile technologies.

  • 2G: Primarily supports voice transmission.
  • 3G: Supports both voice and data transmission.

Question 11: What is the difference between Packet switching and Circuit switching techniques?

Answer: In circuit switching, a dedicated path exists from source to destination, while in packet switching, there is no fixed path; data is broken into packets and routed independently.

Question 12: Write two advantages of using an optical fiber cable over an Ethernet cable to connect two service stations, which are 200 meters away from each other.

  • Faster speed than Ethernet.
  • Lower attenuation (signal loss over distance).

Question 13: Write one advantage of bus topology of network. Also illustrate how four (4) computers can be connected with each other using bus topology of network.

Advantage: The cable length required is the least compared to other topologies.


Bus Topology:
[Computer1]---[Cable]---[Computer2]---[Cable]---[Computer3]---[Cable]---[Computer4]

Question 14: Give one suitable example of each URL and Domain Name.

  • URL: http://waltons.in
  • Domain Name: gmail.com

Question 15: Write one advantage of star topology of network. Also, illustrate how five (5) computers can be connected with each other using star topology of network.

Advantage: Easy to replace, install, or remove hosts or other devices.


Star Topology:
          [Hub/Switch]
             / | | | \
       [Comp1][Comp2][Comp3][Comp4][Comp5]

Question 16: Identify the type of topology on the basis of the following:

  • (a) Since every node is directly connected to the server, a large amount of cable is needed which increases the installation cost of the network.
    Answer: Star Topology
  • (b) It has a single common data path connecting all the nodes.
    Answer: Bus Topology

Question 17: Expand the following:

  • VOIP: Voice Over Internet Protocol
  • SMTP: Simple Mail Transfer Protocol

Question 18: Daniel has to share the data among various computers of his two office branches situated in the same city. Name the network (out of LAN, WAN, PAN, and MAN) which is being formed in this process.

Answer: MAN (Metropolitan Area Network)

Question 19: ABC International School is planning to connect all computers, each spread over a distance of 50 meters. Suggest an economic cable type having high-speed data transfer to connect these computers.

Answer: Optical Fibre Cable

Question 20: Mahesh wants to transfer data within a city at very high speed. Write the wired transmission medium and type of network.

  • Wired transmission medium: Optical fibre cable
  • Type of network: MAN (Metropolitan Area Network)

Question 21: Which device is used to connect all computers inside a lab?

Answer: Hub or Switch

Question 22: Which device is used to connect all computers to the internet using telephone wire?

Answer: RJ-45. It is an eight-wired connector used to connect computers on a LAN.

Question 23: What is Wi-Fi Card?

Answer: Wi-Fi cards are small and portable cards that allow the computer to connect to the internet through a wireless network. The transmission is through the use of radio waves.

Question 24: Explain the purpose of a router.

A router establishes a connection between two networks and can handle networks with different protocols. Using a routing table, routers ensure that data packets travel through the best possible paths to reach their destination.

Question 25: Identify the type of topology from the following:

  • (a) Each node is connected with the help of a single cable
    Answer: Bus topology
  • (b) Each node is connected with the help of independent cables with central switching.
    Answer: Star topology

Question 26: What is the difference between LAN and MAN?

LAN (Local Area Network)MAN (Metropolitan Area Network)
The network diameter is limited to a single building or campus. Spans across a city with a diameter of 5–50 km.
Typically used for connecting computers in offices or schools. Used to connect multiple LANs across city regions.

Short Answer Type Questions-I [2 marks each]

Question 1: Write any 1 advantage and 1 disadvantage of Bus topology.

Advantage: Since there is a single common data path connecting all the nodes, the bus topology uses a very short cable length which considerably reduces the installation cost.

Disadvantage: Fault detection and isolation is difficult. Control is not centralized, and identifying a faulty node may require checking multiple points on the network.

Question 2: SunRise Pvt. Ltd. is setting up the network in Ahmedabad with the following setup:

  • MrktDept to FinDept: 80 m
  • MrktDept to LegalDept: 180 m
  • MrktDept to SalesDept: 100 m
  • LegalDept to SalesDept: 150 m
  • LegalDept to FinDept: 100 m
  • FinDept to SalesDept: 50 m

Computers: MrktDept: 20, LegalDept: 10, FinDept: 08, SalesDept: 42

(i) Cable layout and topology: Use Star Topology

(ii) Server placement: MrktDept – it has the highest number of computers as per the 80-20 rule.

(iii) Placement of Modem and Hub/Switch: Each building should have a hub/switch. Modem should be placed in each building if Internet access is required.

(iv) Type of Network: MAN (Metropolitan Area Network) – suitable for connecting multiple counters in the same city.

Question 3: Name the protocol:

  • (i) Used to transfer voice using packet-switched network: VOIP
  • (ii) Used for chatting between 2 groups or between 2 individuals: IRC

Question 4: What is an IP Address?

An IP address is a unique identifier for a device on an IP network. It is a 32-bit binary number commonly represented in dotted decimal format (e.g., 140.179.220.200), where each octet ranges from 0 to 255.

Question 5: What is HTTP?

HTTP (Hypertext Transfer Protocol) is a protocol used to transfer hypertext (text, graphics, images, audio, video) between two computers, primarily over the World Wide Web (WWW).

Question 6: Explain the importance of Cookies.

Cookies are small text files stored by the web browser that a web server sends when the user visits a website. They track pages visited and customize the browsing experience during that session.

Question 7: How is 4G different from 3G?

3G supports multimedia like video and audio applications. 4G offers significantly improved quality, including better-than-TV quality images and video links.

Question 8: Illustrate the layout for connecting 5 computers in a Bus and a Star topology of Networks.

Bus Topology:


[Comp1]---[Cable]---[Comp2]---[Cable]---[Comp3]---[Cable]---[Comp4]---[Cable]---[Comp5]

Star Topology:


           [Hub/Switch]
           /   |   |   |   \
      [Comp1][Comp2][Comp3][Comp4][Comp5]

Question 10: Differentiate between FTP and HTTP

FTP (File Transfer Protocol)HTTP (HyperText Transfer Protocol)
Used to transfer files over the Internet. Used to transfer hypertext (text, graphics, images, sound, etc.) between two computers on the World Wide Web (WWW).
Can be used for transferring large files. Primarily used for browsing web pages.

Question 11: Which is the fastest wired and wireless medium of communication?

MediumTypeFastest Communication Medium
WiredOptical FiberOptical Fiber
WirelessInfraredInfrared or Microwave

Question 12: What is a worm? How is it removed?

A worm is a self-replicating computer program that spreads over a network without user intervention. It can copy itself to other computers automatically.

Removal: Most common antivirus or anti-worm software can detect and remove worms effectively.

Question 13: Out of the following, which all comes under cybercrime?

OptionCybercrime?
(i) Stealing a brand-new computer from a showroom.No
(ii) Getting into someone’s social networking account without their consent and posting pictures.Yes
(iii) Secretly copying files from a call center server and selling them.Yes
(iv) Viewing sites on an internet browser.No

Question 14: Perfect Edu Services Ltd.

  • (i) Most appropriate location of the server: ADMIN building – due to the highest number of computers. MEDIA building is also a good choice due to central location.
  • (ii) Cable layout using Star Topology:

         [Computer 1]
              |
         [Hub/Switch]
       /    |     |     \
[Computer 2] [Computer 3] [Computer 4]
  • (iii) Hardware device for protection: Firewall or Router
  • (iv) Online face-to-face communication: Video Conferencing via VoIP or high-speed cable-based transmission

Question 15: What kind of data gets stored in cookies and how is it useful?

Cookies store small text files that contain session data such as user preferences, login credentials, and browsing history. They help personalize user experience by remembering past actions and preferences.

Question 16: Differentiate between packet switching and message switching

Packet SwitchingMessage Switching
Follows store-and-forward principle for fixed-size packets. Follows store-and-forward principle for entire messages.
Packet size is limited. No limit on message size.
Efficient for smaller, faster transmissions. Used for larger data but may introduce more delay.

Question 10: Differentiate between FTP and HTTP

FTP (File Transfer Protocol)HTTP (HyperText Transfer Protocol)
Used to transfer files over the Internet. Used to transfer hypertext (text, graphics, images, sound, etc.) between two computers on the World Wide Web (WWW).
Can be used for transferring large files. Primarily used for browsing web pages.

Question 11: Which is the fastest wired and wireless medium of communication?

MediumTypeFastest Communication Medium
WiredOptical FiberOptical Fiber
WirelessInfraredInfrared or Microwave

Question 12: What is a worm? How is it removed?

A worm is a self-replicating computer program that spreads over a network without user intervention. It can copy itself to other computers automatically.

Removal: Most common antivirus or anti-worm software can detect and remove worms effectively.

Question 13: Out of the following, which all comes under cybercrime?

OptionCybercrime?
(i) Stealing a brand-new computer from a showroom.No
(ii) Getting into someone’s social networking account without their consent and posting pictures.Yes
(iii) Secretly copying files from a call center server and selling them.Yes
(iv) Viewing sites on an internet browser.No

Question 14: Perfect Edu Services Ltd.

  • (i) Most appropriate location of the server: ADMIN building – due to the highest number of computers. MEDIA building is also a good choice due to central location.
  • (ii) Cable layout using Star Topology:

         [Computer 1]
              |
         [Hub/Switch]
       /    |     |     \
[Computer 2] [Computer 3] [Computer 4]
  • (iii) Hardware device for protection: Firewall or Router
  • (iv) Online face-to-face communication: Video Conferencing via VoIP or high-speed cable-based transmission

Question 15: What kind of data gets stored in cookies and how is it useful?

Cookies store small text files that contain session data such as user preferences, login credentials, and browsing history. They help personalize user experience by remembering past actions and preferences.

Question 16: Differentiate between packet switching and message switching

Packet SwitchingMessage Switching
Follows store-and-forward principle for fixed-size packets. Follows store-and-forward principle for entire messages.
Packet size is limited. No limit on message size.
Efficient for smaller, faster transmissions. Used for larger data but may introduce more delay.

Question 17: Which is the fastest wired and wireless medium of communication?

MediumTypeFastest Communication Medium
WiredOptical FiberOptical Fiber
WirelessInfraredInfrared or Microwave

Question 18: What is a Trojan Horse?

A Trojan Horse is a malicious program disguised as legitimate software. Once executed, it can cause harm to the system, such as stealing data or damaging files, without the user’s knowledge.

Question 19: Out of the following, which all comes under cybercrime?

OptionCybercrime?
Stealing a brand-new hard disk from a showroom.No
Getting into someone’s social networking account without their consent and posting on their behalf.Yes
Secretly copying data from the server of an organization and selling it to another organization.Yes
Looking at online activities of a friend’s blog.No

Question 20: Write any two differences between twisted pair and coaxial pair cable.

Twisted PairCo-axial Cable
Has lower bandwidth compared to coaxial cables. Has higher bandwidth than twisted pair cables.
Consists of two copper wires twisted around each other. Consists of a copper wire core, covered with insulating material, and a layer of conducting material.

Question 21: Write one advantage of Bus Topology of network, also illustrate how 4 computers can be connected with each other using star topology of network.

Advantage of Bus Topology: Requires the least amount of cable compared to other network topologies.

Star Topology Illustration:


                [Computer 1]
                   |
                [Hub/Switch]
                   |
  [Computer 2] ---|--- [Computer 3]
                   |
                [Computer 4]

Short Answer Type Question-II [3 marks]

Question 1: Network Planning for Uplifting Skills Hub India

Scenario:
Uplifting Skills Hub India aims to establish training centers across towns and villages with head offices in cities. Based on distances and computer distribution, the consultant must suggest optimal network solutions.

Shortest Distance Between Locations:

LocationDistance
VILLAGE 1 to B_TOWN2 KM
VILLAGE 2 to B_TOWN1.0 KM
VILLAGE 3 to B_TOWN1.5 KM
VILLAGE 1 to VILLAGE 23.5 KM
VILLAGE 1 to VILLAGE 34.5 KM
VILLAGE 2 to VILLAGE 32.5 KM
A CITY Head Office to B HUB25 KM

Number of Computers at Each Location:

LocationNumber of Computers
B_TOWN120
VILLAGE 115
VILLAGE 210
VILLAGE 315
A CITY OFFICE6

Recommended Network Solutions:

1. Location of the Server:
The server should be placed in B_TOWN since it hosts the maximum number of computers (120), ensuring better connectivity and efficiency.

2. Wired Medium and Cable Layout:
Optical Fibre is recommended for its high-speed capabilities and reliability across longer distances. Below is the suggested cable layout:


                [VILLAGE 1]
                    |
            [Optical Fibre]
                    |
              [B_TOWN (Server)]
                    |
            [Optical Fibre]
                    |
                [VILLAGE 2]
                    |
            [Optical Fibre]
                    |
                [VILLAGE 3]
                    |
            [Optical Fibre]
                    |
             [A CITY OFFICE]

3. Hardware Device:
A Switch should be used at each location to connect all computers locally, ensuring efficient communication and easy scalability.

4. Service/Protocol for Live Interactions:
The most effective service for real-time communication between the Head Office and B_HUB locations is VoIP (Voice over Internet Protocol). It allows live audio/video interaction at low cost with high reliability.

Long Answer Type Questions [4 marks each]

Question 1: Indian School in Mumbai – Network Design

  • (b1) Cable Layout: Star topology with ADMIN as the central hub. Each building (SENIOR, JUNIOR, HOSTEL) should be connected to ADMIN via cables.
  • (b2) Server Placement: ADMIN building – It has the highest number of computers (160), ensuring efficient access and performance.
  • (b3) Devices:
    Repeater: Between ADMIN and SENIOR (200m, exceeds 100m limit)
    Hub/Switch: One in each building to connect all computers locally.
  • (b4) Transmission Media for hilly region (50–60 km away): Radiowave – ideal for obstacles and long-distance communication in hilly areas.

Question 2: Vidya Senior Secondary Public School, Nainital – Networking

  • (ii) Server Location: Wing S (Senior) – It has 150 computers, the highest in the school.
  • (iii) Hub/Switch Placement: One hub or switch in each wing (A, S, J, H) to manage internal communication.
  • (iv) Communication Medium to Main Branch in Delhi: Radiowaves – suitable for long distances and bypassing geographical obstacles.

Question 3: Trine Tech Corporation (TTC) – Office Setup

  • Server Location: Finance block – 120 computers (highest usage)
  • Cable Layout: Star topology with Finance as the central hub

       [Human Resource]
             |
             |
          [Finance]——[Conference]
  • Best Connectivity to London Office: Satellite Link – best for long-distance global communication
  • Device to Connect Computers: Switch – efficient LAN-level device for connecting multiple computers

Question 4: Tech Up Corporation (TUC) – Office Setup

  • Server Location: Finance block – 120 computers (highest)
  • Cable Layout: Star topology with Finance as the central hub

       [Human Resource]
             |
             |
          [Finance]——[Conference]
  • Best Connectivity to London Office: Satellite Link – handles long-distance communication efficiently
  • Device to Connect Computers: Switch – ideal for efficient internal communication within buildings

Question 7:

(a) Difference between Domain Name and IP Address:

Domain NameIP Address
Alphanumeric address of a resource over a network, such as www.example.com. Numeric address of a resource in a network, such as 102.112.0.153.

(b) Advantages of using Optical Fibre Cable over Ethernet Cable:

  • Higher Bandwidth: Optical fibre supports higher data transmission rates.
  • Longer Distance: It transmits data over greater distances with minimal signal degradation.

(c) EPG Network Setup:

  • 1. Server Location: Faculty Studio Building (most computers: 120)
  • 2. Cable Layout: Bus Topology
  • 3. Network Type: LAN (Local Area Network)
  • 4. Wireless Channel: Satellite – for connecting to students worldwide

Question 8:

Link Type for Network Setup: Radio Link – best suited for hilly areas without requiring physical wiring.

Network Type: MAN (Metropolitan Area Network) – suitable for hospital-level city-wide coverage.

Consultation Method: Video Conferencing – enables visual interaction and collaboration.

Email Protocol: POP3 (Post Office Protocol v3) – used to receive emails.

Cookies: Small text files that store session data like login information and preferences.

Form Validation: Handled using server-side scripts for secure and accurate data processing.

Freeware vs Free Software:

  • Freeware: Fully free software with no cost or time limitation.
  • Free Software: May be free for a limited time or have usage restrictions.

Question 9:

Server Location: RED Building – houses 150 computers, the most efficient placement for the server.

Cable Layout: Bus Topology – efficient for minimal cabling and linear structure.

Device Placement:

  • Repeater: Place along longer cable runs to boost signal.
  • Switch: Install in every building to manage internal connections.

Cable Type: Optical Fibre – best for high-speed and long-distance communication between buildings.

Question 10:

Server Location: JAMUNA Building – highest number of computers (150).

Cable Layout: Bus Topology – efficient structure using single backbone.

Device Placement:

  • Repeater: Required between buildings to maintain signal strength.
  • Switch: Place in each building for connecting all computers locally.

Cable Type: Optical Fibre – recommended for high-speed connection between Faridabad campus and Kolkata head office.

Building to Building Distance Table:

FromToDistance (m)
Administrative BuildingFinance Building60
Finance BuildingRecording Studio Building120
Faculty Studio BuildingAdministrative Building70

Question 11: Network Setup for Rehaana Medicos Center

1. Cable Layout of Connections Between the Buildings:

Considering building distances and computer count, the optimal layout is a Star Topology with all buildings connected to a central hub in the Research Lab building.


           [Accounts]
               |
           [Research Lab] — [Store]
               |
           [Reception]

2. Most Suitable Building to House the Server:

The Research Lab should house the server as it contains the maximum number of computers (100), ensuring reduced latency and efficient access.

3. Placement of Devices:

  • Repeater:
    • In Layout 1: Place between Accounts and Store (150m)
    • In Layout 2: Place between Store and Research Lab (180m)
  • Switch/Hub: Install a switch or hub in every building to interconnect local devices.

4. System to Prevent Unauthorized Access:

A Firewall should be implemented. It acts as a barrier between the internal network and external threats, enforcing security rules and preventing unauthorized access.

Question 12: Who is a Hacker?

A hacker is a skilled individual who uses programming knowledge to gain unauthorized access to computer systems. While some hackers aim to explore vulnerabilities or conduct ethical testing (white-hat hackers), others may exploit systems for malicious purposes (black-hat hackers).

Question 13: What is 140.179.220.200?

140.179.220.200 is an IP Address in IPv4 format. It is used to uniquely identify a device on a network and enable communication between devices.

Importance of IP Address:

  • IP addresses help devices locate each other on a network.
  • They are essential for data routing across the internet or LAN.
  • Without IP addresses, devices wouldn’t be able to send or receive data correctly.

TOPIC-2 Network Security and Web Service
Very Short Answer Type Questions [1 mark each]

Question 1: Define firewall.

A firewall is a system designed to prevent unauthorized access to or from a private network. It can be implemented as hardware, software, or a combination of both.

Question 2: Write any two examples of Server-side Scripts.

  • ASP (Active Server Pages)
  • PHP (Hypertext Preprocessor)

Question 3: What is the difference between E-mail and Chat?

  • Chat occurs in near real-time, while E-mail does not.
  • Chat is two-way communication requiring both users to be present, while E-mail is one-way communication.

Question 4: Write names of any two popular open-source operating systems.

  • Kernel
  • Linux

Question 5: What is the difference between video conferencing and chat?

Video conferencing allows multiple participants and supports text, video, and audio. Chat is typically one-to-one and limited to text-based communication.

Question 6: Expand the following abbreviations:

AbbreviationExpansion
HTTPHyper Text Transfer Protocol
VOIPVoice Over Internet Protocol

Question 7: What is the difference between HTTP and FTP?

HTTP is used to transfer web pages and multimedia content, while FTP is used specifically to upload or download files between systems over the internet.

Question 8: What would you use for audio-visual chat with a remote expert?

VOIP (Voice Over Internet Protocol) is the best option for audio-visual communication over long distances.

Question 9: Name one server-side scripting language and one client-side scripting language.

  • Client Side: JavaScript, VBScript
  • Server Side: ASP, JSP

Question 10: Which of the following comes under cybercrime?

Operating someone’s internet banking account without their knowledge is considered a cybercrime.

Question 11: Name two proprietary software along with their application.

  • MS-Office: Used for document creation, spreadsheets, and presentations (MS-Word, Excel, PowerPoint)
  • Visual Studio: Used for application development using Visual Basic, Visual C++

Question 12: Name some cyber offences under the IT Act.

  • Tampering with computer source documents
  • Hacking
  • Publishing obscene content in electronic form

Question 13: What are the three ways of protecting intellectual property?

  • Patents
  • Copyrights
  • Trademarks

Question 14: When a user browses a website, the web server sends a text file to the web browser. What is this called?

Cookies – small text files used to store session data, preferences, or tracking information.

Short Answer Type Questions – I [2 mark each]

Question 1: Define the following:

Firewall: A system designed to prevent unauthorized access to or from a private network. It can be implemented in both hardware and software, or a combination of both.

VoIP (Voice-over-Internet Protocol): A methodology and group of technologies for delivering voice communications and multimedia sessions over Internet Protocol (IP) networks such as the Internet.

Question 2: Give the full form of the following terms:

TermFull Form
XMLExtensible Markup Language
FLOSSFree-Libre Open Source Software
HTTPHyper Text Transfer Protocol
FTPFile Transfer Protocol

Question 3: Differentiate between WORM and VIRUS in computer terminology.

  • Virus: A virus directly affects the system by corrupting data. It attaches itself to a program or file and spreads when the infected file is shared or executed.
  • Worm: A worm is a subclass of a virus that can spread automatically from one computer to another without human intervention.

Question 4: Expand the following:

AbbreviationFull Form
GSMGlobal System for Mobile Communication
GPRSGeneral Packet Radio Service

Question 5: Expand the following abbreviations:

AbbreviationFull Form
HTTPHyper Text Transfer Protocol
VOIPVoice Over Internet Protocol

Question 6: Give the full form of:

TermFull Form
FOSSFree Open Source Software
HTTPHyper Text Transfer Protocol

Question 7: Write the full forms of the following:

AbbreviationFull Form
GNUGNU’s Not Unix
XMLExtensible Markup Language

Question 8: Expand the following terminologies:

AbbreviationFull Form
GSMGlobal System for Mobile Communication
WLLWireless Local Loop

Question 9: Give the full forms of the following terms:

AbbreviationFull Form
CDMACode Division Multiple Access
TDMATime Division Multiple Access
FDMAFrequency Division Multiple Access

Question 10: Expand the following abbreviations:

AbbreviationFull Form
FTPFile Transfer Protocol
TCPTransmission Control Protocol
SMTPSimple Mail Transfer Protocol
VOIPVoice Over Internet Protocol

Short Answer Type Questions-II [3 marks each]

Question 1: Give two examples of PAN and LAN type of networks.

Type of NetworkCharacteristicsExample
PAN (Personal Area Network) Spans a few meters Bluetooth using 2 mobiles, laptops sharing files
LAN (Local Area Network) Spans up to a km Systems in a lab in a school, systems at home

Question 2: Which protocol helps us to browse through web pages using internet browsers? Name any one internet browser.

Protocol: HTTP (Hypertext Transfer Protocol)

Example of Internet Browser: Google Chrome

Question 3: Write two advantages of 4G over 3G Mobile Telecommunication Technologies in terms of speed and services.

  • 4G offers much higher data rates, up to 100 Mbps or more.
  • 4G provides broader coverage and more stable connectivity than 3G.

Question 4: Write two characteristics of Web 2.0.

  • Web 2.0 features dynamic and interactive websites that allow user participation.
  • Only the updated portion of a webpage reloads, improving loading speed and efficiency.