Computer Network
Computer Network
8.1 INTRODUCTION
The greatest breakthrough in technology and communication over the past 20 years has been the
development and advancement of the computer network. From emailing a friend, to online bill
payment, to downloading data from the internet, to e-commerce, networking has made our world
much smaller and forever changed the way we communicate.
Network provides salient features which have made our life easy and comfortable, be it sending an
email, withdrawing money from an ATM machine, online railway or airline reservation, or sharing
ϐǤǡǦ
sent from a computer to get a printout from a printer attached to some other computer. All this
involves a network.
It is the network that connects various computers to each other and handles a large volume of data.
CTM: A computer network is a collection of interconnected computers and other devices to share data and
other resources (hardware and software resources).
8.2.1 Advantages of Computer Networks
Internet
Domain
DNS & Data Storage
Firewall
Wi-Fi
Router
Server
User PC
Printer
Printer
other system. This allows printing of documents by several users and, hence, the printer is
shared by multiple users on the network. Other resources like hard disk, DVD drive, scanner,
etc., can also be shared on a computer network. For example, sharing database, audio and
ϐǡǡ ǡ ǡ .
(b) Improved Communication: A computer network enables fast, reliable and secure
communication between users. It saves time and offers easy communication methods.
For exampleǡǡ ϐ Ǥ
While working on a network, any change made by one manager on his/her computer can easily
be seen by other managers and employees. Thus, a network allows managers to easily update
Ǥ ϐ Ǥ
(c) Reduced Communication Cost: Sharing resources also reduces communication cost. Using
ǡ Ǥ
ǡǡ
video data at a low cost.
(d) Reliability of Data: Reliability means backing up of data, i.e., data can be copied and
stored on multiple computers. In a network system, all computers are connected to each
8.2
other. Thus, the information or message which is shared by each device is stored on their
respective workstations (computers). If, due to some reason (hardware crash, etc.), the data
gets corrupted and, thus, becomes unavailable on one computer, a copy of the same data can
be accessed from another workstation for future use. This leads to smooth functioning and
further processing without disruption.
(e) Central Storage of Data: ȋ ϐ Ȍ
be shared and made available to each and every user in an organization. With centralized
processing, data is stored and retrieved from a single central location. Thus, there is no
duplication of data and almost no data redundancy.
Before we learn about the basic underlying structure of the internet, e.g., domain name servers,
ǡϐ
to others.
8.4
ǡǤ
For example, we may use a modem and dial a local number to connect to an Internet Service
Provider ȋ ȌǤǡ Local Area Network (LAN), but it most
Ǥ
ǡ Ǥ
network and become part of their network. The internet is simply a network of networks.
Most large communication companies have their own dedicated backbones connecting various
regions. In each region, the company has a Point of Presence ȋȌǤ
local users to access the company’s network, often through a local phone number or dedicated
line. The amazing thing here is that there is no overall controlling network. Instead, there are
several high-level networks connecting to each other through Network Access PointsǤ
Backbone
Internet
T3 Line
ISP NAP
LAN
Home Business
Computer
Printer
iPad
Supplement – Computer Science with Python–XII
8.6
ȋ Ȍ
• When data is transmitted through multiple wires, with each wire carrying each bit, it
is called parallel communication.
(d) Serial Communication
• When bits are sent one after another in a series along a wire, it is called serial
communication.
10001----------------10001
(e) Synchronous or Asynchronous Transmission
• When sender and receiver synchronize their checks before transmission, i.e., the
ϐ ǡ
it is called synchronous transmission.
Advantage—Faster than asynchronous mode.
Disadvantage— ǦǤ
• In asynchronous transmission, data is preceded and succeeded by a start bit and stop
Ǥ Ǥ
Advantage— Ǥ
Disadvantage—Slower than synchronous mode.
CTM: The technique of sending data across the network is known as Switching technique. The three types
of techniques used are circuit switching, packet switching and message switching.
8.7
1. Circuit Switching
Circuit switching provides end-to-end connection between two computers. It is established
usually in a telephone network where one person is making a call and another is receiving a call.
In a telephone system, the communication must be established between the two participants,
i.e., the sender and the receiver. The circuit is established between these two participants
before the transfer of data takes place.
Receiver Caller
Fig. 8.6: Circuit Switching
ǡ
path remains idle. The following actions take place during circuit switching:
ȋȌ Ǥ
a physical connection between the two participants.
ȋ Ȍ ϐǤ Ǥ
(c) If the destination node is available, it sends back the acknowledgement of receiving a signal.
Hence, data transmission begins.
(d) When the data transmission is complete, the call can be terminated.
CTM: Circuit switching is a connection-oriented service. In this technique, there is a dedicated link between
the sender and the receiver and no other call can be made during this link, even if the link remains idle.
2. Packet Switching
ǡ Ǥ
ϐǡͳʹͺͷͳʹǤ
Supplement – Computer Science with Python–XII
8.8
Mainframe
Caller
Receiver
CTM: Packet switching offers a connectionless service. Data is fragmented into small packets and each
packet is of fixed size in packet switching technology.
3. Message Switching
ǡ ϐ ϐǡ
in its buffer. It then checks the available link and, if it is free, the data is relayed to another
ϐ Ǥ ȋ ȌǤ
ϐ ϐ ǡ
Ǥ
CTM: Message switching is a store and forward switching technique where there is no direct connection
between the sender and the receiver.
the same order as it is originally sent. In packet switching, the message is broken into
small packets which are randomly sent from source and received in random order at
ǡ Ǥ
8.9
8.8 DATA COMMUNICATION TERMINOLOGIES
ͳǤ Channel: A channel is a communication path through which the data is transmitted from
the sender device to the receiver device.
2. Baud: The number of changes in a signal per second is known as baud. It is the measuring
unit of the data transfer rate. Technically, baud refers to a number of discrete signal
Ǥͳͳ
ͳ Ǥ
͵Ǥ Bandwidth: The amount of data that can be passed along a communication channel in a
ȋͳ ȌǤȋ Ȍǡ
ͳͲ͵ αͳ ȋ ȌǡͳͲ͵ αͳ ȋ ȌǤ
4. Data and Signals: Information that is stored within computer systems and transferred
ȄǤ
Ͳǯ ͳǯǡ
to the computer system. When this data is transmitted from one place to another, it is
converted into signal. Signals are the electric or electromagnetic encoding of data and are
used to transmit data.
5. Communication/Transmission Media: It is a means of communication or access (lines
Ȍ ȀǤ
Communication media is the way of transmitting the signal from one place to another.
Communication media is also known as transmission media. It plays an important role in
sending and receiving of data to and from the sender and receiver.
Ǥ Data Transfer Rate: It is the amount of data transferred in one direction over a link divided
by the time taken to transfer it in bits per second (bps). The various measuring units are
bits per second (bps) and bytes per second (Bps) or baud, kilobits per second (kbps),
megabits per second (mbps), gigabits per second (gbps), terabits per second (tbps.)
Ǥ
2. RJ-45 Connector: RJ-45 is a standard type of connector for network cables. The RJ-45 (Registered
Jack) connectors are the plug-in devices used in networking and telecommunications
Ǥ ǡ Ǥ
CTM: RJ-45 is a short term for Registered Jack-45. It is an eight-wire connector used to connect computers
on LANs, especially Ethernets.
͵Ǥ Ethernet Card: It is a hardware device that helps in the connection of nodes within a network.
ǡ ȋ
card). It is a card that allows computers to communicate over a computer network. On
ǡ Ǥ
address is known as MAC address.
8.10
4. Hub: It is multi-port and unintelligent network device which simply transfers data from
one port of the network to another. A hub is a hardware device used to connect several
computers together with different ports. When the packet reaches one port, it is copied to
all other ports of the hub without changing the destination address in the frame. Rather,
it simply copies the data to all of the nodes connected to the hub.
Ǥ ͺǡͳʹʹͶ ǦͶͷǤ
But the problem with hub is that it is not an intelligent device. It shares bandwidth with
all the attached devices and broadcasts the data, i.e., sends the data frames to all the
connected nodes, as it does not remember devices/computers connected to it. Also, it
ϐ ϐ Ǥ
A hub can both send as well as receive information, but only one task at a time. However, a
Ȁ Ǥ
CTM: Hub is a device used to connect several computers with each other.
5. Switch: A switch (switching hub) is a network device which is used to interconnect computers
Ǥ ϐ Ǥ
multi-port device but with some intelligence and so the data packets received from one port
of network are refreshed and delivered to the other port of the network. The main difference
between hub and switch is that hub replicates what it receives on one port onto all the other
ports, while switch keeps a record of the MAC addresses of the devices attached to it.
Ǥ Bridge: A bridge is a device that works on the physical layer as well as on data link layer. A
network bridge connects multiple network segments at the data link layer (layer 2) of the
OSI model. Bridges relay frames between two originally separate segments. When a frame
enters a bridge, the bridge not only regenerates the signal but also checks the physical
address of the destination and forwards the new copy only to that port.
8.11
ϐ
ϐ Ǥ
PC 4 PC 5 PC 4 PC 5
PC 1 PC 2 PC 3 PC 1 PC 2 PC 3
Fig. 8.10: Ethernet Bridge
CTM: A bridge is a device that links two segments together of the original network.
7. Gateway: A gateway is a device that connects dissimilar networks. In internet, several networks
ϐǤ
order to make reliable communication, there must be a device that helps in communicating.
Gateway is a device which establishes an intelligent connection between a local area network
Ǥ
******** Workstation
Supplement – Computer Science with Python–XII
Gateway
8. Repeater: A repeater is a device that operates only on the physical layer of the OSI model. As
ϐ ǡǡ
ϐǦ Ǥ
device that receives a signal before it becomes too weak and regenerates the original
signal. Also, it is a two-port network device that strengthens the signal intensity and
Ǥ ϐǡ
ͳͲͲ Ǥ
functionality of the network; instead, it makes the signal strong before it degrades.
8.12 or boosters.
Weakened Signal Regenerated Signal
Repeater
Repeater
No signal
through the hill
CTM: Repeater is a device that amplifies a signal that is transmitted across the network so that the signal is
received in the same way as it is sent.
ͻǤ Router: A router is a networking device that forwards data packets from the source
machine to the destination machine by using the shortest path. Routers are used at the
network layer, which is the third layer of the OSI model.
INTERNET EXTENDING A NETWORK USING
A LAN CABLE CONNECTION AND A SECOND ROUTER
Secondary
Main Router Router
LAPTOP LAPTOP
MOBILE TAB TAB MOBILE
CTM: A router is a networking device that helps in forwarding packets from one machine to another.
built-in wireless radio and antenna. A Wi-Fi card is used in a desktop computer that enables
a user to establish an internet connection. Wi-Fi cards are known as wireless fidelity cards
as they allow the user to set up connection without any wire. Wireless Fidelity (Wi-Fi)
cards are widely used in notebook computers due to their highly portable nature. The most
Ǧ ǦǦ
Ǧ Ǥ 8.13
8.10 TYPES OF NETWORKS
A computer network may be small or big depending upon the number of computers and other
Ǥǡǡ Ǥ
A computer network can be on a table, in a room, building, city, country, across continents or
around the world.
ǡ ϐǣ
ͳǤ
2. LAN
͵Ǥ
4. WAN
10 Metres
Supplement – Computer Science with Python–XII
CTM: The network that belongs to a single person or user is known as PAN.
CAMPUS
LAN in Building
LAN in Campus
SOHO
Base station customer
Residential
customer
Multi-tenant
customers
Computer Networks
Repeater
SME
customer
Base station
Wide Area
Network (WAN)
Satellite
Metropolitan
Area Network
(MAN)
Local Area
Personal Area Network (LAN)
Network (PAN)
CTM: LAN and WAN are the two primary and best-known categories of area networks; the others have
emerged with technological advances.
8.16
Comparing LAN and WAN
ǡ ϐǡ
Ǥ ǡ
Ǥ ϐǡ ϐ ǡǡ
etc. Ǥ Ǥ
of MAN is the cable television network. Thus, the basic points of difference between LAN and
WAN are as follows:
ͳǤ ϐ Ǥ
ͳͲǤǡ
WANs are spread across thousands of kilometres in different countries or regions.
ʹǤ ͳ ȋȌͳͲ
ͳǤ ǡ
ϐ Ǥ
͵Ǥ
ǤǤ
4. As LANs are limited by distance, an entire LAN is usually under the control of a single entity,
such as an organization. On the other hand, WANs are usually operated and controlled by
multiple organizations.
Thus, we can say that in comparison to WANs, LANs cover a limited area but they operate with
high speed and low error rates.
CTM: Topology is a way of connecting several devices with each other on a network.
Types of Topologies
ǡϐ Ǥ
Types of Topology
Mesh Topology Star Topology Bus Topology Ring Topology Tree Topology
point link between each dedicated node (workstation). In this type of topology, the link carries
ϐ Ǥ n(n–1)/2
links, where n is the total number of connecting nodes.
For example,ϐ ǡ
ͷȋͷȂͳȌȀʹαͳͲǤ
8.17
Fig. 8.19: Mesh Topology
CTM: When there is a point-to-point link between each computer in a network, it forms mesh topology.
Supplement – Computer Science with Python–XII
BACKBONE
Nodes
Dropline
Computer Networks
8.19
Advantages of Bus Topology
(a) Nodes can be connected or removed easily from bus network.
ȋȌ Ǥ
ȋ Ȍ Ǥ
(d) It works well for small networks.
CTM: There is a main cable which is connected to several workstations through taps. Collision of data can
take place in bus topology.
CTM: In ring topology, each workstation is connected with the predecessor node as well as with the
successor node and, thus, forms a ring. Data is transmitted only in one direction.
ȋȌ ǡ Ǥ ǡ
ϐϐ Ǥ
(c) Though it is scalable, the number of nodes that can be added depends on the capacity of the
central bus and on the cable type.
8.21
CTM: In tree topology, the main central hub is connected to the secondary hub through which all devices
are connected with each other. Tree topology is just like a parent-child relationship.
The decision to select a particular topology for a network does not take place in isolation as
the topology determines the type of media and access methods that would be used on the
network. Therefore, several factors are taken into consideration before selecting a topology
which are as follows:
¾ Cost: ϐ Ǧ Ǥ ǡ
minimize the installation cost. This can be done by selecting an economical transmission
ȋǡȌ Ǥ
can also be minimized by reducing the distances between the nodes.
¾ Flexibility: ϐϐǡi.e., it should be
ϐǤ ϐ
new ones on the network.
¾ Reliability: It refers to the degree of trust that can be placed on a network. Like any
other system, a network can also encounter failure. A network failure can occur due to the
following causes:
ͳǤ Ǥ
2. When the entire network fails. This is caused by a more serious fault that stops the
working of an individual node.
A B
Supplement – Computer Science with Python–XII
Receive Transmit
Fig. 8.24: A Point-to-Point Link
For better performance, the transmit and receive operations can occur over separate cables or
ǡ Ǥ
Ǧ ǤǦ
each pair of computers over a network.
CTM: Communication media is a transmission media used for sending data or signal across the network.
8.22
Types of Communication/Transmission Media
All communication/transmission media can be divided into two categories:
Communication
Media
¾ Guided Media (Wired Media): Guided media are also known as physical or conducted
media. These media use wires for transmitting data. Various wired connections are twisted
ǡ ϐ Ǥ
¾ Unguided Media (Wireless Media):
cables for transmission of data is known as unguided media. Wireless transmission is also
known as unguided media or non-physical media as the transmission takes place through
various types of electromagnetic waves, such as radio waves, terrestrial microwave
transmissions, satellite transmissions, cellular radio systems, infrared transmissions, etc.
Ǥ ǡ Ǧͷǡ Ǧͷ Ǧ Ǥ
are connected by RJ-45 connectors.
2. Coaxial Cable
Ǥ braided shield foil shield
of insulated copper wires surrounded by a braided centre
Ǥ conductor
twisted pair cables. The wrapped structure provides
Ǥ
cables provide high bandwidth rates of up to 450 mbps. outer jacket dielectric
ǣ Fig. 8.27: Coaxial Cable
thin coaxial cable and thick coaxial cable. There
ǡ Ǧͷͻ ȋ Ȍǡ Ǧͷͺ ȋ Ȍ
Ǧͳͳ ȋ ȌǤ Ǥ
connections and cable televisions.
8.24
Disadvantages of Coaxial Cable
ȋȌ ϐ Ǥ
ȋȌ Ǥ
Jacket
Cladding
Buffer
ff
Coating Core
1. Microwave
Microwave signals are used to transmit data without the use of cable. It is a line-of-sight
transmission as signal travels in a straight line. In microwave communication, two directional
parabolic antennas are mounted on towers, buildings or hills to send and receive signals
through air. However, they must be properly aligned with each other, otherwise the signal will
not be focused well at the receiving antenna.
Secondary
Path
Direct Path
(a) It is a cheaper source of communication as it avoids using cables and maintaining repeaters.
ȋ Ȍ ϐ Ǥ
ȋ Ȍ ͳ Ǥ
8.26
2. Radio Waves Radio
Tower
are allocated to private businesses for direct
voice communication. A radio set-up uses
transmitter and receiver. A transmitter sends
radio waves and encodes them into sine
waves which, when received by a receiver, are
decoded and the message is received. Both
the transmitter and receiver use antennas
to radiate and fetch radio signals. They are
Sender Receiver
not line-of-sight transmission and, hence, can
penetrate buildings easily.
(b) They are omnidirectional and can travel Fig. 8.30: Radio Waves
in any direction.
(c) Transmitter and receiver antenna do not need to be physically aligned.
(d) Radio wave transmission offers mobility.
ȋȌ ϐǤ
ȋȌ ϐ Ǥ
3. Satellite Link
Satellite transmission is also a kind of line-of-sight
transmission that is used to transmit signals
Ǥ
͵ ǡ Receiving
Transmitting signal
microwave. Satellite is a special type of microwave signal 35000 km
transmission medium.
Up-link Down-link
It provides various types of services such as
ǡ ǡǡ
Transmitting Receiving
internet applications. In satellite communication, Antenna Antenna
an earth station has a satellite dish, which functions
as an antenna to transmit and receive data from
Fig. 8.31: Satellite Link
satellites.
Computer Networks
When data is transmitted from an earth station to a satellite, it is known as uplink and when
transmission takes place from a satellite to an earth station, it is known as downlink. In satellite,
there are transponders that send and receive signals from/to the earth station.
8.27
Advantages of Satellite Link
ȋȌ Ǥ
(b) No line-of-sight restrictions such as natural mountains, tall buildings, towers, etc.
ȋ Ȍ ϐ Ǥ
4. Infrared
The type of transmission that uses infrared light to send data is known as infrared transmission.
The data is transmitted through air and can propagate in the open space; however, it cannot
Ǥ Ǥ
ʹǤͶ ͳ Ǥ
handheld remote control such as remote control of a TV or AC, etc.
Housing Shield
Transmitter Transmitter
Receiver Receiver
Supplement – Computer Science with Python–XII
Lens
8.28
5. Wireless Technology
Wireless technology is the process of sending information through invisible waves in the
Ǥ ǡ
the electromagnetic spectrum. Thus, wireless communication is the transfer of information
between two or more points that are not connected by an electrical conductor. The various
wireless technologies available are described as follows:
(a) Wi-Fi (Wireless Fidelity): Ǧ ϐ
without wires. The users share the data with each other by connecting to the broadband
internet service without using cables. As it is not a secured media of transmitting data, the
user must use privacy methods such as using passwords and make the connection security
enabled so that it does not become susceptible to hackers. For transmission of data through
Wi-Fi, a user must have a broadband connection, a wireless router and a laptop or desktop.
(b) Wi-Max (Worldwide Interoperability for Microwave Access): Ǧ
͵ͲǤ
Ǥ ͵ͲͶͲǦ
Ǧ ͳ Ȁ ϐ Ǥ Ǧ
ͺͲʹǤͳ Ǧ ǡ
ǤǦ
base station to communicate with the user. Instead of wires, it uses a microwave link to
establish a connection. Internet connectivity to end-user is provided by a microwave link
between the tower and the end-user.
Types of Protocols
ϐ Ǥ
concept. In India, different people speak different languages. Now, a person from Tamil
Ǥ ǡ
Supplement – Computer Science with Python–XII
CTM: File transfer protocol is used to transfer files from server system to requesting node, primarily for
information sharing.
Computer Networks
CTM: GSM is a wireless communication medium that provides the user with roaming facility, good voice
quality, SMS, etc., through digital signals.
8.33
stations is separated from each other. It employs spread spectrum digital technology where
Ǥ ϐ
Ǥ ͶȀ Ǥ
CTM: CDMA is a digital cellular technology that uses spread spectrum technique where the entire
bandwidth is divided among several users for transmission of data.
CTM: GPRS provides high speed data transfer. A user is allowed to download video streaming, audio files,
email messages, etc.
Ǥ
Ǥ ǡ
speaker phone and parallel phones for communication with each other. In traditional telephone
ǡ Ǥ
But in Wireless Local Loop (wireless in local loop) technology, the subscriber is connected to
Ǥ
Ǥ
of digging increases over time, this method proves cheaper than using copper wires. It is used
in remote areas where digging for copper wires is not possible.
ȋ Ȍǡ
Multiple Access (TDMA) and Code Division Multiple Access (CDMA) used for wireless in local
loop. In crowded urban localities where permission to dig may be almost impossible to get,
wireless technology is advised. However, there are also some disadvantages of using wireless
in local loop. First, as the distance between a receiver and transmitter increases in a wireless
8.34
system, the strength of the signal at the receiving end decreases even if there are no obstacles
in the way. Second, as the electromagnetic waves are propagated through air, a signal travelling
from a transmitter may take alternative paths on its way to the receiver. These paths may cause
Ǥ
CTM: Wireless in local loop is a system that is similar to telephone system which provides wireless
telecommunication by deploying a multiplicity of multichannel transceivers.
¾ 2G Technology
ʹ ϐ ͳͻͻͲǯ
provides high data transmission rate in digital format. 2G also introduced data services
for mobiles, starting with SMS. For exampleǡǦǡ Ȁ ǡǤ
Salient features of 2G technology:
Ȉ Ǥ
Ȉ ͶǤ
• Improved security mechanism.
Ȉ Ǥ
• Support transfer of picture messages and MMS.
Ȉ Ǥ
• It allows multiple users per radio channel with each user talking one at a time.
Ȉ Ǥ
¾ 3G Technology
͵ ʹͲͲͲ
Computer Networks
ͳͶͶʹǤ
͵ ϐ ǡ
have faster web services, live chat, fast downloading, video conferencing, etc., over mobile
phones. For exampleǡʹͲͲͲȀǦǡȀ ΪǡǦǤ
8.35
Salient features of 3G technology:
Ȉ ϐ Ǥ
• Live chat, fast downloading, video conferencing, etc., are also possible over mobile phones.
Ȉ ͵Ǥ
• A user can see live streaming on smartphones.
• It provides broadband internet services.
• It allows the user to send and receive large email messages.
Ȉ Ǥ
• Splits channel into time intervals enabling a single user to get all the resources at once.
¾ 4G Technology
Unlike previous generations of mobile technology, 4G mobile technology uses ultra-high
ǡ ͳͲͲ Ȃ
ͳǤǡͶ Ǥ ǡ
4G mobile technology is used for internet access on computers also, and it is totally wireless.
Ͷ ǡDzǡdz
͵ ǤDzǡdz
Ͷ Dz dzȋǢȀǢ
support; Integrated wireless solution; Customized personal services).
Salient features of 4G technology:
• It is used for internet access on computers also and is totally wireless.
Ȉ Ͷ ǡDzǡdz
͵ Ǥ
Ȉ Ǥ
• It provides more data capacity for richer content and more connections.
DzǡdzͶ Dz dzȋȌ
anytime/anywhere.
ǡ
ǡ Ǥ
provide the necessary resources to start an
operating system, run applications and do certain
tasks. Today’s smartphones and mobile processors
are very powerful, so much so that they can compete
with desktop computers.
Ǥ ǡ ǡ
ǡ Ǥ
ͶǦ͵ʹǦǤ ͵ǤͲȂ͵Ǥͷ
Ǥ ȋ Ȍ
ǡ ͵Ǧ ǡ Ͷ
recording capability. The improved processor technology has also made modern mobile devices
Ǧϐ Ǥ
8.36
Today, there are many processors available in the market. QUALCOMM, Apple mobile processors,
Intel mobile processors and some other giants are ruling the market. Let us discuss these
mobile processors.
• Apple W series is used in headphones for wireless audio connectivity. The current series,
ͳǡǤ
• Apple T series Ǥ
ͳǤ
8.37
8.16.3 Intel Atom and Core M Processors
microprocessors. Atom is the brand name given for the low power-
Ǧ ͵ʹǦ ͶǦ
smartphones and tablets.
ͺ
than ARM but consumes more power compared to ARM architecture. The
latest versions of Intel processors have reduced the power consumption,
bringing it down to less than 5 watts, which is ideal for all mobile devices.
Though Atom processors in the beginning supported only Windows, they
Ǥ
Intel Atom processors ͷ Ǥ ͶǦ
ͳͶͳǤ ʹǤͶ
Ghz. Intel also released Intel Core M ultra low-voltage microprocessors designed for ultra-thin
ǡ ʹǦǦͳ Ǥ ͶǤͷ
power, making it ideal for long battery life. These are dual core processors with a speed of
ͳǤͷ ͵Ǥʹ Ǥ ͶͲΨ
Ǥ
The Tegra processors mainly used in smartphones and tablets are Tegra 4, Tegra 4i and Tegra
ͳǤ
8.16.5 MediaTek
MediaTek is a Taiwanese semiconductor company providing chips
for mobile devices, HDTVs and other electronic devices.
ͶǦ Ǥ
͵ Ǥ
ȋʹ Ȍǡ
ȋͶ Ȍǡ ȋ Ȍ ȋͳͲ ȌǤ
The latest processors from MediaTek, Helio X20 and Helio X25, are used in smartphones and
tablets. MediaTek processors are mostly popular with Chinese manufacturers. Xiaomi, Meizu,
8.38
ǡǡ ǤǡǤ ǡǡǡ ǡ
some of the other manufacturers that use MediaTek processors in their tablets.
͵Ͳ ʹǡ ǯǡͳͲʹͲ
respectively. Both are deca core with 2 dual core and a single dual core built inside the processor.
8.16.6 HiSilicon
HiSilicon is a Chinese company specializing in semiconductor
technology. The company, owned by Huawei, creates chips based
on ARM architecture. It is the largest domestic integrated circuit
designer in China.
͵ͳǡ ͵ʹǡ ͵ʹǡ ʹͲǡ ͷͲǡ
ͻͳͲǡͻʹͲǡͻ͵ͲǡͻͷͲͻͲǤ ͻͷͲ
ͺǡ ͺ ͵Ǥ
Kirin 960Ǥ ͶǦ
ͳ Ǥ ʹǤͶ Ǥ
CTM: IRC is used for chatting by sending and receiving text messages. The sender sends request to IRC
server, which then forwards this request to another client to communicate with each other.
8.40
ȋȌǤ ǡ
uses packet switching technology where each packet follows best route to reach its destination.
ǡ
ϐ Ǥ
There are 3 main causes for the evolution of the voice-over IP market:
ͳǤ Ǧ
ʹǤ Ǧ ϐ
͵Ǥ Ȁ
ǣ
ǡǡǡǡǡǡ ǡ
ǡȋȌǡȋͳǦͺͲͲȌǡ ǡ ǡ
ǡ ϐ ǡ ǡ ǡ
switch implementation.
ǣ
ͳǤ Ǥ͵ʹ͵
ʹǤ ȋ Ȍ
CTM: VoIP is a protocol that is used for transmitting voice data and multimedia data over internet protocol.
It uses high speed broadband internet connection.
service to the users, so that a user can communicate with more than one person at a time. Other
ǡǡ
ϐ ǡ Ǥ
redirection services which support personal mobility.
8.41
8.21 NETWORK SECURITY CONCEPTS
Network is used for sharing, messaging and collaboration of data. However, the more network is
used for this purpose, the lesser is the security of data, either in terms of viruses or hacking and
other cyberattacks. To prevent the network from these malicious and/or unethical practices,
various strategies and choices are available that work as building blocks of network security.
These include password authentication, digital signature, challenge handshake authentication
protocol, etc.
Characteristics of Viruses:
(a) Speed of a computer system becomes slower than normal.
ȋ Ȍ Ǥ
(c) Computer restarts automatically after every few minutes.
(d) Various applications of computer do not function properly.
ȋȌ ǡǤ
CTM: A virus is a malicious program that damages data and files of a system and can also corrupt the file
allocation table.
8.42
2. Worms
A worm is a self-replicating program that runs independently and travels across network
connections. The characteristics of viruses and worms are more or less same, but a worm
causes more damage.
CTM: A worm is a computer program which can self-replicate and propagate over the network, with or
without human intervention, and has malicious content.
Characteristics of Worm:
(a) It replicates itself.
ȋ Ȍ ǡǦ Ǥ
ȋ Ȍ ǡǤ
(d) Worms run independently.
The various types of Worms are:
(a) Email Worms: ϐ
to any infected website.
(b) Instant Messaging Worms: Worms spread through instant messaging across the network
by sending mails to infected website.
(c) Internet Worms: ǯ Ǧϐ
or instant-message program to send links to infected websites. These are not as effective
as email worms as the recipient needs to accept the message and click the link. The users
of the particular program are affected by it.
(d) File Sharing Network Worms: These types of worms are downloaded along with the
ϐǤǡǡ
ϐǡ
Ǥ ϐ
folder, the worm gets downloaded on their system also. In this way, the worm copies itself
Ǥ ʹͲͲͶǡ Dzdz
in this way and had the ability to steal personal information, including credit card details,
and send spam on a large scale.
Damage caused by Worms:
ȋȌ ϐ Ǥ
(b) It may affect communication between the host and other systems.
(c) It may disable the antivirus software on the host, which will enable it to cause more damage.
(d) Bulk email chaining can be created with an intention to guess email passwords.
(e) A worm consumes too much system memory (or network bandwidth), causing web servers,
network servers and individual computers to stop responding.
3. Trojan Horse
Computer Networks
CTM: Trojan horse is a hidden code that looks safe but it has some hidden effects while running
applications.
4. Spams
ϐ
Ǥ Ǧ ǡϐ
the same message to be sent to a user which he may not otherwise receive. Generally, it is in the
form of pampering the user with various discount schemes, or commercial advertising, often
ǡ ǡ Ǥ
Ǥ
ϐǡǡ Ǥ
CTM: Spam refers to electronic junk mail that eats up the entire computer’s space.
8.23 COOKIES
ǡ ǡ Ǥ
ǡ ϐ
Supplement – Computer Science with Python–XII
which are then sent to the web server for later use. Cookie is basically a piece of data that is
stored by the website on the user’s hard disk. The information is stored in the form of name
value pair. Generally, the cookies folder is stored in c:\windows\cookies.
Working of Cookies
ͳǤ Ǥ
ʹǤ Ǥ
browser looks for the cookies on the hard disk.
͵Ǥ Ǥ
4. If no cookies data is supplied, then the website comes to know that the user is visiting the
ϐǤ
5. The server creates an ID of a person which is then stored by cookies on the hard disk.
8.44
The information which is stored by a website is known as state information. The information
can be of the following types:
ͳǤ
2. How many are new visitors
͵Ǥ
ͶǤ
CTM: Cookies are the messages which are stored by the website on a user’s hard disk whenever they visit
any website.
8.24 FIREWALL
ϐ Ǥ
ϐ ϐ
Ǥ Ǥ
ϐ ǡ ǡ
ϐǡ Ǥ ϐ
is a network security system, either hardware- or software-based, that controls incoming
ϐ Ǥϐ
ϐǡ ϐǡ ʹͷǡ Ǥ
ϐ ϐ ǣ
ͳǤ ϐǣ ϐǡǡ
ǡ ϐǤ ϐ
Ǧϐ Ǥ ϐ
ǡϐ ϐǤ ǡ
ϐǤ
2. Proxy service:
Ǣǡϐ ϐ
Ǥ
and effectively hides the true network addresses.
͵Ǥ IP address blocking: If the data is coming from a network or website that contains some
ǡ
ϐǤ
4. Protocol blocking:ϐ
particular user or group of users.
5. Application Gateway: ϐ ǡ
and Telnet servers. This is very effective but can impose performance degradation.
Ǥ Circuit-level Gateway:
Ǥ ǡ ϐ
Computer Networks
8.45
Firewall protects the user from the following:
ͳǤ
2. Application backdoors
͵Ǥ
ͶǤ
5. Viruses and macros
Ǥ
CTM: Firewall is a system that is designed to protect the network from illegal use by an unauthorized
person.
CTM: Cyber law defines all the legal and regulatory aspects of internet and the World Wide Web.
a computer are denied access or use of the resources of that computer. Generally, DoS
attacks do not allow the attacker to modify or access information on the computer. A DoS
attack can be of the following types:
• Denial of Access to Information: Refers to an attack in which information sought by
a legitimate user is either destroyed or changed to some unsubtle form.
8.47
• Denial of Access to Applications: Refers to an attack that denies a user from accessing
an application by making it either unusable or unavailable. This is usually done to
prevent the user (or organization) from using applications to perform any task.
• Denial of Access to Systems: Refers to the unavailability of the system, including all
the applications installed on the system or any data stored on the system.
• Denial of Access to Communications: Refers to a common type of attack that can
ϐ
ϐ Ǥ ϐ
Ǥ
person access to a network for legal use. It is an act of giving authority or legal identity
to a user to become an authorized user of the system. Authorization checks can also be
implemented to a program or process to make data free of risk, such as entering of viruses,
Ǥ
2. Authentication: To determine the identity of a person before granting access to private
or sensitive data or information is known as authentication. Verifying the identity of an
ϐ Ǥ
͵Ǥ Privacy: The data which is accessible only to an authorized person is known as private data.
4. Secrecy: Hiding some relevant information from an unauthorized person is called secrecy.
5. Biometric System: Biometric system forms the most secure level of authorization. It
ǡϐǡǡ ǤǡǤ
Ǥ Password Protection: To protect the system or network from an unauthorized person, a
system must be password protected. A password protected system allows access to resources
based upon a secret word entered by the user.
8.48
7. File Permission: ϐǡϐǡϐǡ
ϐǡ Ǥ ϐ
Ǥ ϐ
ϐǤ
ϐ ǣ
(a) Read:ϐǤ
(b) Write:ϐǤ
(c) Execute: ϐǤ
File access permission is granted to three types of users:
(a) Owner: ϐǤ
(b) Group: ϐǤ
(c) Others: Refers to all other users.
8. Firewall:ϐ
unauthorized access while permitting authorized communication. It is a programmer
ϐǡǡ ǡ ǡ
ȋȌ ϐ
rules and other criteria.
ͻǤ Proper Security Policy: An organization’s security policy is a formal statement consisting
of the rules that its employees need to follow to access information about the organization.
The policy should clearly communicate the security goals to all the users, administrators
and managers of the organization. A good security policy must be:
¾ Ǥ
¾ ϐǡǤ
¾ ϐ Ǥ
8.29 HACKING
Hacking is the practice of modifying the features of a system in order to accomplish a goal
outside the creator’s original purpose. A person who consistently engages in hacking activities
and has accepted hacking as a lifestyle and philosophy of their choice is called a hacker.
ǡ ϐ
Ǥ ǡ ǡ
brain hacking, etc., and it is not limited to either of them.
Due to the mass attention given to black hat hackers by the media, the whole hacking term is
often mistaken for any security-related cyber crime.
8.49
8.30.1 WWW (World Wide Web)
WWW is an information service that can be used for sending and receiving information over
Ǥ ǡ ǡ
videos and other multimedia components as well as web navigation features consisting of
Ǥ ȋ
Markup Language) that provides links to other documents as well as graphics, audio and video
ϐǤ Ǧ
Ǥ
web browser and a WWW server is called a web server.
CTM: WWW is a set of programs and protocols that allows the user to create and display multimedia web
pages and is linked to the internet.
CTM: HTML is a Markup language that enables users to create web pages and format them using predefined
tags. Tags are called coded elements.
</Client>
</xml>
CTM: XML is a Markup Language for creating documents in a structured format. Users can create their own
tags along with predefined tags already defined by HTML.
8.51
8.30.4 Hyper Text Transfer Protocol (HTTP)
ϐȋ Ȍ
Ǥ
Ǥ ϐǤ
ȋȌ ȋȌǡ
Ǥ
protocol.
The main features of an HTTP document are:
ͳǤ Ǣ
Ǥ
ʹǤ Ǧ Ǥ
͵Ǥ ȋ Ȍǡ
to the client.
4. It is used for displaying web pages on the screen.
8.52
ϐ
.in - India
·au - Australia
·ca - Canada
.ch - China
.nz - New Zealand
ǤǦ
ǤǦ
.us - United States of America
8.30.6 URL
URL stands for uniform resource locator that helps in locating a particular website or a web
page, for example, http://www.cbse.nic.in/academics.html ϐ Ǥ
ǡ Ǯǯ ǡ ǮǤ Ǥ Ǥǯ
ǤǮ Ǥǯ ϐ
ϐ Ǥ
CTM: URL stands for uniform resource locator that stores the address of a web page.
8.30.7 IP Address
The computers connected to a network also need to follow some rules to communicate with
each other. These sets of rules are known as protocols. Several types of protocols are used for
communication over networks. However, the most common one is the Transmission Control
Ȁ Ȁ ǤȀ Ȁ Ǥ
Ȁ Ǥǡ
Ȁ Ǥ
Ǥ ȋ ȌǤ
ϐ Ȁ ǤȀ
Ǥ ͵ʹǦ
Ǥ ͲʹͷͷǤ
ǣͳͻʹǤͳͺǤͳǤʹǡͳͲǤ͵ʹͶǤͳǤ͵ͳͲͻǤͳ͵ͶǤʹǤʹǤ
ǡ Ǥ
ǡ Ǥ
ǣͳͻʹǤͳͺǤͳǤͳͲ
ǣͳͳͲͲͲͲͲͲǤͳͲͳͲͳͲͲͲǤͲͲͲͲͲͲͲͳǤͲͲͲͲͳͲͳͲ
ȋ Ȍ
connection is used on that computer.
ϐ ǣ
Computer Networks
ͳǤ Start button. A pop-up menu containing various options appears.
2. Open the RunǤ
Type cmd in the Run Ǥ ȋ Ȍ
opens.
8.53
͵Ǥ ϐ Ǥ ǡ
computer (as shown in the output window given below).
8.30.8 Website
A website is a collection of various web pages, images, videos, audios or other kinds of digital
Ǥϐ
home page where all the links related to other documents are displayed. The web pages of a
website are written using HTML and the information is transferred over the internet through
Ǥ
Ǥǣ Ǥ ǤǡǤ ǡǤǡ Ǥ
CTM: A website is a collection of several web pages which are related to each other through hyperlinks.
visits it is known as a static web page. A static web page generally has .htm or .html as
Ǥ
¾ Dynamic web page: An interactive web page is a dynamic web page. A dynamic web
page uses scripting languages to display changing content on the web page. Such a page
ǤǡǤǡǤǤ
CTM: A web browser is a WWW client that navigates through the WWW and displays web pages.
8.54
8.30.11 Web Server
ǡǤ
Ǥǡ
ϐ ǡǡ
Ǥǡ
may be hosted on several linked or mirrored web servers.
Sends request
WEB WEB
Sends response
Some popular web servers are: Apache web server, Netscape enterprise web server, Microsoft
internet information server, etc.
CTM: A web server stores web documents and responds to the requests made by web browsers.
CTM: Web hosting is a service that is provided by the company to users to create web-based applications.
8.55
ϐ
Ǥ ǡ ǡ ǡ
ϐǤ
This is done in the following manner:
¾ ǡ ϐǡ
Ǥǡϐ ϐ
ϐ Ǥ
¾ ϐǡ
server on a network. The DNS server maintains a directory containing a list of all the
Ǥϐ
Ǥ
͵Ǥ ǡ
Ǥ
CTM: A script is a list of commands embedded in a web page which are executed by a certain program or
scripting engine.
ͳǤ౧Ǧ
Client-side scripting enables the user to interact with web pages. The client-side scripts are
Ǥ
client-side scripting is browser dependent and, therefore, the browser must be scripting-
Ǥ Ǧ
are online games, downloading data from the server, etc.
Supplement – Computer Science with Python–XII
8.56
Example of Java Script is as follows:
<HTML>
<HEAD>
<TITLE>ϐ </TITLE>
</HEAD>
<BODY>
<SCRIPT LANGUAGE="JAVASCRIPT">
document.write("Welcome")
</SCRIPT>
</BODY>
</HTML>
JavaScript allows the user to perform several functions such as:
(i) Add scrolling or changing messages to the browser’s status line.
(ii) Update the contents of a form by using validation checks and make calculations.
(For exampleǡͷ ǡ
marks and percentage.)
(iii) Display messages to the user, either in a new web page, which is a sub-part of the main
ǡǤ
(iv) Create and animate images that change when the user hovers the mouse over them.
(v) Detect the browser in use and display different contents for different browsers.
ȋȌ ǦǦǤ
8.57
ǣ
<HTML>
<HEAD>
<TITLE>ϐ </TITLE>
</HEAD>
<BODY>
<SCRIPT TYPEα̶Ȁ ̶ε
document.write("Welcome")
</SCRIPT>
</BODY>
</HTML>
(c) PHP (Hypertext Pre-Processor)
Ǧ Ǥ Ǧ
Ǥ ǡ
login pages, check details from a form, create forums, picture galleries, etc. It was created
ͳͻͻͶ Ǥ
Ǯ ǯǡǮ Ǧ ǯǤ
Ǥ
ǡ
HTML code to the client.
ǣ
ȋȌ Ǥ
ȋȌ Ǧ ǡǡ
the server.
ȋȌ Ǥ
ȋȌ ȋǡǡ
others).
ȋȌ ȋ ǡǡȌǤ
Supplement – Computer Science with Python–XII
CTM: Scripting languages are also often used by applications as control or configure languages. An
example: Firefox is written in C/C++ and can be controlled with JavaScript.
Computer Networks
8.59
Table: 8.1: Difference between Client-Side Scripting and Server-Side Scripting
S.No. Client-Side Scripting Server-Side Scripting
1. Scripting runs through web browser. Scripting runs through web server.
2. The processing takes place on the end-user’s The processing takes place on the server side.
computer.
3. The browser receives the page sent by the server Server executes server-side scripts to send out a
and executes the client-side scripts. page but it does not execute client-side scripts.
4. Client-side scripting cannot be used to connect to Server-side scripting is used to connect to the
the databases on the web server. databases that reside on the web server.
5. Client-side scripting can be blocked by the user. Server-side scripting cannot be blocked by the
user.
6. Response from a client-side script is faster as Response from a server-side script is slower as
compared to a server-side script because the compared to a client-side script because the
scripts are processed on the local computer. scripts are processed on the remote computer.
7. Examples of client-side scripting languages are Examples of server-side scripting languages are
Javascript, VBScript, etc. PHP, JSP, ASP, ASP.Net, Ruby, Perl, etc.
Ȉ Ǥ
Ȉ ϐ Ǥ
• Value lies in content, not in the software used to display content.
• Transfer of data is readily shared.
Ȉ Ǥ
Ȉ ǡ ǡǡ ǡ
information.
Web 2.0 website uses a new programming language called AJAX (Asynchronous JavaScript and
XML).
8.60
Applications supported by Web 2.0 are as follows:
• Blogging
• Social bookmarking
• RSS
• Wikis and other collaborative applications
• Interactive encyclopaedias and dictionaries
• Advanced Gaming
CTM: Web 2.0 refers to added features and applications that make the web more interactive and easy to
provide information using newsgroups, social networking sites, RSS, etc.
8.32 E-COMMERCE
Ǧ ȋ Ȍ ǡ
transmitting of funds or data over an electronic network, primarily the internet. These business
transactions occur either as business-to-business, business-to-consumer, consumer-to-consumer
or consumer-to-business. The terms e-commerce and e-business are often used interchangeably.
Ǧ ǡ ǡ
ǡ ǡ Ǥ ǦǦ
business activities and outreach such as using email for unsolicited ads (usually viewed as
spam) to consumers and other business prospects, as well as to send out e-newsletters to
subscribers. More companies now try to entice consumers directly online, using tools such as
digital coupons, social media marketing and targeted advertisements.
SELF PRODUCTS
E-COMMERCE BANK
CUSTOMERS
BANK PAYMENT
SHIPPING WAREHOUSE
The advantages of e-commerce include its round-the-clock availability, speed of access, wide
availability of goods and services to the consumer, easy accessibility and international reach.
1. Online Banking
Online banking, also known as internet banking, e-banking
or virtual banking, is an electronic payment system that
ϐ
ϐ ϐ
institution’s website. 8.61
2. Mobile Banking
Mobile banking ϐ
ϐ
remotely using a mobile device such as a mobile phone or tablet,
ǡ ǡ ϐ
institution for the purpose.
Identity
Queue
Object Storage Runtime Database
Infrastructure
Computer Network
Block Storage
Phones Tablets
Platform as a Service
Infrastructure as a Service
Server
(ĂͿ dŚƌŽƵŐŚ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘LJŽƵĐĂŶĞƐƚĂďůŝƐŚĐŽŶƚĂĐƚǁŝƚŚĂŶLJŽŶĞŝŶƚŚĞǁŽƌůĚ͘
;ďͿ dŚĞŵĂŝŶĨƵŶĐƚŝŽŶŽĨ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘ŝƐƚŽĚŝǀŝĚĞƚŚĞŵĞƐƐĂŐĞŽƌĚĂƚĂŝŶƚŽƉĂĐŬĞƚƐŽĨĂĚĞĨŝŶŝƚĞ
ƐŝnjĞŽŶƚŚĞƐŽƵƌĐĞĐŽŵƉƵƚĞƌ͘
;ĐͿ ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘ƌĞĨĞƌƐƚŽǁŝƌĞůĞƐƐĨŝĚĞůŝƚLJǁŚŝĐŚĞŶĂďůĞƐƵƐƚŽĐŽŶŶĞĐƚƚŽƚŚĞ/^WǁŝƚŚŽƵƚĂŶLJĐĂďůĞ͘
;ĚͿ ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘ŝƐĂƐŽĨƚǁĂƌĞƚŚĂƚĞŶĂďůĞƐƵƐƚŽĂĐĐĞƐƐƚŚĞŝŶƚĞƌŶĞƚĂŶĚĞdžƉůŽƌĞǁĞďƐŝƚĞƐ͘
;ĞͿ tĞďƉĂŐĞĐŽŶƐƚŝƚƵƚĞƐƚŚĞ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘
;ĨͿ ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘ŝƐƐŽŵĞŽŶĞǁŝƚŚĂƐƚƌŽŶŐŝŶƚĞƌĞƐƚŝŶŚŽǁƚŚŝŶŐƐǁŽƌŬ͕ǁŚŽůŝŬĞƐƚŽĐƌĞĂƚĞĂŶĚ
ŵŽĚŝĨLJƚŚŝŶŐƐĨŽƌƚŚĞŝƌŽǁŶĞŶũŽLJŵĞŶƚ͘
;ŐͿ ĐŽŵƉƵƚĞƌ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘ŝƐĂƐŵĂůůƐŽĨƚǁĂƌĞƉƌŽŐƌĂŵƚŚĂƚƐƉƌĞĂĚƐĨƌŽŵŽŶĞĐŽŵƉƵƚĞƌƚŽ
ĂŶŽƚŚĞƌĂŶĚŝŶƚĞƌĨĞƌĞƐǁŝƚŚƚŚĞŶŽƌŵĂůĨƵŶĐƚŝŽŶŝŶŐŽĨĐŽŵƉƵƚĞƌ͘
;ŚͿ ůĞĐƚƌŽŶŝĐũƵŶŬŵĂŝůŽƌũƵŶŬŶĞǁƐŐƌŽƵƉƉŽƐƚŝŶŐƐĂƌĞŬŶŽǁŶĂƐ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘
;ŝͿ ŝŐŝƚĂůƐŝŐŶĂƚƵƌĞŵĞĞƚƐƚŚĞŶĞĞĚĨŽƌ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘ĂŶĚŝŶƚĞŐƌŝƚLJ͘
;ũͿ dŚĞĨŝƌƐƚŶĞƚǁŽƌŬƚŚĂƚƉůĂŶƚĞĚƚŚĞƐĞĞĚŽĨŝŶƚĞƌŶĞƚǁĂƐ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘
;ŬͿ dŚĞƉƌŽƚŽĐŽůƵƐĞĚĨŽƌŝŶƚĞƌŶĞƚŝƐ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘
;ůͿ ĚĞǀŝĐĞƵƐĞĚƚŽĐŽŶŶĞĐƚĚŝƐƐŝŵŝůĂƌŶĞƚǁŽƌŬƐŝƐĐĂůůĞĚ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘
;ŵͿ ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘ŝƐƌĞƐƉŽŶƐŝďůĞĨŽƌŚĂŶĚůŝŶŐƚŚĞĂĚĚƌĞƐƐŽĨƚŚĞĚĞƐƚŝŶĂƚŝŽŶĐŽŵƉƵƚĞƌƐŽƚŚĂƚĞĂĐŚ
8.66 ƉĂĐŬĞƚŝƐĚĞůŝǀĞƌĞĚƚŽŝƚƐƉƌŽƉĞƌĚĞƐƚŝŶĂƚŝŽŶ͘
;ŶͿdƌŝĐŬŝŶŐƉĞŽƉůĞƚŚƌŽƵŐŚĂƵƚŚĞŶƚŝĐͲůŽŽŬŝŶŐĞŵĂŝůƐŽƌǁĞďƐŝƚĞƐŝƐĐĂůůĞĚ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘
;ŽͿƉƌŽŐƌĂŵĚĞƐŝŐŶĞĚƚŽƌĞƉůŝĐĂƚĞĂŶĚĞĂƚƵƉĂĐŽŵƉƵƚĞƌ͛ƐƐƚŽƌĂŐĞŝƐĐĂůůĞĚ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘
;ƉͿĚŝŐŝƚĂůĚŽĐƵŵĞŶƚŝƐƐƵĞĚƚŽĂƐŝƚĞďLJĂĐĞƌƚŝĨŝĐĂƚŝŽŶĂƵƚŚŽƌŝƚLJŽĨƚŚĞŝŶƚĞƌŶĞƚŝƐĐĂůůĞĚĂ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘
;ƋͿdŽĐŽŶŶĞĐƚĐŽŵƉƵƚĞƌƐůŽĐĂƚĞĚŝŶĂƐƉĞĐŝĨŝĐďƵŝůĚŝŶŐŽƌĐĂŵƉƵƐŝƐŬŶŽǁŶĂƐ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘
;ƌͿ
tŝͲ&ŝ͕ŝŶĨƌĂƌĞĚĂŶĚůƵĞƚŽŽƚŚĂƌĞĞdžĂŵƉůĞƐŽĨ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘
;ƐͿ/ŶƚĞƌƐƉĂĐĞŝƐĂ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘
;ƚͿ
ƐĞƌǀĞƌƚŚĂƚƉƌŽǀŝĚĞƐŝƚƐƐĞƌǀŝĐĞƐƚŽŽƚŚĞƌǁŽƌŬƐƚĂƚŝŽŶƐŽŶĂŶĞƚǁŽƌŬŝƐĂ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘
;ƵͿdŚĞƚĞĐŚŶŝƋƵĞŽĨƐǁŝƚĐŚŝŶŐŝŶǁŚŝĐŚĚĂƚĂŝƐĚŝǀŝĚĞĚŝŶƚŽƐŵĂůůĞƌĨƌĂŐŵĞŶƚƐŝƐĐĂůůĞĚ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘
;ǀͿ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘ŝƐĂĚĞĚŝĐĂƚĞĚůŝŶŬďĞƚǁĞĞŶƚŚĞƐĞŶĚĞƌĂŶĚƚŚĞƌĞĐĞŝǀĞƌ͘
;ǁͿ ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘ŝƐƚŚĞŵĞĂƐƵƌŝŶŐƵŶŝƚŽĨƐƉĞĞĚĂƚǁŚŝĐŚƚŚĞĚĂƚĂƚƌĂŶƐĨĞƌƚĂŬĞƐƉůĂĐĞ͘
;džͿůů ƚŚĞ ĐŽŵƉƵƚĞƌƐ ĂƌĞ ĐŽŶŶĞĐƚĞĚ ǁŝƚŚ ĞĂĐŚ ŽƚŚĞƌ ŝŶ ĂŶ ƵŶŽƌŐĂŶŝnjĞĚ ŵĂŶŶĞƌ ŝŶ ƚŽƉŽůŽŐLJ
................................ .
;LJͿ /Ŷ͕͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘ĂůůĐŽŵƉƵƚĞƌƐƐŚĂƌĞĞƋƵŝǀĂůĞŶƚƌĞƐƉŽŶƐŝďŝůŝƚLJĨŽƌƉƌŽĐĞƐƐŝŶŐĚĂƚĂ͘
Answers: (aͿ /ŶƚĞƌŶĞƚ ;ďͿ dW ;ĐͿ tŝͲ&ŝ
;ĚͿ ƌŽǁƐĞƌ ;ĞͿ tŽƌůĚtŝĚĞtĞď ;ĨͿ ,ĂĐŬĞƌ
;ŐͿ sŝƌƵƐ ;ŚͿ ^WD ;ŝͿ ƵƚŚĞŶƚŝĐĂƚŝŽŶ
;ũͿ ZWEd ;ŬͿ dWͬ/W ;ůͿ 'ĂƚĞǁĂLJ
;ŵͿ /W ;ŶͿ ,ĂĐŬŝŶŐ ;ŽͿ tKZD
;ƉͿ ŝŐŝƚĂůĐĞƌƚŝĨŝĐĂƚĞ ;ƋͿ >E
;ƌͿ ŽŵŵƵŶŝĐĂƚŝŽŶDĞĚŝƵŵƐ ;ƐͿ EĞƚǁŽƌŬ ;ƚͿ ĞĚŝĐĂƚĞĚƐĞƌǀĞƌ
;ƵͿ WĂĐŬĞƚƐǁŝƚĐŚŝŶŐ ;ǀͿ ŝƌĐƵŝƚƐǁŝƚĐŚŝŶŐ ;ǁͿ ďŝƚƐͬƐĞĐŽŶĚ
;džͿ DĞƐŚ ;LJͿ WĞĞƌͲƚŽͲƉĞĞƌŶĞƚǁŽƌŬ
2. ^ƚĂƚĞǁŚĞƚŚĞƌƚŚĞĨŽůůŽǁŝŶŐƐƚĂƚĞŵĞŶƚƐĂƌĞdƌƵĞŽƌ&ĂůƐĞ͘
(ĂͿ ƐĞƚŽĨƌƵůĞƐƚŚĂƚŐŽǀĞƌŶƐŝŶƚĞƌŶĞƚŝƐĐĂůůĞĚƉƌŽƚŽĐŽů͘
;ďͿ ƌĞƉĞĂƚĞƌŚĂŶĚůĞƐĚŝĨĨĞƌĞŶƚƉƌŽƚŽĐŽůƐ͘
;ĐͿ ŚƵďŝƐŬŶŽǁŶĂƐĂŶŝŶƚĞůůŝŐĞŶƚĚĞǀŝĐĞŽŶƚŚĞŶĞƚǁŽƌŬ͘
;ĚͿ ůŽĐĂƚŝŽŶŽŶĂŶĞƚƐĞƌǀĞƌŝƐĐĂůůĞĚĂǁĞďƐŝƚĞ͘
;ĞͿ ĚŽĐƵŵĞŶƚƚŚĂƚƵƐĞƐ,ddWŝƐĐĂůůĞĚĂǁĞďƉĂŐĞ͘
;ĨͿ ƐǁŝƚĐŚŝƐĂĚĞǀŝĐĞƵƐĞĚƚŽƐĞŐŵĞŶƚŶĞƚǁŽƌŬƐŝŶƚŽƐƵďͲŶĞƚǁŽƌŬƐŽƌƐƵďŶĞƚƐ͘
;ŐͿ ŵĂŝůŚĞůƉƐƵƐƚŽƐĞŶĚĂŶĚƌĞĐĞŝǀĞŵĞƐƐĂŐĞƐƚŚƌŽƵŐŚǀŝĚĞŽĐŽŶĨĞƌĞŶĐŝŶŐ͘
;ŚͿ dŚĞĚĞŐĞŶĞƌĂƚŝŽŶŽĨĂƐŝŐŶĂůŽǀĞƌĂĚŝƐƚĂŶĐĞŽŶĂŶĞƚǁŽƌŬŝƐĐĂůůĞĚĂƚƚĞŶƵĂƚŝŽŶ͘
;ŝͿ ŽĂdžŝĂůĐĂďůĞƉŽƐƐĞƐƐĞƐŚŝŐŚĞƌƚĞŶƐŝůĞƐƚƌĞŶŐƚŚƚŚĂŶŽƉƚŝĐĂůĨŝďƌĞ͘
;ũͿ tŚĞŶƚǁŽĞŶƚŝƚŝĞƐĂƌĞĐŽŵŵƵŶŝĐĂƚŝŶŐĂŶĚĚŽŶŽƚǁĂŶƚĂƚŚŝƌĚƉĂƌƚLJƚŽůŝƐƚĞŶ͕ƚŚŝƐƐŝƚƵĂƚŝŽŶŝƐĚĞĨŝŶĞĚ
ĂƐƐĞĐƵƌĞĐŽŵŵƵŶŝĐĂƚŝŽŶ͘
Answers: (ĂͿ dƌƵĞ ;ďͿ &ĂůƐĞ ;ĐͿ &ĂůƐĞ ;ĚͿ dƌƵĞ ;ĞͿ dƌƵĞ ;ĨͿ dƌƵĞ
(ŐͿ &ĂůƐĞ ;ŚͿ dƌƵĞ ;ŝͿ &ĂůƐĞ ;ũͿ dƌƵĞ
3. DƵůƚŝƉůĞŚŽŝĐĞYƵĞƐƚŝŽŶƐ;DYƐͿ
(ĂͿ ĐŽŵƉƵƚĞƌŶĞƚǁŽƌŬ͗
;ŝͿ /ƐĂĐŽůůĞĐƚŝŽŶŽĨŚĂƌĚǁĂƌĞĐŽŵƉŽŶĞŶƚƐĂŶĚĐŽŵƉƵƚĞƌƐ
;ŝŝͿ /ƐŝŶƚĞƌĐŽŶŶĞĐƚĞĚďLJĐŽŵŵƵŶŝĐĂƚŝŽŶĐŚĂŶŶĞůƐ
;ŝŝŝͿ ůůŽǁƐƐŚĂƌŝŶŐŽĨƌĞƐŽƵƌĐĞƐĂŶĚŝŶĨŽƌŵĂƚŝŽŶ
;ŝǀͿ ůůŽĨƚŚĞĂďŽǀĞ
;ďͿ tŚĂƚŝƐĂĨŝƌĞǁĂůůŝŶĐŽŵƉƵƚĞƌŶĞƚǁŽƌŬ͍
;ŝͿ dŚĞƉŚLJƐŝĐĂůďŽƵŶĚĂƌLJŽĨŶĞƚǁŽƌŬ
Computer Networks
;ŝŝͿ ŶŽƉĞƌĂƚŝŶŐƐLJƐƚĞŵŽĨĐŽŵƉƵƚĞƌŶĞƚǁŽƌŬ
;ŝŝŝͿ ƐLJƐƚĞŵĚĞƐŝŐŶĞĚƚŽƉƌĞǀĞŶƚƵŶĂƵƚŚŽƌŝnjĞĚĂĐĐĞƐƐ
;ŝǀͿ ǁĞďďƌŽǁƐŝŶŐƐŽĨƚǁĂƌĞ
;ĐͿ tŚĂƚŝƐƚŚĞƵƐĞŽĨƌŝĚŐĞŝŶƚŚĞŶĞƚǁŽƌŬ͍
;ŝͿ dŽĐŽŶŶĞĐƚ>EƐ ;ŝŝͿ dŽƐĞƉĂƌĂƚĞ>EƐ
;ŝŝŝͿ dŽĐŽŶƚƌŽůŶĞƚǁŽƌŬƐƉĞĞĚ ;ŝǀͿ ůůŽĨƚŚĞĂďŽǀĞ
8.67
;ĚͿ ĂĐŚ/WƉĂĐŬĞƚŵƵƐƚĐŽŶƚĂŝŶ͗
;ŝͿ KŶůLJ^ŽƵƌĐĞĂĚĚƌĞƐƐ ;ŝŝͿ KŶůLJĞƐƚŝŶĂƚŝŽŶĂĚĚƌĞƐƐ
;ŝŝŝͿ ^ŽƵƌĐĞĂŶĚĞƐƚŝŶĂƚŝŽŶĂĚĚƌĞƐƐ ;ŝǀͿ ^ŽƵƌĐĞŽƌĞƐƚŝŶĂƚŝŽŶĂĚĚƌĞƐƐ
;ĞͿ tŚŝĐŚŽĨƚŚĞƐĞŝƐŶŽƚĂĐŽŵŵƵŶŝĐĂƚŝŽŶĐŚĂŶŶĞů͍
;ŝͿ ^ĂƚĞůůŝƚĞ ;ŝŝͿ DŝĐƌŽǁĂǀĞ ;ŝŝŝͿ ZĂĚŝŽǁĂǀĞ ;ŝǀͿ tŝͲ&ŝ
;ĨͿ DE^ƚĂŶĚƐĨŽƌ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘
(i) Metropolitan Area Network (ii) Main Area Network
;ŝŝŝͿ DĞƚƌŽƉŽůŝƚĂŶĐĐĞƐƐEĞƚǁŽƌŬ ;ŝǀͿ DĞƚƌŽĐĐĞƐƐEĞƚǁŽƌŬ
;ŐͿ tŚŝĐŚŽĨƚŚĞƐĞŝƐŶŽƚĂŶĞdžĂŵƉůĞŽĨƵŶŐƵŝĚĞĚŵĞĚŝĂ͍
;ŝͿ KƉƚŝĐĂů&ŝďƌĞĂďůĞ ;ŝŝͿ ZĂĚŝŽǁĂǀĞ ;ŝŝŝͿ ůƵĞƚŽŽƚŚ ;ŝǀͿ ^ĂƚĞůůŝƚĞ
;ŚͿ /ŶǁŚŝĐŚƚŽƉŽůŽŐLJĂƌĞĂůůƚŚĞŶŽĚĞƐĐŽŶŶĞĐƚĞĚƚŚƌŽƵŐŚĂƐŝŶŐůĞŽĂdžŝĂůĐĂďůĞ͍
;ŝͿ ^ƚĂƌ ;ŝŝͿ dƌĞĞ ;ŝŝŝͿ ƵƐ ;ŝǀͿ ZŝŶŐ
;ŝͿ tŚŝĐŚŽĨƚŚĞĨŽůůŽǁŝŶŐŝƐƚŚĞƐŵĂůůĞƐƚŶĞƚǁŽƌŬ͍
;ŝͿ tE ;ŝŝͿ DE ;ŝŝŝͿ >E ;ŝǀͿ tŝͲ&ŝ
;ũͿ tŚŝĐŚƉƌŽƚŽĐŽůŝƐƵƐĞĚĨŽƌƚŚĞƚƌĂŶƐĨĞƌŽĨŚLJƉĞƌƚĞdžƚĐŽŶƚĞŶƚŽǀĞƌƚŚĞǁĞď͍
;ŝͿ ,dD> ;ŝŝͿ ,ddW ;ŝŝŝͿ dWͬ/W ;ŝǀͿ &dW
Answers: ;ĂͿ ;ŝǀͿ ;ďͿ ;ŝŝŝͿ ;ĐͿ ;ŝͿ ;ĚͿ ;ŝŝŝͿ ;ĞͿ ;ŝǀͿ ;ĨͿ ;ŝͿ
;ŐͿ ;ŝͿ ;ŚͿ ;ŝŝŝͿ ;ŝͿ ;ŝŝŝͿ ;ũͿ ;ŝŝͿ
SOLVED QUESTIONS
1. ĞĨŝŶĞĂŶĞƚǁŽƌŬ͘tŚĂƚŝƐŝƚƐŶĞĞĚ͍
Ans. ŶĞƚǁŽƌŬ ŝƐ ĂŶ ŝŶƚĞƌĐŽŶŶĞĐƚĞĚ ĐŽůůĞĐƚŝŽŶ ŽĨ ĂƵƚŽŶŽŵŽƵƐ ĐŽŵƉƵƚĞƌƐ ƚŚĂƚ ĐĂŶ ƐŚĂƌĞ ĂŶĚ ĞdžĐŚĂŶŐĞ
ŝŶĨŽƌŵĂƚŝŽŶ͘
Need for networking:
(a) Resource sharing:ZĞƐŽƵƌĐĞƐĂƌĞƐŚĂƌĞĚďLJĂůůĐŽŵƉƵƚĞƌƐŽǀĞƌƚŚĞŶĞƚǁŽƌŬĨŽƌĞĨĨĞĐƚŝǀĞƵƚŝůŝnjĂƚŝŽŶ͘
;ďͿ File sharing:ĨŝůĞŝŶĂŶĞƚǁŽƌŬĐĂŶďĞĂĐĐĞƐƐĞĚĨƌŽŵĂŶLJǁŚĞƌĞ͘
2. Write two advantages and two disadvantages of network.
Ans. Advantages of network:
;ĂͿ tĞĐĂŶƐŚĂƌĞƌĞƐŽƵƌĐĞƐƐƵĐŚĂƐƉƌŝŶƚĞƌƐĂŶĚƐĐĂŶŶĞƌƐ͘
;ďͿ tĞĐĂŶƐŚĂƌĞĚĂƚĂĂŶĚĂĐĐĞƐƐĨŝůĞƐĨƌŽŵĂŶLJĐŽŵƉƵƚĞƌ͘
Disadvantages of network:
;ĂͿ /ĨƚŚĞƌĞŝƐĂŶLJƉƌŽďůĞŵŝŶƚŚĞƐĞƌǀĞƌ͕ƚŚĞŶŶŽĐŽŵŵƵŶŝĐĂƚŝŽŶĐĂŶƚĂŬĞƉůĂĐĞ͘
;ďͿ EĞƚǁŽƌŬĨĂƵůƚƐĐĂŶĐĂƵƐĞůŽƐƐŽĨĚĂƚĂ͘
;ĐͿ /ĨƚŚĞƌĞŝƐŶŽƉƌŝǀĂĐLJŵĞĐŚĂŶŝƐŵƵƐĞĚ͕ƚŚĞŶƚŚĞĞŶƚŝƌĞŶĞƚǁŽƌŬĐĂŶďĞĂĐĐĞƐƐĞĚďLJĂŶƵŶĂƵƚŚŽƌŝnjĞĚ
Supplement – Computer Science with Python–XII
person.
3. tŚĂƚŝƐZWEd͍tŚĂƚŝƐE^&Ed͍
Ans. ZWEd;ĚǀĂŶĐĞĚZĞƐĞĂƌĐŚWƌŽũĞĐƚŐĞŶĐLJEĞƚǁŽƌŬͿŝƐĂƉƌŽũĞĐƚƐƉŽŶƐŽƌĞĚďLJh^ĞƉĂƌƚŵĞŶƚŽĨĞĨĞŶĐĞ͘
E^&Ed͕ĚĞǀĞůŽƉĞĚďLJƚŚĞEĂƚŝŽŶĂů^ĐŝĞŶĐĞ&ŽƵŶĚĂƚŝŽŶ͕ǁĂƐĂŚŝŐŚĐĂƉĂĐŝƚLJŶĞƚǁŽƌŬĂŶĚƐƚƌŝĐƚůLJƵƐĞĚĨŽƌ
ĂĐĂĚĞŵŝĐĂŶĚĞŶŐŝŶĞĞƌŝŶŐƌĞƐĞĂƌĐŚ͘
4. tŚĂƚĂƌĞƚŚĞǀĂƌŝŽƵƐƚLJƉĞƐŽĨŶĞƚǁŽƌŬƐ͍
Ans. ŶĞƚǁŽƌŬŝƐĂŶŝŶƚĞƌĐŽŶŶĞĐƚŝŽŶŽĨƐĞǀĞƌĂůŶŽĚĞƐƚŚƌŽƵŐŚƐŽŵĞĐŽŵŵƵŶŝĐĂƚŝŽŶŵĞĚŝĂǁŝƚŚƚŚĞŐŽĂůŽĨ
ƐŚĂƌŝŶŐĚĂƚĂ͕ĨŝůĞƐĂŶĚƌĞƐŽƵƌĐĞƐ͘dŚĞƌĞĂƌĞƚŚƌĞĞƚLJƉĞƐŽĨŶĞƚǁŽƌŬƐ͗
;ĂͿ >ŽĐĂůƌĞĂEĞƚǁŽƌŬ;>EͿ
;ďͿ DĞƚƌŽƉŽůŝƚĂŶƌĞĂEĞƚǁŽƌŬ;DEͿ
;ĐͿ tŝĚĞƌĞĂEĞƚǁŽƌŬ;tEͿ
5. EĂŵĞƚŚĞǀĂƌŝŽƵƐůĂLJĞƌƐŽĨĐŽĂdžŝĂůĐĂďůĞ͘
Ans. ŽĂdžŝĂůĐĂďůĞĐŽŶƐŝƐƚƐŽĨƚŚĞĨŽůůŽǁŝŶŐůĂLJĞƌƐ͗
;ĂͿ ŵĞƚĂůůŝĐƌŽĚͲƐŚĂƉĞĚŝŶŶĞƌĐŽŶĚƵĐƚŽƌ ;ďͿ ŶŝŶƐƵůĂƚŽƌĐŽǀĞƌŝŶŐƚŚĞƌŽĚ
;ĐͿ ŵĞƚĂůůŝĐŽƵƚĞƌĐŽŶĚƵĐƚŽƌĐĂůůĞĚƐŚŝĞůĚ ;ĚͿ ŶŝŶƐƵůĂƚŽƌĐŽǀĞƌŝŶŐƚŚĞƐŚŝĞůĚ
;ĞͿ ƉůĂƐƚŝĐĐŽǀĞƌ
8.68
6. tŚĂƚŝƐĂƐƉĂŵŵĂŝů͍ ^ϮϬϭϱ
Ans. ^ƉĂŵ ŝƐ ƚŚĞ ĂďƵƐĞ ŽĨ ĞůĞĐƚƌŽŶŝĐ ŵĞƐƐĂŐŝŶŐ ƐLJƐƚĞŵƐ ;ŝŶĐůƵĚŝŶŐ ŵŽƐƚ ďƌŽĂĚĐĂƐƚ ŵĞĚŝĂ͕ ĚŝŐŝƚĂů ĚĞůŝǀĞƌLJ
ƐLJƐƚĞŵƐͿƚŽƐĞŶĚƵŶƐŽůŝĐŝƚĞĚďƵůŬŵĞƐƐĂŐĞƐŝŶĚŝƐĐƌŝŵŝŶĂƚĞůLJ͘
7. ŝĨĨĞƌĞŶƚŝĂƚĞďĞƚǁĞĞŶ&dWĂŶĚ,ddW͘ ^ϮϬϭϱ
Ans. &dWŝƐĂƉƌŽƚŽĐŽůƚŽƚƌĂŶƐĨĞƌĨŝůĞƐŽǀĞƌƚŚĞŝŶƚĞƌŶĞƚ͘,ddWŝƐĂƉƌŽƚŽĐŽůǁŚŝĐŚĂůůŽǁƐƚŚĞƵƐĞŽĨ,dD>ƚŽ
ďƌŽǁƐĞǁĞďƉĂŐĞƐŝŶƚŚĞtŽƌůĚtŝĚĞtĞď͘
8. KƵƚŽĨƚŚĞĨŽůůŽǁŝŶŐ͕ǁŚŝĐŚŝƐƚŚĞĨĂƐƚĞƐƚ;ĂͿtŝƌĞĚ͕ĂŶĚ;ďͿtŝƌĞůĞƐƐŵĞĚŝƵŵŽĨĐŽŵŵƵŶŝĐĂƚŝŽŶ͍/ŶĨƌĂƌĞĚ͕
ŽĂdžŝĂůĂďůĞ͕ƚŚĞƌŶĞƚĂďůĞ͕DŝĐƌŽǁĂǀĞ͕KƉƚŝĐĂů&ŝďƌĞ͘ ^ϮϬϭϱ
Ans. (a) Wired:KƉƚŝĐĂů&ŝďƌĞ
;ďͿ Wireless:/ŶĨƌĂƌĞĚŽƌDŝĐƌŽǁĂǀĞ
9. tŚĂƚŝƐĂǁŽƌŵ͍,ŽǁŝƐŝƚƌĞŵŽǀĞĚ͍ ^ϮϬϭϱ
Ans. ǁŽƌŵŝƐĂƐĞůĨͲƌĞƉůŝĐĂƚŝŶŐĐŽŵƉƵƚĞƌƉƌŽŐƌĂŵ͘/ƚƵƐĞƐĂŶĞƚǁŽƌŬƚŽƐĞŶĚĐŽƉŝĞƐŽĨŝƚƐĞůĨƚŽŽƚŚĞƌĐŽŵƉƵƚĞƌƐ
ŽŶƚŚĞŶĞƚǁŽƌŬĂŶĚŝƚŵĂLJĚŽƐŽǁŝƚŚŽƵƚĂŶLJƵƐĞƌŝŶƚĞƌǀĞŶƚŝŽŶ͘DŽƐƚŽĨƚŚĞĐŽŵŵŽŶĂŶƚŝǀŝƌƵƐ;ĂŶƚŝͲ
ǁŽƌŵͿƐŽĨƚǁĂƌĞƌĞŵŽǀĞǁŽƌŵ͘
10. /ůůƵƐƚƌĂƚĞƚŚĞůĂLJŽƵƚĨŽƌĐŽŶŶĞĐƚŝŶŐĨŝǀĞĐŽŵƉƵƚĞƌƐŝŶĂƵƐĂŶĚĂ^ƚĂƌƚŽƉŽůŽŐLJŽĨEĞƚǁŽƌŬƐ͘
Ans. Bus topology
Server
BACKBONE
Nodes
Dropline
Star topology
Computer
Computer Computer
HUB
Computer Printer
11. /ŶŶĞƚǁŽƌŬŝŶŐ͕ǁŚĂƚŝƐtE͍,ŽǁŝƐŝƚĚŝĨĨĞƌĞŶƚĨƌŽŵ>E͍ ^ϮϬϭϭ
Ans. /ŶƚĞƌŶĞƚŝƐĂŶĞdžĂŵƉůĞŽĨtE;tŝĚĞƌĞĂEĞƚǁŽƌŬͿ͘DŽƐƚtEƐĞdžŝƐƚƚŽĐŽŶŶĞĐƚ>EƐƚŚĂƚĂƌĞŶŽƚŝŶ
ƚŚĞƐĂŵĞŐĞŽŐƌĂƉŚŝĐĂůĂƌĞĂ͘tEŝƐĚŝĨĨĞƌĞŶƚĨƌŽŵ>EĚƵĞƚŽŝƚƐŶĞƚǁŽƌŬƌĂŶŐĞ͘tEŝƐĨŽƌĐŽŶŶĞĐƚŝŶŐ
ĐŽŵƉƵƚĞƌƐĂŶLJǁŚĞƌĞŝŶƚŚĞǁŽƌůĚǁŝƚŚŽƵƚĂŶLJŐĞŽŐƌĂƉŚŝĐĂůůŝŵŝƚĂƚŝŽŶǁŚĞƌĞĂƐ>EŝƐĐŽŶĨŝŶĞĚǁŝƚŚŝŶ
Computer Networks
ĂƌĂŶŐĞŽĨϭϬϬŵƚŽϱϬϬŵ͘
12. tŚĂƚŝƐŵĞĂŶƚďLJƚŽƉŽůŽŐLJ͍EĂŵĞƐŽŵĞƉŽƉƵůĂƌƚŽƉŽůŽŐŝĞƐ͘
Ans. dŽƉŽůŽŐLJŝƐƚŚĞĂƌƌĂŶŐĞŵĞŶƚďLJǁŚŝĐŚĐŽŵƉƵƚĞƌƐĂƌĞĐŽŶŶĞĐƚĞĚǁŝƚŚĞĂĐŚŽƚŚĞƌ͕ĞŝƚŚĞƌƉŚLJƐŝĐĂůůLJŽƌ
ůŽŐŝĐĂůůLJ͘
dŚĞƉŽƉƵůĂƌƚŽƉŽůŽŐŝĞƐĂƌĞ͗
;ĂͿ ƵƐŽƌ>ŝŶĞĂƌdŽƉŽůŽŐLJ ;ďͿ ZŝŶŐdŽƉŽůŽŐLJ
;ĐͿ ^ƚĂƌdŽƉŽůŽŐLJ ;ĚͿ dƌĞĞdŽƉŽůŽŐLJ 8.69
13. tŚLJĂƌĞĨŝďƌĞŽƉƚŝĐĐĂďůĞƐďĞĐŽŵŝŶŐƉŽƉƵůĂƌ͍
Ans. &ŝďƌĞŽƉƚŝĐƚƌĂŶƐŵŝƐƐŝŽŶŝƐďĞĐŽŵŝŶŐŝŶĐƌĞĂƐŝŶŐůLJƉŽƉƵůĂƌĚƵĞƚŽŝƚƐŶŽŝƐĞƌĞƐŝƐƚĂŶĐĞ͕ůŽǁĂƚƚĞŶƵĂƚŝŽŶĂŶĚ
ŚŝŐŚďĂŶĚǁŝĚƚŚĐĂƉĂďŝůŝƚŝĞƐ͘
14. tŚĂƚĨĂĐƚŽƌƐƐŚŽƵůĚďĞƚĂŬĞŶŝŶƚŽĐŽŶƐŝĚĞƌĂƚŝŽŶǁŚŝůĞŽƉƚŝŶŐĨŽƌĂƉĂƌƚŝĐƵůĂƌƚŽƉŽůŽŐLJ͍
Ans. dŚĞƌĞĂƌĞĂŶƵŵďĞƌŽĨĨĂĐƚŽƌƐǁŚŝĐŚĂƌĞƚŽďĞĐŽŶƐŝĚĞƌĞĚ͗
;ĂͿ ŽƐƚ ;ďͿ &ůĞdžŝďŝůŝƚLJ
;ĐͿ ZĞůŝĂďŝůŝƚLJ
15. tŚĂƚŝƐĂŵŽĚĞŵ͍tŚĂƚĂƌĞƚŚĞƚǁŽƚLJƉĞƐŽĨŵŽĚĞŵƐ͍
Ans. DŽĚĞŵƐƚĂŶĚƐĨŽƌŵŽĚƵůĂƚŽƌĚĞŵŽĚƵůĂƚŽƌƚŚĂƚĐŽŶǀĞƌƚƐĂŶĂůŽŐƐŝŐŶĂůƐƚŽĚŝŐŝƚĂůƐŝŐŶĂůƐĂƚƚŚĞƐĞŶĚĞƌ͛Ɛ
ĞŶĚ͘/ƚĐŽŶǀĞƌƚƐĚŝŐŝƚĂůƐŝŐŶĂůƐďĂĐŬƚŽĂŶĂůŽŐƐŝŐŶĂůƐĂƚƚŚĞƌĞĐĞŝǀĞƌ͛ƐĞŶĚ͘
dŚĞƚǁŽƚLJƉĞƐŽĨŵŽĚĞŵƐĂƌĞ͗ŝŶƚĞƌŶĂůŵŽĚĞŵĂŶĚĞdžƚĞƌŶĂůŵŽĚĞŵ͘
16. tŚĂƚŝƐƌĞŵŽƚĞůŽŐŝŶ͍tŚĂƚŝƐdĞůŶĞƚ͍
Ans. ZĞŵŽƚĞůŽŐŝŶŝƐƚŚĞƉƌŽĐĞƐƐŽĨĂĐĐĞƐƐŝŶŐĂŶĞƚǁŽƌŬĨƌŽŵĂƌĞŵŽƚĞƉůĂĐĞǁŝƚŚŽƵƚĂĐƚƵĂůůLJďĞŝŶŐƉƌĞƐĞŶƚ
ĂƚƚŚĞƉůĂĐĞŽĨǁŽƌŬŝŶŐ͘dĞůŶĞƚŝƐĂŶŝŶƚĞƌŶĞƚƵƚŝůŝƚLJƚŚĂƚůĞƚƐƵƐůŽŐŽŶƚŽĂƌĞŵŽƚĞĐŽŵƉƵƚĞƌƐLJƐƚĞŵ͘
ƵƐĞƌŝƐĂďůĞƚŽůŽŐŝŶƚŚĞƐLJƐƚĞŵĨŽƌƐŚĂƌŝŶŐŽĨĨŝůĞƐǁŝƚŚŽƵƚďĞŝŶŐƚŚĞĂĐƚƵĂůƵƐĞƌŽĨƚŚĂƚƐLJƐƚĞŵ͘
17. ƌŝĞĨůLJĞdžƉůĂŝŶ&dW͘
Ans. &dWƐƚĂŶĚƐĨŽƌ&ŝůĞdƌĂŶƐĨĞƌWƌŽƚŽĐŽů͘/ƚŝƐƚŚĞƐƚĂŶĚĂƌĚŵĞĐŚĂŶŝƐŵƉƌŽǀŝĚĞĚďLJdWͬ/WĨŽƌĐŽƉLJŝŶŐĂĨŝůĞ
ĨƌŽŵŽŶĞŚŽƐƚƚŽĂŶŽƚŚĞƌ͘tŚŝůĞƐŚĂƌŝŶŐĨŝůĞƐĨƌŽŵŽŶĞƐLJƐƚĞŵƚŽĂŶŽƚŚĞƌ͕ǁĞŵĂLJĞŶĐŽƵŶƚĞƌƐĞǀĞƌĂů
ƉƌŽďůĞŵƐͶƚǁŽƐLJƐƚĞŵƐŵĂLJŚĂǀĞĚŝĨĨĞƌĞŶƚĚŝƌĞĐƚŽƌLJƐƚƌƵĐƚƵƌĞƐ͕ƚǁŽƐLJƐƚĞŵƐŵĂLJŚĂǀĞĚŝĨĨĞƌĞŶƚĨŝůĞͲ
ŶĂŵŝŶŐ ĐŽŶǀĞŶƚŝŽŶƐ͕ Žƌ ƚǁŽ ƐLJƐƚĞŵƐ ŵĂLJ ŚĂǀĞ ĚŝĨĨĞƌĞŶƚ ǁĂLJƐ ƚŽ ƌĞƉƌĞƐĞŶƚ ƚĞdžƚ ĂŶĚ ĚĂƚĂ͘ ůů ƚŚĞƐĞ
ƉƌŽďůĞŵƐĂƌĞƐŽůǀĞĚďLJ&dW͘
18. tŚĂƚŝƐƉƌŽƚŽĐŽů͍EĂŵĞƐŽŵĞĐŽŵŵŽŶůLJƵƐĞĚƉƌŽƚŽĐŽůƐ͘
Ans. ƉƌŽƚŽĐŽůŵĞĂŶƐƚŚĞƌƵůĞƐƚŚĂƚĂƌĞĂƉƉůŝĐĂďůĞĨŽƌĂŶĞƚǁŽƌŬ͕ŽƌǁĞĐĂŶƐĂLJƚŚĞĐŽŵŵŽŶƐĞƚŽĨƌƵůĞƐƵƐĞĚ
ĨŽƌĐŽŵŵƵŶŝĐĂƚŝŽŶŝŶŶĞƚǁŽƌŬ͘
ŝĨĨĞƌĞŶƚƚLJƉĞƐŽĨƉƌŽƚŽĐŽůƐĂƌĞ͗
(a) HTTP:,LJƉĞƌdĞdžƚdƌĂŶƐĨĞƌWƌŽƚŽĐŽů
;ďͿ FTP:&ŝůĞdƌĂŶƐĨĞƌWƌŽƚŽĐŽů
;ĐͿ SLIP:^ĞƌŝĂů>ŝŶĞ/ŶƚĞƌŶĞƚWƌŽƚŽĐŽů
(d) PPP:WŽŝŶƚͲƚŽͲWŽŝŶƚWƌŽƚŽĐŽů
(e) TCP/IP:dƌĂŶƐŵŝƐƐŝŽŶŽŶƚƌŽůWƌŽƚŽĐŽůͬ/ŶƚĞƌŶĞƚWƌŽƚŽĐŽů
(f) SMTP:^ŝŵƉůĞDĂŝůdƌĂŶƐĨĞƌWƌŽƚŽĐŽů
(g) POP: WŽƐƚKĨĨŝĐĞWƌŽƚŽĐŽů
(h) IMAP:/ŶƚĞƌŶĞƚDĂŝůĐĐĞƐƐWƌŽƚŽĐŽů
19. tŚĂƚŝƐdWͬ/W͍
Ans. dWͬ/W ;dƌĂŶƐŵŝƐƐŝŽŶ ŽŶƚƌŽů WƌŽƚŽĐŽůͬ/ŶƚĞƌŶĞƚ WƌŽƚŽĐŽůͿ ŝƐ Ă ƉƌŽƚŽĐŽů ĨŽƌ ĐŽŵŵƵŶŝĐĂƚŝŽŶ ďĞƚǁĞĞŶ
Supplement – Computer Science with Python–XII
ĐŽŵƉƵƚĞƌƐƵƐĞĚĂƐĂƐƚĂŶĚĂƌĚĨŽƌƚƌĂŶƐŵŝƚƚŝŶŐĚĂƚĂŽǀĞƌŶĞƚǁŽƌŬƐĂŶĚŝƐƚŚĞďĂƐŝƐĨŽƌƐƚĂŶĚĂƌĚ/ŶƚĞƌŶĞƚ
ƉƌŽƚŽĐŽůƐ͘/ƚŝƐĂůƐŽƌĞƐƉŽŶƐŝďůĞĨŽƌĂƐƐĞŵďůŝŶŐƉĂĐŬĞƚƐĂƚƚŚĞƌĞĐĞŝǀĞƌ͛ƐƐŝĚĞ͘
20. ,ŽǁŝƐ&dWĚŝĨĨĞƌĞŶƚĨƌŽŵ,ddW͍
Ans. &dWŝƐĂƉƌŽƚŽĐŽůƵƐĞĚƚŽƵƉůŽĂĚĨŝůĞƐĨƌŽŵĂǁŽƌŬƐƚĂƚŝŽŶƚŽĂŶ&dWƐĞƌǀĞƌŽƌĚŽǁŶůŽĂĚĨŝůĞƐĨƌŽŵĂŶ&dW
ƐĞƌǀĞƌƚŽĂǁŽƌŬƐƚĂƚŝŽŶ͕ǁŚĞƌĞĂƐ,ddWŝƐĂƉƌŽƚŽĐŽůƵƐĞĚƚŽƚƌĂŶƐĨĞƌĨŝůĞƐĨƌŽŵĂtĞďƐĞƌǀĞƌŽŶƚŽĂ
ďƌŽǁƐĞƌŝŶŽƌĚĞƌƚŽǀŝĞǁĂǁĞďƉĂŐĞƚŚĂƚŝƐŽŶƚŚĞŝŶƚĞƌŶĞƚ͘
21. ĞĨŝŶĞDŽďŝůĞŽŵŵƵŶŝĐĂƚŝŽŶĂŶĚtŝƌĞůĞƐƐŽŵŵƵŶŝĐĂƚŝŽŶ͘
Ans. DŽďŝůĞŽŵŵƵŶŝĐĂƚŝŽŶĞƐƐĞŶƚŝĂůůLJƌĞĨĞƌƐƚŽĂĐŽŵƉƵƚŝŶŐĚĞǀŝĐĞƚŚĂƚŝƐŶŽƚĐŽŶƚŝŶƵŽƵƐůLJĐŽŶŶĞĐƚĞĚƚŽƚŚĞ
ďĂƐĞŽƌĐĞŶƚƌĂůŶĞƚǁŽƌŬ͘dŚŝƐŵĂLJŝŶĐůƵĚĞůĂƉƚŽƉƐ͕ŶĞǁůLJͲĐƌĞĂƚĞĚƐŵĂƌƚƉŚŽŶĞƐĂŶĚĂůƐŽWƐ͘tŝƌĞůĞƐƐ
ŽŵŵƵŶŝĐĂƚŝŽŶŝƐƐŝŵƉůLJĚĂƚĂĐŽŵŵƵŶŝĐĂƚŝŽŶǁŝƚŚŽƵƚƚŚĞƵƐĞŽĨĂůĂŶĚůŝŶĞ͘dŚŝƐŵĂLJŝŶǀŽůǀĞĂĐĞůůƵůĂƌ
ƚĞůĞƉŚŽŶĞ͕ĂƚǁŽͲǁĂLJƌĂĚŝŽ͕ĂĨŝdžĞĚǁŝƌĞůĞƐƐĐŽŶŶĞĐƚŝŽŶ͕ĂůĂƐĞƌŽƌƐĂƚĞůůŝƚĞĐŽŵŵƵŶŝĐĂƚŝŽŶ͘
22. tŚĂƚŝƐDŽďŝůĞWƌŽĐĞƐƐŽƌ͍
Ans. DŽďŝůĞWƌŽĐĞƐƐŽƌƐĂƌĞƌĞƋƵŝƌĞĚƚŽƌƵŶĂŶŽƉĞƌĂƚŝŶŐƐLJƐƚĞŵ͕ďĞŝƚĚĞƐŬƚŽƉ͕ůĂƉƚŽƉŽƌŵŽďŝůĞ͘dŚĞLJƉƌŽǀŝĚĞ
ŶĞĐĞƐƐĂƌLJƌĞƐŽƵƌĐĞƐƚŽƐƚĂƌƚĂŶŽƉĞƌĂƚŝŶŐƐLJƐƚĞŵ͕ƌƵŶĂƉƉůŝĐĂƚŝŽŶƐĂŶĚĚŽƚĂƐŬƐ͘
23. EĂŵĞĂŶLJĨŽƵƌƉŽƉƵůĂƌŵŽďŝůĞƉƌŽĐĞƐƐŽƌƐŝŶƚŚĞŵĂƌŬĞƚ͘
Ans. &ŽƵƌ ƉŽƉƵůĂƌ ŵŽďŝůĞ ƉƌŽĐĞƐƐŽƌƐ ĂƌĞ YƵĂůĐŽŵŵ ^ŶĂƉĚƌĂŐŽŶ͕ ƉƉůĞ͛Ɛ DŽďŝůĞ WƌŽĐĞƐƐŽƌƐ͕ ,ŝ^ŝůŝĐŽŶ ĂŶĚ
^ĂŵƐƵŶŐdžLJŶŽƐ͘
8.70
24. tŚĂƚĂƌĞƚŚĞĂĚǀĂŶƚĂŐĞƐŽĨĞͲĐŽŵŵĞƌĐĞĂƉƉůŝĐĂƚŝŽŶƐ͍
Ans. dŚĞĂĚǀĂŶƚĂŐĞƐŽĨĞͲĐŽŵŵĞƌĐĞĂƉƉůŝĐĂƚŝŽŶƐŝŶĐůƵĚĞƚŚĞŝƌƌŽƵŶĚͲƚŚĞͲĐůŽĐŬĂǀĂŝůĂďŝůŝƚLJ͕ƚŚĞƐƉĞĞĚŽĨĂĐĐĞƐƐ͕
ƚŚĞǁŝĚĞĂǀĂŝůĂďŝůŝƚLJŽĨŐŽŽĚƐĂŶĚƐĞƌǀŝĐĞƐĨŽƌƚŚĞĐŽŶƐƵŵĞƌ͕ĞĂƐLJĂĐĐĞƐƐŝďŝůŝƚLJĂŶĚŝŶƚĞƌŶĂƚŝŽŶĂůƌĞĂĐŚ͘
25. ĞĨŝŶĞǁĞďďƌŽǁƐĞƌĂŶĚǁĞďƐĞƌǀĞƌ͘
Ans. Web Browser:ǁĞďďƌŽǁƐĞƌŝƐĂƐŽĨƚǁĂƌĞǁŚŝĐŚŝƐƵƐĞĚĨŽƌĚŝƐƉůĂLJŝŶŐƚŚĞĐŽŶƚĞŶƚŽŶǁĞďƉĂŐĞ;ƐͿ͘
/ƚŝƐƵƐĞĚďLJƚŚĞĐůŝĞŶƚƚŽǀŝĞǁǁĞďƐŝƚĞƐ͘džĂŵƉůĞƐŽĨǁĞďďƌŽǁƐĞƌͶ'ŽŽŐůĞŚƌŽŵĞ͕&ŝƌĞĨŽdž͕/ŶƚĞƌŶĞƚ
džƉůŽƌĞƌ͕^ĂĨĂƌŝ͕KƉĞƌĂ͕ĞƚĐ͘
Web Server:ǁĞďƐĞƌǀĞƌŝƐĂƐŽĨƚǁĂƌĞǁŚŝĐŚĞŶƚĞƌƚĂŝŶƐƚŚĞƌĞƋƵĞƐƚ;ƐͿŵĂĚĞďLJĂǁĞďďƌŽǁƐĞƌ͘ǁĞď
ƐĞƌǀĞƌŚĂƐĚŝĨĨĞƌĞŶƚƉŽƌƚƐƚŽŚĂŶĚůĞĚŝĨĨĞƌĞŶƚƌĞƋƵĞƐƚƐĨƌŽŵǁĞďďƌŽǁƐĞƌ͕ůŝŬĞŐĞŶĞƌĂůůLJ&dWƌĞƋƵĞƐƚŝƐ
ŚĂŶĚůĞĚĂƚWŽƌƚϭϭϬĂŶĚ,ddWƌĞƋƵĞƐƚŝƐŚĂŶĚůĞĚĂƚWŽƌƚϴϬ͘džĂŵƉůĞŽĨǁĞďƐĞƌǀĞƌŝƐƉĂĐŚĞ͘
26. ŝĨĨĞƌĞŶƚŝĂƚĞďĞƚǁĞĞŶyD>ĂŶĚ,dD>͘
Ans. /Ŷ ,dD> ;,LJƉĞƌ dĞdžƚ DĂƌŬƵƉ >ĂŶŐƵĂŐĞͿ͕ ďŽƚŚ ƚĂŐ ƐĞŵĂŶƚŝĐƐ ĂŶĚ ƚŚĞ ƚĂŐ ƐĞƚ ĂƌĞ ĨŝdžĞĚ͕ ǁŚĞƌĞĂƐ yD>
;džƚĞŶƐŝďůĞDĂƌŬƵƉ>ĂŶŐƵĂŐĞͿŝƐĂŵĞƚĂͲůĂŶŐƵĂŐĞĨŽƌĚĞƐĐƌŝďŝŶŐŵĂƌŬƵƉůĂŶŐƵĂŐĞƐ͘yD>ƉƌŽǀŝĚĞƐƚŚĞ
ĨĂĐŝůŝƚLJ ƚŽ ĚĞĨŝŶĞ ƚĂŐƐ ĂŶĚ ƚŚĞ ƐƚƌƵĐƚƵƌĂů ƌĞůĂƚŝŽŶƐŚŝƉƐ ďĞƚǁĞĞŶ ƚŚĞŵ͘ ůů ƚŚĞ ƐĞŵĂŶƚŝĐƐ ŽĨ ĂŶ yD>
ĚŽĐƵŵĞŶƚǁŝůůĞŝƚŚĞƌďĞĚĞĨŝŶĞĚďLJƚŚĞĂƉƉůŝĐĂƚŝŽŶƐƚŚĂƚƉƌŽĐĞƐƐƚŚĞŵŽƌďLJƐƚLJůĞƐŚĞĞƚƐ͘
27. tŚĂƚŝƐǁĞƐƚŝŶŐ͍
Ans. tĞƐƚŝŶŐŝƐĂŵĞĂŶƐŽĨŚŽƐƚŝŶŐǁĞďƐĞƌǀĞƌĂƉƉůŝĐĂƚŝŽŶƐŽŶĂĐŽŵƉƵƚĞƌƐLJƐƚĞŵƚŚƌŽƵŐŚǁŚŝĐŚĞůĞĐƚƌŽŶŝĐ
ĐŽŶƚĞŶƚŽŶƚŚĞŝŶƚĞƌŶĞƚŝƐƌĞĂĚŝůLJĂǀĂŝůĂďůĞƚŽĂŶLJǁĞďͲďƌŽǁƐĞƌĐůŝĞŶƚ͘
28. tŚĂƚŝƐŚĂĐŬŝŶŐ͍
Ans. ,ĂĐŬŝŶŐŝƐĂƉƌŽĐĞƐƐŽĨĂĐĐĞƐƐŝŶŐĂĐŽŵƉƵƚĞƌƐLJƐƚĞŵŽƌŶĞƚǁŽƌŬǁŝƚŚŽƵƚŬŶŽǁŝŶŐƚŚĞĂĐĐĞƐƐĂƵƚŚŽƌŝnjĂƚŝŽŶ
ĐƌĞĚĞŶƚŝĂůŽĨƚŚĂƚƐLJƐƚĞŵ͘,ĂĐŬŝŶŐĐĂŶďĞŝůůĞŐĂůŽƌĞƚŚŝĐĂůĚĞƉĞŶĚŝŶŐŽŶƚŚĞŝŶƚĞŶƚŝŽŶŽĨƚŚĞŚĂĐŬĞƌ͘
29. tŚĂƚĂƌĞĐŽŽŬŝĞƐ͍
Ans. ŽŽŬŝĞƐĂƌĞŵĞƐƐĂŐĞƐƚŚĂƚĂǁĞďƐĞƌǀĞƌƚƌĂŶƐŵŝƚƐƚŽĂǁĞďďƌŽǁƐĞƌƐŽƚŚĂƚƚŚĞǁĞďƐĞƌǀĞƌĐĂŶŬĞĞƉ
ƚƌĂĐŬŽĨƚŚĞƵƐĞƌ͛ƐĂĐƚŝǀŝƚLJŽŶĂƐƉĞĐŝĨŝĐǁĞďƐŝƚĞ͘ŽŽŬŝĞƐĂƌĞƐĂǀĞĚŝŶƚŚĞĨŽƌŵŽĨƚĞdžƚĨŝůĞƐŝŶƚŚĞĐůŝĞŶƚ
ĐŽŵƉƵƚĞƌ͘
30. ŝĨĨĞƌĞŶƚŝĂƚĞďĞƚǁĞĞŶĐƌĂĐŬŝŶŐĂŶĚŚĂĐŬŝŶŐ͘
Ans. ƌĂĐŬŝŶŐŝƐĚĞĨŝŶĞĚĂƐĂŶĂƚƚĞŵƉƚƚŽƌĞŵŽǀĞƚŚĞĐŽƉLJƉƌŽƚĞĐƚŝŽŶƐŝŶƐĞƌƚĞĚŝŶƚŽƐŽĨƚǁĂƌĞƉƌŽŐƌĂŵƐ͘
ƉƌŽŐƌĂŵƐƵĐĐĞƐƐĨƵůůLJƐƚƌŝƉƉĞĚŽĨƉƌŽƚĞĐƚŝŽŶƐŝƐƚŚĞŶŬŶŽǁŶĂƐŚĂǀŝŶŐďĞĞŶ͞ƌĂĐŬĞĚ͘͟,ĂĐŬŝŶŐĐĂŶďĞ
ĞƚŚŝĐĂůͬůĞŐĂůďƵƚĐƌĂĐŬŝŶŐŝƐĂƚŽƚĂůůLJŝůůĞŐĂůŵĞƚŚŽĚĂŶĚŝƐĂůƐŽĐĂůůĞĚƉŝƌĂĐLJ͘
31. tŚĂƚŝƐǁĞďƐĐƌŝƉƚŝŶŐ͍
Ans. ƐĐƌŝƉƚŝƐĂƐŵĂůůďŝƚŽĨĐŽĚĞƚŚĂƚĞŶĂďůĞƐǁĞďďƌŽǁƐĞƌƐƚŽĚŽƐŽŵĞƚŚŝŶŐƌĂƚŚĞƌƚŚĂŶũƵƐƚĚŝƐƉůĂLJŝŶŐƐƚĂƚŝĐ
ƌĞƐƵůƚƐ͘^ĐƌŝƉƚƐĂƌĞƵƐĞĚŝŶǁĞďĚĞƐŝŐŶƚŽĐƌĞĂƚĞĚLJŶĂŵŝĐƉĂŐĞƐ͘dŚĞƌĞĂƌĞƚǁŽĐĂƚĞŐŽƌŝĞƐŽĨǁĞďƐĐƌŝƉƚƐ͗
ůŝĞŶƚͲ^ŝĚĞ^ĐƌŝƉƚǁŚŝĐŚĐĂŶďĞǁƌŝƚƚĞŶďLJƵƐŝŶŐ:ĂǀĂ^ĐƌŝƉƚ͕s^ĐƌŝƉƚ͕ĂŶĚ^ĞƌǀĞƌͲ^ŝĚĞ^ĐƌŝƉƚ͕ǁŚŝĐŚĐĂŶ
ďĞǁƌŝƚƚĞŶŝŶW,W;ƵƐĞĚĨŽƌĐůŝĞŶƚͲƐŝĚĞƐĐƌŝƉƚŝŶŐĂůƐŽͿĂŶĚ:^W͘
32. EĂŵĞƐŽŵĞǁĞďƐĐƌŝƉƚŝŶŐůĂŶŐƵĂŐĞƐ͘
Ans. dŚĞƌĞĂƌĞŵĂŶLJƐĐƌŝƉƚŝŶŐůĂŶŐƵĂŐĞƐĂǀĂŝůĂďůĞƚŽĚĂLJ͘DŽƐƚĐŽŵŵŽŶĂƌĞs^ĐƌŝƉƚ͕:ĂǀĂ^ĐƌŝƉƚ͕^W͕W,W͕
WZ>ĂŶĚ:^W͘
33. tŚĂƚŝƐLJďĞƌƌŝŵĞ͍
Ans. tŚĞŶĂŶLJĐƌŝŵĞŝƐĐŽŵŵŝƚƚĞĚŽǀĞƌƚŚĞŝŶƚĞƌŶĞƚ͕ŝƚŝƐƌĞĨĞƌƌĞĚƚŽĂƐLJďĞƌƌŝŵĞ͘
34. tŚĂƚŝƐtĞďϮ͘Ϭ͍
Ans. tĞďϮ͘ϬŝƐĂĐŽŶĐĞƉƚƚŚĂƚƚĂŬĞƐƚŚĞŶĞƚǁŽƌŬĂƐĂƉůĂƚĨŽƌŵĨŽƌŝŶĨŽƌŵĂƚŝŽŶƐŚĂƌŝŶŐ͕ŝŶƚĞƌŽƉĞƌĂďŝůŝƚLJ͕ƵƐĞƌͲ
ĐĞŶƚƌĞĚĚĞƐŝŐŶ͕ĂŶĚĐŽůůĂďŽƌĂƚŝŽŶŽŶƚŚĞŝŶƚĞƌŶĞƚŽƌtŽƌůĚtŝĚĞtĞď͘tĞďϮ͘ϬƐŝƚĞĂůůŽǁƐƵƐĞƌƐƚŽ
ŝŶƚĞƌĂĐƚĂŶĚĐŽůůĂďŽƌĂƚĞǁŝƚŚĞĂĐŚŽƚŚĞƌ͘džĂŵƉůĞƐŽĨtĞďϮ͘ϬŝŶĐůƵĚĞƐŽĐŝĂůŶĞƚǁŽƌŬŝŶŐƐŝƚĞƐ͕ĨĂĐĞŬ͕
ŐŽŽŐůĞн͕ƚǁŝƚƚĞƌ͕ĞƚĐ͘
Computer Networks
35. 'ŝǀĞŽŶĞĂĚǀĂŶƚĂŐĞŽĨďƵƐƚŽƉŽůŽŐLJŽĨŶĞƚǁŽƌŬ͘ůƐŽƐƚĂƚĞŚŽǁĨŽƵƌĐŽŵƉƵƚĞƌƐĐĂŶďĞĐŽŶŶĞĐƚĞĚǁŝƚŚ
ĞĂĐŚŽƚŚĞƌƵƐŝŶŐƐƚĂƌƚŽƉŽůŽŐLJŽĨŶĞƚǁŽƌŬ͘
Ans. /ŶďƵƐƚŽƉŽůŽŐLJ͕ƚŚĞǁŽƌŬƐƚĂƚŝŽŶƐĐĂŶĞĂƐŝůLJďĞĞdžƚĞŶĚĞĚŽƌƌĞŵŽǀĞĚ͘/ŶƐƚĂƌƚŽƉŽůŽŐLJ͕ĨŽƵƌĐŽŵƉƵƚĞƌƐ
ĐĂŶďĞĐŽŶŶĞĐƚĞĚǁŝƚŚĞĂĐŚŽƚŚĞƌƚŚƌŽƵŐŚĂƐĞƌǀĞƌ͘
8.71
36. tƌŝƚĞ ƚǁŽ ĂĚǀĂŶƚĂŐĞƐ ŽĨ ƵƐŝŶŐ ĂŶ ŽƉƚŝĐĂů ĨŝďƌĞ ĐĂďůĞ ŽǀĞƌ ĂŶ ƚŚĞƌŶĞƚ ĐĂďůĞ ƚŽ ĐŽŶŶĞĐƚ ƚǁŽ ƐĞƌǀŝĐĞ
ƐƚĂƚŝŽŶƐǁŚŝĐŚĂƌĞϮϬϬŵĂǁĂLJĨƌŽŵĞĂĐŚŽƚŚĞƌ͘ ^ϮϬϭϯ
Ans. KƉƚŝĐĂůĨŝďƌĞĐĂďůĞŐƵĂƌĂŶƚĞĞƐƐĞĐƵƌĞƚƌĂŶƐŵŝƐƐŝŽŶĂŶĚĂǀĞƌLJŚŝŐŚƚƌĂŶƐŵŝƐƐŝŽŶĐĂƉĂĐŝƚLJ͘KƉƚŝĐĂůĨŝďƌĞ
ĐĂďůĞŝƐŝŵŵƵŶĞƚŽĞůĞĐƚƌŝĐĂůĂŶĚŵĂŐŶĞƚŝĐŝŶƚĞƌĨĞƌĞŶĐĞ͘
37. tƌŝƚĞƚǁŽĐŚĂƌĂĐƚĞƌŝƐƚŝĐƐŽĨtŝͲ&ŝ͘ ^ϮϬϭϰ
Ans. ;ĂͿ /ƚĂůůŽǁƐĂŶĞůĞĐƚƌŽŶŝĐĚĞǀŝĐĞƚŽĞdžĐŚĂŶŐĞĚĂƚĂŽƌĐŽŶŶĞĐƚƚŽƚŚĞŝŶƚĞƌŶĞƚǁŝƌĞůĞƐƐůLJƵƐŝŶŐŵŝĐƌŽǁĂǀĞƐ͘
;ďͿ EĞƚǁŽƌŬƌĂŶŐĞŽĨtŝͲ&ŝŝƐŵƵĐŚůĞƐƐƚŚĂŶŽƚŚĞƌŶĞƚǁŽƌŬƚĞĐŚŶŽůŽŐŝĞƐůŝŬĞǁŝƌĞĚ>E͘
38. tŚĂƚŝƐƚŚĞĚŝĨĨĞƌĞŶĐĞďĞƚǁĞĞŶŵĂŝůĂŶĚŚĂƚ͍ ^ϮϬϭϰ
Ans. ;ĂͿ ŚĂƚŝƐĂƚLJƉĞŽĨƐŽĨƚǁĂƌĞǁŚŝůĞŵĂŝůŝƐĂƉƌŽƚŽĐŽů͘
;ďͿ ŚĂƚƌĞƋƵŝƌĞƐƚŚĞƉĞƌŵŝƐƐŝŽŶŽĨďŽƚŚƉĂƌƚŝĞƐǁŚŝůĞŵĂŝůĚŽĞƐŶŽƚ͘
;ĐͿ ŚĂƚŝƐƚLJƉŝĐĂůůLJƐŽĨƚǁĂƌĞĚĞƉĞŶĚĞŶƚǁŚŝůĞŵĂŝůŝƐŶŽƚ͘
;ĚͿ ŚĂƚŶĞĞĚƐĂĐĐŽƵŶƚƐŽŶƚŚĞƐĂŵĞƉƌŽǀŝĚĞƌǁŚŝůĞŵĂŝůĚŽĞƐŶŽƚ͘
39. tŚĂƚĂƌĞsŽ/W͍
Ans. sŽ/WĂƌĞĐŽŵŵƵŶŝĐĂƚŝŽŶƉƌŽƚŽĐŽůƐĂŶĚƚƌĂŶƐŵŝƐƐŝŽŶƚĞĐŚŶŽůŽŐŝĞƐĨŽƌĚĞůŝǀĞƌLJŽĨǀŽŝĐĞĐŽŵŵƵŶŝĐĂƚŝŽŶ
ĂŶĚŵƵůƚŝŵĞĚŝĂƐĞƐƐŝŽŶƐŽǀĞƌ/ŶƚĞƌŶĞƚWƌŽƚŽĐŽů;/WͿŶĞƚǁŽƌŬƐ͕ƐƵĐŚĂƐƚŚĞŝŶƚĞƌŶĞƚ͘ůƐŽ͕ǁĞĐĂŶƐĂLJƚŚĂƚ
sŽ/WĂƌĞ/WƚĞĐŚŶŽůŽŐLJ͕ŝŶƚĞƌŶĞƚƚĞůĞƉŚŽŶLJĂŶĚďƌŽĂĚďĂŶĚƚĞůĞƉŚŽŶLJ͘
40. džƉĂŶĚƚŚĞĨŽůůŽǁŝŶŐƚĞƌŵƐ͗
;ĂͿ yD> ;ďͿ '^D
;ĐͿ ^D^ ;ĚͿ DE
Ans. ;ĂͿ yD>ʹdžƚĞŶƐŝďůĞDĂƌŬƵƉ>ĂŶŐƵĂŐĞ
;ďͿ '^Dʹ'ůŽďĂů^LJƐƚĞŵĨŽƌDŽďŝůĞĐŽŵŵƵŶŝĐĂƚŝŽŶ
;ĐͿ ^D^ʹ^ŚŽƌƚDĞƐƐĂŐŝŶŐ^ĞƌǀŝĐĞ
;ĚͿ DEʹDĞƚƌŽƉŽůŝƚĂŶƌĞĂEĞƚǁŽƌŬ
41. ,ŽǁŵĂŶLJƐǁŝƚĐŚŝŶŐƚĞĐŚŶŝƋƵĞƐĂƌĞƚŚĞƌĞ͍džƉůĂŝŶĂŶLJŽŶĞ͘
Ans. dŚĞƌĞĂƌĞƚŚƌĞĞƐǁŝƚĐŚŝŶŐƚĞĐŚŶŝƋƵĞƐ͗
;ĂͿ ŝƌĐƵŝƚ^ǁŝƚĐŚŝŶŐ ;ďͿ WĂĐŬĞƚ^ǁŝƚĐŚŝŶŐ
;ĐͿ DĞƐƐĂŐĞ^ǁŝƚĐŚŝŶŐ
Circuit Switching: /Ŷ ƚŚŝƐ ƚĞĐŚŶŝƋƵĞ͕ ĨŝƌƐƚ ƚŚĞ ĐŽŵƉůĞƚĞ ƉŚLJƐŝĐĂů ĐŽŶŶĞĐƚŝŽŶ ďĞƚǁĞĞŶ ƚǁŽ ĐŽŵƉƵƚĞƌƐ ŝƐ
ĞƐƚĂďůŝƐŚĞĚ ĂŶĚ ƚŚĞŶ ĚĂƚĂ ŝƐ ƚƌĂŶƐŵŝƚƚĞĚ ĨƌŽŵ ƚŚĞ ƐŽƵƌĐĞ ĐŽŵƉƵƚĞƌ ƚŽ ƚŚĞ ĚĞƐƚŝŶĂƚŝŽŶ ĐŽŵƉƵƚĞƌ͘ dŚĞ
ĞŶƚŝƌĞĚĞĚŝĐĂƚĞĚůŝŶĞŝƐƵƐĞĚďLJƚŚĞĐĂůůĞƌĂŶĚƚŚĞƌĞĐĞŝǀĞƌĂŶĚŶŽŽƚŚĞƌƵƐĞƌĐĂŶƵƐĞŝƚĞǀĞŶŝĨƚŚĞůŝŶĞ
ďĞĐŽŵĞƐŝĚůĞ͘tŚĞŶƚŚĞĚĂƚĂƚƌĂŶƐŵŝƐƐŝŽŶŝƐŽǀĞƌ͕ƚŚĞůŝŶĞŝƐĚŝƐĐŽŶŶĞĐƚĞĚĂŶĚŝƐĂǀĂŝůĂďůĞĨŽƌƚŚĞŶĞdžƚ
ĐŽŵŵƵŶŝĐĂƚŝŽŶ͘
42. ,ŽǁĂƌĞdƌŽũĂŶŚŽƌƐĞƐĚŝĨĨĞƌĞŶƚĨƌŽŵtŽƌŵƐ͍DĞŶƚŝŽŶĂŶLJŽŶĞĚŝĨĨĞƌĞŶĐĞ͘ ^ĂŵƉůĞWĂƉĞƌ
Ans. dƌŽũĂŶŚŽƌƐĞŝƐĂƚĞƌŵƵƐĞĚƚŽĚĞƐĐƌŝďĞŵĂůǁĂƌĞƚŚĂƚĂƉƉĞĂƌƐƚŽƚŚĞƵƐĞƌƚŽƉĞƌĨŽƌŵĂĚĞƐŝƌĂďůĞĨƵŶĐƚŝŽŶ
Supplement – Computer Science with Python–XII
ďƵƚǁŚŝĐŚ͕ŝŶĨĂĐƚ͕ĨĂĐŝůŝƚĂƚĞƐƵŶĂƵƚŚŽƌŝnjĞĚĂĐĐĞƐƐƚŽƚŚĞƵƐĞƌ͛ƐĐŽŵƉƵƚĞƌƐLJƐƚĞŵ͘
ĐŽŵƉƵƚĞƌtŽƌŵŝƐĂƐĞůĨͲƌĞƉůŝĐĂƚŝŶŐƉƌŽŐƌĂŵ͘/ƚƵƐĞƐĂŶĞƚǁŽƌŬƚŽƐĞŶĚĐŽƉŝĞƐŽĨŝƚƐĞůĨƚŽŽƚŚĞƌŶŽĚĞƐ
ĂŶĚƚŚĂƚƚŽŽǁŝƚŚŽƵƚŚƵŵĂŶŝŶƚĞƌǀĞŶƚŝŽŶ͘
43. tŚĂƚŝƐĂĐŽŵŵƵŶŝĐĂƚŝŽŶĐŚĂŶŶĞů͍EĂŵĞƚŚĞďĂƐŝĐƚLJƉĞƐŽĨĐŽŵŵƵŶŝĐĂƚŝŽŶĐŚĂŶŶĞůƐĂǀĂŝůĂďůĞ͘
Ans. ĐŽŵŵƵŶŝĐĂƚŝŽŶĐŚĂŶŶĞůŝƐĂůƐŽŬŶŽǁŶĂƐĐŽŵŵƵŶŝĐĂƚŝŽŶŵĞĚŝĂŽƌƚƌĂŶƐŵŝƐƐŝŽŶŵĞĚŝĂ͘ŽŵŵƵŶŝĐĂƚŝŽŶ
ŵĞĚŝĂĐĂŶďĞǁŝƌĞůĞƐƐŽƌǁŝƌĞĚ͘tŝƌĞůĞƐƐŵĞĚŝĂŝƐĂůƐŽŬŶŽǁŶĂƐƵŶŐƵŝĚĞĚŵĞĚŝĂǁŚŝůĞǁŝƌĞĚŵĞĚŝĂŝƐ
ĂůƐŽŬŶŽǁŶĂƐŐƵŝĚĞĚŵĞĚŝĂ͘
&ŽůůŽǁŝŶŐĂƌĞƚŚƌĞĞďĂƐŝĐƚLJƉĞƐŽĨĐŽŵŵƵŶŝĐĂƚŝŽŶĐŚĂŶŶĞůƐĂǀĂŝůĂďůĞ͗
;ĂͿ dǁŝƐƚĞĚWĂŝƌĂďůĞƐ ;ďͿ ŽĂdžŝĂůĂďůĞƐ
;ĐͿ &ŝďƌĞͲŽƉƚŝĐĂďůĞƐ
44. ĞĨŝŶĞďĂƵĚ͕ďƉƐĂŶĚƉƐ͘,ŽǁĂƌĞƚŚĞƐĞŝŶƚĞƌůŝŶŬĞĚ͍
Ans. BaudŝƐĂƵŶŝƚŽĨŵĞĂƐƵƌĞŵĞŶƚĨŽƌƚŚĞŝŶĨŽƌŵĂƚŝŽŶͲĐĂƌƌLJŝŶŐĐĂƉĂĐŝƚLJŽĨĂĐŽŵŵƵŶŝĐĂƚŝŽŶĐŚĂŶŶĞů͘
bps (bits per second)ƌĞĨĞƌƐƚŽĂƚŚŽƵƐĂŶĚďŝƚƐƚƌĂŶƐŵŝƚƚĞĚƉĞƌƐĞĐŽŶĚ͘
Bps (Bytes per second)ƌĞĨĞƌƐƚŽĂƚŚŽƵƐĂŶĚďLJƚĞƐƚƌĂŶƐŵŝƚƚĞĚƉĞƌƐĞĐŽŶĚ͘
ůůƚŚĞƐĞƚĞƌŵƐĂƌĞŵĞĂƐƵƌĞŵĞŶƚƵŶŝƚƐƵƐĞĚƚŽƌĞĨĞƌƚŽƚŚĞĂŵŽƵŶƚŽĨŝŶĨŽƌŵĂƚŝŽŶƚƌĂǀĞůůŝŶŐƚŚƌŽƵŐŚĂ
ƐŝŶŐůĞĐŚĂŶŶĞůĂƚĂŶLJŽŶĞƉŽŝŶƚŽĨƚŝŵĞ͘
8.72
45. ŝĨĨĞƌĞŶƚŝĂƚĞďĞƚǁĞĞŶƐƚĂƌƚŽƉŽůŽŐLJĂŶĚďƵƐƚŽƉŽůŽŐLJ͘
Ans. dŚĞŵĂŝŶƉŽŝŶƚƐŽĨĚŝĨĨĞƌĞŶĐĞďĞƚǁĞĞŶƐƚĂƌƚŽƉŽůŽŐLJĂŶĚďƵƐƚŽƉŽůŽŐLJĂƌĞ͗
Star topology Bus topology
ĐĞŶƚƌĂůŚƵďŝƐƌĞƋƵŝƌĞĚƚŽĐŽŶŶĞĐƚĂůůĐŽŵƉƵƚĞƌƐǁŝƚŚ ůŽŶŐĐĂďůĞŬŶŽǁŶĂƐďĂĐŬďŽŶĞŝƐƵƐĞĚƚŽĐŽŶŶĞĐƚĂůů
ĞĂĐŚŽƚŚĞƌ͘ ĐŽŵƉƵƚĞƌƐǁŝƚŚĞĂĐŚŽƚŚĞƌ͘
dŚĞĚĂƚĂŝƐƚƌĂŶƐŵŝƚƚĞĚĨƌŽŵƚŚĞƐĞŶĚĞƌƚŽƚŚĞƌĞĐĞŝǀĞƌ dŚĞĚĂƚĂŝƐƚƌĂŶƐŵŝƚƚĞĚƚŚƌŽƵŐŚĂůŽŶŐĐĂďůĞĨƌŽŵƚŚĞ
ďLJƉĂƐƐŝŶŐƚŚƌŽƵŐŚƚŚĞŚƵď͘ ƐĞŶĚĞƌƚŽƚŚĞƌĞĐĞŝǀĞƌ͘
EŽĐŽůůŝƐŝŽŶƚĂŬĞƐƉůĂĐĞƚŚƌŽƵŐŚƚƌĂŶƐŵŝƐƐŝŽŶŽĨĚĂƚĂ͘ ŽůůŝƐŝŽŶĐĂŶƚĂŬĞƉůĂĐĞĂƐƚŚĞĚĂƚĂĐĂŶďĞƚƌĂŶƐŵŝƚƚĞĚ
ĨƌŽŵďŽƚŚĞŶĚƐĂƚƚŚĞƐĂŵĞƚŝŵĞ͘
/ĨƚŚĞĐĞŶƚƌĂůŚƵďĨĂŝůƐ͕ƚŚĞĞŶƚŝƌĞŶĞƚǁŽƌŬƐŚƵƚƐĚŽǁŶ͘ /ĨƚŚĞƌĞŝƐĂďƌĞĂŬŝŶĂĐĂďůĞ͕ŶŽƚƌĂŶƐŵŝƐƐŝŽŶƚĂŬĞƐƉůĂĐĞ͘
46. ĞĨŝŶĞƚŚĞĨŽůůŽǁŝŶŐƚĞƌŵƐ͗
;ĂͿ Z:Ͳϰϱ ;ďͿ ƚŚĞƌŶĞƚ ;ĐͿ ƚŚĞƌŶĞƚĐĂƌĚ
;ĚͿ ,Ƶď ;ĞͿ ^ǁŝƚĐŚ
Ans. (a) RJ-45:Z:ͲϰϱŝƐĂƐƚĂŶĚĂƌĚƚLJƉĞŽĨĐŽŶŶĞĐƚŽƌĨŽƌŶĞƚǁŽƌŬĐĂďůĞƐĂŶĚŶĞƚǁŽƌŬƐ͘/ƚŝƐĂŶϴͲƉŝŶĐŽŶŶĞĐƚŽƌ
ƵƐƵĂůůLJƵƐĞĚǁŝƚŚƚŚĞƌŶĞƚĐĂďůĞƐ͘
;ďͿ Ethernet:ƚŚĞƌŶĞƚŝƐĂ>EĂƌĐŚŝƚĞĐƚƵƌĞĚĞǀĞůŽƉĞĚďLJyĞƌŽdžŽƌƉ͘ĂůŽŶŐǁŝƚŚĂŶĚ/ŶƚĞů͘/ƚƵƐĞƐ
ĂďƵƐŽƌƐƚĂƌƚŽƉŽůŽŐLJĂŶĚƐƵƉƉŽƌƚƐĚĂƚĂƚƌĂŶƐĨĞƌƌĂƚĞƐŽĨƵƉƚŽϭϬŵďƉƐ͘
;ĐͿ Ethernet card: dŚĞĐŽŵƉƵƚĞƌƉĂƌƚƐŽĨƚŚĞƌŶĞƚĂƌĞĐŽŶŶĞĐƚĞĚƚŚƌŽƵŐŚĂƐƉĞĐŝĂůĐĂƌĚĐĂůůĞĚƚŚĞƌŶĞƚ
ĐĂƌĚ͘/ƚĐŽŶƚĂŝŶƐĐŽŶŶĞĐƚŝŽŶƐĨŽƌĞŝƚŚĞƌĐŽĂdžŝĂůŽƌƚǁŝƐƚĞĚƉĂŝƌĐĂďůĞƐ
(d) Hub: /ŶĐŽŵƉƵƚĞƌŶĞƚǁŽƌŬŝŶŐ͕ĂŚƵďŝƐĂƐŵĂůů͕ƐŝŵƉůĞ͕ůŽǁͲĐŽƐƚĚĞǀŝĐĞƚŚĂƚũŽŝŶƐŵƵůƚŝƉůĞĐŽŵƉƵƚĞƌƐ
together.
(e) Switch: ƐǁŝƚĐŚŝƐĂƐŵĂůůŚĂƌĚǁĂƌĞĚĞǀŝĐĞƚŚĂƚũŽŝŶƐŵƵůƚŝƉůĞĐŽŵƉƵƚĞƌƐƚŽŐĞƚŚĞƌǁŝƚŚŝŶŽŶĞůŽĐĂů
area network (LAN).
47. ĞĨŝŶĞƚŚĞĨŽůůŽǁŝŶŐĚĂƚĂĐŽŵŵƵŶŝĐĂƚŝŶŐĚĞǀŝĐĞƐ͗
;ĂͿ ZĞƉĞĂƚĞƌ ;ďͿ ƌŝĚŐĞ
;ĐͿ ZŽƵƚĞƌ ;ĚͿ 'ĂƚĞǁĂLJ
Ans. (a) Repeater:/ƚŝƐĂĚĞǀŝĐĞƚŚĂƚĂŵƉůŝĨŝĞƐĂŶĚƌĞƐƚŽƌĞƐƚŚĞƐŝŐŶĂůďĞĨŽƌĞŝƚŐĞƚƐĚĞŐƌĂĚĞĚĂŶĚƚƌĂŶƐŵŝƚƐƚŚĞ
ŽƌŝŐŝŶĂůƐŝŐŶĂůďĂĐŬƚŽƚŚĞĚĞƐƚŝŶĂƚŝŽŶ͘ƌĞƉĞĂƚĞƌŝƐĂƌĞŐĞŶĞƌĂƚŽƌĂŶĚŶŽƚĂŶĂŵƉůŝĨŝĞƌ͘
;ďͿ Bridge:ďƌŝĚŐĞŝƐĂĚĞǀŝĐĞĚĞƐŝŐŶĞĚƚŽĐŽŶŶĞĐƚƚǁŽ>EƐĞŐŵĞŶƚƐ͘dŚĞƉƵƌƉŽƐĞŽĨĂďƌŝĚŐĞŝƐƚŽĨŝůƚĞƌ
ƚƌĂĨĨŝĐ ŽŶ Ă >E͘ ƌŝĚŐĞ ƌĞůĂLJƐ ĨƌĂŵĞƐ ďĞƚǁĞĞŶ ƚǁŽ ŽƌŝŐŝŶĂůůLJ ƐĞƉĂƌĂƚĞ ƐĞŐŵĞŶƚƐ͘ tŚĞŶ Ă ĨƌĂŵĞ
ĞŶƚĞƌƐĂďƌŝĚŐĞ͕ƚŚĞďƌŝĚŐĞŶŽƚŽŶůLJƌĞŐĞŶĞƌĂƚĞƐƚŚĞƐŝŐŶĂůďƵƚĂůƐŽĐŚĞĐŬƐƚŚĞƉŚLJƐŝĐĂůĂĚĚƌĞƐƐŽĨ
ƚŚĞĚĞƐƚŝŶĂƚŝŽŶĂŶĚĨŽƌǁĂƌĚƐƚŚĞŶĞǁĐŽƉLJŽŶůLJƚŽƚŚĂƚƉŽƌƚ͘
;ĐͿ Router:ZŽƵƚĞƌƐŽƉĞƌĂƚĞŝŶƚŚĞƉŚLJƐŝĐĂů͕ĚĂƚĂůŝŶŬĂŶĚŶĞƚǁŽƌŬůĂLJĞƌƐŽĨƚŚĞK^/ŵŽĚĞů͘dŚĞLJĚĞĐŝĚĞ
ƚŚĞƉĂƚŚĂƉĂĐŬĞƚƐŚŽƵůĚƚĂŬĞ͘ƌŽƵƚĞƌŝƐĂŶĞƚǁŽƌŬŝŶŐĚĞǀŝĐĞǁŚŽƐĞƐŽĨƚǁĂƌĞĂŶĚŚĂƌĚǁĂƌĞĂƌĞ
ƵƐƵĂůůLJƚĂŝůŽƌĞĚƚŽƚŚĞƚĂƐŬƐŽĨƌŽƵƚŝŶŐĂŶĚĨŽƌǁĂƌĚŝŶŐĚĂƚĂƉĂĐŬĞƚƐĂĐƌŽƐƐŶĞƚǁŽƌŬ͘
(d) Gateway:ŐĂƚĞǁĂLJŽƉĞƌĂƚĞƐŽŶĂůůƚŚĞƐĞǀĞŶůĂLJĞƌƐŽĨK^/ŵŽĚĞů͘ŶĞƚǁŽƌŬŐĂƚĞǁĂLJŝƐĂĐŽŵƉƵƚĞƌ
ǁŚŝĐŚŚĂƐŝŶƚĞƌŶĞƚͲǁŽƌŬŝŶŐĐĂƉĂďŝůŝƚLJŽĨũŽŝŶŝŶŐƚŽŐĞƚŚĞƌƚǁŽŶĞƚǁŽƌŬƐƚŚĂƚƵƐĞĚŝĨĨĞƌĞŶƚďĂƐĞƉƌŽƚŽĐŽůƐ͘
'ĂƚĞǁĂLJĐŽŶǀĞƌƚƐŽŶĞƉƌŽƚŽĐŽůƚŽĂŶŽƚŚĞƌĂŶĚĐĂŶ͕ƚŚĞƌĞĨŽƌĞ͕ĐŽŶŶĞĐƚƚǁŽĚŝƐƐŝŵŝůĂƌŶĞƚǁŽƌŬƐ͘
48. tŚĂƚŝƐ,dD>͍tŚĞƌĞŝƐŝƚƵƐĞĚ͍
Ans. ,dD>;,LJƉĞƌdĞdžƚDĂƌŬƵƉ>ĂŶŐƵĂŐĞͿŝƐƵƐĞĚƚŽĐƌĞĂƚĞ,LJƉĞƌƚĞdžƚĚŽĐƵŵĞŶƚƐ;ǁĞďƉĂŐĞƐͿĨŽƌǁĞďƐŝƚĞƐ͘
,dD>ŝƐƚŚĞƐƚĂƚŝĐŵĂƌŬͲƵƉůĂŶŐƵĂŐĞǁŚŝĐŚŝƐƵƐĞĚĨŽƌƚŚĞĨŽůůŽǁŝŶŐƉƵƌƉŽƐĞƐ͗
ͻ /ƚŝƐƵƐĞĚƚŽĐƌĞĂƚĞǁĞďƉĂŐĞƐ͘
ͻ /ƚƚĞůůƐƚŚĞďƌŽǁƐĞƌŚŽǁƚŽĚŝƐƉůĂLJƚĞdžƚ͕ƉŝĐƚƵƌĞƐĂŶĚŽƚŚĞƌƐƵƉƉŽƌƚŵĞĚŝĂ͘
ͻ /ƚƐƵƉƉŽƌƚƐŵƵůƚŝŵĞĚŝĂĂŶĚŶĞǁƉĂŐĞůĂLJŽƵƚĨĞĂƚƵƌĞƐ͘
ͻ /ƚƉƌŽǀŝĚĞƐŵĂŶLJƚĂŐƐĨŽƌĐŽŶƚƌŽůůŝŶŐƚŚĞƉƌĞƐĞŶƚĂƚŝŽŶŽĨŝŶĨŽƌŵĂƚŝŽŶŽŶƚŚĞǁĞďƉĂŐĞƐ͕ƐƵĐŚĂƐ͗
фKzх͕ф>/х͕ф,Zх͕ĞƚĐ͘
49. ĞĨŝŶĞ'^D͕DĂŶĚt>>͘
Computer Networks
Ans. GSM:'ůŽďĂůƐLJƐƚĞŵĨŽƌŵŽďŝůĞĐŽŵŵƵŶŝĐĂƚŝŽŶ;'^DͿŝƐĂǁŝĚĞĂƌĞĂǁŝƌĞůĞƐƐĐŽŵŵƵŶŝĐĂƚŝŽŶƐƐLJƐƚĞŵƚŚĂƚ
ƵƐĞƐ ĚŝŐŝƚĂů ƌĂĚŝŽ ƚƌĂŶƐŵŝƐƐŝŽŶ ƚŽ ƉƌŽǀŝĚĞ ǀŽŝĐĞ ĚĂƚĂ ĂŶĚ ŵƵůƚŝŵĞĚŝĂ ĐŽŵŵƵŶŝĐĂƚŝŽŶ ƐĞƌǀŝĐĞƐ͘ '^D
ƐLJƐƚĞŵĐŽŽƌĚŝŶĂƚĞƐƚŚĞĐŽŵŵƵŶŝĐĂƚŝŽŶďĞƚǁĞĞŶŵŽďŝůĞƚĞůĞƉŚŽŶĞƐ͕ďĂƐĞƐƚĂƚŝŽŶƐĂŶĚƐǁŝƚĐŚŝŶŐƐLJƐƚĞŵƐ͘
CDMA:ŽĚĞŝǀŝƐŝŽŶDƵůƚŝƉůĞĐĐĞƐƐ;DͿŝƐĂĚŝŐŝƚĂůǁŝƌĞůĞƐƐƚĞůĞƉŚŽŶLJƚƌĂŶƐŵŝƐƐŝŽŶƚĞĐŚŶŝƋƵĞǁŚŝĐŚ
ĂůůŽǁƐŵƵůƚŝƉůĞĨƌĞƋƵĞŶĐŝĞƐƚŽďĞƵƐĞĚƐŝŵƵůƚĂŶĞŽƵƐůLJͶ^ƉƌĞĂĚ^ƉĞĐƚƌƵŵ͘
WLL:tŝƌĞůĞƐƐŝŶ>ŽĐĂů>ŽŽƉ;t>>ͿŝƐĂƐLJƐƚĞŵƚŚĂƚĐŽŶŶĞĐƚƐƚŚĞƐƵďƐĐƌŝďĞƌƚŽƚŚĞƉƵďůŝĐƐǁŝƚĐŚĞĚƚĞůĞƉŚŽŶĞ
ŶĞƚǁŽƌŬ;W^dEͿƵƐŝŶŐƌĂĚŝŽƐŝŐŶĂůƐĂƐĂůƚĞƌŶĂƚŝǀĞƚŽŽƚŚĞƌĐŽŶŶĞĐƚŝŶŐŵĞĚŝĂ͘
8.73
UNSOLVED QUESTIONS
1. tŚĂƚŝƐŝŶƚĞƌŶĞƚ͍
2. tŚĂƚŝƐŶĞƚǁŽƌŬ͍
3. tŚĂƚĂƌĞƚŚĞǀĂƌŝŽƵƐƚLJƉĞƐŽĨƚŽƉŽůŽŐŝĞƐ͍
4. ĞƐĐƌŝďĞďƵƐƚŽƉŽůŽŐLJĂŶĚƐƚĂƌƚŽƉŽůŽŐLJ͘
5. ĞĨŝŶĞƚŚĞĨŽůůŽǁŝŶŐƚĞƌŵƐ͗
;ĂͿ ĂƵĚ ;ďͿ ŽŵŵƵŶŝĐĂƚŝŽŶĐŚĂŶŶĞů
;ĐͿ ,ƵďƐ ;ĚͿ ZĞƉĞĂƚĞƌƐ
6. ĞĨŝŶĞ'^DĂŶĚ'WZ^ǁŝƌĞůĞƐƐĐŽŵŵƵŶŝĐĂƚŝŽŶƐLJƐƚĞŵ͘
7. tŚĂƚŝƐŵŽĚĞŵ͍ĞĨŝŶĞƚŚĞĨƵŶĐƚŝŽŶŝŶŐŽĨŝŶƚĞƌŶĂůŵŽĚĞŵĂŶĚĞdžƚĞƌŶĂůŵŽĚĞŵ͘
8. džƉĂŶĚĂŶĚĞdžƉůĂŝŶƚŚĞĨŽůůŽǁŝŶŐƚĞƌŵƐ͗
;ĂͿ WWW ;ďͿ WKWϯ
;ĐͿ sŽ/W ;ĚͿ /Z
9. tŚĂƚŝƐƚŚĞƐŝŐŶŝĨŝĐĂŶĐĞŽĨĐLJďĞƌůĂǁ͍
10. ĞƐĐƌŝďĞƚŚĞĨŽůůŽǁŝŶŐŶĞƚǁŽƌŬŝŶŐĚĞǀŝĐĞƐ͗
;ĂͿ ,ƵďƐ ;ďͿ ZĞƉĞĂƚĞƌƐ ;ĐͿ ZŽƵƚĞƌƐ
;ĚͿ ƌŝĚŐĞƐ ;ĞͿ 'ĂƚĞǁĂLJƐ
11. tŚĂƚĂƌĞtŝͲ&ŝĐĂƌĚƐ͍džƉůĂŝŶ͘
12. tŚĂƚŝƐƚŚĞƐŝŐŶŝĨŝĐĂŶĐĞŽĨƵƐŝŶŐĨŝƌĞǁĂůůƐĂŶĚĂƵƚŚĞŶƚŝĐĂƚŝŽŶ͍
13. tŚĂƚŝƐĂĐŽŵŵƵŶŝĐĂƚŝŽŶƉƌŽƚŽĐŽů͍tŚĂƚŝƐŝƚƐƌŽůĞŝŶŶĞƚǁŽƌŬŝŶŐ͍
14. tŚĂƚŝƐŚƚƚƉƐ͍,ŽǁĚŽĞƐŝƚǁŽƌŬ͍
15. tŚĂƚŝƐƚŚĞƌŶĞƚ͍tŚĂƚŝƐƚŚĞƌŶĞƚĂƌĚ͍
16. tŚĂƚĂƌĞŚƵďƐ͍,ŽǁĂƌĞĂĐƚŝǀĞŚƵďƐĚŝĨĨĞƌĞŶƚĨƌŽŵƉĂƐƐŝǀĞŚƵďƐ͍
17. tŚĂƚĂƌĞƚŚĞĨĂĐŝůŝƚŝĞƐƉƌŽǀŝĚĞĚďLJƚŚĞ^ĞƌǀĞƌŝŶĂŶĞƚǁŽƌŬĞŶǀŝƌŽŶŵĞŶƚ͍
18. tŚŝĐŚĐŽŵŵƵŶŝĐĂƚŝŽŶŵĞĚŝƵŵŝƐƚŽďĞƐƵŐŐĞƐƚĞĚĨŽƌǀĞƌLJĞĨĨĞĐƚŝǀĞĂŶĚĨĂƐƚĐŽŵŵƵŶŝĐĂƚŝŽŶŝŶŐƵŝĚĞĚ
ŵĞĚŝƵŵ͍
19. /ŶĂŚĂƌƐŚŝŶĚƵƐƚƌŝĂůĞŶǀŝƌŽŶŵĞŶƚ͕ǁŚŝĐŚĐĂďůĞǁŽƵůĚLJŽƵůŝŬĞƚŽƵƐĞ͍
20. tŚŝĐŚŵĞĚŝĂŚĂǀĞƚŚĞĂďŝůŝƚLJƚŽĐŽŵŵƵŶŝĐĂƚĞŽǀĞƌŽĐĞĂŶƐ͍
21. tŚĂƚŝƐƚŚĞĚŝĨĨĞƌĞŶĐĞďĞƚǁĞĞŶŵŝĐƌŽǁĂǀĞĂŶĚƌĂĚŝŽǁĂǀĞƚƌĂŶƐŵŝƐƐŝŽŶ͍
22. tŚŝĐŚƚƌĂŶƐŵŝƐƐŝŽŶŵĞĚŝƵŵŝƐƵƐĞĨƵůĨŽƌƐƉĂƌƐĞůLJƉŽƉƵůĂƚĞĚĂƌĞĂƐ͍
23. tŚŝĐŚŶĞƚǁŽƌŬŝƐĞĂƐLJƚŽĞdžƉĂŶĚ͍
24. tŚŝĐŚĚĞǀŝĐĞĨŝůƚĞƌƐƚŚĞĚĂƚĂĂŶĚǁŚŝĐŚĚĞǀŝĐĞĐĂŶŚĂŶĚůĞĚŝĨĨĞƌĞŶƚƉƌŽƚŽĐŽů͍
25. tŚĂƚŝƐĂŶĞƚǁŽƌŬ͍tŚĂƚĂƌĞŝƚƐŐŽĂůƐĂŶĚĂƉƉůŝĐĂƚŝŽŶƐ͍
Supplement – Computer Science with Python–XII
26. tƌŝƚĞƐŽŵĞĂĚǀĂŶƚĂŐĞƐĂŶĚĚŝƐĂĚǀĂŶƚĂŐĞƐŽĨƚŚĞĨŽůůŽǁŝŶŐ͗
;ĂͿ KƉƚŝĐĂůĨŝďƌĞƐ ;ďͿ ŽĂdžŝĂůĐĂďůĞƐ ;ĐͿ dǁŝƐƚĞĚƉĂŝƌĐĂďůĞƐ
;ĚͿ ZĂĚŝŽǁĂǀĞƐ ;ĞͿ DŝĐƌŽǁĂǀĞƐ ;ĨͿ ^ĂƚĞůůŝƚĞƐ
27. džƉůĂŝŶƚŚĞƌŽůĞŽĨ,ddWƉƌŽƚŽĐŽů͘
28. ĞĨŝŶĞĞŵĂŝů͘
29. tŚĂƚĚŽLJŽƵƵŶĚĞƌƐƚĂŶĚďLJĚĂƚĂƚƌĂŶƐĨĞƌƌĂƚĞƐ͍
30. tŚĂƚĂƌĞŚƵďƐ͍tŚĂƚĂƌĞŝƚƐƚLJƉĞƐ͍
31. tŚĂƚŝƐƚŚĞƌŽůĞŽĨĂƐǁŝƚĐŚŝŶĂŶĞƚǁŽƌŬ͍
32. ƌŝĞĨůLJĚŝƐĐƵƐƐƚŚĞƌŽůĞŽĨƚŚĞĨŽůůŽǁŝŶŐĚĞǀŝĐĞƐŝŶƚŚĞĐŽŶƚĞdžƚŽĨŶĞƚǁŽƌŬŝŶŐ͗
;ĂͿ ZĞƉĞĂƚĞƌ ;ďͿ ZŽƵƚĞƌ
;ĐͿ ƌŝĚŐĞ ;ĚͿ 'ĂƚĞǁĂLJ
33. džƉůĂŝŶďƌŝĞĨůLJ͗
;ĂͿ ,ddW ;ďͿ dWͬ/W ;ĐͿ &dW
34. tŚĂƚŝƐĐŽŵƉƵƚŝŶŐ͍,ŽǁŝƐŝƚĚŝĨĨĞƌĞŶƚĨƌŽŵŵŽďŝůĞĐŽŵƉƵƚŝŶŐ͍
35. tŚĞŶ ǁŽƵůĚ LJŽƵ ƉƌĞĨĞƌ ;ŝͿ ŚƵďƐ ŽǀĞƌ ƌĞƉĞĂƚĞƌƐ͕ ;ŝŝͿ ďƌŝĚŐĞƐ ŽǀĞƌ ŚƵďƐ͕ ĂŶĚ ;ŝŝŝͿ ƐǁŝƚĐŚĞƐ ŽǀĞƌ ŽƚŚĞƌ
ŶĞƚǁŽƌŬŝŶŐĚĞǀŝĐĞƐ͍
8.74