Class 12 Computer Science (Python) – Chapter 9 Networking and Open Source Concepts
Chapter Overview – Networking and Open Source Concepts
Chapter 9 introduces students to the essential concepts of computer networks and open-source software. It explores how digital devices communicate over networks, the types of networks, communication protocols, and the basics of Internet technology. Additionally, the chapter covers open-source philosophy, licensing, and tools, promoting awareness of collaborative software development.
This chapter is vital for understanding how modern systems communicate, share resources, and collaborate in real-time. It builds a foundational understanding for careers in IT, software development, cybersecurity, and network administration.
What You Will Learn in Chapter 9
This chapter helps students grasp the fundamental principles of networking and the role of open-source software in today’s tech landscape. It covers the architecture of computer networks, IP addressing, Internet protocols, and the significance of open-source tools and licenses. Students also learn about cloud computing and mobile connectivity.
Key Topics Covered
Introduction to Computer Networking
Computer networks allow data sharing between devices.
Networks can be classified based on size and range (LAN, MAN, WAN).
Types of Networks
LAN (Local Area Network): Limited to small geographical areas (e.g., homes, schools).
MAN (Metropolitan Area Network): Covers a city or large campus.
WAN (Wide Area Network): Spans large areas, like countries (e.g., the Internet).
PAN (Personal Area Network): Short-range networks for personal devices (e.g., Bluetooth).
Network Devices
Modem, Router, Switch, Hub, Access Point: Essential for setting up and managing networks.
Functions of devices and how they connect systems.
Transmission Media
Wired Media: Twisted pair, coaxial cable, optical fiber.
Wireless Media: Radio waves, microwaves, infrared.
Network Topologies
Bus, Star, Ring, Mesh, Tree Topologies
Visual representations and advantages/disadvantages of each.
Protocols and IP Addressing
IP Address: Unique identifier for devices on a network.
IPv4 vs IPv6
Common Protocols:
HTTP/HTTPS: Web communication
FTP: File transfer
SMTP/POP3/IMAP: Email
TCP/IP: Foundational communication suite
Internet and Web Services
URL, Domain Name System (DNS), ISP
Cloud Computing: On-demand access to computing resources.
Web Hosting and Website Addressing
Mobile Connectivity
3G, 4G, 5G, Wi-Fi, Bluetooth
Use of mobile networks and hotspots in communication.
Open Source Concepts
Definition and Philosophy
Open-source software allows users to view, modify, and distribute code.
Promotes collaboration, transparency, and innovation.
Proprietary vs Open Source Software
Differences in accessibility, licensing, and usage rights.
Popular Open-Source Tools
Operating Systems: Linux, Ubuntu
Web Servers: Apache
Software Platforms: MySQL, LibreOffice
Open Source Licenses
GPL (General Public License), Apache License, MIT License
Understanding user rights, modification, and redistribution terms.
Download Chapter 9 Solutions PDF – Networking and Open Source Concepts
Our downloadable PDF includes:
NCERT textbook questions with complete solutions
Topic-wise theory and concept notes
Diagrams of network types and topologies
Protocol charts, device roles, and IP addressing examples
Open-source licensing charts and real-world use cases
Highlights of Our NCERT Solutions
Clearly explained networking concepts with diagrams
Definitions and differences between key terms (LAN/WAN, HTTP/FTP, etc.)
Practical examples of networking devices and transmission media
Conceptual clarity on IP addressing and Internet protocols
Open-source tools and license comparison made easy
Recommended Preparation Tips
Memorize types of networks and their characteristics.
Understand functions of networking devices and common protocols.
Study different network topologies with labeled diagrams.
Learn key differences between open-source and proprietary software.
Familiarize yourself with common open-source tools and licenses.
Additional Study Resources
Flashcards: Network types, devices, and protocols
Charts for IP classes and OSI model layers
Worksheets on identifying transmission media and topologies
CBSE sample papers and PYQs on networking topics
Infographics on open-source software and licensing models
Mastering Chapter 9 – Networking and Open Source Concepts
This chapter provides essential knowledge of how modern communication systems operate and how software is developed and distributed in an open environment. Understanding these concepts is crucial for excelling in computer science and related fields such as cybersecurity, cloud computing, and software engineering.
Mastery of networking basics and open-source tools empowers students for future-ready careers and boosts confidence for practical problem-solving and real-world IT applications.
Class 12 Computer Science (Python) – Chapter 9 Networking and Open Source Concepts
NCERT Textbook Questions Solved – Class 12 Computer Science (Python)
Very Short Answer Type
Question 1:
Identify the Domain Name and URL from the following:http://www.income.in/home.aboutus.html
Answer:
Domain Name: income.in
URL: http://www.income.in/home.aboutus.html
Question 2:
What is web hosting?
Answer:
Web hosting is a service that provides storage space and access for websites on the Internet. It allows websites to be accessible to users worldwide by storing the site\’s files on a server connected to the web.
Question 3:
Write two characteristics of Wi-Fi.
Answer:
- It enables wireless connectivity without physical cables.
- It is suitable for short-range communication, typically within a building or room.
Question 4:
Which protocol is used to create a connection with a remote machine?
Answer:
Telnet is the protocol used to connect to a remote machine. It allows users to log into another computer over a network and operate it as if it were local, often for terminal emulation.
Question 5:
Which protocol is used to create a connection to a remote machine? Give any two advantages of using optical fibers.
Answer:
Protocol: Telnet
Advantages of Optical Fibers:
- They support extremely high-speed data transfer.
- They are immune to electromagnetic interference.
- They have very low signal attenuation.
Question 6:
Expand the following:
Abbreviation | Full Form |
---|---|
GSM | Global System for Mobile Communication |
GPRS | General Packet Radio Service |
Question 7:
What is the difference between packet switching and message switching?
Answer:
Packet Switching | Message Switching |
---|---|
Data is divided into smaller packets that travel independently. | The entire message is sent as a whole from one node to the next. |
Faster and efficient in high-traffic networks. | Slower due to message buffering at each node. |
Question 8:
What is cloud computing?
Answer:
Cloud computing refers to the delivery of computing services—including servers, storage, databases, networking, software, and analytics—over the Internet (“the cloud”) to offer flexible resources, faster innovation, and economies of scale.
Question 9:
Which type of network (out of LAN, PAN, and MAN) is formed when you connect two mobiles using Bluetooth to transfer a video?
Answer:
PAN (Personal Area Network)
Question 10:
Write one characteristic each for 2G and 3G mobile technologies.
Answer:
- 2G: Primarily supports voice communication.
- 3G: Supports high-speed data transfer in addition to voice services.
Question 11:
What is the difference between packet switching and circuit switching techniques?
Answer:
Packet Switching | Circuit Switching |
---|---|
No dedicated path; packets may take different routes. | A dedicated path is reserved from source to destination. |
Efficient for bursty data like emails and web browsing. | Suitable for real-time voice calls. |
Question 12:
Write two advantages of using an optical fibre cable over an Ethernet cable to connect two service stations that are 200 meters apart.
Answer:
- Optical fibres offer much faster data transfer speeds.
- They experience lower signal loss over long distances compared to Ethernet cables.
Question 13:
Write one advantage of bus topology of network. Also illustrate how four (4) computers can be connected with each other using bus topology.
Answer:
An advantage of bus topology is that it uses the least amount of cable compared to other topologies, making it cost-effective.
Bus Topology Illustration:
Computer A ─┬───────────────┬─ Computer B │ │ Backbone Backbone │ │ Computer C ─┴───────────────┴─ Computer D
Question 14:
Give one suitable example of each: URL and Domain Name.
Answer:
- URL: http://waltons.in
- Domain Name: gmail.com
Question 15:
Write one advantage of star topology network. Also illustrate how five (5) computers can be connected using star topology.
Answer:
An advantage of star topology is that it is easy to install or remove devices without affecting the rest of the network.
Star Topology Illustration:
Computer A | | Computer B —— Hub —— Computer C | | Computer D | | Computer E
Question 16: What is the function of a Modem?
Answer: A modem (Modulator-Demodulator) converts digital signals from a computer into analog signals for transmission over telephone lines (modulation) and converts incoming analog signals back into digital form (demodulation).
Question 17: Explain the purpose of a router.
Answer: A router is a device that connects multiple networks together and directs data packets between them. It determines the best path for data to travel using a routing table and supports different networking protocols.
Question 18: Name any two components required for networking.
Answer:
- Repeater
- Router
Question 19: What are repeaters?
Answer: A repeater is a network device that receives a signal, amplifies or regenerates it, and retransmits it. This helps the signal travel longer distances without losing quality.
Question 20: Mention one advantage of star topology over bus topology.
Answer: In a star topology, it is easy to add or remove computers without affecting the rest of the network, which is not the case in a bus topology.
Question 21: Differentiate between packet switching and message switching.
Feature | Packet Switching | Message Switching |
---|---|---|
Data Unit | Divided into small packets | Entire message sent as a single unit |
Storage | No storage required at intermediate nodes | Message is stored temporarily at each node |
Speed | Faster and more efficient | Slower due to store-and-forward mechanism |
Question 22: Differentiate between Bus and Star topology.
Feature | Bus Topology | Star Topology |
---|---|---|
Cable Usage | One single backbone cable | Individual cable connects each node to hub |
Failure Impact | Whole network fails if main cable fails | Only affected device is disconnected if cable fails |
Cost | Cheaper due to less cabling | Expensive due to more cabling required |
Performance | Slower with more devices | Better performance as each node is independent |
Question 23: What is VoIP?
Answer: VoIP (Voice over Internet Protocol) allows users to make voice calls using an internet connection instead of a regular telephone line. It converts voice into digital packets and sends them over the internet.
Question 24: In networking, what is WAN? How is it different from LAN?
Feature | WAN (Wide Area Network) | LAN (Local Area Network) |
---|---|---|
Coverage Area | Large (cities, countries, or continents) | Small (home, office, school) |
Components | Uses telephone lines, satellites, etc. | Uses Ethernet cables or Wi-Fi |
Speed | Generally slower | Generally faster |
Question 25: Define the term bandwidth. Give any one unit of bandwidth.
Answer: Bandwidth refers to the amount of data that can be transferred over a network in a specific amount of time.
Unit: bps (bits per second)
. Other units include kbps
, Mbps
, Gbps
.
Question 26: What is the difference between LAN and MAN?
Feature | LAN (Local Area Network) | MAN (Metropolitan Area Network) |
---|---|---|
Area Covered | Within a building or campus | Covers a city or town |
Speed | High-speed | Moderate speed |
Example | Home or office network | Cable TV network in a city |
Question 27: What is the importance of URL in networking?
Answer: A URL (Uniform Resource Locator) specifies the address of a web resource on the internet. It helps locate and access files, webpages, or services using web browsers.
Question 28: What was the role of ARPANET in the computer network?
Answer: ARPANET (Advanced Research Projects Agency Network) was the first operational packet-switching network developed in 1969 by the US government for defense purposes. It laid the foundation for the modern internet.
Question 29: Which of the following is not a unit for data transfer rate?
- (i) bps
- (ii) abps
- (iii) gbps
- (iv) kbps
Answer: (ii) abps
is not a valid unit for data transfer rate.
Question 30: Identify the type of topology from the following:
- Each node is connected with the help of a single cable
- Each node is connected with the help of an independent cable with a central switch
Description | Topology Type |
---|---|
Each node is connected with a single cable | Bus Topology |
Each node is connected independently to a central switch or hub | Star Topology |
Question 31:
ABC International School is planning to connect all computers, each spread over a distance of 50 metres. Suggest an economic cable type having high speed data transfer to connect these computers.
Answer:
Optical fibre cable.
Question 32:
Mahesh wants to transfer data within a city at very high speed. Write the wired transmission medium and type of network.
Answer:
Wired transmission medium – Optical fibre cable
Type of network – MAN (Metropolitan Area Network)
Question 33:
Which device is used to connect all computers inside a lab?
Answer:
A Hub is used to connect all the computers in a lab. It acts as a central device that allows multiple computers to communicate with each other within a local area network (LAN).
Question 34:
Which device is used to connect all computers to the internet using telephone wire?
Answer:
The Modem is the device used to connect computers to the Internet via telephone lines. It modulates and demodulates digital data into analog signals and vice versa for transmission over telephone networks.
Note: RJ-45 is actually a connector for Ethernet cables, not telephone wires. For DSL internet via telephone lines, an RJ-11 connector is used. So the correct device is \”Modem.\”
Question 35:
What is a Wi-Fi Card?
Answer:
A Wi-Fi card is a hardware device installed in a computer or laptop that enables it to connect to wireless networks. It uses radio waves to receive and transmit data, allowing the device to access the Internet or other network resources without physical cables.
Short Answer Type Questions
Question 1:
Write any two differences between twisted pair and coaxial pair cable.
Answer:
- Structure: A twisted pair cable consists of two insulated copper wires twisted around each other, whereas a coaxial cable consists of a central copper conductor surrounded by insulation, a metallic shield, and an outer insulating layer.
- Data Transmission: Coaxial cables provide higher bandwidth and better shielding against electromagnetic interference compared to twisted pair cables.
Question 2:
Write one advantage of Bus Topology of network. Also, illustrate how 4 computers can be connected with each other using Star Topology.
Answer:
- Advantage of Bus Topology: It requires the least amount of cable compared to other topologies, making it cost-effective for small networks.
- Star Topology Illustration: In star topology, all four computers are connected individually to a central device like a hub or switch. The central device manages the data traffic and acts as the communication bridge between all nodes.
Question 3:
Explain any two switching techniques used in networking.
Answer:
- Message Switching: In this method, entire messages are transferred from one node to another and stored temporarily at intermediate nodes before being forwarded. It is similar to how letters are delivered through a post office.
- Packet Switching: Here, messages are broken into smaller data units called packets. These packets are sent independently across the network and reassembled at the destination, allowing efficient use of bandwidth and better fault tolerance.
Long Answer Type Questions
Question 1: Network Configuration Solutions
(a) Differentiate between PAN and LAN types of networks:
Parameter | PAN (Personal Area Network) | LAN (Local Area Network) |
---|---|---|
Definition | Network for personal devices, typically within 10 meters. | Network connecting devices in a limited geographical area, such as a building or campus. |
Range | Up to 10 meters | Up to 1 kilometer |
Devices | Smartphones, laptops, tablets | Computers, printers, servers |
Example | Bluetooth network | Office LAN |
(b) Which protocol helps us to transfer files to and from a remote computer?
- FTP (File Transfer Protocol)
- Telnet
- TCP (Transmission Control Protocol)
(c) Write two advantages of 3G over 2G mobile telecommunication technologies in terms of speed and services:
- Speed: Faster web browsing and file transfer
- Services: Better video clarity and improved security
(d) Write two characteristics of Web 2.0:
- Makes web more interactive through online social media
- Supports easy online information exchange and video sharing
(e) Write the basic difference between worm and Trojan Horse:
Parameter | Worm | Trojan Horse |
---|---|---|
Definition | A self-replicating malware that spreads across networks. | A malicious software disguised as legitimate software. |
Spread Mechanism | Automatically spreads by exploiting vulnerabilities. | Relies on user interaction to install. |
Damage | Can slow down or crash networks. | Steals information or damages files. |
(f) Categorize the following under client-side and server-side scripts:
Script | Category |
---|---|
JavaScript | Client-Side |
ASP | Server-Side |
VBScript | Client-Side |
JSP | Server-Side |
(g) Intelligent Hub India Network Configuration:
i) Server Placement Suggestion:
The server should be placed at YTOWN, as it has the maximum number of computers and is closest to all other locations.
ii) Wired Medium:
The most suitable wired medium would be Optical Fiber, as it offers high-speed data transfer and is ideal for long-distance communication.
iii) Hardware Device for Connectivity:
A Switch or Hub should be installed to connect all the computers within each location.
iv) Server/Protocol for Live Interaction:
Video Conferencing or VoIP protocols would be most helpful for live interaction between experts at the Head Office and people at YHUB locations.
Question 2: Indian School Network Configuration
i) Cable Layout Suggestion: The cable layout should be a star topology, where the central hub connects all the buildings (Senior, Junior, Admin, Hostel) efficiently.
ii) Server Placement: The server should be placed in the ADMIN building, as it has the maximum number of computers.
iii) Device Placement:
Device | Placement |
---|---|
Repeater | Between ADMIN and SENIOR buildings to extend the distance. |
Hub/Switch | In all buildings to connect multiple computers efficiently. |
iv) Suitable Transmission Media for Interconnecting the School and Inquiry Office:
- Fiber Optic Cable
- Microwave
- Radiowave
Question 3: Vidya Senior Secondary Public School Network Configuration
i) Suitable Topology: A star topology would be the most suitable as it provides efficient communication between all the wings.
ii) Server Placement: The server should be placed in the SENIOR wing, as it has the maximum number of computers.
iii) Device Placement: Hub/Switch should be placed in all wings to connect multiple computers.
iv) Communication Medium: Radiowaves would be the best option as they are reliable and can travel through obstacles like hills.
Question 5: Network Classification and Protocols
i) Suitable Network for Connecting Two Adjacent Computer Labs: LAN (Local Area Network) should be used as it is ideal for networks covering short distances.
ii) Difference Between HTTP and FTP:
HTTP | FTP |
---|---|
Used for transferring web pages. | Used for transferring files between systems. |
Stateless protocol. | Stateful protocol. |
iii) Major Difference Between Message Switching and Packet Switching:
- Message Switching: Entire message is sent in one go.
- Packet Switching: The message is divided into packets for efficient transmission.
iv) Basic Difference Between DNS and URL:
- DNS (Domain Name System): Resolves domain names to IP addresses.
- URL (Uniform Resource Locator): Specifies the address of a web resource.
v) Application of Web 2.0:
- Web Hosting
- Web Browsing
vi) Categorizing Scripts:
Script | Category |
---|---|
JSP | Server-Side |
JavaScript | Client-Side |
ASP | Server-Side |
VBScript | Client-Side |
Question 6: Trine Tech Corporation (TTC)
Suggested Server Block: Finance Block, because it has the maximum number of computers.
Block to Cable Layout
Finance
HR
Accounts
R&D
Connectivity Between Bangalore and London
Best Connectivity: Satellite link
Suggested Networking Device
Suggested Device: Switch
Question 7: G.R.K International Inc.
Suggested Server Block: Human Resources, because it has the maximum number of computers.
Cable Layout Among the Blocks
HR
Finance
Tech
Admin
Networking Device for Each Block
Suggested Networking Device: Switch
Media for Connectivity Between Bengaluru and Delhi
Suggested Media: Satellite link
Question 8: Rovenza Communications International (RCI)
Suggested Server Block: Faculty Recording Block
Cable Layout Among the Blocks
Faculty
IT
Admin
Network Type
Network Type: LAN
Wireless Channel for Global Connection
Wireless Channel: Satellite
Advantages of Open Source Software
- Open source software’s source code is available, can be modified, copied & distributed while proprietary software cannot be changed.
- Open source software is free, while proprietary software is paid.
Cybercrime Definition
Crime that does not fall under Cybercrime: Stealing keyboard and mouse from a shop.
Question 9: Networking Topology & Other Concepts
Identify the Type of Topology
Star Topology: Since every node is directly connected to the server, a large amount of cable is needed which increases the installation cost of the network.
Bus Topology: It has a single common data path connecting all the nodes.
Expansion of Acronyms
Acronym | Expansion |
---|---|
VOIP | Voice Over Internet Protocol |
SMTP | Simple Mail Transfer Protocol |
Who is a Hacker?
A hacker is a computer enthusiast who uses programming skills to intentionally access a computer without authorization, typically not for malicious purposes.
IP Address
The 32-bit binary number represented as four decimal values (e.g., 140.179.220.200) is an IP Address. It is used to identify computers on a network.
Type of Network for Data Sharing
Network Type: MAN (Metropolitan Area Network)
Rehaana Medicos Center Network Setup
Suggested Server Block: Research Lab, as it contains the maximum number of computers.
Cabling and Network Device Placement
- Repeater should be placed between Accounts and Store due to the large distance to avoid signal loss.
- Hub/Switch should be placed in the server room to efficiently manage the traffic between the blocks.
System to Prevent Unauthorized Access
Suggested System: Firewall
Question 10: Domain Name vs. IP Address
Domain Name: An alphanumeric address used to identify a resource over the network (e.g., www.Gabsclasses.com).
IP Address: A numeric address assigned to a resource in a network (e.g., 102.112.0.153).
Advantages of Optical Fibre over Ethernet Cable
- Faster Communication
- Free from electrical & noise interference
EPG Campus Setup
Suggested Server Building: Faculty Studio Building
Suggested Network Type: LAN
Suggested Wireless Channel: Satellite
Question 11: Telemedicine Network Setup
Link Type for Network Setup
Suggested Link: Radio Link
Network Type for Telemedicine
Network Type: MAN (Metropolitan Area Network)
Consultation Method
Consultation Method: Email
Protocol for Receiving Emails
Protocol: POP3
What are Cookies?
Cookies are small files that store user information and are used to identify the user when they log into a system.
Script Type for Client Side Validation
Script Type: Server-side script
Freeware vs Free Software
Difference: Freeware is software available for unlimited use at no cost, while free software may only be free for a limited time.
Question 12
Workalot Consultants are setting up a secured network for their office campus at Gurgaon for their day-to-day office and web-based activities. They are planning to have connectivity between three buildings and the head office situated in Mumbai. Answer the questions (i) to (iv) after going through the building positions in the campus and other details.
Answer:
The most suitable place to install the server is building \”RED\” because this building has the maximum number of computers, which reduces communication delay.
Cable Layout:
Since the cabling distance between buildings GREEN, BLUE, and RED are quite large, so a repeater would ideally be needed along their path to avoid loss of signals during the course of data flow in their routes.
Switch Placement: In the layout, a switch is needed in all the buildings to interconnect the group of cables from the different computers in each building.
High-Speed Link to Mumbai: The most suitable cable for the high-speed link between the organization and the head office in Mumbai is Optical Fiber.
Question 13
Granuda Consultants are setting up a secured network for their office campus at Faridabad for their day-to-day office and web-based activities. They are planning to have connectivity between 3 buildings and the head office situated in Kolkata. Answer the questions (i) to (iv) after going through the building positions in the campus and other details.
Answer:
The most suitable place to install the server is building \”JAMUNA\” because this building has the maximum number of computers, which reduces the communication delay.
Cable Layout:
We recommend Bus Topology for cabling between buildings.
Repeater Placement: Since the cabling distance between buildings GANGA and JAMUNA is quite large, a repeater should be placed along the route to avoid signal loss.
Switch Placement: A switch should be installed in each building to interconnect the group of cables from the different computers in each building.
High-Speed Link to Kolkata: The most suitable cable for the high-speed link between the organization and the head office in Kolkata is Optical Fiber.
Question 14
India Skills Hub is a skill development community which has an aim to promote the standard of skills in the society. It is planning to set up its training centres in multiple towns and villages Pan India with its head offices in the nearest cities. Answer the questions (i) to (iv), keeping in mind the distances between various locations and other given parameters.
Answer:
The most suitable location for the server is UVW-TOWN because it is approximately equidistant from the villages P, Q, and R, ensuring efficient connectivity.
Cable Layout:
For connectivity between UVW-TOWN and the head office, Optic Fiber is recommended, while for connecting the villages P, Q, and R with the server at UVW-TOWN, Co-axial cable should be used.
Device Placement: The villages P, Q, and R can be connected with the server at UVW-TOWN by using a Hub, and the head office is connected by a Bus topology.
Protocol for Live Interaction: For live interactions, HTTP protocol can be used, and other terminals can be connected using UDP or FTP protocols.
Question 15
Mudra Publishing is a group of companies engaged in publishing IT-related books located in the hilly area of Shimla. The companies are located in four different blocks whose layout is shown in the following figure.
Answer:
The most suitable topology is Bus Topology due to the central connection point provided by the backbone.
The most suitable block to house the server is BLOCK-D because it has the maximum number of computers.
Device Placement:
Switch Placement: A switch should be placed in each block to manage communication between computers.
Repeater Placement: A repeater should be installed between BLOCK-D and BLOCK-C to enhance signal strength due to the long distance.
High-Speed Connectivity to Delhi:
The most economic way to connect the Shimla campus to the marketing office in Delhi would be the use of Radiowave Transmission, as it is easy to install, can travel long distances, and penetrate buildings effectively.
TOPIC-2
Network Security and Web Service
Very Short Answer Type Questions
Question 1: Define firewall.
Answer:
A firewall is a security system designed to monitor and control incoming and outgoing network traffic. It serves to prevent unauthorized access to or from a private network. Firewalls can be implemented as hardware, software, or a combination of both.
Question 2: Write any two examples of Server-side Scripts.
Answer:
- ASP (Active Server Pages)
- PHP (Hypertext Preprocessor)
Question 3: What is the difference between E-mail & Chat?
Answer:
- Email is asynchronous communication, meaning messages are sent and read at different times.
- Chat, on the other hand, is typically real-time communication, where both parties are online at the same time.
Aspect | Chat | |
---|---|---|
Communication | 1-way communication | 2-way communication |
Real-time | No (Delayed) | Yes (Near real-time) |
Question 4: Write names of any two popular open source software, which are used as operating systems.
Answer:
- Linux
- Unix
Question 5: What is the difference between video conferencing and chat?
Answer:
In video conferencing, multiple participants can interact using text, video, and audio. It allows group communication. In contrast, chat is generally a one-to-one communication tool and typically involves only text-based interaction.
Question 6: Expand the following abbreviations:
- HTTP: Hyper Text Transfer Protocol
- VOIP: Voice Over Internet Protocol
Question 7: What is the difference between HTTP and FTP?
Answer:
- HTTP (HyperText Transfer Protocol) is used for transferring web pages and multimedia content over the internet.
- FTP (File Transfer Protocol) is used for transferring files over the internet.
Protocol | Purpose | Usage |
---|---|---|
HTTP | Transfer text and multimedia content | Browsing websites |
FTP | Transfer files between client and server | File-sharing, uploading/downloading |
Question 8: What out of the following will you use to have an audio-visual chat with an expert sitting in a far-away place to fix-up a technical issue?
- VoIP
- FTP
Answer: (i) VoIP (Voice over Internet Protocol) is the most suitable for audio-visual communication.
Question 9: Name one server-side scripting language and one client-side scripting language.
Answer:
Client-side: JavaScript, VBScript
Server-side: ASP, JSP
Question 10: Which out of the following comes under cyber crime?
- Operating someone’s internet banking account without his knowledge.
- Stealing a keyboard from someone’s computer.
- Working on someone’s computer with his/her permission.
Answer:
(i) Operating someone’s internet banking account, without his knowledge.
Question 11: Name two proprietary software along with their application.
Answer:
- MS Office: A suite of applications like MS Word, MS Excel, MS PowerPoint.
- Visual Studio: An integrated development environment for application development in languages like Visual Basic, C++, etc.
Question 12: Out of the following, identify client-side scripts and server-side scripts:
- ASP
- Javascript
- VBScript
- JSP
Answer:
Server-side scripts: ASP, JSP
Client-side scripts: JavaScript, VBScript
Question 13: Compare open-source software and proprietary software.
Answer:
Feature | Open-Source Software | Proprietary Software |
---|---|---|
License | Free to use and modify | Paid license, permission required to use |
Modification | Source code is available for modification | Source code is not available |
Usage | Can be used, modified, and distributed freely | Use is restricted by the license |
Question 14: Differentiate between XML and HTML.
Answer:
XML (Extensible Markup Language) is used to store and transport data with a focus on the structure and meaning of the data.
HTML (Hypertext Markup Language) is used to display data on web pages, with a focus on presentation.
Aspect | XML | HTML |
---|---|---|
Purpose | Data transport and storage | Web page presentation |
Flexibility | User-defined tags | Predefined tags for web structure |
Data Handling | Handles data in a machine-readable form | Displays content in a human-readable form |
Question 15: What is WEB 2.0?
Answer:
Web 2.0 refers to the second generation of web-based services and applications that focus on collaboration, sharing, and user-generated content. It includes social media platforms, blogs, wikis, and other interactive web technologies.
Question 16: Which of the following is/are not a client-side script?
- VB Script
- Java Script
- ASP
- PHP
Answer:
(iii) ASP and (iv) PHP are server-side scripts.
Question 17: If someone has hacked your website, to whom you lodge the complaint?
Answer:
The complaint should be lodged with the police under the IT Act, which governs cybercrimes in India.
Question 18: What do you mean by IP address? How is it useful in computer security?
Answer:
An IP address is a unique numerical identifier assigned to each device on a network. It is essential for routing data between devices on the internet and plays a crucial role in security by identifying and tracking the location of systems in the network.
Question 19: What do you mean by spam mails? How can you protect your mailbox from spams?
Answer:
Spam mails are unsolicited and often irrelevant emails sent in bulk to numerous recipients. You can protect your mailbox by setting up spam filters or using third-party anti-spam tools.
Question 20: When do you prefer XML over HTML and why?
Answer:
XML is preferred over HTML when you need a flexible data structure that can be customized with your own tags. Unlike HTML, which has predefined tags, XML allows users to define tags suited to their specific needs, providing more flexibility in data representation.
Question 21: How does a firewall protect our network?
Answer:
A firewall is a security device designed to monitor and control incoming and outgoing network traffic. It functions based on predefined rules to either allow or block traffic. The firewall can be hardware, software, or a combination of both. By controlling traffic between different security zones, it prevents unauthorized access while permitting authorized communication.
How a firewall works:
Firewall Function | Description |
---|---|
Permit | Allows authorized communication from trusted sources. |
Block | Denies access from untrusted or unauthorized sources. |
Encrypt | Encrypts data to ensure secure transmission. |
Decrypt | Decrypts data to make it readable by authorized systems. |
Proxy | Acts as an intermediary between users and the services they access. |
Question 22: Compare freeware and shareware.
Answer:
Freeware is software that is made available to users at no cost, but it is still proprietary. The author retains certain rights to the software, such as restricting copying or making modifications.
Shareware is a type of software that is offered for free for a limited time or with limited functionality. To access the full version of the software, users must purchase a license.
Comparison:
Aspect | Freeware | Shareware |
---|---|---|
Price | Free | Free trial, but requires purchase for full version |
Modification | Not allowed | Usually restricted |
Support | No support | Limited support, full support with purchase |
Question 23: How are Trojan horses different from worms? Mention any one difference.
Answer:
A Trojan horse is malware that appears to perform a useful function but actually facilitates unauthorized access to the user\’s computer. It does not self-replicate.
A worm is a self-replicating program that spreads across networks without user intervention, often causing harm by using resources and spreading itself.
Difference:
Aspect | Trojan Horse | Worm |
---|---|---|
Replication | Does not replicate | Replicates itself |
Function | Appears useful but facilitates unauthorized access | Spreads across networks and consumes resources |
Question 24: Give the full form of:
- FOSS: Free Open Source Software
- HTTP: Hyper Text Transfer Protocol
Question 25: What is the difference between a Trojan horse and a virus in terms of computers?
Answer:
A Trojan horse is a non-self-replicating malware that appears to perform a desirable function but instead facilitates unauthorized access. A computer virus, on the other hand, is a self-replicating program that spreads from one system to another and can cause damage to files and systems.
Difference:
Aspect | Trojan Horse | Virus |
---|---|---|
Replication | Does not replicate | Replicates itself |
Function | Appears useful but facilitates unauthorized access | Spreads and infects other systems |
Question 26: Which term is used for a software/hardware device that is used to block unauthorized access while permitting authorized communications?
Answer: The term is Firewall.
Question 27: Write the full forms of the following:
- GNU: GNU\’s Not Unix
- XML: Extensible Markup Language
Question 28: Expand the following terminologies:
- GSM: Global System for Mobile Communication
- WLL: Wireless Local Loop
Question 29: Name some cyber offences under the IT Act.
Answer:
- Tampering with computer source documents
- Hacking
- Publishing obscene information in electronic form
Question 30: What are the three ways of protecting intellectual property?
Answer:
The three main ways of protecting intellectual property are:
- Patents
- Copyrights
- Trademarks
Question 31: When a user browses a website, the web server sends a text file to the web browser. What is the name of this?
Answer: The text file is called a Cookie.
Short Answer Type Questions
Question 1: Define the following
Term | Definition |
---|---|
Firewall | A firewall is a security system—either software, hardware, or a combination of both—that is designed to prevent unauthorized access to or from a private network. It filters incoming and outgoing traffic based on a defined set of security rules. |
VoIP (Voice over Internet Protocol) | VoIP is a technology that enables voice communication and multimedia sessions over the Internet. It converts voice signals into digital data packets and transmits them over IP networks such as the Internet. |
Illustration: How VoIP Works
[Microphone] → [VoIP Software] → [Internet] → [Receiver’s VoIP App] → [Speaker]
Question 2: Give the full form of the following terms
Term | Full Form |
---|---|
XML | Extensible Markup Language |
FLOSS | Free-Libre Open Source Software |
HTTP | Hypertext Transfer Protocol |
FTP | File Transfer Protocol |
Question 3: Differentiate between WORM and VIRUS
Feature | WORM | VIRUS |
---|---|---|
Spread Mechanism | Self-replicates and spreads across networks without user action | Attaches to files/programs and spreads when the host file is executed |
User Interaction | Not required | Required |
System Impact | Consumes bandwidth or slows down system | Can corrupt or delete files |
Nature | Subclass of virus | Independent malware program |
Question 4: Expand the following
Abbreviation | Full Form |
---|---|
GSM | Global System for Mobile Communication |
GPRS | General Packet Radio Service |
Question 5: Expand the following abbreviations
Abbreviation | Full Form |
---|---|
HTTP | Hypertext Transfer Protocol |
VoIP | Voice Over Internet Protocol |
Question 6: Give the full form of
Term | Full Form |
---|---|
FOSS | Free Open Source Software |
HTTP | Hypertext Transfer Protocol |
Question 7: Write the full forms of the following
Abbreviation | Full Form |
---|---|
GNU | GNU’s Not Unix |
XML | Extensible Markup Language |
Question 8: Expand the following terminologies
Abbreviation | Full Form |
---|---|
GSM | Global System for Mobile Communication |
WLL | Wireless Local Loop |
Question 9: Give the full forms of the following terms
Abbreviation | Full Form |
---|---|
CDMA | Code Division Multiple Access |
TDMA | Time Division Multiple Access |
FDMA | Frequency Division Multiple Access |
Question 10: Expand the following abbreviations
Abbreviation | Full Form |
---|---|
FTP | File Transfer Protocol |
TCP | Transmission Control Protocol |
SMTP | Simple Mail Transfer Protocol |
VoIP | Voice Over Internet Protocol |