You are on page 1of 4

Pakistan International School, Jubail

1st Term, Academic Session 2023-24

UNIT#3
“CONNECTIONS ARE MADE: ACCESSING THE INTERNET”
QUESTION/ANSWER
Q#1: Define URL and IP address with examples.
URL:
A URL, or Uniform Resource Locator, is known as the address of a web page. It is used to
locate a file on a web server on the internet. They are easier to remember than an IP
address.
IP Address:
Internet Protocol is an address assigned to each device on a network that is unique to the
network. Each device that is on a network has an IP address assigned to it. An IP address
consists of four numbers, each separated by a full stop. Each number is between 0 to 255.
Example:

URL IP Address
http://www.google .com 172.217.169.78
http://www.micropython .com 176.58.119.26
http://www.microsoft .com 104.215.148.63

Q#2: Which characteristics can affect the wireless transmission method?


For each wireless transmission method, it is important that the following characteristics
are considered;
i. Bandwidth
ii. Transmission distance
iii. Security
iv. Interference

Q#3: What is the drawback of using 5G as compared to 4G?


When it comes to 5G vs. 4G, one drawback of 5G is that it has a shorter range compared to
4G. So you might experience a weaker signal if you're far away from a 5G tower. 5G covers

Notes by: Ms. MARYAM ASLAM


Pakistan International School, Jubail
1st Term, Academic Session 2023-24
only 500metres transmission distance and on the other hand 4G can cover 16kilometres
transmission distance.

Q#4: Define domain name and top-level domain (TLD) with example.
The domain name (an easy-to-remember name) is the part that changes, depending on
which web server you would like to visit using your web browser. For example
http://www.snapchat.com, in this URL snapchat.com is the domain name.
A top-level domain or TLD is the part at the end of the domain name. There are over 1000
TLD’s available to buy, but the most common is .com, some popular TLDs are;
 .org
 .net
 .pk
 .in
 .au

Q#5: What happens when you type a URL into your web browser?

i. A user types into their web browser the URL of the website they would like to visit,
for example http://saudinews.com.
ii. The URL (saudinews.com) request gets sent to the DNS server to find the matching
IP address.
iii. The IP address of the web server where the website is kept (81.92.228.150) is sent
back to the user’s computer.
iv. If the DNS cannot find the IP address in its database, this search is then passed on to
a higher-level DNS (another DNS that has access to an ever larger list of domain
names).
v. It the higher-level DNS still cannot find it, a 404 error is returned. This means that
the page was not found.
vi. The web browser then sends a request to the web server’s IP address that returns
the web page.

Notes by: Ms. MARYAM ASLAM


Pakistan International School, Jubail
1st Term, Academic Session 2023-24
Q#6: What are insecure websites? How can we check the validity of a website?
When using internet, it is important to know whether a website is secure. It can be difficult
to tell which websites are secure and which are insecure, but web browsers have some
built-in tools that can help you decide whether to use them. Some websites do not use
HTTPS with SSL certificate. This means that if you were to enter any information on this
website, it would not be encrypted before it was sent, which means that hackers could read
your data.
There are ways to verify the trusted certificate of a website, to check whether it is as secure
as your web browser. The address bar displays information about the security of a web

page. In the address bar by clicking the padlock , SSL certificate can be viewed. This
certificate proves that the owner of this website is genuine. The address bar also shows the
protocol that data is sent by. URL should begin with https, which is the secure way to send
data between your computer and the webpage.
Example of a secure website:

Q#7: What do you know about Caesar cipher? How you can encode and decode
messages using cipher?
The Caesar cipher is a famous technique that can be used to encrypt messages. This cipher
works by shifting the alphabet along by a specified number of places. A message that can be
read easily is known as plain text and a message once it has been encrypted is known as
cipher text. We can shift the letters at random, and to decode it, which is known as simple
substitution, a user or device would need to know the full character list. And a Caesar
cipher with shift of two would look like this:

For Example:
The message in plaintext is: BOOK
Encrypted Caesar shift cipher it is: ZMMI
Notes by: Ms. MARYAM ASLAM
Pakistan International School, Jubail
1st Term, Academic Session 2023-24
Q#8: Explain how DNS enables users to access websites on their devices.
DNS (Domain Name System) is a system used to translate a URL to an IP address, so that
you don’t have to remember the IP addresses for web servers. The Internet's DNS system
works much like a phone book by managing the mapping between names and
numbers. DNS servers translate requests for names into IP addresses, controlling which
server an end user will reach when they type a domain name into their web browser. DNS
allows you to type a URL (like google.com) into your web browser to retrieve the files from
the web server with the matching IP address (such as 142.250.74.142).

Q#9: Why error occurs in data transmission? What an error looks like?
Computers communicate with each other using binary code, but sometimes these binary
messages can be corrupted or interfered with causing errors. These issues can cause binary
bits to flip between 1 and 0, causing errors in the data being sent. There are number of
reasons why errors can occur:
 Power surges
 Broken or damaged cables
 Electrical interference
 Hacking
Example:
Computer 1 wants to send the byte 01000101 but, due to the faulty cable, Computer 2
receives it as 00000101.

Q#10: Explain the uses of AI in internet searching.


AI technology is improving rapidly, and the more people use AI, the more accurate it gets.
Search engines use the machine-learning technology. Search engines have programmed
their artificial intelligence to provide new ways to search. It is now possible to search for
pictures using an image. To do this, search engines use image-recognition technology. This
method of searching is called a reverse image search and uses artificial intelligence to
‘view’ the image and decide what the image is of.

Notes by: Ms. MARYAM ASLAM

You might also like