Networking and Internet Class 11 Questions and Answers

Teachers and Examiners (CBSESkillEduction) collaborated to create the Networking and Internet Class 11 Questions and Answers. All the important Information are taken from the NCERT Textbook Information Technology (802) class 11.

Networking and Internet Class 11 Questions and Answers

1. What is computer network?
Answer – Computer networking is the term for a network of connected computers that may communicate and share resources. These networked devices transmit data through wireless or physical technologies using a set of guidelines known as communications protocols.

2. What are the communication take place in computer network?
Answer – A computer network is made up of a number of connected nodes that communicate over a channel. There are three types of computer network communication:
a. Simplex
b. Half-duplex
c. Full-duplex

Simplex – Only one route of information transport is possible in simplex mode. Unidirectional describes this mode. Simple data is transferred through numerous fibre optics and satellites in computer networks.

Half-duplex – Only one node at a time can broadcast data in the half-duplex mode, which allows for bidirectional communication between the two nodes. In low-bandwidth situations, this mode is typically used to transfer files between nodes.

Full-duplex – In full-duplex mode, both communicating parties can send and receive at the same time. NIC Support full-duplex mode.

3. Difference between resource sharing and communication?
Answer – Difference between resource sharing and communication are –

Resource Sharing – Sharing hardware and software resources is made possible by networking computers. Peripherals (such printers and scanners), the CPU, and memory are a few examples of hardware resources. System and application software, as well as files that may contain text, audio, and video content, are examples of software resources.

Communication – Information sharing between network nodes is facilitated by connecting computers through a network. For instance, since the printer is linked to every network node, any of the computer systems  send data to any of the printer, the three other computers, or both.

Networking and Internet Class 11 Questions and Answers

4. What are the different transmission Medium in computer network?
Answer – A transmission medium is a channel of transmission that allows for the signal-based transfer of data from one node to another. The data is converted into an appropriate form for transmission on the medium via a signal.
There are two types of transmission medium –

a. Guided medium – Physical conductors like twisted pairs, coaxial cable, and fibre optics are referred to the guided medium. The signal travels as voltage and current in coaxial and twisted pair cable, but it travels as light in optical fibre.

b. Unguided medium – Electro-magnetic waves are used by the unguided medium, which eliminates the need for a physical conductor. Microwave, radio wave, and infrared are a few examples of unguided media.

5. What is the purpose of repeater?
Answer – A signal may weaken and degrade with increased distance. In order to increase the input signal’s range, a repeater is employed to return the signal to its original state. It is positioned between two cable segments as a result.

Networking and Internet Class 11 Questions and Answers

6. What is the purpose of HUB?
Answer – A hub joins multiple lines, which are also known as cable segments, as opposed to a repeater, which only connects two wires. Multiple input/output (I/O) ports on a hub each connect to a single cable.

7. What is Bridge?
Answer – A bridge is a multiport network interface used to connect two or more LANs, sometimes at differing speeds. Therefore, a bridge can be used to combine smaller LANs to create a larger LAN.

8. What is Switch?
Answer – Switches are used to connect individual nodes in the network with one another, as opposed to bridges, which join two or more computers in LAN. Each node in the network is attached to a different switch port.

Networking and Internet Class 11 Questions and Answers

9. What is Router?
Answer – LAN or WAN routers are used to link different networks together. Data from an incoming network is sent to another network via a router. A router keeps track of different networks’ routing tables. The router chooses which network the incoming packet should be sent to based on the destination address.

10. What is Gateway?
Answer – A gateway enables communication across networks based on various protocol systems. Data from one network that uses one protocol is translated to the outgoing network’s protocol before being forwarded. As a result, a gateway can be compared to a router that has software for protocol conversion.

11. What are the different types of Network?
Answer – Networks can be roughly characterized as PAN, LAN, MAN, and WAN based on their geographic range.

a. Personal area network (PAN) – A personal area network (PAN) is a type of computer network designed to connect computers and other devices that are physically close to one person. Personal computers, printers, fax machines, telephones, PDAs, scanners, and even gaming consoles are a few examples of the kinds of gadgets that are utilized in a PAN.

b. Local area network (LAN) – Local Area networks can have a radius of up to 1 km and are private networks. They are typically established inside a structure or campus. The operating speed of LANs is between 10 Mbps and 1 Gbps.

c. Metropolitan area network (MAN) – Metropolitan Area Network is the abbreviation. It could be held by several people or groups, not just one. These networks, which have a radius of up to 50 km, are used to create connections within cities.

d. Wide area network (WAN) – Wide Area Network is referred to as WAN. A WAN typically covers a distance of roughly 1000 km. They are useful for linking isolated places and for long-distance communication. They create connections inside a nation or continent.

Networking and Internet Class 11 Questions and Answers

12. What is topology?
Answer – The physical and logical configuration of a network’s nodes and links is known as its topology. Devices like switches, routers, and software with switch and router functionality are typically included in nodes. A graph is a common way to represent network topologies.

13. Different between broadcast and point-to-point topology?
Answer – Network topology refers to the positioning of nodes in a network, often known as their layout. Broadly speaking, there are two different topologies: broadcast and point-to-point.

a. Broadcast topology – All nodes in a broadcast topology share a single physical link. All nodes receive when one node sends. When multiple nodes broadcast at once, collision may happen, and a collision resolution mechanism is in place to deal with it. Bus and ring topologies dominate in broadcast networks.

b. Point-to-Point topologies – Every pair of nodes in a point-to-point architecture has its own dedicated link. Star and mesh topologies are common for point-to-point networks.

Networking and Internet Class 11 Questions and Answers

14. Types of topologies?
Answer – There are five different types of topologies?
a. Bus topologies
b. Ring topologies
c. Star topologies
d. Mesh topologies
e. Tree topologies

15. What is Bus topologies?
Answer – In a bus topology, several nodes are connected by a lengthy cable known as the backbone cable (or just the backbone) using a connector known as the tap. In this, every device linked to the backbone cable receives a message sent by one. Less cabling is needed, and this topology is simple to establish and expand the network built using it. However, isolating and locating faults is challenging.

16. What is Ring topologies?
Answer – In a ring topology, all the devices are connected by a cable that is shaped like a ring. The intended recipient of the message is reached by way of a one-way transmission of the intended message. Device addition and deletion, fault isolation, and fault detection are simple processes. The topology, however, is constrained by single point failure, which can disrupt the entire network. It could take longer to send a message from one node to another node (four steps when sending from device A to device E).

Networking and Internet Class 11 Questions and Answers

17. What is Star Topology?
Answer – All of the devices in a star topology are linked to the hub, which serves as the main controller. Any two devices can communicate with each other through the hub that relays messages. Installation and configuration of the star network are simple.
Furthermore, fault isolation and detection are simple. However, compared to bus and ring topologies, it requires more cabling. Moreover, a failed hub will result in a failed network.

18. What is Mesh Topology?
Answer – Every node in the network is connected to every other node due to mesh topology. The topology offers secure data transfer without any traffic issues because every conceivable pair of nodes has a dedicated point-to-point connection. To establish the topology, several connections are necessary. As the network expands, this makes installation more challenging as there are more nodes.

Networking and Internet Class 11 Questions and Answers

19. What is Tree topology?
Answer – A hybrid topology that combines bus and star topologies is called tree topology. In a bus topology, the primary backbone cable functions as the tree’s trunk, and star networks (and even individual nodes) are connected to it like the tree’s branches. A portion of a network built using a tree topology will not be affected if it is damaged. In comparison to other topologies, installation and configuration are challenging. Additionally, if the backbone cable is broken, the network’s communication will be affected as a whole.

20. Purpose of MAC Address?
Answer – A network interface controller (NIC) is given a media access control address (MAC address), which it can use as a network address in communications inside a network segment.

21. What is IP address?
Answer – Every computer in a network has an additional distinctive identification code called an IP Address. The four bytes (or 32 bits) that make up an IP address can range in value from 0 to 255.

22. What is Domain name?
Answer – When using client software to access a website, a domain name is a string of characters that corresponds to a numeric IP address. A domain name is just the text that a user types into their browser to access a specific website. For instance, Google’s domain name is “google.com”.

Networking and Internet Class 11 Questions and Answers

23. Difference between generic domain and country specific domain?
Answer – A generic domain name, like toothpaste.com or videogame.com, is made up of one or more words that are often used in dictionaries. TLDs can contain generic domain names, however the.com TLD is the most expensive of them.

Generally speaking, country-specific domain extensions identify the location or language for which the website’s content is appropriate.

Generic Domain Names:
·com – commercial business
·edu – Educational institutions
·gov – Government agencies
·mil – Military
·net – Network organizations
·org – Organizations (nonprofit)

Country Specific Domain Names:
.in – India
·au – Australia
·ca – Canada
.ch – China
.nz – New Zealand
.pk – Pakistan
.jp – Japan
.us – United States of America

24. What is digital literacy?
Answer – Raising knowledge and understanding regarding technology, such as desktop computers, smartphones, tablets, and other electronic devices, is referred to as digital literacy. Internet and software tool familiarity are also included. People may more easily and effectively obtain, evaluate, exchange, create, and transmit information because to this expertise.

Networking and Internet Class 11 Questions and Answers

25. What is the purpose of Internet Services?
Answer – Network services are programmes that are hosted by servers on a computer network and offer functionality to network users. The Internet has several uses, including e-mail, file sharing, remote login, and the World Wide Web (WWW).

26. What is Telnet?
Answer – Telnet is a network protocol that allows for two-way, collaborative, text-based communication between two computers as well as remote computer access. It uses the Transmission Control Protocol/Internet Protocol (TCP/IP) networking protocol to create remote sessions in response to user commands.

27. What are the different TCP/IP model.
Answer – The TCP/IP Model are –
a. Application Layer
b. Transport Layer
c. Internet Layer
d. Link Layer

Networking and Internet Class 11 Questions and Answers

28. What do you mean by Application Layer?
Answer – Data or a message is created at the sending end and reviewed and processed at the receiving end. The message that will be sent with the header must likewise be enclosed by this layer. On this layer, a number of protocols like HTTP (HyperText Transfer Protocol) and POP3 (Post Office Protocol version 3) operate. POP3 enables you to download emails to your local computer so you can read them offline.

29. What are the different types of Malware?
Answer – Malicious software (programmes) created with the purpose of interfering with system performance by harming the system, gaining unauthorised access to the system, or preventing legitimate users from using computing resources are referred to as malware. Malware includes viruses, worms, and Trojan horses.

30. What is Virus?
Answer – A virus is a piece of software code that can damage your computer by corrupting or overwriting system data.

Networking and Internet Class 11 Questions and Answers

31. What is worm virus?
Answer – A worm is frequently acquired via a network, and it floods the hard disc by automatically producing several copies of itself there. It causes network congestion when a worm is received as an email attachment and automatically forwarded to the recipients.

32. What is Trojan Horse?
Answer – A Trojan Horse Virus is a form of malware that instals itself on a computer by impersonating a trustworthy application. The delivery technique often involves an attacker hiding malicious malware in genuine software using social engineering in an effort to get users’ system access.

33. What is Eavesdropping?
Answer – The act of surreptitiously or covertly listening to another person’s private discussion or communications without that person’s agreement is known as eavesdropping. Telephone lines, cellphone networks, email, and instant messaging are all used for eavesdropping.

34. What is Denial of Service?
Answer – A cyberattack known as a denial-of-service (DoS) attack renders a system or network resource inaccessible to its users by temporarily or permanently interrupting services.
In order to overwhelm systems and prevent requests from being fulfilled, denial of service is often achieved by flooding the targeted computer or resource with unnecessary requests. A DoS attack is comparable to a crowding of customers at a store’s entrance, making it difficult for actual customers to enter.

Networking and Internet Class 11 Questions and Answers

35. What are the different types Cyber Crime.
Answer – The different type of Cyber Crime activity are –
a. Cyber bulling
b. Cyber stalking
c. Online Job Fraud
d. Vishing
e. SMSing
f. SIM Swap scam
g. Creadit card fraud
h. Identity theft
i. Spamming
j. Ransomware

36. What is the purpose of Firewalls?
Answer – An enterprise, home, or individual’s internal network is protected by a firewall from malicious traffic coming from other networks. This can be accomplished by installing a router or a computer (typically designated to act as a firewall) between the internal network and the external network. Firewall examines network traffic and permits only data that does not contravene security constraints to travel through the network. A router-based hardware firewall stops harmful malware from entering your network from the outside.

37. How to protect our self from measures while accessing internet?
Answer – To protect our self from measures activity –
a. Never click on a suspicious link specified on a web page or send through a mail.
b. Make sure that passwords are strong and are changged frequently.
c. Never disclose personal information
d. Report phishing issues to the concerned authorities
e. Ensure that the web browser is updated and secure.

Employability Skills Class 11 Notes

Employability Skills Class 11 MCQ

Employability Skills Class 11 Questions and Answers

Information Technology Class 11 Notes

Information Technology Class 11 MCQ

Information Technology Class 11 Questions and Answers

error: Content is protected !!