9 Class Chapter No 01
9 Class Chapter No 01
Q.1: What is the function and significance of Napier’s Bone in early computing?
Ans: It is created by John Napier in the year 1617. It is the better calculating device invented at that time period. It is the
type of operating device which is operated manually for the purpose of calculations of quotients and products of the
given numbers. All the mathematical calculations like addition, subtraction, multiplication, and division are
calculated and performed by it.
Q.2: How did Charles Babbage’s Difference Engine differ from the Analytical Engine?
Ans: The Difference Engine and Analytical Engine were two early mechanical computers designed by Charles Babbage.
The Difference Engine was a large calculator designed to compute polynomial functions, while the Analytical Engine
was a more advanced general-purpose computer that used punched cards for input and output, and was capable of
performing a wide range of calculations.
Q.3: What is the primary goal of fifth generation computers?
Ans: The primary goal of fifth generation of computers is to develop devices that can understand natural languages and have
thinking power. This is a big challenge for computer developers and programmers to design such systems and software
for us.
Q.4: Write down characteristics of fifth generation computers.
Ans: The computers made in the fifth generation are more powerful, functional, fast in speed, even if they are still in the
development phase. There are some characteristics of the computers that use ULSI (Ultra Large-Scale Integration)
technology, which are given below:
The computers of fifth-generation use AI (artificial intelligence) technology that includes: Development of expert
systems, Game Playing, Robotics, Natural language understanding, and Neural Networks.
The AI technology made these computers to understand human language as well as recognize graphs and pictures.
The development of fifth-generation computers is intended to solve highly complex problems, including working
with natural language.
Q.5: Explain Von Neumann architecture. Name the three types of memory maintained on the motherboard in the Von
Neumann architecture.
Ans: Von Neumann architecture is the design upon which many general purpose computers are based. The key elements of
von Neumann architecture are:
A processor based on von Neumann architecture has five special registers which it uses for processing:
The program counter (PC) holds the memory address of the next instruction to be fetched from primary storage
The memory address register (MAR) holds the address of the current instruction that is to be fetched from memory,
or the address in memory to which data is to be transferred
The memory data register (MDR) holds the contents found at the address held in the MAR, or data which is to be
transferred to primary storage
The current instruction register (CIR) holds the instruction that is currently being decoded and executed
The accumulator (ACC) is a special purpose register and is used by the arithmetic logic unit (ALU) to hold the data
being processed and the results of calculations
Memory listed on Motherboard in Von Neumann architecture are Registers RAM and Secondary Storage.
Data Retention Requires continuous power supply to retain data. Retains data even when power is turned off.
Mainly used for short-term storage and quick Used for long-term storage, firmware, and
Usage
access to data. system software.
Data is lost when power is interrupted or turned Data is preserved even in the absence of
Data Integrity
off. power.
Highly volatile, meaning data is lost when power is Non-volatile, meaning data is retained even
Volatility
lost or turned off. when power is lost or turned off.
Power
Requires constant power supply to maintain data. Does not require power to retain data.
Consumption
External Memory or Secondary Memory: Comprising of Magnetic Disk, Optical Disk, and Magnetic Tape i.e.
peripheral storage devices which are accessible by the processor via an I/O Module.
Internal Memory or Primary Memory: Comprising of Main Memory, Cache Memory & CPU registers. This is
directly accessible by the processor.
Ans: Word length or word size is an important characteristic of processor design. It refers to the amount of data that can be
handled at one time by the processor. The larger the word size, the greater the amount of data that can be transferred
to the CPU in one pass. This is an important factor for the processor performance, as to process an instruction it might
well require multiple fetches of data from the main memory. Therefore, being able to pass larger amounts of data to
the processor with every pass, the system is likely to carry out instructions faster.
Q.8: What is pipelining, and how does it improve the efficiency of a CPU?
Ans: Pipelining is a technique in which multiple instructions are overlapped during execution. It is used primarily to create
and organize instructions in a processor so that the processes run in concurrent fashion. Basically, Pipelining is a
process to manage the addition of new tasks frequently by removing the completed tasks.
Pipelining improves CPU performance by allowing multiple instructions to be executed simultaneously, reducing overall
processing time.
The basic idea behind pipelining is to break down the execution of an instruction into a series of independent steps,
with each step being handled by a different part of the processor. This allows the processor to work on several
instructions at once, much like an assembly line in a factory.
Imagine a simple CPU that executes instructions in four stages: fetch, decode, execute, and write back. Without
pipelining, the CPU would have to complete all four stages for one instruction before it could start the next. This means
that most of the CPU's components would be idle most of the time. With pipelining, as soon as the CPU finishes
fetching the first instruction, it can start fetching the second, while the first moves on to the decode stage. This way, all
parts of the CPU can be working on different stages of different instructions at the same time, which greatly increases
the CPU's efficiency and speed.
Q.9: Imagine you are building a custom computer for a friend. Give three considerations you would take into account
when choosing the type and size of memory for this computer.
Ans: Almost everything you do on a computer relies on having sufficient memory. This includes moving your mouse cursor,
which uses a minimal amount of RAM, and multitasking across multiple apps, which uses more RAM. There are many
processes constantly running in the background, such as system updates and security software that also consume RAM.
That is not to say that RAM is the only source of memory storage; solid state drives (SSD) or hard drives (HD) are also
used for memory storage. While RAM is used for short-term storage, such as undoing a previous action, SSDs or HDs are
used for long-term storage, such as saving a document.
To put it simply, the more things you do on your computer, the more GB of RAM you need. As time goes on you will
likely need to increase your computer memory as newer programs demand more memory bandwidth.
Intermediate User
Internet browsing, email, Word Processing, spreadsheets, running At least 16GB
simple graphics programs, flash games, music, videos or multitasking
1. Increase RAM: Adding more RAM can help your computer handle more tasks simultaneously, which can
improve overall performance.
2. Use an SSD: Upgrading to a solid-state drive (SSD) from a traditional hard drive can significantly improve the
speed of your computer, as SSDs have faster read and write speeds.
3. Close unnecessary programs: Running too many programs at once can slow down your computer. Closing
unnecessary programs and background processes can free up resources for the tasks you're currently
working on.
4. Clean up disk space: Removing unnecessary files and programs can free up disk space and improve overall
system performance.
5. Update software and drivers: Keeping your operating system, software, and drivers up to date can improve
compatibility and performance.
6. Use a cooling pad: If your computer tends to overheat, using a cooling pad can help maintain optimal
operating temperatures, preventing thermal throttling that can slow down the CPU.
7. Adjust power settings: Changing your computer's power settings to prioritize performance over energy
saving can improve processing speed.
8. Disable startup programs: Disabling unnecessary programs from starting up with your computer can reduce
the time it takes for your system to boot up and free up resources.
By implementing these strategies, you can potentially improve your computer's processing speed without the need to
upgrade the CPU.
Q.11: Your school is planning to purchase new printers for the computer lab. Give three advantages and disadvantages of
impact and non-impact printers to help them make a decision.
Ans: Following are some advantages and disadvantages of Impact and Non-Impact printers:
Impact printers:
Impact printers will work like typewriter and use striking/hammering action.
Print in black or single color.
Impact printers are noisy
High Resolution graphics cannot be produced.
Examples: Dot Matrix Printer, Character Printer and Line Printer
Non-Impact Printers
They use thermal, electrostatic chemical and inkjet technologies.
Produce Single color/multicolor output.
Almost noiseless.
High resolution graphics can be produced.
Examples, Inkjet, Laser printer, Plotters etc.
Both types of printers have their own advantages and disadvantages. From the above comparison, it is clear that
non-impact printers are more efficient and economical as compared to impact printers. The most significant
difference that you should note here is that impact printers use inked ribbon and a mechanical printing head to
produce prints onto a paper, while non-impact printers use non-mechanical and silent printing technology.
Radio broadcasting
Television broadcasting
Computer to printer
Muhammad Sikandar Dar, Assistant Professor, IMCB, G-11/1, Islamabad.
Mr. Iftikhar Hussain, Lecturer, IMCB, G-10/4, Islamabad.
Muhammad Sikandar Dar, Assistant Professor, IMCB, G-11/1, Islamabad
Monitor output
Mouse/keyboard/joystick to computer
Fire alarm system
Loud speaker
Half Duplex:
Data can flow in both directions but not simultaneously.
Speed of half duplex is slow.
Real-life examples of half-duplex communication include:
A walkie-talkie
A two-way radio that has a push-to-talk button
Browsing the internet (requests and responses)
Universal Serial Bus (USB)
Cash withdrawal from ATM machines.
Full Duplex:
Data can flow in both directions simultaneously.
Speed of full duplex is fast.
Some real-life examples of full duplex communication include:
Video calls/video conferencing
Audio calls
Live chats
Comparison Chart:
Basis for
Simplex Half Duplex Full Duplex
Comparison
The sender can only send The sender can send and The sender can send and
Send / Receive
data receive data, but one a time receive data simultaneously
Q.14: What are start and stop bits and where they are used in data transmission?
Ans: Start Bit:The transmission begins with the transmission of a START bit, which is always a logic 0(low voltage level).
This START bit alerts the receiving device that the data is about to transmitted and it helps the receiver synchronize its
internal clock with the sender’s clock.
Stop Bit:After the data bits one or more STOP bits are sent. The STOP bit(s) indicate the end of the data character. In
most cases one or two STOP bits are used depending on the system configuration. These STOP bits are always logic 1
(high voltage level).
Hub Switch
Hub is operated on Physical layer of OSI model. While switch is operated on Data link layer of OSI
Model.
Hub is a broadcast type transmission. While switch is a Unicast, multicast and broadcast
type transmission.
Hub have 4/12 ports. While switch can have 24 to 48 ports.
Hub is a half-duplex transmission mode. While switch is a full duplex transmission mode.
Hub is not an intelligent device that sends While switch is an intelligent device that sends
message to all ports hence it is comparatively message to selected destination so it is expensive.
inexpensive.
Hub is simply old type of device and is not While switch is very sophisticated device and widely
generally used. used.
Cheaper as compared to switch. Expensive as compared to HUB.
Q16: How does asynchronous transmission differ from synchronous transmission and in what situation are they typically
used?
Ans: Now, let’s see the difference between Synchronous Transmission and Asynchronous Transmission:
In Synchronous transmission, data is sent in form of In Asynchronous transmission, data is sent in form of
blocks or frames. bytes or characters.
In Synchronous transmission, the time interval of In Asynchronous transmission, the time interval of
transmission is constant. transmission is not constant, it is random.
In this transmission, users have to wait till the Here, users do not have to wait for the completion of
transmission is complete before getting a response transmission in order to get a response from the
back from the server. server.
In Synchronous transmission, there is no gap present In Asynchronous transmission, there is a gap present
between data. between data.
The start and stop bits are not used in transmitting The start and stop bits are used in transmitting data
data. that imposes extra overhead.
Q17: Explain the concept of a peer-to-peer network and its limitations compared to a client/server network.
Ans: Difference between Client-Server and Peer-to-Peer Network:
In Client-Server Network, Clients and server are In Peer-to-Peer Network, Clients and server are not
differentiated, Specific server and clients are present. differentiated.
Client-Server Network focuses on information sharing. While Peer-to-Peer Network focuses on connectivity.
In Client-Server Network, Centralized server is used to While in Peer-to-Peer Network, Each peer has its own
store the data. data.
In Client-Server Network, Server respond the services While in Peer-to-Peer Network, Each and every node
which is request by Client. can do both request and respond for the services.
Client-Server Network are costlier than Peer-to-Peer While Peer-to-Peer Network are less costlier than
Client-Server Network are more stable than Peer-to- While Peer-to-Peer Network are less stable if number of
Peer Network. peer is increase.
Client-Server Network is used for both small and large While Peer-to-Peer Network is generally suited for small
networks. networks with fewer than 10 computers.
Q.18: Compare and contrast the star and ring network topologies.
Ans: Comparison between Star and Ring Topology.
Connection of nodes In star topology, all the nodes are connected In a ring topology, all the nodes are
to a central controller directly. It has no connected in the form of a ring or loop in a
connection between all the nodes. network.
Expansion of nodes In star topology, adding a new node or In a ring topology, adding a new node or
and flexibility modifying any existing node is easier modifying any existing node is difficult i.e.,
without disturbing the network, i.e., flexibility is very low.
flexibility is very high.
Communication In star topology, adding new nodes does not In-ring topology, the addition of new nodes
Delay increase communication delay. increases communication delay.
Failure of Node In star topology, failure of one node can In ring topology if one link fails then there is
affects the whole network and the hub is a no alternative to connect it with rest of the
failure point. network.
Response time In this topology, response time is good. In a ring topology, response time is relatively
good as compared to star topology.
Data Transfer In a star topology, data travel through all In a ring topology, data travel either in
devices via a hub. clockwise or anticlockwise.
Fault identification In star topology, fault identification and In this topology, it is easier to locate the
and Isolation Isolation are relatively easy as compared to problems with devices and cable, i.e., fault
ring topology. identification and Isolation are easy but not
better as star topology.
Transmission Speed In star topology, transmission speed is In a ring topology, transmission speed is
faster. slow.
Complexity Star topology has average complexity. A ring network requires more cable to
connect nodes hence complexity increased.
Troubleshooting Star topology is easy to configure and Ring topology is relatively difficult to
troubleshoot. reconfigure and troubleshoot.
Installation and In star topology, Installation and In ring topology, Installation and
Maintenance maintenance is easy. maintenance is difficult as compared to star
topology in a network.
Muhammad Sikandar Dar, Assistant Professor, IMCB, G-11/1, Islamabad.
Mr. Iftikhar Hussain, Lecturer, IMCB, G-10/4, Islamabad.
Muhammad Sikandar Dar, Assistant Professor, IMCB, G-11/1, Islamabad
Q.19: Why is mesh topology considered the most reliable but also the most expensive to implement?
Ans: Due to the following points the Mesh topology is most reliable among other topologies:
Yes mesh is the most expensive because in a mesh environment, a cable runs from every computer to every other
computer. If you have four computers, you must have six cables three coming from each computer to the other
computers.
Q.20: What is the role of the Application Layer in the OSI model?
Ans: Each Layer in OSI Model Performs some important duties. Important functions performed by Application Layer are
listed here:
Application Layer manages applications software running on a computer or terminal. This is the most important
function of Applications Layer.
It works like an interface between Network Services & applications. Application Layer supplies Network Services to
End User.
It is also responsible for End User Processes Management.
Miscellaneous other services are also provided by application including Naming Services (e.g. DNS), Mail Services
(e.g. SMTP/POP3), Remote Login Services (e.g. Telnet/SSH), Remote Host Management (e.g. SNMP) etc.
Q.1: Describe the evolution of computer generations from the first generation to the fifth generation, highlight the
technological developments and their impact on computing.
Ans: There are five generations of computer and they are divided on the basis of major technological development at that
time.
1st Generation (1940-1956)
2ndGeneraton (1956-1963)
3rd Generation (1963-1971)
4th Generation (1971-Present)
5th Generation (Present-beyond)
1st Generation (1940-1956):
1st Generation computers used Vacuum tubes and they had to be cooled by air conditioners.
Slow speed, Small memory.
Very expensive and unreliable.
Used input as punched cards and for output electric typewriter.
Use machine language e.g. ENIAC, UNIVAC etc..
LSI(Large Scale Integrated Circuits) and VLSI(Very Large Scale Integrated Circuits) were developed.
Very fast, large storage capacity and advance Input / Output devices.
Variety of software available for use i.e. Multimedia support.
Modern programming languages i.e. C++, Java were developed.
Also support portable and wireless Input/ Output devices e.g. Dual core
In fifth generation computers Artificial Intelligence was introduced means devices behave like human being and
understand natural languages.
User can give command to computer in any natural language like English e.g. Robots, Expert system.
Q.2: Discuss the importance of categorizing and understanding different types of systems, both natural and artificial and
provide examples of each type.
Ans: What does a “system” mean? The word “system” is derived from the Latin word “systema”, which describes the relation
between several working elements or units. Systems are built to produce one or more specific goals. In our daily life, we
come in contact with various systems, such as the accounting system, the transportation system, the computer system,
and so on. What is a simple definition of a system? We can define a system as a group of components or subsystems
that integrate and function together in order to achieve a specific goal.
Understanding and categorizing systems is important for various fields, including engineering, biology, sociology and
management as it allows for better analysis, design, and optimization of these systems to achieve their intended goals.
Natural Systems:A natural system is an interconnected collection of elements that exist in the nature. These
systems are typically found in the environment and are characterized by their ability to self-regulate, adapt and
maintain a certain degree of stability.Following are few examples of Natural Systems:
Ecosystems: In the word “ecosystem”, “eco” means environment, and “system,” refers to connected
processes or elements. Ecosystems are made up of both biotic (and alive) and abiotic (or nonliving)
components. It is a biological community where living and non-living components of the planet interact with
each other. Ecosystem varies in the size and number of organisms they consist of. When the ecosystem is
land-based it is called a terrestrial ecosystem and when it is water-based it is called an aquatic ecosystem.
Solar System:The solar system consists of the Sun; the eight official planets, at least three “dwarf planets”,
more than 130 satellites of the planets, a large number of small bodies (the comets and asteroids), and the
interplanetary medium. (There are probably also many more planetary satellites that have not yet been
discovered.)
Artificial Systems: Artificial systems are known as man-made or human made systems are created and designed
by humans to serve specific purposes, solve problems or achieve particular goals. Artificial Systems are essential
component of modern society contributing to our ability to meet a wide range of needs and advance in various
fields.Following are few examples of Artificial Systems:
Internet and Computer Networks: A computer network is any group of interconnected computing devices
capable of sending or receiving data. A computing device isn't just a computer—it's any device that can run a
program, such as a tablet, phone, or smart sensor.
Satellite Communication Systems: Satellite communication plays a vital role in our daily life. Following are the
applications of satellite communication −
Radio broadcasting and voice communications
Muhammad Sikandar Dar, Assistant Professor, IMCB, G-11/1, Islamabad.
Mr. Iftikhar Hussain, Lecturer, IMCB, G-10/4, Islamabad.
Muhammad Sikandar Dar, Assistant Professor, IMCB, G-11/1, Islamabad
TV broadcasting such as Direct To Home (DTH)
Internet applications such as providing Internet connection for data transfer, GPS applications, Internet
surfing, etc.
Military applications and navigations
Remote sensing applications
Weather condition monitoring & Forecasting
Database Management System: The database is a collection of inter-related data which is used to retrieve,
insert and delete the data efficiently. It is also used to organize the data in the form of a table, schema, views,
and reports, etc.
The college Database organizes the data about the admin, staff, students and faculty etc.Using the database,
you can easily retrieve, insert, and delete the information.
Application Software: Application software is a program designed to help users perform specific
application tasks. These applications fulfill various purposes like word processing, data handling, data
analysis, and much more, saving the time and resources that would be utilized manually. Some of the well-
known examples of application software are Microsoft Word, Excel and search engines like Opera and
Google Chrome. It also includes a class of mobile applications, including communication apps like
WhatsApp and games like Subway Surfers.
Q.3 Explain the characteristics and potential challenges associated with fifth generation computers that aim to
understand natural languages and possess thinking capabilities. What are the implications of such advancement in
computing society?
Ans: NLP is one of the ways that people have humanized machines and reduced the need for labor. It has led to the
automation of speech-related tasks and human interaction. Some applications of NLP include:
Translation Tools: Tools such as Google Translate, Amazon Translate, etc. translate sentences from one language to
another using NLP.
Chatbots: Chatbots can be found on most websites and are a way for companies to deal with common queries
quickly.
Virtual Assistants: Virtual Assistants like Siri, Cortana, Google Home, Alexa, etc can not only talk to you but
understand commands given to them.
Targeted Advertising: Have you ever talked about a product or service or just googled something and then started
seeing ads for it? This is called targeted advertising, and it helps generate tons of revenue for sellers as they can
reach niche audiences at the right time.
Autocorrect: Autocorrect will automatically correct any spelling mistakes you make, apart from this grammar
checkers also come into the picture which helps you write flawlessly.
Cyber security
AI helps in detecting and preventing cyber threats by analyzing network traffic, identifying anomalies, and
predicting potential attacks. It can enhance the security of systems and data through advanced threat detection
and response mechanisms.
These are just a few examples of how AI is applied in various fields. The potential of AI is vast, and its applications
continue to expand as technology advances.
Ans: Hub: A hub is a physical layer networking device which is used to connect multiple devices in a network. They are
generally used to connect computers in a LAN.A hub has many ports in it. A computer which intends to be connected to
the network is plugged in to one of these ports. When a data frame arrives at a port, it is broadcast to every other port,
without considering whether it is destined for a particular destination or not.
Switch: A switch like a hub is a device that connects number of computers together in a LAN. The typical use of a
switch is at a center of a star network or as part of hybrid network. Switch has cables plugged into it from each
computer. Switch is more intelligent than hub.
Router: A router is a device like a switch that routes data packets based on their IP addresses. The router is mainly
a Network Layer device. Routers normally connect LANs and WANs and have a dynamically updating routing table
based on which they make decisions on routing the data packets. The router divides the broadcast domains of hosts
connected through it.
Gateway: A gateway, as the name suggests, is a passage to connect two networks that may work upon different
networking models. They work as messenger agents that take data from one system, interpret it, and transfer it to
another system. Gateways are also called protocol converters and can operate at any network layer. Gateways are
generally more complex than switches or routers. A gateway is also called a protocol converter.
Q.6: Discuss the advantages and limitations of different network topologies, including bus, star, ring and mesh. When
should each topology be used in a network design?
Ans: Bus Topology Advantages and Disadvantages:
Advantages:
Easy installation, each cable needs to be connected with backbone cable.
Less Expensive: Less cables are required than Mesh and star topology
Limited failure: The connection failure of one device doesn’t affect the connections of other devices on network.
Disadvantages:
Difficultly in fault detection.
Not scalable as there is a limit of how many nodes you can connect with backbone cable.
Difficult to troubleshoot: It is difficult to identify the cause of failure.
Data collision: When two or more devices send the data simultaneously then there is a chance of data collision.
Muhammad Sikandar Dar, Assistant Professor, IMCB, G-11/1, Islamabad.
Mr. Iftikhar Hussain, Lecturer, IMCB, G-10/4, Islamabad.
Muhammad Sikandar Dar, Assistant Professor, IMCB, G-11/1, Islamabad
Star Topology Advantages and Disadvantages:
Advantages:
Less expensive: Less expensive because each device only need one I/O port and needs to be connected with hub
with one link.
Easier to install
Cost effective: Less amount of cables required because each device needs to be connected with the hub only.
Robust: If one link fails, other links will work just fine.
Easy to troubleshoot: Easy fault detection because the link can be easily identified.
Reliable: Each device is separately connected to the hub, so a connection failure between a device and hub doesn’t
affect the connection of the other devices.
Disadvantages:
If hub goes down everything goes down, none of the devices can work without hub.
Hub requires more resources and regular maintenance because it is the central system of star topology.
Not Scalable: There is a limit to add new devices as each device increase the load on the central unit (hub or
switch). This is why it is not suitable for the large networks.
Ring Topology Advantages and Disadvantages:
Advantages:
Easy to install.
Managing is easier as to add or remove a device from the topology only two links are required to be changed.
Less expensive: Generally Twisted pair cabling is used in ring topology which is inexpensive and easily available.
Easy maintenance: The network in ring topology is easy to maintain as a system failure doesn’t affect other
systems on network, the failed system can be easily removed and installed again after fixing the issue.
Disadvantages:
A link failure can fail the entire network as the signal will not travel forward due to failure.
Data traffic issues, since all the data is circulating in a ring.
Mesh Topology Advantages and Disadvantages:
Advantages:
No data loss: No data traffic issues as there is a dedicated link between two devices which means the link is only
available for those two devices.
Reliable: Mesh topology is reliable and robust as failure of one link doesn’t affect other links and the
communication between other devices on the network.
Secure: Mesh topology is secure because there is a point to point link thus unauthorized access is not possible.
Easy to troubleshoot: Fault detection is easy as there is a separate connection between each devices.
Fast communication: As there is a dedication connection between two devices on a network, the communication is
fast.
Disadvantages:
Amount of wires required to connected each system is tedious and headache.
Since each device needs to be connected with other devices, number of I/O ports required must be huge.
Scalability issues because a device cannot be connected with large number of devices with a dedicated point to
point link.
Application layer:-The application layer is the top most layer of OSI Model. It provides services to end user. It
interacts with the OS or application software. Whenever user wants to send files, read messages or perform other
network related activities.
Presentation Layer:-The presentation layer is the sixth layer of OSI Model. It receives data from application layer.
It performs data reformatting, data compression and encryption.
Session layer:-Session layer perform functions that enable two applications or two pieces of the same application
to communicate across the network. It establishes, maintains and terminates the session user connection. It also
maintains. Security and perform the task such as name recognition and logging.
Transport layer:-It provides the mechanism to transport data between network devices. It controls the four of
data. It ensures that messages are delivered without any error. The data is retransmitted if there are any error in the
transmission.
Network Layer:- It decides which physical path-way data should take to reach the destination. There may be many
networks between two computers. The communication device Router works in network layer.
Data link layer:-It is responsible for node to node delivery of data. It divides the stream of bits received from
network layer inter manageable data units called frames. It also performs the following functions i.e. Flow control, Error
control and Access control.
Physical layer:-It transmits stream of bits and defines how the data is transmitted over the network and what
control signals are used. Physical layer must decide the following media characteristics, representation of bits,
transmission mode etc.
Q.9: Discuss the advantages and disadvantages of the internet, considering factors like global connectivity, information
access, privacy concern and digital addiction.
Q.10: Explore common applications of the internet and their impact on various aspects of society, including
communication, education, business, entertainment and research.
Ans: Common Applications of Internet: Applications of Internet have revolutionized the way we live, work, learn, and
communicate. What started as a military communication network has grown into a global system that connects billions
of users and devices around the world. The applications of the internet are vast, changing how we do everything from
shopping and banking to entertainment and business. In this blog post, we’ll explore the applications of the internet
and how they impact our daily lives.
Communication: The Applications of internet has dramatically transformed communication by providing free or low-
cost ways for people to connect. Email was one of the earliest internet applications, allowing virtually instant
communication worldwide. Video calling services like Skype and FaceTime have made it possible to communicate face-
to-face over the Internet. Messaging apps like WhatsApp and Facebook Messenger allow instant messaging, while
social networks like Facebook and Twitter enable public conversations.
Education: The internet has created revolutionary changes and opportunities in education. It has enabled the
widespread availability of online education through platforms like Coursera, Udemy, edX and Khan Academy. Massive
open online courses (MOOCs) have made courses from leading universities around the world accessible to anyone with
an Applications of internet connection. K-12 schools utilize online learning software and educational apps to augment
in-classroom teaching.
Students can also easily access digital textbooks, papers and journals for research online through library databases and
search engines. The internet provides unlimited educational content for learning and opens doors for people
everywhere to access education.
Business: The internet has revolutionized the way we live, communicate, and conduct business. Its widespread
adoption has had a profound impact on various aspects of society, but perhaps one of the most significant areas of
transformation has been in the realm of business and commerce. The internet has completely reshaped the way
companies operate, connect with customers, and conduct transactions. The rise of e-commerce has been one of the
most transformative aspects of the Internet for businesses. Online retail has exploded in popularity, with consumers
increasingly turning to the internet to make purchases. Companies like Amazon and Alibaba have become giants in the
industry, disrupting traditional brick-and-mortar retail and forcing businesses to adapt or risk being left behind. E-
commerce offers convenience, choice, and competitive pricing, making it an attractive option for consumers and a vital
channel for businesses.
Entertainment: Internet plays a vital role in Entertainment as Internet is a sole, easy and cost effective source available
in today's world.
Provides dual experience of Entertainment and learning.
Easy Accessibility.
Easy Availability in a spare time anywhere anytime.
Innovative ideas comes up for entertainment via public source.
More alternative options are available in a short span of time at one place for entertainment eg: movies,
games etc.
Research: Technological advances, especially the internet, opened new horizons for almost all scientific fields. As an
integral part of science, research also took advantage of the benefits internet brought. Now, it is practically impossible
to imagine any researcher who doesn’t use the internet for research purposes in one way or another. For instance,
currently, using the internet is the best way to measure customer satisfaction. Thousands of companies around the
world use it for this purpose. Another benefit internet brings for researchers is software. Both desktop and web
versions of available research tools save a significant amount of time and money and help get more effective results.
The survey, automated transcription, analysis software have become go-to tools for researchers and for most of them,
it is difficult to picture research without those tools.