Professional Documents
Culture Documents
3.The amount of data that can be passed along a communication channel in a given period of
time (1 second) is termed as Data transfer rate
4.Communication media is the way of transmitting the signal from one place to another.
Communication media is also known as Transmission media
5. Data transfer rate is the amount of data transferred in one direction over a link divided by the
time taken to transfer it in bits per second (bps).
8. Media Access Control (MAC) _address refers physical address assigned to NIC.
9.Your friend complaints that somebody has created a feck profile on Facebook and defaming
her character with abusive comments and pictures. the type of cybercrime for these situations is
cyber bullying .
10. e-commerce is the buying and selling of goods and services, or the transmitting of funds or
data over an electronic network, primarily the internet.
11.A server that provides its services to other workstations on a network is a Network server
12. Fiber optic cable cables transmits light signals rather than electrical signals.
14.Through network or internet you can establish contact with anyone in the world.
15.The main function of TCP is to divide the message or data into packets of a definite size on
the source computer.
16. Wi-Fi refers to wireless fidelity which enables us to connect to the ISP without any cable.
17. WWW is a software that enables us to access the internet and explore websites.
18.Web page constitutes the website
19. A hacker is someone with a strong interest in how things work, who likes to create and
modify things for their own enjoyment.
20. A computer virus is a small software program that spreads from one computer to another
and interferes with the normal functioning of computer.
21. Electronic junk mail or junk newsgroup postings are known as Spamming
22. Digital signature meets the need for security and integrity.
23. The first network that planted the seed of internet was ARPANET.
26. IP is responsible for handling the address of the destination computer so that each packet is
delivered to its proper destination.
28. A program designed to replicate and eat up a computer’s storage is called worms .
29. A digital document issued to a site by a certification authority of the internet is called a
Digital signature .
30. To connect computers located in a specific building or campus is known as Local area
network (LAN)
31. Wi-Fi, infrared and Bluetooth are examples of Wireless /unguided medium.
33. A server that provides its services to other workstations on a network is a Network server .
34. The techniques of switching in which data is fragmented into smaller techniques is called
Packet switching
35. circuit switching is a dedicated line between the caller and the sender.
36. Bits per second is the measuring unit of speed at which the data transfer takes place.
37. All the computers are connected with each other in an unorganized manner in topology
MESH
38. In Peer-to-peer networking all computers share equivalent responsibility for processing
data
10. When two entities are communicating and do not want a third party to listen, this situation is
defined as secure communication. T
1. A computer network:
(i) Is a collection of hardware components and computers
(ii) Is interconnected by communication channels
(iii) Allows sharing of resources and information
(iv) All of the above
8. In which topology are all the nodes connected through a single Coaxial cable? (i) Star (ii)
Tree (iii) Bus (iv) Ring
10. Which protocol is used for the transfer of hypertext content over the web? (i) HTML (ii)
HTTP (iii) TCP/IP (iv) FTP
1. It is an electronic device that enables a computer to transmit data over telephone lines.
MODEM
2. It is a standard type of connector for network cables. They are the plug-in devices used in
networking and telecommunication applications. They are used primarily for connecting
LANs, particularly Ethernet. RJ45
3. It is a hardware device that helps in the connection of nodes within a network. It is also
known as a network card, network adapter or NIC NIU/TAD/ETHERNET
4. It is a device that operates only on the physical layer of the OSI model. As a signal
travels a fixed distance, before attenuation of the signal it is used which amplifies and
restores signals for long-distance transmission. Repeaters
1. In this topology, all or some of the devices are connected to the central hub, called an
active hub, and some of the devices are connected to the secondary hub, which may be an
active hub or passive hub. TREE topology
2. In this topology, each computer is connected with the other computer. There is a point-to-
point link between each dedicated node (workstation).MESH Topology.
3. In this topology is a multipoint configuration, i.e., several devices are connected to a main
long cable which acts as a backbone Bus topology
5. In this topology, each node is connected to two other nodes on either side of it.
RING topology
1. They are used to transmit data without the use of cable. It is a line-of-sight transmission
as signal travels in a straight line. Microwave signals
2. They are not line-of-sight transmission and, hence, can penetrate buildings easily.
RADIOWAVE
3. It is very expensive as compared to other transmission mediums. Installation is
extremely complex. SATELLITE MICROWAVE
4. It cannot penetrate walls and is affected by distance, noise and heat. INFRARED
2. It is the simplest and most secure way to exchange files over the
internet FTP
7. It is used for remote login that helps a user to log on to another user’s
terminal without being its original user. Telnet