Location via proxy:
[ UP ]
[Report a bug]
[Manage cookies]
No cookies
No scripts
No ads
No referrer
Show this form
Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
24 views
CS Chapter-6 (Computer Network)
computer network notes
Uploaded by
CYBERPUNKS ESPORTS
AI-enhanced title
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save CS Chapter-6(Computer Network) For Later
Download
Save
Save CS Chapter-6(Computer Network) For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
24 views
CS Chapter-6 (Computer Network)
computer network notes
Uploaded by
CYBERPUNKS ESPORTS
AI-enhanced title
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save CS Chapter-6(Computer Network) For Later
Carousel Previous
Carousel Next
Save
Save CS Chapter-6(Computer Network) For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 26
Search
Fullscreen
formed an agency named ARPANET (Advanced Research Projects Agency NETwork) to connect computers studies today at various universities and defence agencies. The main objective of ARPANET was to develop a network that could continue function efficiently even in the event of a nuclear attack. 2. Internet (INTERconnection NETwork): The Intemet is a worldwide network of computer networks. It is not owned by anybody. 3. Interspace: Interspace isa client/server software Program that allows multiple users to communicate online with real - time audio, video and text chat in dynamic 3D environments. + Introduction to Computer Networks : The collection of interconnected computers is called a computer network. Two computers are said to be interconnected. if they are capable of sharing and exchanging information or resources. Advantages of Computer Networks : 1. Resource Sharing means to make all Programs, data and peripherals available to anyone on the network irrespective of the physical location of the resources and the user. 2. Reliability means to keep the copy of a file on ‘wo or more different machines, so if one of them is unavailable (due to some hardware crash or any other) them its other copy can be used Cost factor_means it greatly reduces the cost since the resources can be shared. 4. Communication Medium means one can send messages and whatever the changes at one end are done can be immediately noticed at another. Types of Networks : 1. PAN (Personal Area Network) A Personal Area Network is computer network organized around an individual person. It generally covers a range of less than Question bank ~ Class Xi! (Computer Science) By Swati Chawla 10 meters. Personal Area Networks can constructed with cables or wirelessly 2, LAN (Local Area Network) Tt is a network that is confined to a Felativg) small area. It is generally limite to geographic area such as schoo! labora building. It is generally privately OWney networks over a distance not more than § kn MAN (Metropolitan Area Network): MAN is the networks cover a group of nay corporate offices or a city and might be cihy private or public. It refers to the network thy is spread over an area as big as city 4. WAN (Wide Area Network) : These are the networks spread over large distances say across countries or even continents. through cabling or satellite uplinks are called WAN, It cay even be a group of LANs that are spread acros several locations and connected together. The largest WAN is INTERNET. > DataC Channel is the medium used to cary information or data from one point to another Physical medium like cables over which the information is exchanged is called channel. Baud & bits per second (bps) :- It is used measurement for the information carry of 2 communication channel. Measurement Units :- [bps (bits per second), kbps mbps, gbps, tbps] | Byte= 8 bits 1 KBPS ( Kilo Byte Per Second) 1024 Bytes 1 Kbps (kilobits Per Second) = 1024 bits | Mbps ( Mega bits Per Second )=1024 Kbps Bandwidth :- It is amount of information transmitted or receives per unit time. IP address : An IP address is a unique address tt idemifies a device on the internet ora local netwo IP stands for "Internet Protocol,” which is the S*° ules governing the format of data sent via the intem* or local network. + Switching Techniques Switching techni’? are used for transmitting data across networks|, iret Swi itching : In the Circuit Sw technique, first, the complete end-to-end transmission path between the source and the destination computers is established and tien the message is transmitted through the path The main advantage of this technique js guaranteed delivery of the message. Mostly ie) for voice communication. packet Switching : In this switching technique fixed size of packet can be transmitted across the network. Message Switching : In the Message switching technique, no physical path is established between sender and receiver in advance. ‘Thos each node receives the entire message stores in it entirely on disk and then transmits the Message to the next node, if it is not destination node. This type of network is also called store-and-forward network. Transmission_media_; Transmission media is what medium over the Messages are transmitted, A communication channel is also called as a medium. Different media have different properties and used in different environments for various purposes. Guided / Wired Media : 1. Twisted Pair Cable s_It consists of two identical 1 mm thick copper wires insulated and twisted together. The twisted pair cables are twisted in order to reduce crosstalk and electromagnetic induction. Advantages ; * — Itis easy to install and maintain. It is very inexpensive. Disadvantages : * — Itis incapable to carry a signal over long, distances without the use of repeaters, Due to low bandwidth, these are not suitable for broadband applications. itching 2. Co-axial Cables : It consists of a solid wire Core surrounded by one or more foil or braided Wire shields, each part is from the other by some kind of plastic insulator. It is mostly used in the cable wires. Advantages : * Data transmission rate is better than ‘twisted pair cables. * It provides a cheap means of transporting multi-channel television signals around metropolitan areas. Disadvantages: * Expensive than twisted pair cables. ors bank - Class xi! (Computer Science) Chawla ~~ 91 Unguided / Wireless Medi: Difficult to manage and reconfigure. Optical fibre : An optical fibre consists of thin glass fibres that can carry information in the form of visible light Advantages : * Transmit dat security over long distance with high * Data transmission speed is high. * Provide better Noise immunity. * Bandwidth is up to 10 Gbps. Disadvantages : Expensive as compared to other guided media. Need special care while installation 1. Infrared : The infrared light transmits data through the air and can Propagate throughout @ room, but will not penetrate walls. It is a secure medium of signal transmission. The infrared transmission has become common in TV remotes, automotive garage doors, wireless speakers etc. 2, Radio Waves : an electromagnetic wave with a wavelength between 0.5 cm and 30,000m. The transmission making use of radio frequencies is termed as__radio-wave transmission. 3. Microwave : The Microwave transmission is a line of sight transmission. Microwave signals travel at a higher frequency than radio waves and are popularly used for transmitting data over long distances. 4. Satellite link : The satellite transmission is also kind of line of sight transmission that is used to transmit signals throughout the world. Network Devices: Networking hardware, also known as network equipment or computer networking devices, are electronic devices which are required for communication and interaction between devices on a computer network. * Modem : Full form of Modem is Modulator or Demodulator. A modem is a hardware device that allows a computer or another device , such as router or switch , to connect to the Internet. As we know, phone lines work on Analog Signals, while Computer works on digital signal. So the role of modem is to convert Digital Signal to Analog so that it can be carried by telephone lines and other side it convert Analog signal to Digital Signals, so that it can be carried by computer.© RJ-45: RJ in RJ-45 stands for Registered Jack. It is a standard type of physical connector for network cables. RJ4S connectors are most commonly seen with Ethernet cables feature small plastic plugs on each end that are inserted into the RJ 45 jacks of Ethernet devices. © Ethernet Card : It is also known as NIC (Network Interface Card). It is a device that is attached to each of the workstations and the server and helps the workstations establish all important connection with the network. It contain RJ-45 slot to connect ethernet cable with RJ45 connector. Each NIC attached to workstation has a unique number identifying it, known as MAC address. It is also known as network interface unit * Hub: A hub is a hardware device used to connect several computers together. A hub is a networking device having multiple ports that are used for connecting multiple computers or segments of LAN together. It sends the incoming data to all destinations. Types of Hub: Active Hub : It amplifies the signal as it moves from one connected device to another. These are like repeaters to extend the length of anctwork. Passive Hub : It allows the signal to pass from one computer to another, without any change. Hub is multiport repeater, which broadcasts all information to all other ports. Hence, it is called as Non intelligent or dumb device. Causes unnecessary traffic. Hub can send or receive information, but it can not do both at a same time, * Switch : A switch is a device that is used to segment networks into different subnetworks or LAN Segments. A switch is responsible for filtering, i.e. transforming data in a specific way and for forwarding packets between LAN Segments. A switch has same job as that of a hub’s, i.e. to connect multiple computers, But, a switch is a smart device. It can identify the intended destination and send the information only to the target computers. No unnecessary traffic generated. It can send and receive information at same time. ‘© Repeater : A repeater is a device that amplifies and restore signals for long distance transmission, © Router : A device that works like a bridge but can handle different protocols. Question bank - Class Xil (Computer Science) By Swati Chawla 92 nsible for forwa The router 18 respot different ding a from one network to a different network, destination is unknown (0 a router, it seng, th traffic to another router which knows the destination. Gateway : A gateway is a device that cone Gresimilar networks. It establishes an in Connection between 10cal ATCA Networks ip completely different structures. WiFi Card = Similar to Ethernet card but jt allows our computers {0 connect With other devices without wite, 1c. for Wireleg, connectivity. It may be internal or extemal With built-in wireless radio and antenna the Pie common i card used in desktop compute, fre PCI express Wi-Fi card made it fit the p¢y express card slot on the motherboard. connecting different computers in a network. The way in which the computers / devices ar physically interconnected to form a network js called a Topology. 1. Bus Topology : In bus topology, all the nodes are connected to a main cable called backbone. If any node has to send some information to any other node, it sends the | signal to the backbone. The signal traves through the entire length of the backbone and Network Topologies : Topology is an an of | | is received by the node for which it is intended. “ooo Advantages : + Itis easy to install. * It requires less cable length and hence it is cost effective. * Failure of a node does not affect the network. Disadvantages : * In case of a cable fault, the entire network goes down. + Ata time, only one node can transmit data. 2. Star Topology : In Star topology, each node is directly connected to a hub/ switch. Ifa node has to send any information to any oe node, it sends the signal to the hub/switch The star topology uses a separate cable —each node / workstation € Cable connect the node toa central device's Pica omees Advantages : * Itis easy to install, * Itis easy to diagnose the fault in Star Topology. * Tf one link fai function, Disadvantages : * Failure of Hub failure of entire network. * It requires more cable compared to Bus Topology. Ring Topology : In ring topology, every computer is connected to the next computer inthe ring and each transmit the signal what receives from the previous computer. The Messages flow around the ring direction Switch leads to the length as in one Advantages : * Easy to install and configure. * Easy to detect the problem. * All data flows in one direction, reducing the chance of packet collisions. Disadvantages : * All. data being transferred over the network must pass through each workstation on the network, which can make it slower than a star topology. + Theentire network will be impacted if one workstation shuts down. Question bank ~ Class xi (Computer Science) Swati Chawla ~~ 93 ~ Network Protocols 4. Tree Topology : Tree Topology is a combination of Bus and Star Topology. It is used to combine multiple star topologies. Advantages +t offers expansion. * Even if one network fails, the other network remains connected and working, easy way of network In network there are variety of computers connected to each other and share data in many ways. For interaction among these, some rules are applied like how and when a devi can send and receive data how to send the data Packet and how to receive, * HTTP :_Hypertext’ Transfer Protocol (HTTP) is a communications protocol for the transfer of information on the internet and the World Wide Web, HTTP is a Tequest/response standard between a client and a server. A client is the end-user: the server is the web site. HTTP is used to transfer all the files and other data from one computer to another on the World Wide Web. * FTP: FTP stands for File Transfer Protocol, It allows transferring of files from one system to another like uploading of file from local machine to web server using FTP client. * TCP/IP: TCP - is responsible for verifying the correct delivery of data from client to server. Data can be lost in the intermediate network TCP adds support to detect errors or lost data and to trigger retransmission until the data is correcily and completely received, IP - is responsible for moving packet of data from node to node. IP forwards each packet based on a four byte destination address (the IP number). The Internet authorities assign ranges of numbers to different organizations, The organizations assign groups of their numbers to departments. IP operates on gateway machines that move data fromQe 7 nd department to organization (© region & then around the world. | nt to Point PPP ; PPP stands for Poi ada It is a communication protocol © the daté ink layer that is used to protocol data between two connected point-to-point computers: SMTP : SMTP stands for simple ail Transfer Protocol. S p js a set o communication guidelines that allows software to tr the internet. It is @ program 0 messages t0 other computer USeTS email address. pops : POP3 stand for Post Office Protocol. It is a client-server protocol in which email is received and held for you by your internet cover Periodically, you check your mailbox on the server ‘and download any email probably using POP3. It also allows to Frwaload the received messages on 1O=! machine using tool like Outlook so that user can read them even when they are not iser choose t0 connected to the internet. The us Teave copies of the mails on the server 38 advantage is that es the user can cut the are downloaded , Trtemet Connection and read his/her Email urring further at own leisure without int communication costs HTTPS : Hypertext Transfer Protocol Secure is an extension of the Hypertext Transfer Protocol. It is used for secure communication over a computer network, and is widely used on the Intemet. In HTTPS, the communication protocol is encrypted using Transport Layer Security or, formerly, Secure Sockets Layer. VolP : VoIP stands for Voice over Internet Protocol. It is a protocol that enables voice communication over the internet through the compression of voice into the data packets that can be efficiently transmitted over data network and then convert back into voice at receiving end. It uses packet switching (store ‘and forward). It is an alternative to traditional telephone Network, Telnet : Telnet is one of the earliest remote Jogin protocols on the Internet. Through telnet, an administrator or another user can access someone as computer remotely. On the web, HTTP and FTP protocols allow you to request specific files ansmit and electronte ma se estion bank - Class XI! (Computer Science) y Swati Chawla from remote computers but not to actually as a user of that computer, \W; fou logon a8 8 TeEsat user = teever privileges YOu MY have bee ranted 10 specific application and data gy that computer. www for World Wid ve term WWW was coined by Te Bemers Lee It is @ collection of inked nts oF pages, stored on millions of docume ; computers and distributed across the Internet. It is a set of protocols that allows ess any document on the ne, through 2 naming system called the URi( Uniform resource Locator) . Telnet : It is an Internet utility that allows you to log onto remote computer systems, Web Browser = ‘A web browser is a WWW client that navigates through the World wide web and display pages. A web browser is a software used to access the websites. Eg Internet explorer, Firefox, Google Chrome. Web Server : A web server is a WWW server that responds to the requests made by web browser URL (Uniform Resource Locetor) : Each website has a unique address called URL URL looks like this : type:!/ ‘address//path type-> refers type of server in which the file is located(FTP, HTTP) address -> address of the server path->location ofthe file inthe server Domain Name : Refers to the Pe of domain in which they are categorized ino: com, edu, mil, net, tv, biz, Or8, 20% °° Webpage : A single page in @ website 8 called as the webpage. Website : A collection of related web pages is called web sites. Homepage : The first page which is open sna website is called as the Home PE Web Portal : It is a website that ost othe Ferrey er words 2 600 FON Po hyperlinks to many other ‘websites. Exam? : yahoo.com. google.com, indiatimes Web Hosting : It is a way of hs server application on 2 COMPUT agi through which the contents are rou available to any web browser: thei Basically, the web hosts @ woh 3 customers to place web docume” she HTML pages. ics andmedia files to g ji Special ater called a Web server! 'YPe of ¢ (TML : The web document 18 writte * gecial language called HTM Ting ells the browser, how the data, te, veld be displayed, “Xt image XML : It stands for Exte sible vanguage. It is @ language for go gtructured information, In XM create Our OWN tags, Markup fining a + We can Objective Type Questions 1. Amitused a pen drive to Copy files from his friend's laptop to his office computer, Soon his office computer started abnormal functioning, Sometimes it would restart by itself and sometimes it would stop functioning totally, Which of the following options out of (i) to (iv), vould have caused the malfunctioning of the computer. Justify the reason for your (i) Computer Worm i) Computer Virus (ii) Computer Bacteria (iv) Trojan Horse As, chosen option: 4) Computer Virus OR "Trojan Horse 122 drive containing Computer Virus / Trojan fore was used before the abnormal functioning “Ats4. which might have corrupted the system files ‘omputer Virus/ Trojan Horse affects the system ‘sand start abnormal functioning in the computer 2 dai is an IT expert and a freelancer. He Tecently used his skills to access the Administrator password for the Seed *erver of Megatech Corpn Ltd. And provi i Gitfidential data of the organization to the irector, informing him SET Vulnerability of their network security. aes * following options (i) to (iv), which one ston bank = Class Xl (Computer Science) ati Chawa 95 aPPropriately defines Jai, "T YOUF chosen option, r (i) Mackey Justify the reason V) Network Admit ANS: (i) Hacker " A Hacker igs Or kets a person who breaks into the network 3 tademig ization without any malicious mn ™ Wdentity the type , Of (opology on the basis of the ® Since every node Server, a large amo following: tar T opology b. thas a single common data all the nodes, ANS: Bus Topology 4. Expand the following: a. VO} ~~ Voice Over Internet Protocol b.SMTP — Simple Mail Transfer Protocol ©. WLL Wireless in Local Loop 4. TCPAP — ‘Transmission Control Protocol Internet Protocol, © URL --— Uniform Resource Locator 5. The following is a 32 bit binary number usually Fepresented as 4 decimal values, each Fepresenting 8 bits, in the range 0 to 255 (known 8 octets) separated by decimal points. 140.179.220.200 What is it? What is its importance? Ans. Itis an IP Address, It is used to identify the computers network. 6 Daniel has to share the data among various Computers of his two offices branches situated in the same city. Name th fe network (out of LAN, WAN, PAN and MAN) which is being formed in this process, Ans. MAN (Metropolitan Area Network) 7. Give two examples of PAD networks. Ans. Example: path connecting ona \N type of Ni © Small Office or Intemet caf Two or mote computers connected in few distances, © Networking — in buildings. Examples of PAN type of Network are © Upload the photo from your cell phone to your desktop computer. © Watch movies from an online streaming service to your TV. Home Offices/Schooldata vis?Bluetooth. © Sharing of © Creating hotspot. prowse . i helps us 8 Which protocol c M8 rowers? through web pages us Name any one internet browser | ‘Ans, WWW (World Wide Web) oF HTTP Ce Tens Transfer Protocol) is used. for searching information from Internet using li Examples of Intemet Browser: ‘© Mozilla Firefox Microsoft Internet Explorer © Google Chrome © Opera internet browser 9. Which protocol helps us to transfer files to and from a remote computer? Ans: FTP or Telnet or TCP 10. Name the protocol: i. Used to transfer voice using network. Ans : VOIP ii, Used for chatting between 2 groups or between two _ individuals. Ans : IRC 11. (a) Which of the following crime(s) does not ‘come under cybererime? * Copying some important data from a computer without taking permission from the owner of the data. «Stealing keyboard and mouse from a shop. © Getting into unknown person’s social networking account and start messaging on his behalf. ‘Ans: Stealing keyboard and mouse from a shop. (b) Out of the following which one comes under cybercrime? © Stealing away a brand new computer from a showroom. © Getting in someone’s social networking account without his consent and posting pictures on his behalf to harass him. «Secretly copying files from server of a call centre and selling it to the other organisation. Viewing sites on an internal browser ‘Ans: getting in someone's social networking account without his consent and posting pictures on his behalf to harass him. 12. What term we use for a software/hardware device, which is used to block, unauthorised access while permitting authorised nications? This term is also used for a device or set of devices configured to packet switched comm: Question bank ~ Class Xl (Computer Science) By Swati Chawla 96 , crypt, decrypt, or pr ermit, deny, ener Ory a and out) computer traffic between gj fer security domains based upon a set of rule ¥ a r ct Firewall. i mission media for nety, ind Satellite o ‘Answer? 13. Name two trans} ‘Ans: Optical Fibre a tk Practice Questions (Solved) 1, Differentiate between Radio Link ; Microwave in context of ri communication technologies. ‘Ans : Radio Link: Data is transmitted outwarg fio, the antenna through free space inal direction is a slow means of communication; Microwave: Data is transmitted based on lng, sight principle, faster thang communication. Amit used a pen drive to copy files from friend’s laptop to his office computer Soo office computer started abnormal functioning Sometimes it would restart by itself an Sometimes it would stop functioning totaly Which of the following options out of () to (iy would have caused the malfunctioning of th Pr computer. Justify the reason for your chosen option: ) Computer Worm i) Computer Virus Computer Bacteria (iv) Trojan Horse ‘Ans: (ii) Computer Virus OR (iv) Trojan Horse © Pen drive containing Computer Virus / Tre Horse was used before the abnormal functions started, which might have corrupted the system fils © Computer Virus/ Trojan Horse affects the system files and start abnormal functioning in. computer 3. Jai is an IT expert and a freelancer He recently used his skills to access OF ye network Administrator password for the 0° server of Megatech Corpn Ltd. And provi confidential data of the organization (© Director, informing him about a vulnerability of their network security. 8 the following options (i) to (iv), which "© appropriately defines Jai. Justify the for your chosen option: (i) Hacker ii) Cracker(iv) Network Admin ) Hacker ‘A Hacker is a person who network of an organizaticy malicious intent. 4, Write two advantages of using "cable over an ethernet cable service stations, which are 1 each other. Hi Ans + breaks into the M without any an optical fibre to connect two '90 m away from A Low power: Because signals in optical fibres degrade less, lower power transmitters can ke used. «Higher data rate: Due to hi rate of optical fibre is more than the data rate at ethernet cable (upto 1 Gbps). + Digital signals: Optical fibres are for carrying digital information wi useful in computer networks, 5. Identify the type of topology on the basis of the following: a Since every node is directly connected to the server, a large amount of cable is needed which increases the installation cost of the network. Ans: Star Topology b.Ithas a single common data the nodes. ‘Ans: Bus Topology 6. Expand the following: 2. VOIP — Voice Over Internet Protocol b.SMTP_ —— Simple Mail Transfer Protocol 7. Who is a hacker? Ans. A Hacker is a person who breaks into the network of an organization without any malicious intent. A hacker accesses the ‘omputer without the intention of destroying data or maliciously harming the computer. The following is a 32 bit binary number Usually represented as 4 — decimal Values, each representing 8 bits, in the range 0 to 255 (known as octets) separated by decimal points. 140.179.220.200 What is it? What is its importance? | ABS. It is an IP Address. It is used to identity the puters on a network. . * Daniel has to share the data among various “omputers of his two offices branches situated in the same city. Name the network (out of LAN, WAN, PAN and MAN) which is being formed in this process. Ans, MAN (Metropolitan Area Network) "©. Give two examples of PAN and LAN type of Networks, igher bandwidth, data ideally suited hich is specially Path connecting all Heston bank ~ Class xi1 (Computer Science) "Swati Chawla ae 7 Ans.Examples of LAN ,pe of Network are : * Small Office or Internet café Two or more computers connected in few distances, Networking in buildings Examples of PAN type of Network are : * Upload the photo from your cell phone to your desktop computer. o Home/Offices’School Watch movies from an online streaming service to your TV. Sharing of data via Bluetooth Creating hotspot. ~ What is protocol? Whi browse browsers? ich protocol helps us to through web pages using internet Name any one internet browser. Ans : Protocol: Protocol is a set of rules that two or more computers must follow to communicate on network WWW (World Wide Web) or HTTP (Hyper Text Transfer Protocol) is used for searching information from Intemet using Internet browser, Examples of Internet Browser * Mozilla Firefox * Microsoft Internet Explorer *© Google Chrome © Opera 12, (a) What is the basic difference between Trojan Horse and Computer Worm? Trojan Horse Computer Worm It is a "Malware" It is a self-replicating computer program computer program Presented as useful or which uses a network to hamnless in order to send copies of itself to induce the user to other computers on the install and run them. network and it may do so without any user interventi (b) What is worm and how is it removed? Ans: A worm is a self-replicating computer program which uses a network to send copies of itself to other computers on the network and it may do so without any user intervention Womms can be removed by installing antivirus. 13. Categories the following under Client side and Server Side script category? (i) VB Script -——— Client Side (ii) ASP —— Server Side JSP ——— Server Side (iv) Java Script— Client Sideypes of 14, Differentiate between PAN and LAN types networks, Ans: a —— PAN stands for| LAN stands for Local | Personal Area Network. | Area Network. , i} PAN is a computer | LAN interconnects @ high number of nodes | network organised d around an individual | within a confines person. physical area up [© kilometre. "Examples of LAN type | Examples of PAN type of Network are : of Network are © Small Office or| © Upload the photo | Internet café | from your cell © Two or more | phone to your computers desktop computer. connected in few distances. © Sharing of data via © Networking in Bluetooth. Home/Offices/Scho | ¢ Creating hotspot. ol buildings. 15. Which protocol helps us to transfer files to and from a remote computer? Ans: FTP or Telnet or TCP 16. Write one advantage of bus topology of network. Also, illustrate how —four computers can be connected with each other using star topology of network? Ans. Advantage of bus topology: In bus topology, computers canbe connected with each other using server (host) along a single length of cable. Four computers can be connected with each other using server in the following way: 5 , Comp 1 gil Comes a. =x cme hme 17. (a) What is VoIP? Ans: VoIP (Voice over Internet Protocol) is simply the transmission of voice traffic over IP- based networks. VoIP has been around in one form or another, since 1973 when it began as an experiment by US OR Voice-over-Internet Protocol( VoIP) is a methodology and group of _ technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet (b) Name the protocol: Question bank - Class Xil (Computer Science) 98 By Swati Chawla i. Used to transfer voice using packer tn “ i network. Ans :VOIP ii, Used for chatting between 2 groups o, between two individuals. ‘Ans : IRC 18, What is an IP Address? ‘Ans: AnIP address is a unique identifier fy. or host connection on an IP network 4” address is a 32 bit binary number Us, represented as 4 decimal value representing 8 bits, inthe range 0 to (known as octets) separated by decima| oi: This: is known as "dotted deci, notation. Example:140.179.220.200 19, What is HTTP? Ans: HTTP — (Hyper = Text Trang Protocol): HTTP is used to transfer all fies « other data (collectively called resources) fy ‘one computer to another on the world wide wei 20. Explain the importance of Cookies, Ans: — Cookies are files stored temporarily on w browser's computer, — which allow the ‘www server to store persistent information associated with browsing user on user's system. OR Cookies are files that store user informatio that is used to identify the user when he logs into the system. + What is the different between HTT? and FTP? Ans: FTP, is a protocol used to upload files from workstation toa FTP server or downlo files from a FTP server to a worksatoe whereas, HTTP, is a protocol used tons files from a Web server onto a browse i order to view a Web page that is on te Internet. 22. Write two advantages of using open sou" software over proprietary software: Ans: Open source software is a software, ™™ i source code is available to customer 3 5 can be modified and can be redistrib’ without any limitations whereas source is not available in proprietary software. © source software are generally free of °°, One need an authorized license paid i”, touse this proprietary software while °F source software can be used by any" ig are usually free. One can use ths sof #F their personal use. After giving any "™ a”, 2wa or code in this Type one cannot change the code or modify it. (a) Which of the following crime(s) * qoes not come under cybercrime? ¢ Copying some important data from a computer without taking permission from the owner of the data. «Stealing keyboard and mouse from a shop. ¢ Getting into unknown person's social networking account and start messaging on his behalf. ans: Stealing keyboard and mouse from a shop, (b) Out of the following which one comes ander cybercrime? + Stealing away a brand new computer from a showroom. + Getting in someone’s social networking account without his consent and posting pictures on his behalf to harass him. « Secretly copying files from server of a call centre and selling it to the other organisation. «© Viewing sites on an internal browser Ans: getting in someone's social networking account without his consent and posting pictures on his behalf to harass him. (c) Which of the following crimes are covered under cyber crime? * Stealing brand new hard disc from a shop. * Getting into unknown person's social networking account and start messaging on his behalf Copying some important data from a computer without taking permission from the owner of the data. Ans: Getting into unknown person's social Networking account and start messaging on his halt (a) Which of the following come under cyber crime? * Operating someone's internet banking Account without his knowledge. Stealing a keyboard from someone's computer. Working on someone's computer with his or her permission. ; Answer. Operating someone's internet banking “count without his knowledge Q ; by ation bank - Class xi! (Computer Science) "Swati Chawla ~~ (©) Which of the following will come under cyber crime? * Theft of a brand new sealed pack laptop. — * Access to a bank account for getting unauthorised money transaction. | * Modification in a company data with unauthorised access. Photo copying a printed copy. Answer : Access to a bank account for getting unauthorised money transaction. 24. Give one suitable example of each URL and Domain Name. Ans: URL : http://www.Gabsclasses.cem/aboutus Domain name: www.Gabs: 25. Name two Proprieta their ap Ans: (i) Microsoft Office — Microsoft Office belongs to Microsoft Corporation. This software is used for office automation and also can be used other than office productivity at personal level. Microsoft. Office contains following —_ other applications like Microsoft Word, Microsoft Excel, Microsoft PowerPoint, etc. (ii) Oracle — Oracle Corporation is the owner of Oracle software. Oracle is one of most popular RDBMS software in world. 26. Define the term Bandwidth. Give unit of Bandwidth. Ans: Bandwidth is referred as the volume of . software along with information per unit of time that a transmission medium (like an internet connection) can handle. OR The amount of data that can be transmitted in a fixed amount of time is known as bandwidth. For digital devices, the bandwidth is usually expressed in bits per second (bps) or bytes per second. For analog devices, the bandwidth is expressed in cycles per second, or Hertz (Hz). 27. Expand the following terminologies: a. HTML - Hyper Text Markup Language b. XML - Extensible Markup Language e. GNU -GNU's Not UNIX d. FTP - File Transfer Protocol ¢. FSF- Free Software Foundation f GSM - Global System for Mobile Communication g. WiFi- Wireless Fidelity h. CDMA - Code Division Multiple Access i, HTTP - Hyper Text Transfer Protocoli, ARPANET— Advanced research Project Agency of Network MODEM - Modulator Demodulator WLL - Wireless in Local Loop TCPAP - Transmission Control Protocol Internet Protocol PPP Point to Point Protocol WWW - World Wide Web URL - Uniform Resource Locator GPRS - General Packet Radio Service VoIP - Voice over Internet Protocol SMTP - Simple Mail Transfer Protocol POP - Post Office Protocol - Telnet - Teletype Network 4G - Fourth Generation - ASP- Active Server Pages - ISP- Java Server Pages VB- Visual Basic PHP - Personal Home Page IPR - Intellectual Property Rights 28. (a) Define the term firewall. Ans: Firewall is a security system that prevents an unauthorised access to a private network. No information can leave or enter the private network. (b) How does firewall protect our network? Ans: A firewall is a part of a computer system or network that is designed to block unauthorised access while permitting authorised communications. It is a device or set of devices configured to permit, deny, encrypt, decrypt or proxy all (in and out) computer traffic between different security domains based upon a set of rules and other criteria, (c) What term we use for a software/hardware device,which is used to block, unauthorised access while permitting authorised communications? This term is also used for a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all (in and out) computer traffic between different security domains based upon a set of rules and other criteria, Ans: Firewall 29. What is the importance of URL j networking? ‘Ans : A Uniform Resource Locator (URL) is used to specify, where an identified resource is available in the network and the mechanism for retrieving il. A URL is also referred a web address. 30. What was the role of ARPANET in the Computer Network? Ber Baers ceryvnepe?® toas Question bank ~ Class il (Computer Science) 100 By Swati Chawla Ans: In 1969, ARPANET was ser 4 American goverment for defenor ™ t, ARPANET stands for Advanceg Projects agency Network. “y 31. Which of the following is not an 4, transfer rate? (i) bps (ii) abps (iii) gps Ans: (ii) abps 32, What is the difference between Trojan y and Virus in terms of computers? me ‘Ans: A trojan horse isa term used to descrite malware that appears to the USET, to perf a desirable function but, in fact, facilitates unauthorized access, to the User's computer system. A computer virus is a self-replicating computer program. It uses a Network to send copies of itself to the other nodes (computers on the network) and it May do 9 without any user intervention, 33. What term we Nit for ty (iv) kbps use for a software/hardware device, which is used to block, unauthorized authorized communications. This term is also used for a device or set of devices configured deny, encrypt, decrypt, or proy all (in and out) computer traffic between different security domains based upon + set of rules and other criteria. Ans: Firewall 34. What is the difference between Virus and Worms in the computers? VIRUS directly effects the system by Corrupting the useful data. A computer virus attaches itself to a program or file enabling it to spread from one computer to another. ‘A WORM is similar to a virus by design s considered to be subclass. ofa vinvs Worm spread from computer to computer but unlike a virus, it has the capability ® travel without any human action. 35. What is difference between Star Top?! access — while Ans: and Bus Topology of network? Ans, Bus Topology Star Topology () | Bus Sur Toe Topology is is non ~ lin (ii) (i) computers36. What is protocol? Which Protocol to search information using an internet browser? ans: Protocol: Protocol is a set of rule. : more computers Used from internet S that two or mpl MUSt follow tg communicate on netw WWW (World Wide Web) or HTTP (th nm Text Transfer Protocol) js ee used for Searchi information from Intern ne let using Internet browser. 37, Name two switching techniques used to transfer data between two terminals(computers), Ans: Switching techniques used to transfer data between two terminals are: © Circuit switching * Packet switching 38. What is the difference between LAN and WAN? Ans: The network which connect: countries network is known as W AN. It can be a group of LANs. The largest existing WAN is Interet. LAN is a group of computers and network devices connected together, usually within the same building whereas WAN is not Testricted to geographical location, although it might be confined within the bounds of state or is the different Protocol? Which protocol is used tocopyafile from/to a remotely located server? Ans: Protocol: Protocol is a set of rules that two or more computers must follow to communicate on network. FTP is used to copy a file from/to a remotely located server. 40. What is a Hub? Ans: A hub is a hardware device used to connect Several computers together. 41. How is Coaxial cable different from Optical Fibre? ; Ans: The data transmission characteristics of co- axial cable are considerably better than twisted pair but not better in relation to optical fibre. The co-axial eave being used as a shared cable network, wit Part of the bandwidth being used for sts traffic. Optical fibre is difficult to i because they are fragile and Ee special care to install. One ce in Major advantage of optical fibre over oe on Cable is its complete immunity to : RUestion bank - 101 8y Swati ch ~~ Class XII (Computer Science) lawl 45. 46. . How because the information is travelled on a modulated light beam, - What is a Modem? Function of modem is to convert analog Signals into digital signals. Modem also converts digital signal into analog signal Itis also. used to connect Internet. is a Hacker different from a Cracker? Hackers are the ones who get into someone's code or computer without any malicious intentions, where as Crackers are the one’s who get into someone’s code or computer with malicious intentions. OR Hackers These are the persons who get unauthorised access to the websites and replace them with other websites or unlawful information. Crackers The person who uses certain software to trap authenticated information or to crack the security codes such as uuser names and password to illegally access the information of computers is called a cracker. Which of the following unit measures the speed with which data’ can transmitted from one node to node of a network? Also, give the expansion of the suggested unit. i) Mbps ii) KMps iii) MGps (Megabytes per second) Suggest network —type(out- of LAN,MAN,WAN) for connecting each of the following set of their offices: Back Office and Work Office Back Office and south Office Back Office and Work Office - LAN Back Office and South Office - WAN Which device you will suggest to be Produced by the company for connecting all the computers with in each of their offices out of the following devices? Switeh/Hub Modem Telephone Switch / Hub . Which of the following communication medium, you will suggest. to be produced by the company for connectingNew Delhi for very their offices in > effective and fast communication Telephone Cable Optical Fil Ethernet Cable Ans: Optical Fibre 48. Which of the following unit measures a speed with which data can transmitted from one node to another node ofa network? Also, give the expansion of the suggested unit Im i) KMpsii) Mbps —_iii) MGps Ans) (ii) Mbps Mega bits per second 49. Differentiate between Internet Intranet. | Internet is a vast intemational network that is the most preferred WAN across the globe by joining computer networks together with telephone lines to form a backbone. Intranet is a network that exists exclusively within an organisation and that is based on Internet technology. 50. (a) Name two transmission media for networking. Optical Fibre and Satellite (b) Name any two required for networking. Ans: — Switch/Hub and Repeaters. and Ans: Ans: components 51. What is the difference between Message and Switching technique Switching technique? Packet Ans. Message Switching In message switching, there is no upper limit. |There is a tight upper limit on the | block size. A fixed size of packet is specified. Alll the packets are In Message Switching, packets | stored in main are stored on disk. | memory in This increases the | switching office, performance as | access time is reduced. 52. What do you understand Cookies and Firewall? Ans: Cookies: Cookies are the bits of data put on a hard disk when some on visit certain we sites. The cookies on the hard disk have the username and password init, so people don't have to log in. | by the terms Firewall: It isthe system to prevent unauthorized access to / form @ network. Question bank ~ Class XII (Computer Science) By Swati Chawla 102 (a) Write two advantages 53. dvantages for STAR topolo a by Ans: Advantage = Easy to replace; remove hosts or other devices, Disadvantage : If the central system corrupted , whole network stops. Hac, insay o Bl og, (b) Differentiate between Bus Bus Topology (i) | Bus Topology is | Linear. (ii) | No Switch is \s S used [= to connec, the _t omputers, 5: 2 |. What is the purpose of using a repeat, in the context of networking? Repeaters are networking devices, tha receive a signal and retransmit it aa higher level so that the signal covers longer distance. It’s required if the distance between source and destination is 70 to 199 m or more. If someone has hacked your Website, whom you lodge the Complaint? Ans: The complaint has to be lodged with the police under IT Act. OR We can report to Cyber cell also. 56. What do you mean by IP Address? Howis it useful in Computer Security? Ans: An Inteet Protocol (IP) address is a numerical identification and logical address that is assigned to devices connected in a computer network. An IP address is used to uniquely identify devices on the internet. and so one ca Quickly know the location of the system inthe network, - What do you mean by Spam Mails? How can you protect your mailbox from Spa™ Spam mails, also known as junk e-mail, is? subset of spam that involves identical messages sent to numerous recipients by e-mail. ty We can protect our mailbox from spams °) creating appropriate filters. ML When do you prefer XML over H and why? 5 The first benefit of XML is that because)” are writing your own markup _languae You are not restricted to a limited set of HE defined by proprietary Yen, Rather than waiting for standards bod 55. 58. Ans:adopt tag set enhancements (a can take quite some time), companies to adopt each other's standard: (yeah right!) with XML, you can create sno ‘own set of tags at your own pace ° 59, Which type of network (out of LAN, PAN and MAN )is formed, when you connect mobiles Process which or for browser ay using Bluetooth to transfer a picture file? ‘Ans: When two mobiles are connected using Bluetooth to transfer a picture files PAN(Personal Area Network) is created, 60. (a) Write one advantage of bus topology of network. Also, illustrate fa how four computers can be connected with each other using star topology of network? Ans: Advantage of bus topology In bus topology, computers can be connected with each other using server (host) along a single length of cable. one: (b) ference between star topology and bus topology of network? Ans: In star topology, nodes are connected to server individually whereas in bus topology all nodes are connected to server along a single length of cable. Node 1 Node 2 a . : 4 “ Node 1 Node 3 Node 3 Star topology Bus toplogy 61, What is the advantage of using SWITCH over HUB? Ans: Switch provides a dedicated line at full bandwidth between two devices but hub doesn’t provide a dedicated line. Hub share the 6, bandwidth © Write any two characteristics of Wifi Ns: 1. Itis a wireless solution for getting connected phe Intemea. “is handy as well as available throughout the Joumey ‘. (@) Whats the difference between E-Mail and Chat? Ques By go" Bank ~ Class xu (Computer Science) la *Wati haw a 103 Ans: In order to chat, you need to have an account onthe same Services as the person you are chatting with. On the other hand, in case of E-Mail, it is not necessary, ie. you can have an account from any provider and you can establish your own. (b) What is the difference conferencing and chat? Ans: Chat generally involves to one communication on the other hand_-video conferencing means more than two persons are involved in a discussion. What is the difference between domain name and IP address? IP address is an identifier for a computer or a device ona TCP/IP network. Example: 1.160.10.240 could be an IP address where as a domain name is a name that identifies one or more IP addresses. Example the domainname microsoft.com represents about a dozen IP addresses, between video ‘one 2 R '. Out of the following which is the fastest wired and wireless medium of communication: Infrared, coaxial cable, ethernet cable, microwave, optical fibre Ans: Wired: Optical fibre Wireless — infrared 66. What out of the following you will use to have an audio visual chat with an expert ing in a far away place to fix up technical issue : EMAIL , VoIP, FTP. Ans: VoIP 67. Differentiate between bus and_ star topology of network. Ans: In Star topology, nodes are connected to server individually where as, in bus topology, all the nodes are connected along a single length of cable 68. Differentiate between HTML and XML. — stands for | XML __ stands HTML for | Hyper text Transfer | eXtensible Markup | Protocol. | Language. A standard mark up —___| ‘A markup language | language for creating that specifies a set of web pages and web | rules for encoding applications. documents in a | format that_is both |[Ti a ate readable. | — Case Insensitive. | Case Sensitive Ml has | Programmers defin | HTML y . | predefined tags. __| their own tas Some tags don’t | It is ‘mandatory ae | require a closing tag. close each tag that been used. ___—— [Focuses on | Focuses on carrying | displaying data. __ information. ——__— | Helps to develop the | Helps to exchange structure of web | data between pages. different platforms. _| 69. Distinguish between website and web browser. ‘Ans: Website is a collection of related web pages served from a single web domain, while web browser is a software that is used to accept and display the web pages. 70. How is it easier to diagnose fault in Star topology than in Bus topology? ‘Ans :In Star topology each node is directly connected to a central hub / switch, hence fault diagnosis becomes easy. In bus topology all the nodes are connected to the backbone cable. The signal travels through the entire length of the backbone and is received by the node for which it is intended. Hence, fault diagnosis is difficult. Case Study Based Questions TIPS TO SOLVE QUESTIONS BASED ON CASE STUDY (5 MARKS) 2. Name the most suitable wing where the server should be installed. Justify. Server is to be placed in the building/wing, where number of computers are maximum. 3. Draw the cable layout. (a) use star topology OR (b) Use the 80-20 rule (connect the buildings having shortest distance. For N buildings, n-1 wires are required. No loops 4. Suggest the placement of networking devices. (a) Hub/Switch : In all building’ office’ wing to connect all the computers. (b) Repeaters: In between the building/office/wing where distance is more than 70 0100 meter to regenerate the signals. (c) Modem (Internet Connecting device) : Should be installed at wing/building/office that have Question bank - Class Xil (Computer Science) By Swati Chawla maximum number of computers (OF Where sen is installed). i : e oe eof software) Firewall (Hardwar 2 ety (d) security device 0 prevent unauthorized acces for from the network. ; tg 5, Which communication medium OF Inter > connecting Technology is used for connect % offices: Internet Connecting Technology Compromise with Speed Not with Cost ‘Compromise with Cost Not with speed Cable connection possible (Dial-up connection) Cable connection possible {Optical Fibre) Cable connection Cable connection not not possible possible (Hilly area, Long. (Hilly area, Long distance etc.) distance etc.) Satellite Radiowave communication) Communication In case of wireless connection take care of the following points: (a) If compromise on speed but not on cost, then broadband connection will be suitable. (b) Moderate Economical wireless connection is Radio wave / Microwave. If area is hilly, then radio wave is preferred. (c) The best wireless medium is Satelite (d) The best wired medium for high speed connectivity is Optical Fiber. Question 1: Intelligent Hub India is a knowledge community aimed to uplift the standard of skills and knowleds® in the society. It is planning to setup its training centres in multiple towns and villages pan India with its head offices in the nearest cities. They have created a model of their network with a city, 210" and 3 villages as given. As a network consultant, you have to suggest the best network related solution for thelr issues/problems raised in (i) to (iv) keeping in mind 104 ed
You might also like
Computer Network - Part 1
PDF
No ratings yet
Computer Network - Part 1
8 pages
NOTES NETWORKING
PDF
No ratings yet
NOTES NETWORKING
6 pages
Computer Networks PPT
PDF
No ratings yet
Computer Networks PPT
35 pages
Computer Network
PDF
No ratings yet
Computer Network
27 pages
Additional Notes Computer Network Unit-1
PDF
No ratings yet
Additional Notes Computer Network Unit-1
19 pages
Fundamentals of Network (Autosaved)
PDF
No ratings yet
Fundamentals of Network (Autosaved)
51 pages
Notes of Networking
PDF
No ratings yet
Notes of Networking
51 pages
Computer
PDF
No ratings yet
Computer
19 pages
Computer Network Notes and Pyq
PDF
No ratings yet
Computer Network Notes and Pyq
15 pages
Chapter Notes - CH 8 - Communication and Network Concepts, Computer Science, Class 12 Class 12 Notes - EduRev
PDF
100% (1)
Chapter Notes - CH 8 - Communication and Network Concepts, Computer Science, Class 12 Class 12 Notes - EduRev
20 pages
Networking Notes 12
PDF
No ratings yet
Networking Notes 12
9 pages
PDF Class 12 Computer Networks Notes by MNJ (1)
PDF
No ratings yet
PDF Class 12 Computer Networks Notes by MNJ (1)
65 pages
LESSON 1-Networking Concepts
PDF
No ratings yet
LESSON 1-Networking Concepts
50 pages
Part 1 Computer Network
PDF
No ratings yet
Part 1 Computer Network
32 pages
NETWORKING ONE
PDF
No ratings yet
NETWORKING ONE
66 pages
Network Notes
PDF
No ratings yet
Network Notes
15 pages
8-Introduction To Computer Networks - Telecommunications, The Internet, and Wireless Technology
PDF
No ratings yet
8-Introduction To Computer Networks - Telecommunications, The Internet, and Wireless Technology
51 pages
Networking Notes For Today
PDF
No ratings yet
Networking Notes For Today
51 pages
Computer Studies Ii
PDF
No ratings yet
Computer Studies Ii
51 pages
Network
PDF
No ratings yet
Network
7 pages
computer network
PDF
No ratings yet
computer network
23 pages
Computer Networks and Data Communication
PDF
No ratings yet
Computer Networks and Data Communication
15 pages
Cyber Academy Student Handbook 2023 Net+ & Sec+ (1)
PDF
No ratings yet
Cyber Academy Student Handbook 2023 Net+ & Sec+ (1)
200 pages
Together with class 12
PDF
No ratings yet
Together with class 12
8 pages
Computer Networks Notes CS
PDF
No ratings yet
Computer Networks Notes CS
22 pages
Class XII Computer Network-I
PDF
No ratings yet
Class XII Computer Network-I
43 pages
Ip Class 12 Computer Network
PDF
No ratings yet
Ip Class 12 Computer Network
25 pages
Networking
PDF
No ratings yet
Networking
47 pages
Lecture One
PDF
No ratings yet
Lecture One
75 pages
CS 12 Computer Netowrk
PDF
No ratings yet
CS 12 Computer Netowrk
25 pages
Fundamentals of Network
PDF
No ratings yet
Fundamentals of Network
52 pages
Class 12 Network
PDF
No ratings yet
Class 12 Network
32 pages
Networking
PDF
No ratings yet
Networking
15 pages
Module 1 - PPT - 1
PDF
No ratings yet
Module 1 - PPT - 1
54 pages
Network 20210426203825
PDF
No ratings yet
Network 20210426203825
51 pages
Network 20210426203825
PDF
No ratings yet
Network 20210426203825
51 pages
Evolution of Networking
PDF
No ratings yet
Evolution of Networking
8 pages
Computer Network 2
PDF
No ratings yet
Computer Network 2
59 pages
Computer Networks Unit 1
PDF
No ratings yet
Computer Networks Unit 1
74 pages
Computer Network Class XII
PDF
No ratings yet
Computer Network Class XII
49 pages
L-12 Computer Networks and Their Purpose
PDF
No ratings yet
L-12 Computer Networks and Their Purpose
37 pages
Networking 2020-21 Part 1
PDF
No ratings yet
Networking 2020-21 Part 1
87 pages
LO 3-Administrating Network
PDF
No ratings yet
LO 3-Administrating Network
19 pages
UNIT 5 Basics of Networking
PDF
No ratings yet
UNIT 5 Basics of Networking
73 pages
Computer Networks Unit 1
PDF
No ratings yet
Computer Networks Unit 1
71 pages
12-Informatics Practices - Unit 3-Computer Networking-Notes and Video Link
PDF
No ratings yet
12-Informatics Practices - Unit 3-Computer Networking-Notes and Video Link
19 pages
Computer Science - Computer Networks
PDF
No ratings yet
Computer Science - Computer Networks
81 pages
Lect BCA DCN 1 A
PDF
No ratings yet
Lect BCA DCN 1 A
51 pages
Network
PDF
No ratings yet
Network
30 pages
01 Computer Communication and Networks V PDF
PDF
No ratings yet
01 Computer Communication and Networks V PDF
30 pages
Computer Network
PDF
No ratings yet
Computer Network
32 pages
Network and Network Types
PDF
No ratings yet
Network and Network Types
61 pages
CBSE Class 12 Computer Science - Networking
PDF
No ratings yet
CBSE Class 12 Computer Science - Networking
10 pages
Lecture - 09 - Intro To Netwoks
PDF
No ratings yet
Lecture - 09 - Intro To Netwoks
38 pages
COMP 202 Reviewer
PDF
No ratings yet
COMP 202 Reviewer
3 pages
CPT 1
PDF
No ratings yet
CPT 1
184 pages
Computer Networking
PDF
No ratings yet
Computer Networking
54 pages
Communication & Network Concept
PDF
No ratings yet
Communication & Network Concept
96 pages
Related titles
Click to expand Related Titles
Carousel Previous
Carousel Next
Computer Network - Part 1
PDF
Computer Network - Part 1
NOTES NETWORKING
PDF
NOTES NETWORKING
Computer Networks PPT
PDF
Computer Networks PPT
Computer Network
PDF
Computer Network
Additional Notes Computer Network Unit-1
PDF
Additional Notes Computer Network Unit-1
Fundamentals of Network (Autosaved)
PDF
Fundamentals of Network (Autosaved)
Notes of Networking
PDF
Notes of Networking
Computer
PDF
Computer
Computer Network Notes and Pyq
PDF
Computer Network Notes and Pyq
Chapter Notes - CH 8 - Communication and Network Concepts, Computer Science, Class 12 Class 12 Notes - EduRev
PDF
Chapter Notes - CH 8 - Communication and Network Concepts, Computer Science, Class 12 Class 12 Notes - EduRev
Networking Notes 12
PDF
Networking Notes 12
PDF Class 12 Computer Networks Notes by MNJ (1)
PDF
PDF Class 12 Computer Networks Notes by MNJ (1)
LESSON 1-Networking Concepts
PDF
LESSON 1-Networking Concepts
Part 1 Computer Network
PDF
Part 1 Computer Network
NETWORKING ONE
PDF
NETWORKING ONE
Network Notes
PDF
Network Notes
8-Introduction To Computer Networks - Telecommunications, The Internet, and Wireless Technology
PDF
8-Introduction To Computer Networks - Telecommunications, The Internet, and Wireless Technology
Networking Notes For Today
PDF
Networking Notes For Today
Computer Studies Ii
PDF
Computer Studies Ii
Network
PDF
Network
computer network
PDF
computer network
Computer Networks and Data Communication
PDF
Computer Networks and Data Communication
Cyber Academy Student Handbook 2023 Net+ & Sec+ (1)
PDF
Cyber Academy Student Handbook 2023 Net+ & Sec+ (1)
Together with class 12
PDF
Together with class 12
Computer Networks Notes CS
PDF
Computer Networks Notes CS
Class XII Computer Network-I
PDF
Class XII Computer Network-I
Ip Class 12 Computer Network
PDF
Ip Class 12 Computer Network
Networking
PDF
Networking
Lecture One
PDF
Lecture One
CS 12 Computer Netowrk
PDF
CS 12 Computer Netowrk
Fundamentals of Network
PDF
Fundamentals of Network
Class 12 Network
PDF
Class 12 Network
Networking
PDF
Networking
Module 1 - PPT - 1
PDF
Module 1 - PPT - 1
Network 20210426203825
PDF
Network 20210426203825
Network 20210426203825
PDF
Network 20210426203825
Evolution of Networking
PDF
Evolution of Networking
Computer Network 2
PDF
Computer Network 2
Computer Networks Unit 1
PDF
Computer Networks Unit 1
Computer Network Class XII
PDF
Computer Network Class XII
L-12 Computer Networks and Their Purpose
PDF
L-12 Computer Networks and Their Purpose
Networking 2020-21 Part 1
PDF
Networking 2020-21 Part 1
LO 3-Administrating Network
PDF
LO 3-Administrating Network
UNIT 5 Basics of Networking
PDF
UNIT 5 Basics of Networking
Computer Networks Unit 1
PDF
Computer Networks Unit 1
12-Informatics Practices - Unit 3-Computer Networking-Notes and Video Link
PDF
12-Informatics Practices - Unit 3-Computer Networking-Notes and Video Link
Computer Science - Computer Networks
PDF
Computer Science - Computer Networks
Lect BCA DCN 1 A
PDF
Lect BCA DCN 1 A
Network
PDF
Network
01 Computer Communication and Networks V PDF
PDF
01 Computer Communication and Networks V PDF
Computer Network
PDF
Computer Network
Network and Network Types
PDF
Network and Network Types
CBSE Class 12 Computer Science - Networking
PDF
CBSE Class 12 Computer Science - Networking
Lecture - 09 - Intro To Netwoks
PDF
Lecture - 09 - Intro To Netwoks
COMP 202 Reviewer
PDF
COMP 202 Reviewer
CPT 1
PDF
CPT 1
Computer Networking
PDF
Computer Networking
Communication & Network Concept
PDF
Communication & Network Concept