Class 12 Computer Science (Python) – Chapter 9 Networking and Open Source Concepts

Chapter Overview – Networking and Open Source Concepts

Chapter 9 introduces students to the essential concepts of computer networks and open-source software. It explores how digital devices communicate over networks, the types of networks, communication protocols, and the basics of Internet technology. Additionally, the chapter covers open-source philosophy, licensing, and tools, promoting awareness of collaborative software development.

This chapter is vital for understanding how modern systems communicate, share resources, and collaborate in real-time. It builds a foundational understanding for careers in IT, software development, cybersecurity, and network administration.

What You Will Learn in Chapter 9

This chapter helps students grasp the fundamental principles of networking and the role of open-source software in today’s tech landscape. It covers the architecture of computer networks, IP addressing, Internet protocols, and the significance of open-source tools and licenses. Students also learn about cloud computing and mobile connectivity.

Key Topics Covered

Introduction to Computer Networking

  • Computer networks allow data sharing between devices.

  • Networks can be classified based on size and range (LAN, MAN, WAN).

Types of Networks

  • LAN (Local Area Network): Limited to small geographical areas (e.g., homes, schools).

  • MAN (Metropolitan Area Network): Covers a city or large campus.

  • WAN (Wide Area Network): Spans large areas, like countries (e.g., the Internet).

  • PAN (Personal Area Network): Short-range networks for personal devices (e.g., Bluetooth).

Network Devices

  • Modem, Router, Switch, Hub, Access Point: Essential for setting up and managing networks.

  • Functions of devices and how they connect systems.

Transmission Media

  • Wired Media: Twisted pair, coaxial cable, optical fiber.

  • Wireless Media: Radio waves, microwaves, infrared.

Network Topologies

  • Bus, Star, Ring, Mesh, Tree Topologies

  • Visual representations and advantages/disadvantages of each.

Protocols and IP Addressing

  • IP Address: Unique identifier for devices on a network.

  • IPv4 vs IPv6

  • Common Protocols:

    • HTTP/HTTPS: Web communication

    • FTP: File transfer

    • SMTP/POP3/IMAP: Email

    • TCP/IP: Foundational communication suite

Internet and Web Services

  • URL, Domain Name System (DNS), ISP

  • Cloud Computing: On-demand access to computing resources.

  • Web Hosting and Website Addressing

Mobile Connectivity

  • 3G, 4G, 5G, Wi-Fi, Bluetooth

  • Use of mobile networks and hotspots in communication.

Open Source Concepts

Definition and Philosophy

  • Open-source software allows users to view, modify, and distribute code.

  • Promotes collaboration, transparency, and innovation.

Proprietary vs Open Source Software

  • Differences in accessibility, licensing, and usage rights.

Popular Open-Source Tools

  • Operating Systems: Linux, Ubuntu

  • Web Servers: Apache

  • Software Platforms: MySQL, LibreOffice

Open Source Licenses

  • GPL (General Public License), Apache License, MIT License

  • Understanding user rights, modification, and redistribution terms.

Download Chapter 9 Solutions PDF – Networking and Open Source Concepts

Our downloadable PDF includes:

  • NCERT textbook questions with complete solutions

  • Topic-wise theory and concept notes

  • Diagrams of network types and topologies

  • Protocol charts, device roles, and IP addressing examples

  • Open-source licensing charts and real-world use cases

Highlights of Our NCERT Solutions

  • Clearly explained networking concepts with diagrams

  • Definitions and differences between key terms (LAN/WAN, HTTP/FTP, etc.)

  • Practical examples of networking devices and transmission media

  • Conceptual clarity on IP addressing and Internet protocols

  • Open-source tools and license comparison made easy

Recommended Preparation Tips

  • Memorize types of networks and their characteristics.

  • Understand functions of networking devices and common protocols.

  • Study different network topologies with labeled diagrams.

  • Learn key differences between open-source and proprietary software.

  • Familiarize yourself with common open-source tools and licenses.

Additional Study Resources

  • Flashcards: Network types, devices, and protocols

  • Charts for IP classes and OSI model layers

  • Worksheets on identifying transmission media and topologies

  • CBSE sample papers and PYQs on networking topics

  • Infographics on open-source software and licensing models

Mastering Chapter 9 – Networking and Open Source Concepts

This chapter provides essential knowledge of how modern communication systems operate and how software is developed and distributed in an open environment. Understanding these concepts is crucial for excelling in computer science and related fields such as cybersecurity, cloud computing, and software engineering.

Mastery of networking basics and open-source tools empowers students for future-ready careers and boosts confidence for practical problem-solving and real-world IT applications.

Class 12 Computer Science (Python) – Chapter 9 Networking and Open Source Concepts

NCERT Textbook Questions Solved – Class 12 Computer Science (Python)

Very Short Answer Type

Question 1:

Identify the Domain Name and URL from the following:
http://www.income.in/home.aboutus.html

Answer:
Domain Name: income.in
URL: http://www.income.in/home.aboutus.html

Question 2:

What is web hosting?

Answer:
Web hosting is a service that provides storage space and access for websites on the Internet. It allows websites to be accessible to users worldwide by storing the site\’s files on a server connected to the web.

Question 3:

Write two characteristics of Wi-Fi.

Answer:

  • It enables wireless connectivity without physical cables.
  • It is suitable for short-range communication, typically within a building or room.

Question 4:

Which protocol is used to create a connection with a remote machine?

Answer:
Telnet is the protocol used to connect to a remote machine. It allows users to log into another computer over a network and operate it as if it were local, often for terminal emulation.

Question 5:

Which protocol is used to create a connection to a remote machine? Give any two advantages of using optical fibers.

Answer:

Protocol: Telnet

Advantages of Optical Fibers:

  • They support extremely high-speed data transfer.
  • They are immune to electromagnetic interference.
  • They have very low signal attenuation.

Question 6:

Expand the following:

AbbreviationFull Form
GSMGlobal System for Mobile Communication
GPRSGeneral Packet Radio Service

Question 7:

What is the difference between packet switching and message switching?

Answer:

Packet SwitchingMessage Switching
Data is divided into smaller packets that travel independently.The entire message is sent as a whole from one node to the next.
Faster and efficient in high-traffic networks.Slower due to message buffering at each node.

Question 8:

What is cloud computing?

Answer:
Cloud computing refers to the delivery of computing services—including servers, storage, databases, networking, software, and analytics—over the Internet (“the cloud”) to offer flexible resources, faster innovation, and economies of scale.

Question 9:

Which type of network (out of LAN, PAN, and MAN) is formed when you connect two mobiles using Bluetooth to transfer a video?

Answer:
PAN (Personal Area Network)

Question 10:

Write one characteristic each for 2G and 3G mobile technologies.

Answer:

  • 2G: Primarily supports voice communication.
  • 3G: Supports high-speed data transfer in addition to voice services.

Question 11:

What is the difference between packet switching and circuit switching techniques?

Answer:

Packet SwitchingCircuit Switching
No dedicated path; packets may take different routes.A dedicated path is reserved from source to destination.
Efficient for bursty data like emails and web browsing.Suitable for real-time voice calls.

Question 12:

Write two advantages of using an optical fibre cable over an Ethernet cable to connect two service stations that are 200 meters apart.

Answer:

  • Optical fibres offer much faster data transfer speeds.
  • They experience lower signal loss over long distances compared to Ethernet cables.

Question 13:

Write one advantage of bus topology of network. Also illustrate how four (4) computers can be connected with each other using bus topology.

Answer:
An advantage of bus topology is that it uses the least amount of cable compared to other topologies, making it cost-effective.

Bus Topology Illustration:

Computer A ─┬───────────────┬─ Computer B
            │               │
          Backbone       Backbone
            │               │
Computer C ─┴───────────────┴─ Computer D

Question 14:

Give one suitable example of each: URL and Domain Name.

Answer:

  • URL: http://waltons.in
  • Domain Name: gmail.com

Question 15:

Write one advantage of star topology network. Also illustrate how five (5) computers can be connected using star topology.

Answer:
An advantage of star topology is that it is easy to install or remove devices without affecting the rest of the network.

Star Topology Illustration:

               Computer A
                   |
                   |
Computer B —— Hub —— Computer C
                   |
                   |
             Computer D
                   |
                   |
             Computer E

Question 16: What is the function of a Modem?

Answer: A modem (Modulator-Demodulator) converts digital signals from a computer into analog signals for transmission over telephone lines (modulation) and converts incoming analog signals back into digital form (demodulation).

Question 17: Explain the purpose of a router.

Answer: A router is a device that connects multiple networks together and directs data packets between them. It determines the best path for data to travel using a routing table and supports different networking protocols.

Question 18: Name any two components required for networking.

Answer:

  • Repeater
  • Router

Question 19: What are repeaters?

Answer: A repeater is a network device that receives a signal, amplifies or regenerates it, and retransmits it. This helps the signal travel longer distances without losing quality.

Question 20: Mention one advantage of star topology over bus topology.

Answer: In a star topology, it is easy to add or remove computers without affecting the rest of the network, which is not the case in a bus topology.

Question 21: Differentiate between packet switching and message switching.

FeaturePacket SwitchingMessage Switching
Data UnitDivided into small packetsEntire message sent as a single unit
StorageNo storage required at intermediate nodesMessage is stored temporarily at each node
SpeedFaster and more efficientSlower due to store-and-forward mechanism

Question 22: Differentiate between Bus and Star topology.

FeatureBus TopologyStar Topology
Cable UsageOne single backbone cableIndividual cable connects each node to hub
Failure ImpactWhole network fails if main cable failsOnly affected device is disconnected if cable fails
CostCheaper due to less cablingExpensive due to more cabling required
PerformanceSlower with more devicesBetter performance as each node is independent

Question 23: What is VoIP?

Answer: VoIP (Voice over Internet Protocol) allows users to make voice calls using an internet connection instead of a regular telephone line. It converts voice into digital packets and sends them over the internet.

Question 24: In networking, what is WAN? How is it different from LAN?

FeatureWAN (Wide Area Network)LAN (Local Area Network)
Coverage AreaLarge (cities, countries, or continents)Small (home, office, school)
ComponentsUses telephone lines, satellites, etc.Uses Ethernet cables or Wi-Fi
SpeedGenerally slowerGenerally faster

Question 25: Define the term bandwidth. Give any one unit of bandwidth.

Answer: Bandwidth refers to the amount of data that can be transferred over a network in a specific amount of time.

Unit: bps (bits per second). Other units include kbps, Mbps, Gbps.

Question 26: What is the difference between LAN and MAN?

FeatureLAN (Local Area Network)MAN (Metropolitan Area Network)
Area CoveredWithin a building or campusCovers a city or town
SpeedHigh-speedModerate speed
ExampleHome or office networkCable TV network in a city

Question 27: What is the importance of URL in networking?

Answer: A URL (Uniform Resource Locator) specifies the address of a web resource on the internet. It helps locate and access files, webpages, or services using web browsers.

Question 28: What was the role of ARPANET in the computer network?

Answer: ARPANET (Advanced Research Projects Agency Network) was the first operational packet-switching network developed in 1969 by the US government for defense purposes. It laid the foundation for the modern internet.

Question 29: Which of the following is not a unit for data transfer rate?

  • (i) bps
  • (ii) abps
  • (iii) gbps
  • (iv) kbps

Answer: (ii) abps is not a valid unit for data transfer rate.

Question 30: Identify the type of topology from the following:

  • Each node is connected with the help of a single cable
  • Each node is connected with the help of an independent cable with a central switch
DescriptionTopology Type
Each node is connected with a single cableBus Topology
Each node is connected independently to a central switch or hubStar Topology

Question 31:

ABC International School is planning to connect all computers, each spread over a distance of 50 metres. Suggest an economic cable type having high speed data transfer to connect these computers.

Answer:
Optical fibre cable.

Question 32:

Mahesh wants to transfer data within a city at very high speed. Write the wired transmission medium and type of network.

Answer:
Wired transmission medium – Optical fibre cable
Type of network – MAN (Metropolitan Area Network)

Question 33:

Which device is used to connect all computers inside a lab?

Answer:
A Hub is used to connect all the computers in a lab. It acts as a central device that allows multiple computers to communicate with each other within a local area network (LAN).

Question 34:

Which device is used to connect all computers to the internet using telephone wire?

Answer:
The Modem is the device used to connect computers to the Internet via telephone lines. It modulates and demodulates digital data into analog signals and vice versa for transmission over telephone networks.
Note: RJ-45 is actually a connector for Ethernet cables, not telephone wires. For DSL internet via telephone lines, an RJ-11 connector is used. So the correct device is \”Modem.\”

Question 35:

What is a Wi-Fi Card?

Answer:
A Wi-Fi card is a hardware device installed in a computer or laptop that enables it to connect to wireless networks. It uses radio waves to receive and transmit data, allowing the device to access the Internet or other network resources without physical cables.

Short Answer Type Questions

Question 1:

Write any two differences between twisted pair and coaxial pair cable.

Answer:

  • Structure: A twisted pair cable consists of two insulated copper wires twisted around each other, whereas a coaxial cable consists of a central copper conductor surrounded by insulation, a metallic shield, and an outer insulating layer.
  • Data Transmission: Coaxial cables provide higher bandwidth and better shielding against electromagnetic interference compared to twisted pair cables.

Question 2:

Write one advantage of Bus Topology of network. Also, illustrate how 4 computers can be connected with each other using Star Topology.

Answer:

  • Advantage of Bus Topology: It requires the least amount of cable compared to other topologies, making it cost-effective for small networks.
  • Star Topology Illustration: In star topology, all four computers are connected individually to a central device like a hub or switch. The central device manages the data traffic and acts as the communication bridge between all nodes.

Question 3:

Explain any two switching techniques used in networking.

Answer:

  • Message Switching: In this method, entire messages are transferred from one node to another and stored temporarily at intermediate nodes before being forwarded. It is similar to how letters are delivered through a post office.
  • Packet Switching: Here, messages are broken into smaller data units called packets. These packets are sent independently across the network and reassembled at the destination, allowing efficient use of bandwidth and better fault tolerance.

Long Answer Type Questions

Question 1: Network Configuration Solutions

(a) Differentiate between PAN and LAN types of networks:

ParameterPAN (Personal Area Network)LAN (Local Area Network)
DefinitionNetwork for personal devices, typically within 10 meters.Network connecting devices in a limited geographical area, such as a building or campus.
RangeUp to 10 metersUp to 1 kilometer
DevicesSmartphones, laptops, tabletsComputers, printers, servers
ExampleBluetooth networkOffice LAN

(b) Which protocol helps us to transfer files to and from a remote computer?

  • FTP (File Transfer Protocol)
  • Telnet
  • TCP (Transmission Control Protocol)

(c) Write two advantages of 3G over 2G mobile telecommunication technologies in terms of speed and services:

  • Speed: Faster web browsing and file transfer
  • Services: Better video clarity and improved security

(d) Write two characteristics of Web 2.0:

  • Makes web more interactive through online social media
  • Supports easy online information exchange and video sharing

(e) Write the basic difference between worm and Trojan Horse:

ParameterWormTrojan Horse
DefinitionA self-replicating malware that spreads across networks.A malicious software disguised as legitimate software.
Spread MechanismAutomatically spreads by exploiting vulnerabilities.Relies on user interaction to install.
DamageCan slow down or crash networks.Steals information or damages files.

(f) Categorize the following under client-side and server-side scripts:

ScriptCategory
JavaScriptClient-Side
ASPServer-Side
VBScriptClient-Side
JSPServer-Side

(g) Intelligent Hub India Network Configuration:

i) Server Placement Suggestion:
The server should be placed at YTOWN, as it has the maximum number of computers and is closest to all other locations.

ii) Wired Medium:
The most suitable wired medium would be Optical Fiber, as it offers high-speed data transfer and is ideal for long-distance communication.

iii) Hardware Device for Connectivity:
A Switch or Hub should be installed to connect all the computers within each location.

iv) Server/Protocol for Live Interaction:
Video Conferencing or VoIP protocols would be most helpful for live interaction between experts at the Head Office and people at YHUB locations.

Question 2: Indian School Network Configuration

i) Cable Layout Suggestion: The cable layout should be a star topology, where the central hub connects all the buildings (Senior, Junior, Admin, Hostel) efficiently.

ii) Server Placement: The server should be placed in the ADMIN building, as it has the maximum number of computers.

iii) Device Placement:

DevicePlacement
RepeaterBetween ADMIN and SENIOR buildings to extend the distance.
Hub/SwitchIn all buildings to connect multiple computers efficiently.

iv) Suitable Transmission Media for Interconnecting the School and Inquiry Office:

  • Fiber Optic Cable
  • Microwave
  • Radiowave

Question 3: Vidya Senior Secondary Public School Network Configuration

i) Suitable Topology: A star topology would be the most suitable as it provides efficient communication between all the wings.

ii) Server Placement: The server should be placed in the SENIOR wing, as it has the maximum number of computers.

iii) Device Placement: Hub/Switch should be placed in all wings to connect multiple computers.

iv) Communication Medium: Radiowaves would be the best option as they are reliable and can travel through obstacles like hills.

Question 5: Network Classification and Protocols

i) Suitable Network for Connecting Two Adjacent Computer Labs: LAN (Local Area Network) should be used as it is ideal for networks covering short distances.

ii) Difference Between HTTP and FTP:

HTTPFTP
Used for transferring web pages.Used for transferring files between systems.
Stateless protocol.Stateful protocol.

iii) Major Difference Between Message Switching and Packet Switching:

  • Message Switching: Entire message is sent in one go.
  • Packet Switching: The message is divided into packets for efficient transmission.

iv) Basic Difference Between DNS and URL:

  • DNS (Domain Name System): Resolves domain names to IP addresses.
  • URL (Uniform Resource Locator): Specifies the address of a web resource.

v) Application of Web 2.0:

  • Web Hosting
  • Web Browsing

vi) Categorizing Scripts:

ScriptCategory
JSPServer-Side
JavaScriptClient-Side
ASPServer-Side
VBScriptClient-Side

Question 6: Trine Tech Corporation (TTC)

Suggested Server Block: Finance Block, because it has the maximum number of computers.

Block to Cable Layout

Finance
HR
Accounts
R&D

Connectivity Between Bangalore and London

Best Connectivity: Satellite link

Suggested Networking Device

Suggested Device: Switch

Question 7: G.R.K International Inc.

Suggested Server Block: Human Resources, because it has the maximum number of computers.

Cable Layout Among the Blocks

HR
Finance
Tech
Admin

Networking Device for Each Block

Suggested Networking Device: Switch

Media for Connectivity Between Bengaluru and Delhi

Suggested Media: Satellite link

Question 8: Rovenza Communications International (RCI)

Suggested Server Block: Faculty Recording Block

Cable Layout Among the Blocks

Faculty
IT
Admin

Network Type

Network Type: LAN

Wireless Channel for Global Connection

Wireless Channel: Satellite

Advantages of Open Source Software

  • Open source software’s source code is available, can be modified, copied & distributed while proprietary software cannot be changed.
  • Open source software is free, while proprietary software is paid.

Cybercrime Definition

Crime that does not fall under Cybercrime: Stealing keyboard and mouse from a shop.

Question 9: Networking Topology & Other Concepts

Identify the Type of Topology

Star Topology: Since every node is directly connected to the server, a large amount of cable is needed which increases the installation cost of the network.

Bus Topology: It has a single common data path connecting all the nodes.

Expansion of Acronyms

AcronymExpansion
VOIPVoice Over Internet Protocol
SMTPSimple Mail Transfer Protocol

Who is a Hacker?

A hacker is a computer enthusiast who uses programming skills to intentionally access a computer without authorization, typically not for malicious purposes.

IP Address

The 32-bit binary number represented as four decimal values (e.g., 140.179.220.200) is an IP Address. It is used to identify computers on a network.

Type of Network for Data Sharing

Network Type: MAN (Metropolitan Area Network)

Rehaana Medicos Center Network Setup

Suggested Server Block: Research Lab, as it contains the maximum number of computers.

Cabling and Network Device Placement

  • Repeater should be placed between Accounts and Store due to the large distance to avoid signal loss.
  • Hub/Switch should be placed in the server room to efficiently manage the traffic between the blocks.

System to Prevent Unauthorized Access

Suggested System: Firewall

Question 10: Domain Name vs. IP Address

Domain Name: An alphanumeric address used to identify a resource over the network (e.g., www.Gabsclasses.com).

IP Address: A numeric address assigned to a resource in a network (e.g., 102.112.0.153).

Advantages of Optical Fibre over Ethernet Cable

  • Faster Communication
  • Free from electrical & noise interference

EPG Campus Setup

Suggested Server Building: Faculty Studio Building

Suggested Network Type: LAN

Suggested Wireless Channel: Satellite

Question 11: Telemedicine Network Setup

Link Type for Network Setup

Suggested Link: Radio Link

Network Type for Telemedicine

Network Type: MAN (Metropolitan Area Network)

Consultation Method

Consultation Method: Email

Protocol for Receiving Emails

Protocol: POP3

What are Cookies?

Cookies are small files that store user information and are used to identify the user when they log into a system.

Script Type for Client Side Validation

Script Type: Server-side script

Freeware vs Free Software

Difference: Freeware is software available for unlimited use at no cost, while free software may only be free for a limited time.

Question 12

Workalot Consultants are setting up a secured network for their office campus at Gurgaon for their day-to-day office and web-based activities. They are planning to have connectivity between three buildings and the head office situated in Mumbai. Answer the questions (i) to (iv) after going through the building positions in the campus and other details.

Answer:

The most suitable place to install the server is building \”RED\” because this building has the maximum number of computers, which reduces communication delay.

Cable Layout:

Since the cabling distance between buildings GREEN, BLUE, and RED are quite large, so a repeater would ideally be needed along their path to avoid loss of signals during the course of data flow in their routes.

Switch Placement: In the layout, a switch is needed in all the buildings to interconnect the group of cables from the different computers in each building.

High-Speed Link to Mumbai: The most suitable cable for the high-speed link between the organization and the head office in Mumbai is Optical Fiber.

Question 13

Granuda Consultants are setting up a secured network for their office campus at Faridabad for their day-to-day office and web-based activities. They are planning to have connectivity between 3 buildings and the head office situated in Kolkata. Answer the questions (i) to (iv) after going through the building positions in the campus and other details.

Answer:

The most suitable place to install the server is building \”JAMUNA\” because this building has the maximum number of computers, which reduces the communication delay.

Cable Layout:

We recommend Bus Topology for cabling between buildings.

Repeater Placement: Since the cabling distance between buildings GANGA and JAMUNA is quite large, a repeater should be placed along the route to avoid signal loss.

Switch Placement: A switch should be installed in each building to interconnect the group of cables from the different computers in each building.

High-Speed Link to Kolkata: The most suitable cable for the high-speed link between the organization and the head office in Kolkata is Optical Fiber.

Question 14

India Skills Hub is a skill development community which has an aim to promote the standard of skills in the society. It is planning to set up its training centres in multiple towns and villages Pan India with its head offices in the nearest cities. Answer the questions (i) to (iv), keeping in mind the distances between various locations and other given parameters.

Answer:

The most suitable location for the server is UVW-TOWN because it is approximately equidistant from the villages P, Q, and R, ensuring efficient connectivity.

Cable Layout:

For connectivity between UVW-TOWN and the head office, Optic Fiber is recommended, while for connecting the villages P, Q, and R with the server at UVW-TOWN, Co-axial cable should be used.

Device Placement: The villages P, Q, and R can be connected with the server at UVW-TOWN by using a Hub, and the head office is connected by a Bus topology.

Protocol for Live Interaction: For live interactions, HTTP protocol can be used, and other terminals can be connected using UDP or FTP protocols.

Question 15

Mudra Publishing is a group of companies engaged in publishing IT-related books located in the hilly area of Shimla. The companies are located in four different blocks whose layout is shown in the following figure.

Answer:

The most suitable topology is Bus Topology due to the central connection point provided by the backbone.

The most suitable block to house the server is BLOCK-D because it has the maximum number of computers.

Device Placement:

Switch Placement: A switch should be placed in each block to manage communication between computers.

Repeater Placement: A repeater should be installed between BLOCK-D and BLOCK-C to enhance signal strength due to the long distance.

High-Speed Connectivity to Delhi:

The most economic way to connect the Shimla campus to the marketing office in Delhi would be the use of Radiowave Transmission, as it is easy to install, can travel long distances, and penetrate buildings effectively.

TOPIC-2
Network Security and Web Service
Very Short Answer Type Questions

Question 1: Define firewall.

Answer:
A firewall is a security system designed to monitor and control incoming and outgoing network traffic. It serves to prevent unauthorized access to or from a private network. Firewalls can be implemented as hardware, software, or a combination of both.

Question 2: Write any two examples of Server-side Scripts.

Answer:

  • ASP (Active Server Pages)
  • PHP (Hypertext Preprocessor)

Question 3: What is the difference between E-mail & Chat?

Answer:

  • Email is asynchronous communication, meaning messages are sent and read at different times.
  • Chat, on the other hand, is typically real-time communication, where both parties are online at the same time.
AspectEmailChat
Communication1-way communication2-way communication
Real-timeNo (Delayed)Yes (Near real-time)

Question 4: Write names of any two popular open source software, which are used as operating systems.

Answer:

  • Linux
  • Unix

Question 5: What is the difference between video conferencing and chat?

Answer:
In video conferencing, multiple participants can interact using text, video, and audio. It allows group communication. In contrast, chat is generally a one-to-one communication tool and typically involves only text-based interaction.

Question 6: Expand the following abbreviations:

  • HTTP: Hyper Text Transfer Protocol
  • VOIP: Voice Over Internet Protocol

Question 7: What is the difference between HTTP and FTP?

Answer:

  • HTTP (HyperText Transfer Protocol) is used for transferring web pages and multimedia content over the internet.
  • FTP (File Transfer Protocol) is used for transferring files over the internet.
ProtocolPurposeUsage
HTTPTransfer text and multimedia contentBrowsing websites
FTPTransfer files between client and serverFile-sharing, uploading/downloading

Question 8: What out of the following will you use to have an audio-visual chat with an expert sitting in a far-away place to fix-up a technical issue?

  • VoIP
  • Email
  • FTP

Answer: (i) VoIP (Voice over Internet Protocol) is the most suitable for audio-visual communication.

Question 9: Name one server-side scripting language and one client-side scripting language.

Answer:
Client-side: JavaScript, VBScript
Server-side: ASP, JSP

Question 10: Which out of the following comes under cyber crime?

  • Operating someone’s internet banking account without his knowledge.
  • Stealing a keyboard from someone’s computer.
  • Working on someone’s computer with his/her permission.

Answer:
(i) Operating someone’s internet banking account, without his knowledge.

Question 11: Name two proprietary software along with their application.

Answer:

  • MS Office: A suite of applications like MS Word, MS Excel, MS PowerPoint.
  • Visual Studio: An integrated development environment for application development in languages like Visual Basic, C++, etc.

Question 12: Out of the following, identify client-side scripts and server-side scripts:

  • ASP
  • Javascript
  • VBScript
  • JSP

Answer:
Server-side scripts: ASP, JSP
Client-side scripts: JavaScript, VBScript

Question 13: Compare open-source software and proprietary software.

Answer:

FeatureOpen-Source SoftwareProprietary Software
LicenseFree to use and modifyPaid license, permission required to use
ModificationSource code is available for modificationSource code is not available
UsageCan be used, modified, and distributed freelyUse is restricted by the license

Question 14: Differentiate between XML and HTML.

Answer:
XML (Extensible Markup Language) is used to store and transport data with a focus on the structure and meaning of the data.
HTML (Hypertext Markup Language) is used to display data on web pages, with a focus on presentation.

AspectXMLHTML
PurposeData transport and storageWeb page presentation
FlexibilityUser-defined tagsPredefined tags for web structure
Data HandlingHandles data in a machine-readable formDisplays content in a human-readable form

Question 15: What is WEB 2.0?

Answer:
Web 2.0 refers to the second generation of web-based services and applications that focus on collaboration, sharing, and user-generated content. It includes social media platforms, blogs, wikis, and other interactive web technologies.

Question 16: Which of the following is/are not a client-side script?

  • VB Script
  • Java Script
  • ASP
  • PHP

Answer:
(iii) ASP and (iv) PHP are server-side scripts.

Question 17: If someone has hacked your website, to whom you lodge the complaint?

Answer:
The complaint should be lodged with the police under the IT Act, which governs cybercrimes in India.

Question 18: What do you mean by IP address? How is it useful in computer security?

Answer:
An IP address is a unique numerical identifier assigned to each device on a network. It is essential for routing data between devices on the internet and plays a crucial role in security by identifying and tracking the location of systems in the network.

Question 19: What do you mean by spam mails? How can you protect your mailbox from spams?

Answer:
Spam mails are unsolicited and often irrelevant emails sent in bulk to numerous recipients. You can protect your mailbox by setting up spam filters or using third-party anti-spam tools.

Question 20: When do you prefer XML over HTML and why?

Answer:
XML is preferred over HTML when you need a flexible data structure that can be customized with your own tags. Unlike HTML, which has predefined tags, XML allows users to define tags suited to their specific needs, providing more flexibility in data representation.

Question 21: How does a firewall protect our network?

Answer:
A firewall is a security device designed to monitor and control incoming and outgoing network traffic. It functions based on predefined rules to either allow or block traffic. The firewall can be hardware, software, or a combination of both. By controlling traffic between different security zones, it prevents unauthorized access while permitting authorized communication.

How a firewall works:

Firewall FunctionDescription
PermitAllows authorized communication from trusted sources.
BlockDenies access from untrusted or unauthorized sources.
EncryptEncrypts data to ensure secure transmission.
DecryptDecrypts data to make it readable by authorized systems.
ProxyActs as an intermediary between users and the services they access.

Question 22: Compare freeware and shareware.

Answer:
Freeware is software that is made available to users at no cost, but it is still proprietary. The author retains certain rights to the software, such as restricting copying or making modifications.
Shareware is a type of software that is offered for free for a limited time or with limited functionality. To access the full version of the software, users must purchase a license.

Comparison:

AspectFreewareShareware
PriceFreeFree trial, but requires purchase for full version
ModificationNot allowedUsually restricted
SupportNo supportLimited support, full support with purchase

Question 23: How are Trojan horses different from worms? Mention any one difference.

Answer:
A Trojan horse is malware that appears to perform a useful function but actually facilitates unauthorized access to the user\’s computer. It does not self-replicate.
A worm is a self-replicating program that spreads across networks without user intervention, often causing harm by using resources and spreading itself.

Difference:

AspectTrojan HorseWorm
ReplicationDoes not replicateReplicates itself
FunctionAppears useful but facilitates unauthorized accessSpreads across networks and consumes resources

Question 24: Give the full form of:

  • FOSS: Free Open Source Software
  • HTTP: Hyper Text Transfer Protocol

Question 25: What is the difference between a Trojan horse and a virus in terms of computers?

Answer:
A Trojan horse is a non-self-replicating malware that appears to perform a desirable function but instead facilitates unauthorized access. A computer virus, on the other hand, is a self-replicating program that spreads from one system to another and can cause damage to files and systems.

Difference:

AspectTrojan HorseVirus
ReplicationDoes not replicateReplicates itself
FunctionAppears useful but facilitates unauthorized accessSpreads and infects other systems

Question 26: Which term is used for a software/hardware device that is used to block unauthorized access while permitting authorized communications?

Answer: The term is Firewall.

Question 27: Write the full forms of the following:

  • GNU: GNU\’s Not Unix
  • XML: Extensible Markup Language

Question 28: Expand the following terminologies:

  • GSM: Global System for Mobile Communication
  • WLL: Wireless Local Loop

Question 29: Name some cyber offences under the IT Act.

Answer:

  • Tampering with computer source documents
  • Hacking
  • Publishing obscene information in electronic form

Question 30: What are the three ways of protecting intellectual property?

Answer:
The three main ways of protecting intellectual property are:

  • Patents
  • Copyrights
  • Trademarks

Question 31: When a user browses a website, the web server sends a text file to the web browser. What is the name of this?

Answer: The text file is called a Cookie.

Short Answer Type Questions

Question 1: Define the following

TermDefinition
FirewallA firewall is a security system—either software, hardware, or a combination of both—that is designed to prevent unauthorized access to or from a private network. It filters incoming and outgoing traffic based on a defined set of security rules.
VoIP (Voice over Internet Protocol)VoIP is a technology that enables voice communication and multimedia sessions over the Internet. It converts voice signals into digital data packets and transmits them over IP networks such as the Internet.

Illustration: How VoIP Works

[Microphone] → [VoIP Software] → [Internet] → [Receiver’s VoIP App] → [Speaker]

Question 2: Give the full form of the following terms

TermFull Form
XMLExtensible Markup Language
FLOSSFree-Libre Open Source Software
HTTPHypertext Transfer Protocol
FTPFile Transfer Protocol

Question 3: Differentiate between WORM and VIRUS

FeatureWORMVIRUS
Spread MechanismSelf-replicates and spreads across networks without user actionAttaches to files/programs and spreads when the host file is executed
User InteractionNot requiredRequired
System ImpactConsumes bandwidth or slows down systemCan corrupt or delete files
NatureSubclass of virusIndependent malware program

Question 4: Expand the following

AbbreviationFull Form
GSMGlobal System for Mobile Communication
GPRSGeneral Packet Radio Service

Question 5: Expand the following abbreviations

AbbreviationFull Form
HTTPHypertext Transfer Protocol
VoIPVoice Over Internet Protocol

Question 6: Give the full form of

TermFull Form
FOSSFree Open Source Software
HTTPHypertext Transfer Protocol

Question 7: Write the full forms of the following

AbbreviationFull Form
GNUGNU’s Not Unix
XMLExtensible Markup Language

Question 8: Expand the following terminologies

AbbreviationFull Form
GSMGlobal System for Mobile Communication
WLLWireless Local Loop

Question 9: Give the full forms of the following terms

AbbreviationFull Form
CDMACode Division Multiple Access
TDMATime Division Multiple Access
FDMAFrequency Division Multiple Access

Question 10: Expand the following abbreviations

AbbreviationFull Form
FTPFile Transfer Protocol
TCPTransmission Control Protocol
SMTPSimple Mail Transfer Protocol
VoIPVoice Over Internet Protocol