0% found this document useful (0 votes)
329 views3 pages

Class 8 Computer Networking Overview

Uploaded by

onlyforstudyw
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
329 views3 pages

Class 8 Computer Networking Overview

Uploaded by

onlyforstudyw
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

ST ANDREWS SCOTS SR. SEC.

SCHOOL
9TH AVENUE, I.P. EXTN., PATPARGANJ, DELHI-92
CLASS- VIII (2021-22)
SUBJECT-COMPUTER
CHAPTER-1

A. Tick (√) the correct option.

1. describes a computer that is connected to a network.


a. Node b. Device [Link] d. Attachment
Answer: a. Node
2. A computer network that spans across a city can be called
a. LAN b. WAN c. MAN d. CAN
Answer: c. MAN
3. can convert the digital data into analog signal and vice versa.
a. Hub b. Modem c. Router [Link] Card
Answer: b. Modem
4. A computer network that can be used only within an organization is called
a. Internet b. Intranet c. Both a and b d. None of these
Answer: b. Intranet
5. A/an ____________ address is an unique identification number assigned to a computer connected
to a network.
a. IP b. Web c. Permanent d. Local
Answer: a. IP

B. Write T' for true and 'F' for false.

1. Modulation is the process of converting analog signals to digital signal. [T]


2. Bluetooth technology uses radio frequency to transmit data from one system to another. [T]
3. Through computer networking, information can be easily shared amongst the people. [T]
4. In Bus topology, all the nodes are connected to a single common path. [T]
5. A server is also called as host computer. [T]

C. Fill in the blanks using the words given below.

1. Protocol is a set of rules that governs the communication between computers on a network.
2. SMTP is a protocol used to send e-mail messages over the internet.
3. Router is a networking device used to connect and facilitate transfer of information between
two networks.
4. In mesh topology every node is connected to each other node.
5. NIC is an expansion card which is used to provide the network access to a computer.

D. Short answer type questions.

1. What is a protocal?
Answer: Protocol is a set of rules that governs the communication between the computers over
a network.
2. Name the various components needed for a computer network.
Answer: The various components needed for a network are Network Interface Card (NIC),
networking cable, hub or a switch and router.
3. Define client and server.
Answer: A server is also called a host computer. It controls to the hardware and software
on the network. It provides a centralised storage area for the programs, data and
information.
4. What is topology?
Answer: Topology refers to the geometric arrangement of computers or nodes in a network.
The factors that determine the type of topology are cost, flexibility and reliability.

E. Long answer type questions.

1. What is a computer network? Write its advantages.


Answer: A computer network is a group of interconnected computer systems and other
computing devices. The computers on the network can communicate with each other as well
as work independently. Each computer in a network is called a node.
Advantages: 1)The information can be easily shared by people.
2) It reduce the cost of hardware.
3) Store information in one centralised location.
4) Reduce in installation cost.
5) User Authentication process to secure data.

2. Describe LAN and WAN.


Answer: LAN(Local Area Network): LAN is short form of Local Area Network. It is a digital
communication system that interconnects a larger number of computers and other peripheral
devices with in a radius of less than 1 km. This type of network is used for a smaller area such as
a residence, school, laboratory, university campus or office building. Cables and communication
devices are used to connect computers to the LAN.
WAN(Wide Area Network): WAN is short form of Wide Area Network. It is a digital
communication system that a large number of computers in a wide geographical area. This
network may operate on a worldwide or nationwide basis. In such type of network, there may not
be physical connection between computers. In WAN telephone lines, microwave, satellite links,
etc., can be used as transmission medium.

3. What is the difference between a webpage and a website?


Answer: Webpage: A single digital page on the World Wide Web(WWW) that contains
information and links of another pages is called a web page. Web Pages are created by using the
Hyper Text Markup Language(HTML).
Website: A website us a collection of web pages which are interlinked to each other. A website
may contains thousands of web pages.

4. What is the difference between sender and receiver in a network.


Answer: Sender: A sender is a computer that wants to send information to other computer
connected to the network.
Receiver: A receiver is a computer which is expecting the data from other computer on the
network.

5. What is an IP Address? Give Example.


Answer: An Internet Protocol (IP) address is an unique identification number assigned to a
computer connected to a network. It has two main functions : host or network interface
identification and location addressing. IP addresses are written and displayed in human- readable
notations, such as [Link].
Application based questions.

[Link] wants to setup a network for his organisation. He wants to use a topology in which all
nodes are connected in a circular path. Which topology should he choose.
Answer: Ring Topology

2. Deepak wants to setup a server which manages all the network traffic. What type of server
does he wants to setup?
Answer: Network Server

******************

Common questions

Powered by AI

When choosing a network topology, factors such as cost, flexibility, and reliability must be considered. Cost involves the expense of setting up and maintaining the network. Flexibility refers to how easily new nodes can be added or removed without significant changes to the network. Reliability focuses on how the network can maintain operations under different conditions. For example, a star topology offers high reliability as the failure of one link does not affect the others but may be costlier than simpler topologies like bus topology .

A MAN (Metropolitan Area Network) is particularly beneficial in scenarios where an organization operates multiple campuses or branches within a city. Unlike a LAN, which is limited to smaller areas like a single building, a MAN can efficiently cover an entire city, offering compatibility with both short and medium-range communications. A MAN can be more cost-effective and easier to manage than a WAN when limited to city-wide area because of its specialized technology and protocols designed for such coverage. It balances the coverage area and performance requirements typical for city-based networking .

An Intranet offers various advantages over the public Internet within an organization. It provides a secure environment where company-specific information and resources can be shared without exposing them to external entities. Intranets enable control over access, ensuring that only authorized personnel can view or exchange sensitive data. This secure access enhances productivity by providing employees with reliable tools and information and maintaining the organization's confidentiality and data integrity .

The Network Interface Card (NIC) is an essential component of a computer network, providing the hardware interface between a computer and the network. It formats the data sent from the computer into a frame, suitable for network transmission, and reverses the process for incoming network data, ensuring proper data communication and interpretation by the computer's operating system. Without a NIC, computers would lack the ability to connect to networks and use network resources .

LAN (Local Area Network) and WAN (Wide Area Network) are both types of networks that facilitate communication among computers. A LAN typically covers a smaller geographic area, such as a single building or campus, using cable connections for direct data transfer. It is ideal for high-speed and low-latency communication within localized areas. In contrast, a WAN covers larger geographic regions, ranging from cities to global connections, using long-distance communication technologies like satellite and telecom networks; bandwidth may be lower and costs higher than LANs. A key similarity between them is that both allow for data sharing and communication, albeit at different scales and speeds .

In a bus topology, all nodes are connected to a single backbone cable which acts as a shared communication medium. Data transmitted by a node travels along the backbone until it reaches the intended recipient. The primary advantage of a bus topology is its simplicity and cost-effectiveness, making it easy to implement and extend. However, its disadvantages include limited cable length and number of nodes, potential for data collisions, and a single point of failure which can disrupt the entire network .

Implementing user authentication processes in a computer network involves several considerations. Firstly, the level of security necessary based on the sensitivity of the data being protected must be determined. Next, the chosen authentication method—such as passwords, biometric scans, or multi-factor authentication—should balance security with user convenience to ensure compliance. Scalability of the authentication process must be considered to accommodate user growth. Finally, any network should include mechanisms to frequently update and enforce strong authentication credentials to maintain security over time .

A centralized server enhances data management and security by providing a single, controlled point for storing, managing, and securing data. This central point simplifies data backup, maintenance, and permission management, ensuring consistent application of security policies across all network users. In contrast, a decentralized system may lead to data fragmentation and inconsistencies in security management, as data is stored and managed across many independent nodes. Centralized systems allow for efficient task management and bolster network administration and security integrity .

A properly managed computer network employs multiple security measures to protect data transmitted through it. User authentication ensures only authorized users have access to the network. Data encryption is used to protect data during transmission, rendering it unreadable to unauthorized parties. Firewalls control incoming and outgoing network traffic based on predetermined security rules, preventing unauthorized access. Additionally, regular security audits and updates of network software help to identify and address vulnerabilities before they can be exploited .

A modem functions as a device that converts digital data to analog signals and vice versa, facilitating communication between digital devices and analog transmission media. This conversion is crucial when data needs to travel over traditional telephone lines, which require analog signals, enabling access to the internet or remote networks via these lines .

You might also like