The document provides an overview of key networking protocols, including TCP/IP, FTP, SMTP, and HTTP, along with their functions. It includes exercises for review, such as filling in blanks and answering questions about cloud services and email protocols. Additionally, it distinguishes between public and private clouds in terms of accessibility and security.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
28 views2 pages
Class 8 CHPT 9
The document provides an overview of key networking protocols, including TCP/IP, FTP, SMTP, and HTTP, along with their functions. It includes exercises for review, such as filling in blanks and answering questions about cloud services and email protocols. Additionally, it distinguishes between public and private clouds in terms of accessibility and security.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2
Answer Key
Chapter 9: More on Computer Networks
Let’s Review (Pg. 136)
Expand the following terms and write their description. 1. Transmission Control Protocol/Internet Protocol Description: TCP is responsible for data transmission and breaks down the data to be sent over the internet into small packets. The IP component routes the packets to the specified IP address, which is its destination. 2. File Transfer Protocol Description: It is used to communicate and transfer files between the computers on a network, such as the internet. 3. Simple Mail Transfer Protocol Description: It is used to transfer emails between two or more servers. 4. Hypertext Transfer Protocol Description: It is a set of protocols that allow users to access data on the World Wide Web.
Exercises (Pgs. 145–147)
A. Tick (✓) the correct answers. 1. c. 2. a. 3. b. 4. c. 5. c. B. Fill in the blanks. 1. Tim Berners-Lee 2. IMAP 3. Cloud storage 4. Google 5. 15 GB C. Write ‘T’ for True and ‘F’ for False. 1. T 2. T 3. F 4. F 5. T D. Answer the following questions. 1. Google Photos and Google Drive 2. The four networking protocols are: ³ HTTP (Hypertext Transfer Protocol) ³ FTP (File Transfer Protocol) ³ SMTP (Simple Mail Transfer Protocol) ³ TCP/IP (Transmission Control Protocol/Internet Protocol) 3. The integration of a set of hardware, networks, storage, interfaces, and services to deliver different aspects of computing as a service over a network is known as cloud. 4. a. FTP (File Transfer Protocol) is used to communicate and transfer files between the computers on a network, such as the internet. FTP uses a secure method to transfer files. ³ The FT client checks the authentication of the users by asking them to login and create their account. ³ After authentication, files can be uploaded or downloaded from the client to the server or vice versa. b. HTTP (Hypertext Transfer Protocol) is a set of protocols that allow users to access data on the World Wide Web. HTTP can be used to transfer data in the form of text, hypertext, audio, video, and so on. When data communication starts, the client uses a web browser, such as Google Chrome or Microsoft Edge, to initiate the request through HTTP protocol and sends it to a web server. The web server receives the request and processes it. The web server then sends the response back to the client through HTTP. c. SMTP (Simple Mail Transfer Protocol) is used to transfer emails between two or more servers. The main purpose of SMTP is to set up communication rules between the servers. 5. a. POP3 (Post Office Protocol 3) is the most recent version of POP. It is a protocol used to download emails from the email server to the client computer. As soon as the email is downloaded, this protocol deletes the email from the server. IMAP (Internet Message Access Protocol) is also used to download emails from the server to the client computer. But unlike POP, it does not delete the emails from the server after they have been downloaded. For saving the emails, it uses more server resources, such as disk space and CPU time, than POP. b. In a public cloud, the service providers use the internet to make the services available to everyone. Any user can access the services of a public cloud. The services include the hardware (such as storage on servers) and software provided by the cloud. As a public cloud is accessible to everyone, it is less secure. A private cloud is accessible only within an organisation. Everyone cannot access services of a private cloud. Because of this, it is more secure than a public cloud. It is also costlier than a public cloud. Therefore, it is mainly used by large companies.