XI IT Part B Practice Set 1
XI IT Part B Practice Set 1
8. What is the term for the amount of data that can be transferred over a network in a specific
amount of time?
a) Data transfer rate
b) Bandwidth
c) Latency
d) Throughput
10. What device connects two networks that may be working with different networking
models?
a) Router
b) Switch
c) Hub
d) Gateway
3. Discuss the various network devices like modems, routers, hubs, and switches. Explain
their functions and how they differ from each other in terms of data handling and network
management.
4. What are some common network security threats? Describe at least three types of threats
in detail and explain the security measures that can be implemented to protect against them.
5. Differentiate between:
a) Modem and Router
b) Hub and Switch
7. Describe the purpose of the <head> and <body> sections in an HTML document.
Solutions:
I. Multiple Choice Questions
Explanation: LAN stands for LOCAL AREA NETWORK. It is a computer network that interconnects
computers within a limited area such as a residence, school, laboratory, university campus or office
building.
Explanation: A ROUTER is a networking device that forwards data packets between computer
networks. It is designed to connect different networks together, allowing communication between
them.
Explanation: HTML stands for HYPER TEXT MARKUP LANGUAGE. It is the standard markup
language for creating web pages and web applications.
Explanation: The <BODY> tag defines the document's body, which contains all the visible contents,
such as headings, paragraphs, images, hyperlinks, tables, lists, etc.
Explanation: The <H1> tag is used to define the largest and most important heading in HTML.
Heading tags range from <H1> to <H6>, with <H1> being the largest.
Explanation: The <TITLE> tag is used to specify a title for the HTML page. This title is shown in the
browser's title bar or page's tab.
Explanation: The five main components of data communication are MESSAGE, SENDER,
RECEIVER, TRANSMISSION MEDIUM, and PROTOCOL. A database is not a fundamental
component of data communication.
8. What is the term for the amount of data that can be transferred over a network in a specific
amount of time?
b) BANDWIDTH
Explanation: BANDWIDTH refers to the maximum rate of data transfer across a given path. It
represents the capacity of the communication channel.
Explanation: A PERSONAL AREA NETWORK (PAN) typically covers a very short range, usually up
to 10 meters. It's used for connecting personal devices like smartphones, laptops, and wearables.
10. What device connects two networks that may be working with different networking models?
d) GATEWAY
Explanation: A GATEWAY is a networking device that connects two different networks that may use
different protocols. It acts as a "gate" between the two networks, translating data between them.
Explanation: A FIREWALL is a network security device that monitors and filters incoming and
outgoing network traffic. It is not a type of malware, but rather a protection against malware.
12. What technique involves attempting to acquire sensitive information by posing as a trustworthy
entity?
b) PHISHING
Explanation: Routers are designed to connect different networks and route data between them.
Explanation: HTTP (Hypertext Transfer Protocol) is not secure. HTTPS (HTTP Secure) is the secure
version.
Explanation: The <TABLE> tag is indeed used to create tables in HTML documents.
Explanation: The <IMG> tag is a self-closing tag in HTML and does not require a closing tag.
Explanation: CSS is an acronym for CASCADING STYLE SHEETS, a style sheet language used for
describing the presentation of a document written in HTML or XML.
Explanation: HTML comments are not visible on the rendered webpage. They are only visible in the
source code.
7. A computer network is a group of devices connected with each other through different
transmission mediums such as cables, radio waves, satellites etc.
TRUE
Explanation: While related, BANDWIDTH refers to the maximum theoretical data transfer capacity,
while DATA TRANSFER RATE is the actual speed at which data is transferred.
Explanation: This describes the format of IPv4 addresses, which consist of four octets separated by
dots.
10. A hub is more efficient than a switch because it sends data packets to all connected devices.
FALSE
Explanation: A SWITCH is more efficient than a HUB because it sends data only to the intended
recipient, while a hub broadcasts to all connected devices.
Explanation: The INTERNET is a global WIDE AREA NETWORK (WAN), not a Local Area Network.
12. A firewall aims at protecting the internal network of an organization, home, or individual from
malicious traffic from external networks.
TRUE
5. A NETWORK is a group of devices connected with each other through some transmission
medium.
6. The physical path by which a message travels from sender to receiver is called the
TRANSMISSION medium.
7. The amount of data that can be transferred over a network in a specific amount of time is termed
as BANDWIDTH.
8. A MODEM is a hardware device that allows a computer or another device to connect to the
Internet by converting analog signals to digital and vice versa.
These components work together by allowing the SENDER to encode a MESSAGE, transmit it
through a TRANSMISSION MEDIUM using agreed-upon PROTOCOLS, and enabling the
RECEIVER to decode and interpret the message.
- METROPOLITAN AREA NETWORK (MAN): Covers a city, medium speed, can be publicly or
privately owned.
Example: City-wide government network
Advantage: Connects multiple LANs
Limitation: More complex than LAN
- WIDE AREA NETWORK (WAN): Covers large geographical areas, lower speed, often uses public
networks.
Example: Internet
Advantage: Global connectivity
Limitation: Can be slower and less secure than LAN/MAN
- MODEM: Converts digital signals to analog and vice versa for transmission over telephone lines.
- ROUTER: Forwards data packets between computer networks, deciding the best path.
- HUB: Connects multiple devices in a network, broadcasting data to all connected devices.
- SWITCH: Similar to a hub but more intelligent, sending data only to the intended recipient.
Security measures:
- Antivirus software
- Firewalls
- Regular software updates
- User education on security practices
5. Differentiation:
a) Modem vs Router:
- MODEM: Converts digital to analog signals and vice versa
- ROUTER: Directs network traffic between different networks
b) Hub vs Switch:
- HUB: Broadcasts data to all connected devices
- SWITCH: Intelligently directs data only to intended recipients
<html>
<!DOCTYPE html>
<head>
<title>Basic HTML Document</title>
</head>
<body>
<h1>Hello, World!</h1>
<p>This is a basic HTML document.</p>
</body>
</html>
The <HEAD> section contains meta-information about the HTML page, such as the title, character
encoding, and links to external resources. It is not displayed in the browser window.
The <BODY> section contains the visible content of the HTML page, including text, images, and
other elements that are rendered by the browser.