Class XII COMPUTER NETWORKING. Assignment-3. identify client side script(s) and server script(s):

Similar documents
Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help

CHAPTER - 10 COMPUTER NETWORKING

Advanced Higher Computing. Computer Networks. Homework Sheets

Class XII (Theory) C++

Computer Networking Type A: Very Short Answer Questions

Higher Computing Networking 1

Study Guide CompTIA A+ Certification, Domain 2 Networking

Chapter 4: Networking and the Internet

Component 4: Introduction to Information and Computer Science

Technical Glossary from Frontier

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

Understand Wide Area Networks (WANs)

Computer Networks. By Hardeep Singh

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

Multi-Homing Dual WAN Firewall Router

Local Area Networks (LANs) Blueprint (May 2012 Release)

Firewall VPN Router. Quick Installation Guide M73-APO09-380

CHAPTER 9: THE EVOLVING INTERNET

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

Connecting with Computer Science, 2e. Chapter 5 The Internet

A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and

Chapter 5. Data Communication And Internet Technology

Network Technology CMP-354-TE. TECEP Test Description

Local-Area Network -LAN

RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009

Wireless LANs vs. Wireless WANs

COMPUTER NETWORK TECHNOLOGY (300)

Go Wireless. Open up new possibilities for work and play

Introduction. Network Basics. Workstations. Server. Hub

Discovering Computers Chapter 9 Communications and Networks

524 Computer Networks

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

NETWORKING TECHNOLOGIES

IT Data Communication and Networks (Optional)

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers

Network Fundamentals CHAPTER 1

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Technical papers Virtual private networks

Data Communication and Computer Network


Chapter 12 Homework CIT J001/02/04/06. Name: Date: Course: Test:

Telecommunications, the Internet, and Wireless Technology

Alexander Nikov. 6. Telecommunications and networks, the Internet. Hyundai Heavy Industries Creates A Wireless Shipyard. a Wireless Shipyard

Cornerstones of Security

Local Area Network. OSI Seven Layer Model. Whole Building Network

VPN. Date: 4/15/2004 By: Heena Patel

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

BASIC ANALYSIS OF TCP/IP NETWORKS

CompTIA Network+ (Exam N10-005)

Introduction to computer networks and Cloud Computing

Networks. Connecting Computers. Measures for connection speed. Ethernet. Collision detection. Ethernet protocol

Lesson 24 Network Fundamentals

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

An Introduction to Computer Networking

Internet and Services

Chapter 9 The Internet

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

CSCI 362 Computer and Network Security

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Outline Introduction to Internet, Intranet and Extranet. What is an Intranet? by Awad. Basic Intranet-enabling Technology [Awad, chapter 4]

E-BUSINESS THREATS AND SOLUTIONS

Mathatma Gandhi University

Computer Networking Networks

Networks. The two main network types are: Peer networks

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

Computer Networking: A Survey

Security Issues with Distributed Web Applications

Computer Networks. Computer Networks. Telecommunication Links. Connecting. Connecting via Telephone Lines ISDN

Introduction to Networking

SOHO 6 Wireless Installation Procedure Windows 95/98/ME with Internet Explorer 5.x & 6.0

AN ANALYTICAL STUDY OF INTERNET AND INTRANET CONNECTIONS AND CONFIGURATIONS IN ISP

Chapter 1 Introduction

10 WIRELESS, REMOTE, AND WIDE AREA NETWORKING

Network Security Topologies. Chapter 11

CITS1231 Web Technologies. Client, Server, the Internet, and the Web

The Shift to Wireless Data Communication

Think! Think! Data communications. Long-Distance. Modems: to analog and back. Transmission Media. The last mile is the hardest for digital information

IT4405 Computer Networks (Compulsory)

Technical Support Information Belkin internal use only

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

Page 1 of 7. Computer Networking

NZQA Expiring unit standard 6857 version 4 Page 1 of 5. Demonstrate an understanding of local and wide area computer networks

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 1 BASIC CONCEPTS OF NETWORK

Network Topologies. Network Topologies

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts

Introduction to Ethernet

PROTECTING NETWORKS WITH FIREWALLS

ewon-vpn - User Guide Virtual Private Network by ewons

SiteCelerate white paper

ELECTRONIC COMMERCE SYSTEMS

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Network Concepts. IT 4823 Information Security Concepts and Administration. The Network Environment. Resilience. Network Topology. Transmission Media

CPET 581 E-Commerce & Business Technologies. Topics

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks


Introduction To Computer Networks

Computer Networks Vs. Distributed Systems

Transcription:

Class XII COMPUTER NETWORKING Assignment-3 1. Differentiate between packet switching and message switching technique in network communication. 2. Differentiate between BUS and STAR topology of networks. 3. What is VolP? 4. Out of the following, identify client side script(s) and server script(s): side a. ASP b. Javascript c. VBScrip d. JSP

Quick learn university is setting up its Academic blocks at Prayag Nagar and planning to set up a network. The university has 3 academic blocks and one Human Resource Center as shown in the diagram below: Business Block Technology Block Law Block HR Block

Center to center distances between various blocks/center is as follows: Law Block to Business Block Law Block Technology Block Law Block to HR Center Business Block to Technology Block Business Block to HR Center Technology Block to HR Center 40m 80 m 105 m 30 m 35 m 15 m Number of Computers in each of the Blocks/Center is as follows: Law Block 15 Technology Block 40 HR Center 115 Business Block 25 (e1) Suggest the most suitable place (i.e., Block/Center) to install the server of this university with a suitable reason. (e2) Suggest an ideal layout for connecting these blocks/center for a wired connectivity. (e3) which device you will suggest to be placed/installed in each of these blocks/center to efficiently connect all the computers with in these blocks/center? (e4) The university is planning to connect its admission office in the closest big city, which is more than 250 km from university, which type of network out of LAN, MAN or WAN will be formed? Justify your answer. 5. Which of the following will come under Cyber Crime? a. Theft of a brand new sealed pack Laptop

b. Access to a bank account for getting unauthorized Money Transaction c. Modification in a company data with unauthorized access d. Photocopying a printed report 6. Compare open source software and proprietary software. 7. In networking, what is WAN? How is it different from LAN? 8. Differentiate between XML and HTML 9. What is WEB2.9? 10. Out of the following, identify client side script(s) and server side script(s): a. Javascript b. ASP c. VBScript d. JSP

Great Sudies Uniersity is setting up its Academic schools at Sunder Nagar and planning to set up a network. The university has 3 academic schools and one administration center as shown in the diagram below: Business School Technology School Law School Admin Center

Center to center distances between various buildings is as follows: Law School to Business School Law School Technology School Law School to Admin Center Business School to Technology School Business School to Admin Center Technology School to Admin Center 60m 90 m 115 m 40 m 45 m 25 m Number of Computers in each of the Schools/Center is as follows: Law School 25 Technology School 50 Admin Center 125 Business School 35 (e1) Suggest the most suitable place (i.e.,schools/center) to install the server of this university with a suitable reason

(e2) Suggest an ideal layout for connecting these Schools/center for a wired connectivity. (e3) Which device you will suggest to be placed/installed in each of these schools/center to efficiently connect all the computers within these Schools/center? (e4) The university is planning to connect its admission office in the closest big city, which is more that 350 km from the university. Which type of network out of LAN, MAN or WAN will be formed? Justify your answer. 11. Compare Open Source Software and Proprietary Software. 12. What are cookies? 13. What was the role of ARPANET in Computer Network?

14. Which of the following is not a unit for data transfer rate? a. aps b. abps c. gbps d. kbps 15. what is the difference between Trojan Horse and Virus in terms of computers? 16. What term we use for a software/hardware device, which is used to block, unauthorized access while permitting authorized communications. This term is also used for a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all (in and out) computer traffic between different security domains based upon a set of rules and other criteria.. 17. Write the full forms of the following: a. GNU b. XML 18. Write one advantage of each for Open Source Software and Proprietary Software 19. What is the difference between Virus and Worms in the computers? 20. Write the full forms of the following: a. FTP b. FSF

21. Name any two common Web browsers. 22. What is difference between Star Topology and Bus Topology of network?

23. Expand the following abbreviations: a. GSM b. CDMA 24. What I protocol? Which protocol is used to search information from Internet using an internet browser? Freshminds University Ana Nagar Campus Kolkata Admission Office Office Block Commerce Block Science Block Freshminds University of India is starting its first campus in Ana Nagar of South India with its center admission office in Kolkata. The university has 3 major blocks comprising of Office Block, Science Block and Commerce Block in the 5 km area Campus. As a network expert, you need to suggest the network plan as per (E1) to (E4) to the authorities keeping in mind the distance and other given

parameters. Expected Wire distances between various locations: Office Block to Science Block Office Block to Commerce Block Science Block to Commerce Block Kolkata Admissions office to Ana Nagar Campus 90 m 80 m 15 m 2450 km Office Block 10 Science Block 140 Commerce Block 30 Kolkata Admission Office 8 Expected number of computers to be installed at various locations in the university are as follows:

(E1) Suggest the authorities, the cable layout amongst various blocks, inside university campus for connecting the blocks. (E2) Suggest the most suitable place (i.e., block) to house the server of this university with a suitable reason. (E3) Suggest an efficient device from the following to be installed in each of the blocks to connect all the computers: MODEM SWITCH GATEWAY (E4) Suggest the most suitable (very high speed) service to provide data connectivity between Admission Office located in Kolkata and the campus located in Ana Nagar from the following options: Telephone line Fixed-line Dial-up connection Co-axial Cable Network GSM Leased line Satellite Connection

28. What is difference between LAN and WAN?

29. Expand the following abbreviations: a. HTTP b. ARPANET 30. What is protocol? Which protocol is used to copy a file from/ to a remotely located server? 31. Name two switching techniques used to transfer data between two terminals (computers). 32. What is a Hub? 33. Expand the following terms with respect to networking: a. MODEM b. WLL c. FTP d. TCP/IP 34. How is coaxial cable different from Optical Fibre? 35. How is Hacker different from Cracker? 36. What is the significance of Cyber law? 37. Expand the following terms with respect to Networking: a. CDMA b. FTP c. WLL

d. HTML 38. Which of the following unit measures the speed with which data can be transmitted from one node to another node of a network? Also, give the expansion of the suggested unit a. Mbps b. KMph c. MGps 39. Name two transmission media for networking. 40. What is the difference between Message Switching technique and Packet Switching technique?