186 solutions available
Question 1Assertion. A modem is a communication device that works on the principle of converting digital data to analog data and vice versa.Reason....
Question 2Assertion. A hub can also act as an amplifier at times.Reason. An active hub is capable of amplifying the signal during transmission while...
Question 3Assertion. A repeater is not like an amplifier.Reason. A repeater regenerates a signal thereby removing noise.
Question 4Assertion. A router and a bridge are similar.Reason. A router works like a bridge but can handle different protocols unlike bridge.
Question 5Assertion. Protocols IMAP and POP3 are different but generally work together.Reason. While IMAP is used for receiving email on a server,...
Question 6Assertion. Hubs and switches can be replaced.Reason. While a hub is a broadcast device, a switch is a unicast device.
Question 7Assertion. Internet Protocol allows the voice data transmission along with other data over packet-switched networks.Reason. VoIP (Voice...
Question 8Assertion. Crackers and hackers technically do the same thing.Reason. Crackers do the hacking with malicious intentions to harm the data or...
Question 9Assertion. Viruses, Worms, Trojans, Adware, Spyware are all Malware.Reason. Malware is a general term to represent data threat Software.
Question 10Assertion. A useful looking program may damage data.Reason. Trojan Horses are useful looking programs which create havoc and damage the...
Question 11Assertion. Spyware are not harmful as they do not damage data.Reason. Spyware track data about user and sell it to others hampering your...
Question 12Assertion. Data may be stolen through Eavesdropping.Reason. Unauthorised monitoring of other people's communication is called...
Question 1What is a modem ? Name two categories of modems.
Question 2(i)Define RJ-45.
Question 2(ii)Define Ethernet.
Question 2(iii)Define Ethernet card.
Question 2(iv)Define hub.
Question 2(v)Define switch.
Question 3(i)Define host.
Question 3(ii)Define repeater.
Question 3(iii)Define bridge.
Question 3(iv)Define router.
Question 3(v)Define gateway.
Question 4What is the purpose of using a gateway in context of networking ?
Question 5What is the purpose of using a repeater in context of networking ?
Question 1Briefly explain file transfer protocol.
Question 2What is protocol ? Name some commonly used protocols.
Question 3What is TCP/IP ? What is HTTP ?
Question 4Define Mobile Communication and Wireless Communication.
Question 5(i)Define GSM.
Question 5(ii)Define SMS.
Question 5(iii)Define WLL.
Question 6Compare 3G, 4G and 5G networks.
Question 7Name some chat and video conferencing protocols.
Question 8What is VoIP ?
Question 9Discuss the two technologies to connect to Internet wirelessly.
Question 1What is remote login ? What is Telnet ?
Question 2What is HTML ? Where it is used ?
Question 3What is URL ? What is WWW ?
Question 4Define web browser and web server.
Question 5What is web hosting ?
Question 6What is web scripting ?
Question 7Name some web scripting languages.
Question 8What is hacking ?
Question 9What are cookies ?
Question 10What is cracking ? How is it different from hacking ?
Question 11What is Cyber Crime ?
Question 12When was IT Act enforced in India ?
Question 13What is Spam ?
Question 1SMTP is a protocol that allows to send/upload email message from local computer to an email server.
Question 2In a network, a machine is identified by unique address called IP Address.
Question 3The physical address assigned by NIC manufacturer is called MAC address.
Question 4The bridge is a network device that can connect the network segments based on the same protocol.
Question 5The router is a network device that navigates the data packets over large networks through the most efficient route.
Question 6A router is networking device that connects computers in a network by using packet switching to receive, and forward data to the...
Question 7The gateway is a network device that connects dissimilar networks.
Question 8The repeater is a networking device that regenerates or recreates a weak signal into its original strength and form.
Question 9HTTPS is like HTTP but a more secure protocol.
Question 10IMAP holds the email message until user deletes it.
Question 11POP3 holds the email message on the server until the user downloads it.
Question 12Switch like hub connects many devices but is more intelligent device.
Question 13In TCP/IP, the IP protocol is responsible for addressing.
Question 14In TCP/IP, the TCP protocol is responsible for dividing a message into multiple packets.
Question 15Telnet protocol facilitates remote logic.
Question 16Computer virus is a program that makes a computer sick (computer virus).
Question 17A cracker is a malicious hacker.
Question 18Cookies are small text files saved by the websites visited.
Question 19A script is a list of commands embedded in a webpages.
Question 1Discuss various Network devices.
Question 2Discuss various Network protocols.
Question 3Briefly discuss wireless and mobile computing, and various techniques used for wireless and mobile computing.
Question 4Define network security. What is its need ? How can it be achieved ?
Question 5"New York Avenue" is planning to expand their network in India, starting with two cities in India to provide infrastructure for...
Question 6Global Village Enterprises has following four buildings in Hyderabad city :Computers in each building are networked but buildings are not...
Question 7"China Middleton Fashion" is planning to expand their network in India, starting with two cities in India to provide infrastructure for...
Question 8"Bhartiya Connectivity Association" is planning to spread their offices in four major cities in India to provide regional IT infrastructure...
Question 9INDIAN PUBLIC SCHOOL in Darjeeling is setting up the network between its different wings. There are 4 wings named as SENIORS(S), JUNIOR(J),...
Question 10Eduminds University of India is starting its first campus in a small town Parampur of Central India with its center admission office in...
Question 11Great Studies University is setting up its Academic schools at Sunder Nagar and planning to set up a network. The university has 3...
Question 12Expertia Professional Global (EPG) is an online corporate training provider company for IT related courses. The company is setting up...
Question 1A device that forwards data packet from one network to another is called aBridgeRouterHubGateway
Question 2Hub is aBroadcast deviceUnicast deviceMulticast deviceNone of the above
Question 3Network device that regenerates and retransmits the whole signal is ............... .ModemHubRepeaterBridge
Question 4Network device which connects networks of similar types (same protocols).HubRouterBridgeGateway
Question 5Network device which connects dissimilar networks (different protocols).HubRouterBridgeGateway
Question 6Network device that sends the data over optimizing paths through connected hops is ............... .HubRouterBridgeGateway
Question 7MODEM isModulation DemodulationModulation DemandingModulator DemodulatorModel Demodulator
Question 8Which device broadcasts any data to all devices on a network?RouterSwitchHubBridge
Question 9Which device filters data packets and only sends to those that require the data?RouterSwitchHubBridge
Question 10Which device is more intelligent when sending data packets?RouterSwitchModemNone of these
Question 11Connects multiple computers together in a network; Shares data among all computersRouterSwitchHubBridge
Question 12The protocol suit that is the main communication protocol over the Internet:HTTPFTPTCP/IPPPP
Question 13HTTP stands for :Hyper Text Transfer ProtocolHyper Transmission Text ProtocolHaving Terminal Transfer ProtocolHaving Text Transfer Protocol
Question 14IMAP stands for :Internet Message Access ProtocolInternetwork Mapping Access ProtocolInternet Mapping Add ProtocolInternetwork Message...
Question 15IMAP protocol is usually used at :Outlook programWeb based email programsDatabasesDesktop applications
Question 16The difference between IMAP and POP protocols:IMAP allows to download emails once the user accesses the email account while POP doesn'tPOP...
Question 17HTTPS is different than HTTP that it:sends and receives messages in compressed formsends and receives messages in encrypted formsends and...
Question 18What does a network protocol mean?Rules governing communicationRequests over a networkServices over a networkAll of these
Question 19Which protocol does this image symbolize ?IMAPSMTPFTPHTTPS
Question 20POP3 is a protocol used for ...............Reading ProtocolsAccessing emailsDownloading images from the serverSending files over Internet
Question 21SMTP is used forAdding address to emailsConnecting with serverSending emails from one server to anotherDownloading emails
Question 22Which of the following is the odd one out ? FTP, HTTP, IMAP, HTTPSIMAPFTPHTTPSHTTP
Question 23IP (Internet Protocol) is responsible forDividing the message into multiple packetsAssigning addresses to the packetsRearranging the...
Question 24TCP (Transmission Control Protocol) is not responsible forDividing the message into multiple packetsAssigning addresses to the...
Question 25Which protocol holds the email until you actually delete it?POP3IMAPSMTPFTP
Question 26Which protocol holds the email only until you receive it?SMTPFTPIMAPPOP3
Question 27URL expands toUniform Rate LineUniversal Resource LineUniversal Resource LocatorUniform Resource Locator
Question 28Which of the following protocols allows the use of HTML on the World Wide Web ?HTTPPPPFTPPOP
Question 29Which of the following is not a mobile communication technology ?GPRSGSM5GHTTP
Question 30GPRS works with ............... to utilise its unused bandwidth.WLLGSM2GNone of these
Question 31Which of the following is a voice-only network?1g2G3g4g5g
Question 32Which of the following is analogue network?1g2G3g4g5g
Question 33The new web standard that incorporates AI, ML and blockchain to the Internet is ...............Web 1.0Web 2.0Web 3.0Web 4.0
Question 34A security mechanism that can be created in hardware and software both to prevent the unauthorised access to and from a network is called...
Question 35Unauthorised electronic junk mail is called ...............Trojan horseWormSpamComputer virus
Question 36A harmful program in the disguise of a useful program is called ...............Trojan horseWormSpamComputer virus
Question 37A program capable of replicating itself and eating up all the memory is a ...............Trojan horseWormSpamComputer virus
Question 38What out of the following, will you use to have an audio-visual chat with an expert sitting in a far-away place to fix-up a technical...
Question 39............... is a communication methodology designed to deliver both voice and multimedia communications over Internet...
Question 40Tarini Wadhawa is in India and she is interested in communicating with her uncle in Australia. She wants to show one of her own designed...
Question 41Which of the following statements correctly explains the term Firewall in context of Computer Network Society ?A device that protects the...
Question 1What is the role of modem in electronic communications ?
Question 2What is hub ? What are its types ?
Question 3What is the role of a switch in a network ?
Question 4(i)Briefly discuss the role of a repeater in networking.
Question 4(ii)Briefly discuss the role of a router in networking.
Question 4(iii)Briefly discuss the role of a bridge in networking.
Question 4(iv)Briefly discuss the role of a gateway in networking.
Question 5What is a communication protocol ? What is its role in a network ?
Question 6(i)Write short note on HTTP.
Question 6(ii)Write short note on TCP/IP.
Question 6(iii)Write short note on FTP.
Question 7Expand the following :VoIPPPP
Question 8Write the full forms of the following :SMTPPPP
Question 9What is the use of TELNET ?
Question 10Discuss the advantages and disadvantages of E-mail.
Question 11What is video conferencing ? How is it related to networking ?
Question 12What is web browser ? What is a web server ? How are these two related ?
Question 13Write short notes on URLs and domain names.
Question 14What is web hosting ? What are its various categories ?
Question 15(i)Explain HTML briefly.
Question 15(ii)Explain XML briefly.
Question 15(iii)Explain DHTML briefly.
Question 16What do you understand by network security ? Why is it considered very important ?
Question 17What is a firewall ? Briefly explain different firewall techniques.
Question 18What is hacking ? What is cracking ? How are these two terms inter-related.
Question 19(i)Define virus.
Question 19(ii)Define Worms.
Question 19(iii)Define Trojan Horse.
Question 19(iv)Define Spam.
Question 19(v)Define Cyber Crime.
Question 19(vi)Define India IT Act 2000.
Question 19(vii)Define IPR.
Question 20(i)When would you prefer hubs over repeaters.
Question 20(ii)When would you prefer bridges over hubs.
Question 20(iii)When would you prefer switch over other network devices.
Question 21When would you opt for a router in a network ?
Question 22What is the difference between client-side scripting and server-side scripting ?
Question 23How are viruses harmful ? How can you prevent them ?
Question 24Out of the following, identify client side script(s) and server side script(s):(a) ASP(b) Javascript(c) VBScript(d) JSP
Question 25Compare HTTP and HTTPS.
Question 26(i)Write short notes on IMAP.
Question 26(ii)Write short notes on POP3.
Question 27What is protocol ? Which protocol is used to search information from Internet using an internet browser?
Question 28What is protocol ? Which protocol is used to copy a file from/to a remotely located server ?
Question 29What is the difference between a webpage and a website ?
Question 30What is the role of URL ?
Question 31What is the difference between a web browser and a web server ?
Question 32What is web hosting ? What is its significance ?
Question 33Write a short note on functioning of Telnet.
Question 1A switch can work in place of a hub.
Question 2A gateway is like a modem.
Question 3An amplifier and a repeater do the same thing.
Question 4A hub broadcasts the received signal to all its connected devices.
Question 5A switch is an intelligent hub.
Question 6Repeater and router precisely do the same thing.
Question 7A hub can be replaced with a switch.
Question 8A router can be replaced with a bridge.
Question 9With TCP/IP protocol, the data packets can arrive at different times at the final location.
Question 10The TCP of TCP/IP is responsible for the addressing of the packets to reach destination.
Question 11Bridges are devices that connect one LAN to another LAN that uses the same protocol.
Question 12The HTTP and HTTPS are the same protocols.
Question 13In a network, a hub is replicable with a switch.
Question 14A switch is like an intelligent hub.
Question 15A cracker and a hacker technically do the same work.
Question 16Both, a computer virus and an antivirus for computers, are programs.