Unit 2 Question and Answers

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

UNIT – 2 QUESTIONS AND ANSWERS

ANS 1
(a) ARPANET - Advanced Research Projects Agency Network
(b) LAN - Local Area Network
(c) MAN - Metropolitan Area Network
(d) WAN - Wide Area Network
(e) WWW - World Wide Web
(f) TELNET - Terminal Network
ANS 2
ANS 3
Network devices play crucial roles in facilitating communication and data exchange within and
between networks. They help manage, route, and transmit data efficiently, ensuring smooth
network operations.
(a) Bridge
Purpose: A bridge is used to connect and filter traffic between two or more network segments,
reducing collisions and improving overall network performance.
(b) Router
Purpose: A router directs data packets between different networks, determining the best path for
data transmission and enabling communication between various devices and networks.
(c) Repeater
Purpose: A repeater is used to regenerate and amplify signals over long distances, ensuring that
data can travel farther without losing signal.
(d) Switch
Purpose: A switch connects devices within a network and uses MAC addresses to forward data
only to the destination computer improving network efficiency.
ANS 4
ANS 5

ANS 6
Cookies are small pieces of data that websites store on a user's device when they visit a
site. These data pieces are used to remember information about the user, such as their
preferences, login details, and browsing activity.
ANS 7

Both firewalls and antivirus software are essential components of a comprehensive


security strategy, providing layered protection to ensure the safety and integrity of
computer systems and networks.
ANS 8
A protocol is a set of rules or standards that defines how different entities communicate
or interact with each other.
ANS 9
The TCP/IP model, or Transmission Control Protocol/Internet Protocol model, is a
conceptual framework used to understand and design network communication protocols.
It consists of four layers, each with specific functions:
1. Application Layer:
o Function: Provides network services directly to user applications. It is where
protocols for applications like HTTP (for web browsing), SMTP (for email),
and FTP (for file transfer) operate.
o Examples: Web browsers, email clients, and file transfer applications.
2. Transport Layer:
o Function: Manages end-to-end communication, error correction, and data
flow control between devices. It ensures that data is delivered reliably and
in the correct sequence.
o Key Protocols:
▪ TCP (Transmission Control Protocol): Provides reliable, connection-
oriented communication with error-checking and retransmission of
lost packets.
▪ UDP (User Datagram Protocol): Provides connectionless
communication with minimal error recovery, used for applications
where speed is crucial, and some data loss is acceptable.
3. Internet Layer:
o Function: Handles the logical addressing, routing, and forwarding of data
packets across networks. It is responsible for determining the best path for
data to travel from the source to the destination.
o Key Protocols:
▪ IP (Internet Protocol): Provides addressing and routing of packets
across networks.
▪ ICMP (Internet Control Message Protocol): Used for diagnostic and
error-reporting purposes.
4. Link Layer:
o Function: Manages the physical transmission of data over network
hardware. It deals with the hardware addressing and the protocol for how
data is transmitted over various physical media.
o Examples: Ethernet, Wi-Fi.
The TCP/IP model is foundational to the Internet and most modern networks, enabling
diverse systems to communicate with each other effectively.
ANS 10
Cyber law, also known as Internet law or digital law, is crucial for several reasons:
1. It establishes rules and guidelines for activities conducted online, including
e-commerce, social media, data privacy, and intellectual property. This ensures that
online activities are conducted within a legal framework.
2. Protection of Privacy: Cyber law provides mechanisms to protect individuals'
privacy and personal information from unauthorized access, misuse, or breaches.
3. Cyber law addresses various types of cybercrimes, such as hacking, phishing,
identity theft, and cyberbullying. It defines criminal activities in the digital space
and prescribes penalties for offenders.
ANS 11
TELNET is a protocol used for remote login and command-line access to remote computers
over a network.
1. Establishing a Connection:
o TELNET operates on a client-server model. The TELNET client is the software
or terminal used by the user to connect, and the TELNET server is the
remote system that accepts and processes the connection.
o Port Number: TELNET uses TCP port 23 by default.
2. Authentication:
o Login Credentials: Once the connection is established, the user is prompted
to enter a username and password. These credentials are used to
authenticate the user on the remote system.
o User Authentication: After entering the correct credentials, the user gains
access to the remote system’s command-line interface.
3. Session Management:
o Command Execution: After logging in, users can execute commands as if
they were working directly on the remote system. This allows them to
perform various tasks, such as file management, system monitoring, and
running applications.
4. Termination:
o Session End: The TELNET session ends when the user logs out or terminates
the connection.
ANS 12

ANS 13
1. Never click on a suspicious link specified on a web page or send through a mail for which
you are not sure about its authenticity.
2. Make sure that passwords are strong and are changed frequently.
3. Never disclose personal information such as date of birth, home address, personal
phone number, account details, passwords, credit and debit card details, work history
details.
4. Report phishing issues to the concerned authorities or at cybercrime.gov.in.
5. Do not post any offensive content on social networking site as it may lead to a criminal
action against you.
6. Beware before spreading any kind of a rumor as it may be treated as a cyber-crime.
7. If someone is harassing or threatening you, take snapshot of it as a proof, and block the
person. Also, report the incident to the site administrator.

ANS 14
ALREADY DONE ABOVE

ANS 15
Digital literacy refers to raising knowledge and awareness about technology such as
desktop computers, smartphones, tablets, and other electronic gadgets. It also includes
familiarity with software tools and the internet.

You might also like