You are on page 1of 4

12. How do we remove temporary files?

Ans- Follow these steps below:


a.On your keyboard, press the Windows + R keys at the same time.
b. In the Open field, type %temp%, then press ENTER. ,
c. Press the CTRL + A keys at the same time to select all the .tmp items.
d. Press the DELETE key, and then click Yes when the User Account Control window appears to confirm.
13. Why is disk defragmentation required? How can we achieve disk defragmentation ?
Ans- Defragmentation can solve and mitigate problems, such as slow speeds, freeze-ups and extended boot
times of a computer. If there's not enough contiguous space to hold complete files on an HDD, files can become
fragmented and the storage algorithms on the disk separate the data to fit it inside the available space.
14. What steps do we take to remove unused shortcuts and program services?
Ans- On your desktop, right-click on your selected shortcut icon. Step 2. In the drop-down menu, select the
“Delete” option to remove shortcuts. You can also drag the icon to the Recycle Bin directly.
15. How can we check the network connectivity of your system ?
Ans- Select the Start button, then type settings. Select Settings > Network & internet. The status of your network
connection will appear at the top. Windows 10 lets you quickly check your network connection status.
16. Explain how you would check the validity of the IP address.
Ans- First, click on your Start Menu and type cmd in the search box and press enter. A black and white window
will open where you will type ipconfig /all and press enter. There is a space between the command ipconfig and
the switch of /all. Your ip address will be the IPv4 address.
17. How will you check whether the network fly lead is working properly?
Ans- The fly lead is the cable that connects the network card in your computer to a network point (usually on the
wall). A non-operational network fly lead could also cause failure in the internet connection. The network fly lead is
seated in the network slot on your computer.

18. Describe the procedure to check whether the network card is working properly .
Ans – A working network card is essential to connect to the Internet. The network card lights must be flashing or
lit up. If there are no lights, either the network card is broken, or there is no network to connect to. A broken
network card needs repair or replacement.

1. Give the full form of following terms:


(a) ARPANET - Advanced Research Project Agency Network
(b) LAN – Local Area Network
(c) MAN – Metropolitan Area Network
(d) WAN – Wide Area Network
(e) WWW – World Wide Web

(f) TELNET - Telecommunication Network

2. Differentiate between the following:


(a) Bus and Star Topology
Ans- In star topology, there is a non-linear arrangement of nodes in a network. In a bus topology, there is a linear
arrangement of nodes in a network.
(b) Star and Tree Topology
Ans- Star topology is a topology in which the nodes are connected to the central hub or router. Tree topology is a
topology in which the nodes are organized in the form of a tree.
(c) Star and Mesh Topology
Ans- In star topology, the nodes are connected to the central hub or router. In mesh topology, the nodes are
connected to each other completely via dedicated link.
(d) Ring and Bus Topology
Ans- In a Ring topology, each device is connected to two other devices in a circular fashion. Bus topology is a
topology where each device is connected to a single cable which is known as the backbone.
(e) LAN and WAN
Ans- LAN means local area network. WAN means wide area network. LANs connect users and applications in
close geographical proximity (same building). WANs connect users and applications in geographically dispersed
locations (across the globe).
(f) LAN and MAN
Ans- LAN is a network that usually connects a small group of computers in a given geographical area. MAN is a
comparatively wider network that covers large regions- like towns, cities, etc.
(g) MAN and WAN
Ans- MAN covers a smaller area than WAN, typically a single city or a large campus, while WAN covers a larger
area, spanning multiple cities, countries, or even continents.
(h) Internet and WWW
Ans- WWW stands for World Wide Web. Internet is a means of connecting a computer to any other computer
anywhere in the world. World Wide Web which is a collection of information which is accessed via the Internet.
Internet is infrastructure.
3. What is the purpose of network devices? Explain following network devices.
Ans- he primary purpose of network devices is to transmit and receive data quickly and securely. "Network
Devices" is a broad term that encompasses a range of communication equipment including hubs, switches,
routers, bridges, gateways, load balancers, modems, repeaters, and more.
(a) Bridge - A bridge operates at the data link layer. A bridge is a repeater, with add on the functionality of filtering
content by reading the MAC addresses of the source and destination. It is also used for interconnecting two LANs
working on the same protocol. It has a single input and single output port, thus making it a 2 port device.
(b) Router - A router is a device like a switch that routes data packets based on their IP addresses. The router is
mainly a Network Layer device. Routers normally connect LANs and WANs and have a dynamically updating
routing table based on which they make decisions on routing the data packets. The router divides the broadcast
domains of hosts connected through it.
(c) Repeater - A repeater operates at the physical layer. Its job is to regenerate the signal over the same network
before the signal becomes too weak or corrupted to extend the length to which the signal can be transmitted over
the same network. An important point to be noted about repeaters is that they not only amplify the signal but also
regenerate it. When the signal becomes weak, they copy it bit by bit and regenerate it at its star topology
connectors connecting following the original strength. It is a 2-port device.
(d) Switch - A switch is a multiport bridge with a buffer and a design that can boost its efficiency(a large number of
ports imply less traffic) and performance. A switch is a data link layer device. The switch can perform error
checking before forwarding data, which makes it very efficient as it does not forward packets that have errors and
forward good packets selectively to the correct port only.
4. Which of the following listed acts are cyber-crimes?
(a) Copying data from someone’s computer without his permission.
(b) Stealing someone’s device.
(c) Accessing one’s bank account for carrying online transactions.
(d) Modifying the official documents without permission.
(e) Creating a fake identity and posting on someone’s behalf.
(f) Sending friend request to someone on a social networking site.
5. What is the difference between Email and Chat?
Ans- Chatting is real-time, shorter messages, informal, allows the use of multimedia, and is used for quick,
informal communication. Email, on the other hand, is not real-time, allows longer messages, is more formal,
allows the use of multimedia but is less common, and is used for more formal communication.
6. What are cookies?
Ans- Cookies are small pieces of text sent to your browser by a website you visit. They help that website
remember information about your visit, which can both make it easier to visit the site again and make the site
more useful to you.
7. Differentiate between firewall and antivirus. How both contribute to the security of the system?
Ans- A firewall is primarily a network security solution designed to filter the traffic entering or leaving a protected
network or endpoint, while an antivirus is primarily an endpoint security solution designed to inspect files and
software running on a host or server.
8. Define protocol.
Ans- A set of rules or procedures for transmitting data between electronic devices, such as computers. In order
for computers to exchange information, there must be a preexisting agreement as to how the information will be
structured and how each side will send and receive it.
9. Explain TCP/IP Model.
Ans-

o The TCP/IP model was developed prior to the OSI model.


o The TCP/IP model is not exactly similar to the OSI model.
o The TCP/IP model consists of five layers: the application layer, transport layer, network layer, data
link layer and physical layer.
o The first four layers provide physical standards, network interface, internetworking, and transport
functions that correspond to the first four layers of the OSI model and these four layers are
represented in TCP/IP model by a single layer called the application layer.
o TCP/IP is a hierarchical protocol made up of interactive modules, and each of them provides
specific functionality.

10. What is the significance of cyber law?


Ans- Cyber Laws yields legal recognition to electronic documents and a structure to support e-filing and e-
commerce transactions and also provides a legal structure to reduce, check cyber crimes. Importance of Cyber
Law: It covers all transactions over the internet. It keeps eye on all activities over the internet.
11. How is TELNET used for remote login?
Ans- Users connect remotely to a machine using Telnet, sometimes referred to as Telnetting into the system.
They are prompted to enter their username and password combination to access the remote computer, which
enables the running of command lines as if logged in to the computer in person.
12. List the various security issues concerned with using the Internet. Explain each of them by giving proper
examples.
Ans-
13. List various protective measures that can be taken for network security.
Ans-
14. Define cybercrime and cyber law.
Ans- In Simple way we can say that cyber crime is unlawful acts wherein the computer is either a tool or a target
or both. Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery,
defamation and mischief, all of which are subject to the Indian Penal Code.
15. Define Digital Literacy.
Ans- Digital literacy is essentially the discovery, evaluation, creation and communication of information, but there
is more to it. Many experts prefer to focus on specific technology and literacy skills and do not define the term.

You might also like