Hsslive - In: 11 Computer Networks
Hsslive - In: 11 Computer Networks
….. …..
x = 10 ; x = 10 ;
call_by_val( x ) ; call_by_ref( x ) ;
……….. ………..
void call_by_val(int a) void call_by_ref(int &a)
{ {
a= a * 2 ; // here a becomes 20 and x remains a= a * 2 ; ; // here a and x becomes 20
} as 10 }
in
**********************************************************************************************************************
.
Chapter – 11 Computer Networks ve
1. What is the need for computer networks? [ March 2020, Score 3 ]
sli
Ans.1. Resource Sharing: The sharing of available hardware and software resources ( like
programs, printers , hard disk etc.)In a computer network is called resource sharing.
2. Reliability: A file can have copies in different computers. So breaking down of one system will
not cause data loss.
Hs
2. Explain the functions of the following Network devices: [ March 2020, Score 5 ]
(a) Modem
(b) Switch
(c) Gateway
(d) Multiplexer
(e) Router
Ans.
a) Modem: It is used for communication between computers through telephone lines. It
converts digital signals received from a computer into analogue signals (Modulation) and
analogue signals received from telephone lines into digital signals (Demodulation).
b) Switch: Switch can be considered as an intelligent hub. It store addresses of all the devices
connected to it.
c) Gateway: It can interconnect two different networks using the different protocols.
d) Multiplexer: It divides the transmission medium into several logical frequency channels
through which we can send many different signals at a time.
e) Router: It can interconnect two networks of the same type using the same protocol.
3. Write short notes on : [ July 2019, Score 2 ]
in
a) Bluetooth
b) Wi-Fi
Ans a) Bluetooth: Its frequency ranges from 2.402 GHz to 2.480 GHz. It is a short distance
.
communication (approx. 10m). It is uses in cell phones, wireless keyboard etc.
ve
b) Wi-Fi: Its frequency ranges from 2.4 GHz to 5 GHz. It can connect more devices at a time.
4. Define network topology. Explain about the four major topologies
[ July 2019, Score 5 ]
Ans. Topology is the way in which computers are physically interconnected to form a network.
sli
Common types of topologies are:
Bus Topology: There is a main cable called bus from the server to which every nodes are
connected by short drop cables. A small device called terminator is attached at the end of the
bus. When a data signal reaches the terminator at the end, it is absorbed and the bus is free to
Hs
Advantages:
i). Easy to install
ii). Less cable is needed. So less expensive
iii). Failure of node does not affect the network.
Disadvantages:
i). Fault detection is difficult.
ii). Failure of cable, server or terminator will affect entire network.
Ring Topology: All node computers are connected to a circular cable. All data are passing
through this cable.
Advantages:
i). No signal amplification required because each node will do it.
ii). requires less cable, so cost effective
Disadvantages:
i). If a node fails, entire network will fail.
ii). Addition of nodes is difficult.
Star Topology: In star topology there is hub/server at its center and all other work stations are
connected to it through separate connections. All messages are passed through the server. When
a message goes from one computer to another, it is first send to the server, which then
retransmits the message to the destination computer.
in
Advantages:
i). If one workstation fails, it does not affect the whole network.
ii). Easy to install
.
iii). It is easy to expand
Disadvantages:
i). requires more cables than Bus topology
ve
iv). Easy to find faults and remove workstations.
Advantages:
i). If one workstation or a path fails, it does not affect the whole network.
Hs
Disadvantages:
i). requires more cables, so very expensive.
ii). Very complex and difficult to manage.
5. Write short notes on. [ March 2019, Score 3 ]
a) Bluetooth
b) Wi-Fi
c) Satellite
Ans. a) Bluetooth: Its frequency ranges from 2.402 GHz to 2.480 GHz. It is a short distance
communication. It is uses in cell phones, wireless keyboard etc. It can connect up to 8 devices
b) Wi-Fi: Its frequency ranges from 2.4 GHz to 5 GHz. Data transfer speed is up to 54Mbps. Data
transfer speed is up to 54Mbps
c) Satellite: These are like repeaters but can cover a large foot area due to its position 36000KM
above earth. Geostationary satellites are used for this. Its transponders receive the sending signal
from earth), strengthen them and slightly change its frequency to avoid mixing with the up linking
signal and retransmit it to earth
Ans. Topology is the way in which computers are physically interconnected to form a network.
Common types of topologies are:
Bus Topology: There is a main cable called bus from the server to which every nodes are
connected by short drop cables. A small device called terminator is attached at the end of the
in
bus. When a data signal reaches the terminator at the end, it is absorbed and the bus is free to
carry new signal.
.
ve
sli
Advantages:
i). Easy to install
Hs
. in
Advantages:
ve
i). If one workstation fails, it does not affect the whole network.
ii). Easy to install
sli
iii). It is easy to expand
iv). Easy to find faults and remove workstations.
Disadvantages:
i). requires more cables than Bus topology
Hs
Advantages:
i). If one workstation or a path fails, it does not affect the whole network.
Disadvantages:
i) Requires more cables, so very expensive.
ii). Very complex and difficult to manage.
7. In ........ Network topology, each node is directly connected to a hub/ switch.
[ July 2018, Score 1 ]
Ans. Star
8. Write a short note on WiMAX [ July 2018, Score 2 ]
It combines the benefits of wireless and broadband. Its frequency ranges from 2 GHz to 11
in
G Hz. Hundreds of users can connect at a time. It requires high cost of installation and power
consumption.
.
b) Specify the type of network given below: [July 2018, Score 3 ]
ve
ATM network, Cable television network, Network within the school, Network at home using
Bluetooth, Telephone network, Railway network
Ans. a) A peer-to-peer network has no dedicated servers. Here a number of computers are
connected together for the purpose of sharing information or devices. All the computers are
sli
considered equal. Any computer can act as a client or as a server at any instance. This network is
good for small networks where there is no need for dedicated servers.
eg: http://www.dhsekerala.gov.in/index.html
Here, http is the protocol used, dhsekerala.gov.in is the domain name and index.html is
the file name.
12. Which one of the following transmission media carry information in the form of light signals?
in
a) Coaxial cable
.
c) Optical fibre cable
d) Wi-Fi
Ans. WAN
14. Explain the advantages of forming networked computers than keeping stand-alone computers.
[ July 2017, Score 3 ]
1. Data communication is possible. Computer network helps user to communicate with any other user of
the network through its services like e-mail chatting etc.
2. Resource Sharing: The sharing of available hardware and software resources ( like programs, printers
, hard disk etc.)in a computer network is called resource sharing.
3. Reliability: A file can have copies in different computers. So breaking down of one system will not
cause data loss.
15. a) Different networks with different protocols are connected by a device called ---------
i) Router
ii) Bridge
iii) Switch
iv) Gateway [ March 2017, Score 1 ]
b) Protocol is a special set of rules to be followed in a network when devices in the network
communicates. Each protocol specifies rules for formatting data, compressing data, error checking,
in
making connections and making sure that the data packets reach its destination
16. Compare any three types of networks based on span of geographical area.
.
[ March 2017, Score 3 ]
b) Local Area Network (LAN): Networking of communication devices within a limited area like a building,
room or a campus. It can set up using wired media (UTP/STP cable) or wireless media ( infra-red, radio
sli
waves etc.) and can cover up to a few kilometers.
c) Metropolitan Area Network (MAN): It is a networking of communication devices within a city. Its
coverage may up to a few hundred kilometers. It can interconnect a number of LANs and computers.
Hs
a) IP address
b) MAC address
c) Modem
Ans. a) It is a unique 4-part numeric address assigned to each node on a network for unique
identification of them. It is normally expressed in “dotted decimal Number”.
Eg. 192.165.1.1
b) Media Access Control Address is universal, unique and permanent address (12 digit hexadecimal
number) assigned to each NIC by its manufacturer. Its first half contains the ID of the manufacturer and
second half is the serial number of the particular adapter. The usual format of MAC address is:
MM : MM : MM : SS : SS : SS
c) Modem: It is used for communication between computers through telephone lines. It converts digital
signals received from a computer into analogue signals and analogue signals received from telephone
lines into digital signals.
18. Define network topology. Explain any four network topologies in detail
[July 2016, Score 5 ]
Ans. Topology is the way in which computers are physically interconnected to form a network. Common
types of topologies are:
Bus Topology: There is a main cable called bus from the server to which every node is connected by
short drop cables. A small device called terminator is attached at the end of the bus. When a data signal
in
reaches the terminator at the end, it is absorbed and the bus is free to carry new signal.
Advantages:
i). Easy to install
.
ii). Less cable is needed. So less expensive
ve
iii). Failure of node does not affect the network.
Disadvantages:
i). Fault detection is difficult.
ii). Failure of cable, server or terminator will affect entire network.
sli
Ring Topology: All node computers are connected to a circular cable. All data are passing through this
cable.
Advantages:
i). No signal amplification required because each node will do it.
Hs
Advantages:
i). If one workstation fails, it does not affect the whole network.
ii). Easy to install
iii). It is easy to expand
iv). Easy to find faults and remove workstations.
Disadvantages:
i). Requires more cables than Bus topology
ii). If the central device fails it affect entire network
Mesh Topology: In this Topology each node is connected to other nodes. So, there is more than one
path between two nodes. Here, failure of one node may not affect the data communication.
Advantages:
i). If one workstation or a path fails, it does not affect the whole network.
in
Disadvantages:
i). Requires more cables, so very expensive.
ii). Very complex and difficult to manage.
.
19. Identify the type of LAN topology in which there are more than one path between nodes.
ve [ March 2016, Score 1 ]
a) Star
b) Ring
c) Mesh
d) bus
sli
Ans. c) Mesh
20. ABC Ltd., required to connect their computers in their company without using wires Suggest suitable
medium to connect the computers. Explain [ July 2015, Score 3 ]
Hs
Ans. Unguided Media is used to connect the computers. There are three types of Unguided Media:
Radio waves: It transmits data at different frequencies ranging from 3 kHz. to 300 GHz.
Microwaves: Microwave signals can travel in straight line if there is any obstacle in its path, it can’t bend.
So, it uses tall towers instead of short one.
Infrared waves: These waves are used for transmitting data in short distance and its frequency range is
300 GHz to 400 GHz.
21. In …………………… topology all the nodes are connected to a main cable.
[July 2015, Score 1]
Ans. bus
22. Bluetooth can be used for ------------- communication. [ July 2015, Score 1 ]
i) long distance ii) short distance iii) mobile phone iv) all of these
Ans ii) Short distance
23. Any device which is directly connected to a network is called ----------------
[ March 2015, Score 1 ]
Ans. node
24. a) To make data transfer faster, a switch stores two different addresses all the devices connected to
it. What are they? [ March 2015, Score 1 ]
b) There are five computers in a lab. Write short notes on any three possible methods to interconnect
these computers. Draw the diagram of each method
in
Ans. a) Source address and destination address
b) Bus Topology: There is a main cable called bus from the server to which every node is
connected by short drop cables. A small device called terminator is attached at the end of the bus. When
.
a data signal reaches the terminator at the end, it is absorbed and the bus is free to carry new signal.
ve
sli
Hs
Advantages:
i). Easy to install
ii). Less cable is needed. So less expensive
iii). Failure of node does not affect the network.
Disadvantages:
i). Fault detection is difficult.
ii). Failure of cable, server or terminator will affect entire network.
Ring Topology: All node computers are connected to a circular cable. All data are passing
through this cable.
Advantages:
i). No signal amplification required because each node will do it.
ii). Requires less cable, so cost effective
Disadvantages:
i). If a node fails, entire network will fail.
in
ii). Addition of nodes is difficult.
Star Topology: In star topology there is hub/server at its centre and all other work stations are
connected to it through separate connections. All messages are passed through the server. When
.
a message goes from one computer to another, it is first sent to the server, which then
ve
retransmits the message to the destination computer.
sli
Hs
Advantages:
i). If one workstation fails, it does not affect the whole network.
ii). Easy to install
iii). It is easy to expand
iv). Easy to find faults and remove workstations.
Disadvantages:
i). requires more cables than Bus topology
ii). If the central device fails it affect entire network
**********************************************************************************************************************
Chapter - 12 Internet and Mobile Computing
1. What is FTTH? Explain its merits. [ March 2020, Score 2 ]
Merits:
1. High Bandwidth
2. High Speed
in
2. Describe about search engines with example. [ March 2020, Score 2 ]
Ans. Search engine websites are special programs that are designed to help people to find information
available in World Wide Web. Search engine web sites use programs called web crawlers or spiders or
.
robots to search the web. Web crawlers search the web pages stored in the different web servers and
find possible keywords
4. Easy to reference: Sent and received e-mail messages can be stored safely.
4. Describe briefly about any two advantages of E-mail. [ July 2019, Score 2 ]
Ans. 1.Speed: An e-mail is delivered instantly to any location across the world. We can send the same
e-mail to multiple users simultaneously.
2. Easy to use: We can send and receive e-mails and save them easily on our computer.
in
6. Write the advantages of social media. [ March 2019, Score 2 ]
Ans. 1. Bring people together: Social networking allows people to find long-lost childhood friends and
.
make new ones.
ve
2. Plan and organise events: These sites help users to organise and participate in events.
3. Business promotion: Social media offers opportunities for businesses to connect with customers,
implement marketing campaigns, manage reputation, etc.
4. Social skills: These sites allow people to express their views over a particular issue and become an
sli
agent for social change.
Ans. Firewall: A firewall is a system used to provide security to a computer network. It filters all data
incoming and leaving the computer network. It can be either hardware or software based.
Anti-virus: An anti-virus is a software used to detect and remove virus and malware. It uses virus
definition to detect viruses. The infected files are stored in a special area called quarantine, which can
be removed later.
Ans. A firewall is a system used to provide security to a computer network. It filters all data incoming
and leaving the computer network. It can be either hardware, software-based o both.
Ans. Phishing is an attempt to acquire sensitive information such as user name, password, credit card
details. The phishing websites have URLs and home pages similar to their original ones. The act of
creating such a misleading website is called spoofing.
in
11. SIM card is a smart card used inside a mobile phone. What is the full form of SIM?
.
b) Subscriber Identity Mobile
c) Subscriber Identification Mobile
d) Single Identity Mobile
13. Explain the influence of social media in society. [ July 2017, Score 3]
Hs
Ans. Social media can be very influential on society in both positive and negative ways. It gives people a
way to stay in touch with people who live far away. It lets people share fun, interesting and informative
content. It gives businesses a way to engage with customers. Social media has made it very easy to
spread information quickly.
The personal information of users can be used for illegal activities. Information like the e-mail address,
name, location and age can be used to commit online crimes. Addiction to these sites wastes our
valuable time. It will negatively affect our mental states.
14. Find the best matches from the given definition for the terms in the given list.
Ans. Worm- c) A standalone malware program usually makes the data traffic slow.
Hashing –b. Technical effort to manipulate the normal behavior of networked computer system.
Phishing – d) Attempt to acquire information like username and passwords by posting as the original
website.
in
15. Susheel’s Gmail id is [email protected]. He sends an email to rani whose email id is
[email protected]. How is the mail sent from Susheel’s computer to Rani’s Computer?
[ March 2017, Score 3 ]
.
ve
Ans. The first part Susheel is the username that identifies the address and the second part gmail.com is
the domain name of the e-mail server, i.e., the name of the e-mail service provider.
When an e-mail is sent from Susheel’s computer using web mail or e-mail client software, it reaches the
e-mail server of our e-mail service provider. From there the message is routed from sender’s e-mail
server all the way to the rani’s e-mail server. The recipient’s e-mail server then delivers the e-mail to the
sli
recipient’s mail box (inbox), which stores the e-mail and waits for the user to read it. Simple Mail
Transfer Protocol (SMTP) is used for e-mail transmission across Internet.
16. Which one of the following technologies is used for locating geographic positions according to
Hs
a. MMS
b. GPS
c. GSM
d. SMS
Ans. b. GPS
17. What is browsing? Briefly explain the steps needed for browsing. [ July 2016, Score 3 ]
Ans. Browsing refers to visiting web pages using a web browser. It is also known as surfing. The steps
used by a web browser to display web pages
1. The web browser obtains the IP address corresponding to the DNS portion of URL.
2. Using the IP, a TCP connection is established between web browser and web server.
4. The web server locates the pages and sends to the browser.
5. The browser accepts the pages, interprets and displays the content.
18. Pick the odd one from the following list [ March 2016, Score 1 ]
a. Spam
b. Trojan horse
in
c. Phishing
d. Firewall
.
.Ans. d. Firewall
20. Which one of the following statements is True in relation with Wi-Max internet connectivity.
sli
[ March 2016, Score 1 ]
21. Explain any three mobile communication services [ March 2016, Score 3 ]
Ans. Short Message Service (SMS): Short Message Service (SMS) is a text messaging service in
mobile communication systems that allows exchanging short text messages. SMS is the most widely
used data application by mobile phone users
Multimedia Messaging Service (MMS): Multimedia Messaging Service (MMS) is a way to send and
receive messages that consists of multimedia content using mobile phones. MMS does not specify a
maximum size for a multimedia message. MMS supports contents such as text, graphics, music, video
clips and more.
Global Positioning System (GPS) :The Global Positioning System (GPS) is a satellite based navigation
system that is used to locate a geographical position anywhere on earth, using its longitude and latitude.
GPS consists of satellites, control and monitoring stations, and receivers. The basis of the GPS is a
group of satellites that are continuously orbiting the earth.
22. Define Internet. Compare two types of internet connectivity namely dial up and broadband.
[ March 2016, Score 1 ]
Ans. Internet is a collection of interconnected networks for the exchange of data and information.
in
Dial-up Wired broadband
Slow connections speed up to High seed connection speed higher
.
56kbps than 256 kbps
ve
Requires dialing to connect to ISP
Used telephone lines exclusively
Always On connection
Simultaneous use of voice and
internet
Uses dial-up modem Uses broadband modem
sli
23. a). Acquiring information such as username, password, credit card details etc. using misleading
websites is known as ……………… [ July 2015, Score1 ]
b) Pick the odd one out : Google, Safari, Mozilla Firefox, Internet explorer.
Hs
Ans. a. Phishing
b. Google
24. One of your friends wants to send. an email to his father abroad to convey him birthday wishes with
a painting done by him. Explain the structure and working of email to him.
[ July 2015, Score 3 ]
Ans. When an e-mail is sent from your computer using web mail or e-mail client software, it reaches the
e-mail server of our e-mail service provider. From there the message is routed from sender’s e-mail
server all the way to the recipient’s e-mail server. The recipient’s e-mail server then delivers the e-mail to
the recipient’s mail box (inbox), which stores the e-mail and waits for the user to read it. Simple Mail
Transfer Protocol (SMTP) is used for e-mail transmission across Internet.
Ans. a). An Intranet is a privately owned network. For example, the network of a company can be
considered as an Intranet. An Intranet is an internal network that uses internet and web technologies.
26. Social media plays an important role in today’s life. Write notes supporting and opposing its impact.
in
[ March 2015, Score 3 ]
Ans. Social media can be very influential on society in both positive and negative ways. It gives people a
way to stay in touch with people who live far away. It lets people share fun, interesting and informative
.
content. It gives businesses a way to engage with customers. Social media has made it very easy to
spread information quickly. ve
The personal information of users can be used for illegal activities. Information like the e-mail address,
name, location and age can be used to commit online crimes. Addiction to these sites wastes our
valuable time. It will negatively affect our mental states. Students may lose concentration and this in turn
sli
may affect their studies. Social media will spread the news very quickly. It can facilitate or worsen a
crisis by spreading negative information or misinformation at an incredible speed.
Hs
**********************************************************************************************************************