Students can Download 2nd PUC Computer Science Chapter 15 Networking Concepts Questions and Answers, Notes Pdf, 2nd PUC Computer Science Question Bank with Answers helps you to revise the complete Karnataka State Board Syllabus and to clear all their doubts, score well in final exams.
Karnataka 2nd PUC Computer Science Question Bank Chapter 15 Networking Concepts
2nd PUC Computer Science Networking Concepts One Mark Questions and Answers
Question 1.
What is networking?
Answer:
A network is an inter-connection of autonomous computers. Two computer are said to be interconnected if they are capable to exchange & to support information.
Question 2.
What is server?
Answer:
It is a main computer to which many clients are connected.
Question 3.
What is client?
Answer:
Individual machine connected to server.
Question 4.
What is topology?
Answer:
A topology is the actual appearance or layout of network.
Question 5.
Explain 2G?
Answer:
2nd Generation.
Question 6.
What is virus?
Answer:
Computer virus is a malicious program that requires a host & is designed to make a system sick.
Question 7.
What is chatting?
Answer:
Chatting is a waey for people to communicate love with each other by typing the text messages which is immediately seen by the person who is online.
Question 8.
What is cyber law?
Answer:
Cyber Law is a generic term, which refers to all the legal and regulatory aspects of internet & the WWW.
Question 9.
What are cookies?
Answer:
Cookies are messages that a web server transmits to a web browses so that a web server can keep track of the user’s activity on a specific web site.
Question 10.
What are Hackers?
Answer:
Hackers are more interested in gaining knowledge about compute systems & possible using this knowledge for playful pranks.
2nd PUC Computer Science Networking Concepts Two Marks Questions and Answers
Question 1.
List the Goals for networking?
Answer:
The network goals are as listed below.
- Resource sharing: The aim is to make all the program, data 4 peripherals available to anyone on the network irrespective of the physical location of the resources & the user.
- Reliability: A file can have copies on two or three different machines. So if one of them is unviable, the other copies could be used.
- Cost factor: Personal computers have better price/ performance ratio than micro computers.
- Communication medium: using a network, it is possible for managers, working far apart, to prepare financial report of the company.
Question 2.
What do you mean by transmission models?
Answer:
By transmission media or communication channels of network, it is meant that the connecting cables or connecting media are being talked about. The cables that connect two or more workstations are the communication channels.
Question 3.
Which are the Switching technology used?
Answer:
Circuit switching. Message switching & Packet switching
Question 4.
What is SIM card?
Answer:
The SIM – Subscriber Identity Module – is a chip card, the SIZE of a postage stamp. A SIM is a tiny computer chip that gives a cellular device its unique phone number. It has memory, a processor & the ability to interact with the user.
Question 5.
What is network security?
Answer:
The networking offers endless possibilies & opportunities to every user of it, alone with convince. But this convinces and endless benefits are not free from risks as there are many a risks to network security.
Question 6.
What are advantage of EDGE?
Answer:
Enhanced Data rates for Glodab Evolution (EDGE) are a ratio based mobile high speed data standard. It allows data transmission speeds of 384 kbps to be achieved when all eight-time slots are used. In fact, EDGE was formerly called GSM 384. This means a maximum bit rate of 48 kbps per time slot.
2nd PUC Computer Science Networking Concepts Three Marks Questions and Answers
Question 1.
Explain HTTP.
Answer:
The Hypertext Transfer protocol (HTTP) is an application level protocol with the lightness & speed necessary for distributed. Collaborative, hypermedia intormation system. HTTP allows an open-ended set of methods to be used to indicate the purpose of a request.
It builds on the discipline of reference provided by the uniform Resource Identifier (URI), as a location URL or name (URN) for indicating the resource on which a method is to be applied. Messages are passed to HTTP in a format similar to that used by internet mail & multipurpos e Internet Mail Extensions (MIME).
Question 2.
Classify & Explain servers.
Answer:
Non-dedicated servers:
On small networks, a workstation that can double as a server is know as nondedicated server it is not completely dedicated to the cause of serving. Such servers can facilitate the resource-sharing among the work stations on a proportiontely on a smaller scale. Since one computer works as a work station and as well as server, it is slower and requires more memory. The network using such a server are known as peeR-To-PeeR net work.
Dedicated servers:
On bigger network installations, there is a computer reserved for server’s Job & its only Job is to help workstations & access data, software & hardware resources. It does not double-up as a workstation & such a server is known as dedicated server. The networks using such server are known as MASTER SLAVE network.
Question 3.
Explain the types of networking.
Answer:
1. A Local Area Network (LAN):
refers to a combintion of computer hardware & transmission media that is relatively small. LAN’S normally do not exceed tens of kilometers in size & tend to use only one type of transmission medium. The transmission medium normally employs cable or wire. In addition, a LAN is normally entirely contained within a building or camps.
2. A wide Area Network (WAN):
includes all networks larger than LAN, WANs interconnect LAN’S, which may be at opposite sides of country or located around the world.
3. A Metropolitan Area Network (MAN):
is some where between a LAN and a MAN. The term MAN is sometimes used to refer to networks, which connect systems or local area networks within a metropolitan area.
Question 4.
Which are the networking techniques?
Answer:
Circuit Switching:
In this technique, first the complete physical connection between two computers is established and the data are transmitted from the source computer. The important property of this switching technique is to setup an end path (connection) between computers before any data can be sent.
Message switching:
In this technique, the source, compter sends data to the switching office first, which stores the data in the buffer link to another switching office & then sends, the data the process is continued until the data in delivered to the Ho, owing to its working principle, it is also known as store first (in switching office), forward laterr. One Jump at a time.
Packet switching:
With message switching, there is no limit on back size, in contrast, packet switching places a tight upper limit on block size. A fixed size of packet which can be transmitted across the network is specified.
Question 5.
Explain the cables & different types of cables used the transmission.
Answer:
Twisted pair cable:
The most common form of wiring in data communication is the twisted pair cable. It consists of two identical wires wrapped together in a double helix.
Types of Twisted pair cables:
There are two types of twisted pair cables available. There are,
1. Unshielded Twisted Pair (UTP) cable:
HTTP cabling is used fqr variety of electronic communications. It is available in the following five categories.
Type | Dercription |
CAT 1 | Voice-grade communications only; No data transmission |
CAT 2 | Data-grade transmission up to 4 Mbps |
CAT 3 | Data-grade transmission up to 10 Mbps |
CAT 4 | Data-grade transmission up to 16 Mbps |
CAT 5 | Data- grade transmission up to 1000 Mbps. |
2. Shielded Twisted pair (STP) cable:
This type of cables come with sheilding of the individual pairs of wires, which further protects it form external interference. But there also, like UTP, can have maximum length of 100 metres. The advantage of STP over UTP is that it offers greater protection from interference & crosstalk due to shielding.
Types of coaxial cables:
The two most commonly used types of coaxial table are Thicknet & Thinnet.
- Thicknet: This form of coaxial cable is thicker than thinnet. The thicknet coaxial cuble segments can be upto 500 metres long.
- Thinnet: This from of coaxial cable is thinner & it have maximum segment length of 185 metres i.e. using this cable, nodes having maximum mdistance of 185 metres can be Joined.
Question 6.
List the difference between simplex, half-duplex & full-duplex.
Answer:
Depending on the transmission media, the communication model is divided into three types.
- Simplex: It is a one-way communication in which the transmitting device can only send the data & cannot receive. The receiving device can only receive the data & can not send. eg: broadcast radio, television.
- Half Duplex: It is a two-way communication in which both transmitter & receiver can send & receive the data but not simultaneously. They can access at one at a time.
- Full Duplex: It is a two-way communication in which both transmitter and receiver can send & receive the data simultaneously. eg: Internet,
Question 7.
Explain the applications of networking.
Answer:
Need of Networking:
- File sharing provides sharing & grouping of data files over the network.
- Print sharing of compter resource such as hard disk & printers etc.
- email tools for communication with the e-mail address.
- Remote access able to access data & information, around the globe.
- Sharing database to multiple users at the same type by ensuring the integrity.
2nd PUC Computer Science Networking Concepts Five Marks Questions and Answers
Question 1.
Explain the working of OSI & TCP/IP.
Answer:
1. The Physical layer:
The physical layer is concerned with transmitting raw bots over a communication channel. It also deals with mechanical, electrical and timing interfaces.
2. The Data link layer:
The main function of the data link layer is to transform a raw transmission facility in to a line that appears free of undetected transmission errors.
3. The network layer:
The network layer controls the operation of the subnet. The main function to determine how packets are routed from source to destination.
4. The transport Layer:
The basic function of transport layer is to accept data from above layer and split it into smaller units if needed, and pass these to the network layer and ensure that the pieces all arrive correctly at the other end. It also determines types of service to provide to the session layer.
5. The session layer:
The session layer allow users on different machines to establish session between them. It includes dialog control, token management and synchronization.
6. The presentation layer:
The presentation layer concerned with the syntax and semantics of the information transmitted concerned with moving bits around the layer.
7. The application layer:
The application layer contains a variety of protocols that are commonly needed by the uses, for example, HTTP [Hyper Text Transfer Protocol] which is the bases for the World Wide Web (WWW) to access web pages.
TCP/IP [Transmission Contral Protocol/Interent Protocol]:
TCP/IP is the base communication protocol of the part of TCP/IP uses numeric IP addresses to join network segment and TCP/ IP provides a reliable delivery message between networked computes. It is based on the “catenet model” This model assumes that there are a large number of independent networks connected together by gateways. The user should be able to access computers or other resources on any of these networks.
Datagram will pass often through a dozen different networks before getting their final destination. The routing need to accomplish this should be completely invisible to the user. As far is the user concerned, all he needed to know in order to access another system is an ” internet address” This is an address that looks like 128. 64. 194. 1. It is actually a 32-bit number however it is normally written as 4 decimal numbers, each representing 8 bits of the address.
Question 2.
Explain various networking devices used?
Answer:
1. Modem (Modulator & Demodulator):
Modems allow you to combine the power of your computer with the global reach of the telephone system- Because ordinary telephone lines digital information, a modem changed the a format that can be carried by telephone lines. In a similar manner, the modem retrieving the call then changes the analog single back into digital data to the computer. This shift of digital data into analog data back again, allows two computer to communicate with one another, called modulation & demodulation.
2. Ethernet card:
An Ethernet card contains connections for either coaxial or Twisted. Pair cables (or both). If it is designed for coaxial cables, the connection will be BNC. If it is designed for twisted pair, it will have a RJ-45 Connection. Some Ethernet cards also contain An AVI Connector. This can be used to attach coaxial twisted pair or fibre optic cables to an ethernet card.
3. Hub:
A hub is a hardware device used to connect several computers together. A hub that contains multiple independent but connected modules of network and internet worked equipment. A similar term is a concentrator. A concentrator is a device that provides a central connection point for cables from work stations, server and peripherals.
4. Switch:
A switch is a device that is used to segment networks into different sub networks called subnets or LAN segments. Segmenting the network into smaller subnets prevents traffic overloading in a network.
5. Repeater:
A Repeater is a device that amplifies a signal being transmitted on the network. It is used in long network lines, which exceed the maximum rated distance for a single run. Over distance, the cables connecting a network lose the signal transmitted. If the signal degrades too much, It fails to reach the destination, or if it does arrive, the degradation of the message makes it useless. Repeaters can be installed along the way to ensure that data packets their destination.
6. Bridge:
A bridge is a device that lets you link two networks together. Bridges are smart enough to know which computers are on which side of the bridge, so they allow only those message that need to get to the other side of the bridge.
7. Router:
A device that works like a bridge but can handle different protocols is known as a router. For example, a router can link ethernet to a mainframe. If the destination is known to a router it sends the traffic [bound to unknown destination] to another router (using logical addresses) which known the destination. A router differs from a bridge in a way that former uses logical addressees- and the latter rises physical addresses.
Question 3.
What is topology explain in detail.
Answer:
A topology is the actual appearance or layout of the network. Some of the popular topologies are Bus (Linear Bus), star, Ring & mesh.
1. Linear Bus:
The linear bus topology connects all the nodes to common straight cable. All the nodes to a common straight cable. All the nodes on the network share the common bus. The topology is very reliable since a failure on one or more nodes does not affect the bus. The disadvantages of the linear bus are the need for minimum distances between nodes to avoid signal interference. & the loss of data caused by simultaneous transmission by two nodes.
2. Star Network:
In a star network, each node is conneted directly to the central computer. All communications between the nodes have to pass through the central computer. Star network allow the network administrator to give selected hodes higher priopity & also allow centralized running of diagnostic programs. Each node is conneted to the central computer using a device a called Hub.
3. Ring Network:
In a ring network, all nodes are connected to a common cable & the cable start and ends at network server. In this type of network, communications are always in one direction & the data being transmitted is passed through each node in the ring. A major disadvantage of this network is that when a node fails, it can completely halt all communications on the network.
4. Mesh:
A pure mesh network has point-to-point connections between every node in the network. Pure mesh architectures are not usually considered practical. One problem is that each requires an interface for every other device on the network. Another problem is that the amount of cable for a large network is tremendous.
Question 4.
What is gateway? Explain.
Answer:
A Getway is a device that connets dissimilar networks. A gateway operates at the highest layer of network abstraction. It expands the functionality of routers by performing data translation & protocal conversion. It is needed to convert Ethernet traffic from the LAN, to SAN (systems network Architecture) traffic on a legacy system.
It the routes the SNA traffic to the mainframe. When the mainframe answers, the reverse process occurs. A gateway is usually a node on a network that serves as an entrance to another network. It enterprises the gateway is the computer that routes the traffic from the workstation to the outside network that is serving the web pages.
In homes, the gateway is the ISP that connects the user to the internet. In enterprises. The gateway nodes often acts as a proxy server (a machine that is actually not a server but appears as a server) & a firewall (a system designed to prevent unauthorized access to or form a private network).
The gateway is also associated with both a router, which use headers & forwarding tables to determine where packets are sent, & a switch, which provides the actual path for the packet in & out of the gateway.
Question 5.
Explain the network security in detail.
Answer:
Network security makes sure that only legal authorized user & programs gain access to information resources like databases. Also certain control mechanisms are setup that properly authenticated users to get access only to those resources that they are entitled to use. Under this type of security, mechanisms like authorization, authentication, encrypted smart cards, biometrics &firewalls, etc are implemented. The problems encountered under network security can be summarized as follows.
- physical security holes: When individuals gain unauthorized physical access to a computer and tamper with files. Hackers do it by guessing passwords of various users & then gaining access to the network systems.
- Software security holes: When badly written programs or ‘privileged’ software are compromised into doing things that they should not be doing.
- Inconsistent usage holes: When a system administrator assembles a combination of hardware & software such that the system is seriously from a security point of
view.
Question 6.
Give the measures for preventing virus.
Answer:
Virus prevention is not a difficult task. All you need to be is extra careful of ensure to follow the following guidelines to lead virus fee computing life.
- Never use a ” foreign” disk or Cd without scanning it for virus.
- Allows scan files downloaded from the internet or that sources.
- Never boot your PC from a floppy unless you are certain that it is virus free.
- Write-protect your disks.
- Use licensed software.
- Password protect your PC to prevent unattended modification.
- Install & use antivirus software.
- Keep antivirus software upto date.
Some of the antivirus are Kaspersky, Quikheal, K7, Norton 360, Micro Trend Titanium, AVG, Panda, [SET ESET Nod 32, Avast. MCAFEE etc.,]
Cloud technology:
Cloud technology or cloud computing as it is more commonly known today is a computing platform widely used by information technology (IT) service companies.
2nd PUC Computer Science Networking Concepts Additional Questions and Answers
Question 1.
Mention different types of networks.
Answer:
LAN, MAN & WAN.
Question 2.
Mention any two network services.
Answer:
- File services.
- Message services.
Question 3.
Name any two- transmission technigues.
Answer:
- Circuit switching
- Message switching
Question 4.
What isl meant by topology?
Answer:
A topology is the actual appearance or layout of network.
Question 5.
How is LAN different from WAN?
Answer:
LAN is an art interconnection of computers within a single building or a small campus. The range of LANs varies from 10m to 15 km. Whereas WAN is a collection of computers that are geographically spread over a wide area. A WAN can span over a country or a continent, LANS offer lower delay & make very few errors. Whereas WANs offer greater delay between connections.
Question 6.
Write any one feature of LAN.
Answer:
LAN offers lower delay & make very few errors.
Question 7.
What is the main disadvantage of ring network topology?
Answer:
The main disadvantage of ring network topology is that when a node fails, it can completely halt all communication on the network.
Question 8.
Write anyone disadvantage of client-server network.
Answer:
In client-server network, the failure of server will result in failure of entire system.
Question 9.
Expand FTP.
Answer:
FTP stands for File Transfer protocol.
Question 10.
What do you mean by TCP/ IP?
Answer:
TCP/IP stands for Transmission control protocol/ Internet protocol, & represents the communication protocol used by all computers on the Internet.
Question 11.
Explain Bus topology.
Answer:
In Bus topology all the nodes are connected to a common straight cable and they share a common bus. This topology is reliable because the failure or ope on more nodes does not affect the bus. The disadvantage is that there should be minimum distances bet ween the nodes To avoid signal interferece & loss of data.
Question 12.
Explain about LAN, WAN and MAN.
Or
Explain different types of computer network.
Answer:
A Local Area Network (LAN):
refers to a combination of computer hardware & transmission media that is relatvely small. LANs normally do not exceed tens of kilometers in size & tend to use only one type of transmission medium. The transmission medium normally employed is cable or wire. In addition, a LAN is normally entirely contained within a building or campus.
A Wide Area Network (WAN):
includes all networks larger than LAN. WANs interconncet LANs, which may be at opposite sides of a country or located around the world. A metroplitan Area Network (MAN)- is same where between A LAN and a MAN. The term MAN is sometimes used to refer to networks which connect systems or local area networks within a metropolitan area.
Question 13.
Write any four advantages of computer network.
Answer:
Advantages of computer network are:
1. Speed:
Networks provide a very rapid method for sharing & transferring files. Without a network, files are shared by copying them to floppy disks, then carrying or sending the disks from one computer to another. This method of transferring files is very time-consuming.
2. Cost:
Network versions of application software are available at lower costs saving when compared to buying individually licensed copies. Besides a program on a network allows for easier upgrading of the program. The changes have to be done only once, on the file server, instead of an all the individual workstations.
3. Security:
Files and programs on a network can be protected, so that you do not have to worry about illegal copying of programs. Also passwords can be established for specified directories to restrict access only to authorized users.
4. Centralized Software Management:
One of the greatest benefits of installing a network is that software can be loaded on one compter i.e. the file server. This eliminates the need to spend time and energy installing updates and tracking files on independent computers throughout the building.