You are on page 1of 7

UNIT:2 (Computer Network)

Session -2020-2021
Questions/Answer
Question .1 : Why is a switch called an intelligent hub?

Answer: A switch is called an intelligent hub because before simply


forwarding a packet it checks for the intended destination for the packet
and forwards it to that destination only, this is called packet filtering.
While a hub forwards a packet to all the workstations in a network but only
destination computer keeps it, rest all the computers drops that packet.

Question .2 : What is the use of Repeater in a network

Answer: In a network, repeater receives a weak signal coming from a


source an amplifies it to its original strength and then again forwards it
to the destination. Basically, repeater is used in a network so that a
signal can travel longer distances.

Question .3 : State two advantages of networking computers instead of


having standalone computers.

Answer: The two advantages of networking computers instead of standalone


computers are:

 Communicating with each other becomes easier.


 Shared resources.

Question .4 : What is the purpose of switch in a network?

Answer: A switch is a networking device which is used to connect


different LAN segments of a network. A switch also supports packet
filtering and forwarding between LAN segments.

Question .5: Expand (i) ODP (ii) HTTP

Answer:

(i) Open Distributed Processing

(ii) Hyper Text Transfer Protocol

Question .6: How is a Trojan Horse harmful to a network?

Answer: Trojan horse like a virus or worm. At the backend, these perform
some malicious activities like upload (send) some security les and
information from the computer and at the same time download some unwanted
les onto the computer.
Question .7: Write one advantage each of star and bus topology used in
networking.

Answer: Advantage of star topology is that it is most reliable as there


is a direct connection of every node with the central node or server.

Advantage of bus topology is that all nodes are connected through a single
length of a cable so very short cable length is used.

Question .8: Write the name of the most suitable wireless communication
channels for each of the following situations.

(i) Communication between two offices in two different countries.

(ii) To transfer the data from one mobile phone to another. (Delhi
2013)

Answer:

(i) Satellite Communication

(ii) Bluetooth or infrared whichever is supported by the phone.

Question .9 : Mr. Chander vardhan is not able to identify the Domain Name
in the given URL. Identify and write it for him.

http.//www.cbsenic.in/aboutus.htm

Answer: Domain in http://www.cbsenic.in/aboutus.htm is “www.cbsenic.in”.

Question .10 : Gyan Deep International School is planning to connect all


computers, each spread over a distance within 40 m. Suggest an economical
cable type having high-speed data transfer, which can be used to connect
these computers. (Delhi 2012)

Answer: The economical cable with high-speed data transfer can be co-
axial cable.

Question.11 : Name any two most popularly used search engines.

Answer: Two most popular search engines are google and grotel.com

(url:http://www.google.com and http://grotel.com)

Question .12 : Raj Kamal International School is planning to connect all


computers, each spread over distance within 45 m. Suggest an economical
cable type having high speed data transfer, which can be used to connect
these computers. (All India 2012)

Answer:

The economical cable with high speed data transfer can be co-axial cable.
Question .13 : Which communication channel is suitable when very fast
communication between two offices in two different countries is required?
(Delhi 2012c)

Answer: For very fast communication between two countries, satellite


communication is suitable.

Question.14 : Given below two addresses

(i) 59.177.134.72

(ii) http://www.ccc.nic.in/welcome.htm

Identify which one of the above is an IP address and which one is a URL?

Answer:

(i) IP Address 59.177.134.72

(ii) URL http://www.ccc.nic.in/welcome.htm

Question.15 : Mr. Tauq Ahmad wants to prevent unauthorised access to/from


his company’s local area network. Write the name of system
(software/hardware), which he should install.(Delhi 2011)

Answer: He should install firewall system to prevent unauthorised access.

Question .16 : Beauty Lines Fashion Inc. is a fashion company with design
unit and market unit 135 m away from each other. The company recently
connected their LANs using Ethernet cable to share the stock related
information. But after joining their LANs, they are not able to share the
information due to loss of signal in between. Which device out of the
following should you suggest to be installed for a smooth communication?

(i) UPS

(ii) Modem

(iii) Repeater (Delhi 2011)

Answer:

(iii) Repeater.

Question 17.Which of the following is not a feature of networking?

(i) Resource sharing

(ii) Uninterrupted Power Supply (UPS)

(iii) Reduced cost

(iv) Reliability (Delhi 2011; All India 2011; HOTS)


Answer:

(ii) Uninterrupted Power Supply (UPS).

Question .18: Mr. Kant SenGupta wants to prevent unauthorised access


to/from his company’s local area network. Write the name of a system
(software/hardware), which he should install to do the same. (All India
2011)

Answer: Mr. Kant should install firewall system to prevent unauthorised


access.

Question 19.Seven Brothers Fashion Inc. is a fashion company with design


and market unit 130 m away from each other. The company recently connected
their LANs using Ethernet cable to share stock related information.

But after joining the LAN, they are not able to share the information due
to loss of signal in between. Which device out of the following should you
suggest to be installed for smooth communication?

(i) Modem

(ii) Repeater

(iii) UPS (All India 2011)

Answer: (ii) Repeater

Question .20 :What is the difference between star topology and bus topology
of network? (Delhi 2009; HOTS)

Answer: In star topology, all nodes are directly connected with the
central node or server, whereas in bus topology, there is a single length
of transmission medium (usually co-axial cable), on which various nodes are
attached and the server can be anywhere in this transmission cable. Both
ends of the cable are closed by a terminator.

Question 21. What is a protocol? Which protocol is used to search


information from Internet using an Internet browser? (Delhi2009)

OR

What is a protocol? Which protocol is used to copy a le from/to a remotely


located server? (All India 2009)

Answer: Protocol refers to the rules which are applicable for a network.
These protocols dene the standardised format for data packets to be
transmitted over the network, techniques for detecting errors and
correcting them etc.
The protocol used to search the information from Internet using browser is
Hyper Text Transfer Protocol (HTTP).

Question 22. What is the difference between LAN and WAN? (All India 2009)

Answer: A Local Area Network (LAN) is a network which is spread over a


small area such as a school, office or factory. Whereas a Wide Area Network
(WAN) is a network which is spread over entire world. A Wide Area Network
can include a group of . LANs connected together.

Question 23. Expand the following abbreviations

(i) HTTP

(ii) ARPANET (All India 2009)

Answer: (i) HyperText Transfer Protocol.

(ii) Advanced Research Project Agency Network.

Question 24. How are co-axial cable different from optical fiber?

Answer: A coaxial cable consists of a solid core wire surrounded by foil


or wire shield each separated by some plastic insulator. The inner core
wire carries the signals and the outer wire shield provides the ground.

Whereas an optical fiber consists of a thin glass or plastic strands, which


are capable of carrying light signals from a source at one end to another
end.

Question 25. What is a modem?

Answer:

Modem stands for Modulator/Demodulator which converts analog signals into


digital signals and vice- versa. It is used to connect the computers and
transmit data using telephone lines.

Question 26. How is a hacker different from a cracker? (All India 2008)

Answer: A hacker is a person who is interested in gaining knowledge about


the computer system and gaining unauthorised access to computer systems for
playful pranks. Whereas crackers are the programmers with malicious
mentality who break into secured system for the purpose of stealing and
corrupting data.
Question 27. What is the signicance of cyberlaw?

Answer: Cyber law is related to all legal and regulatory aspects of


Internet and the world wide web. Anything concerned with or emanating from
any legal aspects among the users of Internet and other people in
cyberspace comes within the ambit of cyber law. Cyber law works as a
regulatory mechanism for the electronic commerce.

Question 28. Write one advantage of star topology as compared to bus


topology.

Answer: In star topology, there is direct connection of each node with


the server, so whenever there is a communication problem with one node,
other nodes are not affected.

Whereas in bus topology, all nodes are connected through a single length of
line so whenever there is communication problem anywhere in the network
entire network stops functioning.

Question 29. Name two transmission media for networking.

Answer: Two transmission media of networking are as follows:

(i) Co-axial cable

(ii) Optical fiber.

Question 30. Compare optical fiber and co-axial transmission media.

Answer: A coaxial cable consists of a solid core wire surrounded by foil


or wire shield each separated by some plastic insulator. The inner core
wire carries the signals and the outer wire shield provides the ground.

Whereas an optical fiber consists of a thin glass or plastic strands, which


are capable of carrying light signals from a source at one end to another
end.

Question 32. Expand the following terminologies

(i) HTML

(ii) GSM

Answer:

(i) HyperText Markup Language.

(ii) Global System for Mobile Communication.

Question 33. What do you understand by the terms cookies and firewall?
Answer: The firewall is a system designed to prevent the unauthorised
access to or from a private network. There wall can be implemented in the
form of software or hardware or a combination of both.

Cookies also known as browser cookies or tracking cookies, cookies are


small often encrypted text files, located in browser directories. Cookies
are created when a user’s browser loads a particular website. The website
sends information to the browser which then creates a text file.

Question 34. Write two advantages and two disadvantages of star topology.

Answer: Advantages of star topology

(i) The star topology is the most reliable as there is a direct connection
of every node in the network with the central node of the server.

(ii) In case, there is any problem in connection with any node, other nodes
in the network are not affected.

Disadvantages of star topology

(i) Since, every node is directly connected with the central node or
server, so a large quantity of cable is required.

(ii) There is dependency on the central node. If there are some problems
with the central node, entire network stops functioning.

Question 35. Write one difference between co-axial cable and optical fiber
cable.

Answer:

A coaxial cable consists of a solid core wire surrounded by foil or wire


shield each separated by some plastic insulator. The inner core wire
carries the signals and the outer wire shield provides the ground.

Whereas an optical fiber consists of a thin glass or plastic strands, which


are capable of carrying light signals from a source at one end to another
end.

You might also like