0% found this document useful (0 votes)
28 views2 pages

Class 8 CHPT 9

The document provides an overview of key networking protocols, including TCP/IP, FTP, SMTP, and HTTP, along with their functions. It includes exercises for review, such as filling in blanks and answering questions about cloud services and email protocols. Additionally, it distinguishes between public and private clouds in terms of accessibility and security.

Uploaded by

luliasaatvik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views2 pages

Class 8 CHPT 9

The document provides an overview of key networking protocols, including TCP/IP, FTP, SMTP, and HTTP, along with their functions. It includes exercises for review, such as filling in blanks and answering questions about cloud services and email protocols. Additionally, it distinguishes between public and private clouds in terms of accessibility and security.

Uploaded by

luliasaatvik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Answer Key

Chapter 9: More on Computer Networks

Let’s Review (Pg. 136)


Expand the following terms and write their description.
1. Transmission Control Protocol/Internet Protocol
Description: TCP is responsible for data transmission and breaks down the data to be sent over
the internet into small packets. The IP component routes the packets to the specified IP address,
which is its destination.
2. File Transfer Protocol
Description: It is used to communicate and transfer files between the computers on a network,
such as the internet.
3. Simple Mail Transfer Protocol
Description: It is used to transfer emails between two or more servers.
4. Hypertext Transfer Protocol
Description: It is a set of protocols that allow users to access data on the World Wide Web.

Exercises (Pgs. 145–147)


A. Tick (✓) the correct answers.
1. c.
2. a.
3. b.
4. c.
5. c.
B. Fill in the blanks.
1. Tim Berners-Lee
2. IMAP
3. Cloud storage
4. Google
5. 15 GB
C. Write ‘T’ for True and ‘F’ for False.
1. T 2. T 3. F 4. F 5. T
D. Answer the following questions.
1. Google Photos and Google Drive 2. The four networking protocols are:
³ HTTP (Hypertext Transfer Protocol)
³ FTP (File Transfer Protocol)
³ SMTP (Simple Mail Transfer Protocol)
³ TCP/IP (Transmission Control Protocol/Internet Protocol)
3. The integration of a set of hardware, networks, storage, interfaces, and services to deliver
different aspects of computing as a service over a network is known as cloud.
4. a. FTP (File Transfer Protocol) is used to communicate and transfer files between the
computers on a network, such as the internet. FTP uses a secure method to transfer files.
³ The FT client checks the authentication of the users by asking them to login and create
their account.
³ After authentication, files can be uploaded or downloaded from the client to the
server or vice versa.
b. HTTP (Hypertext Transfer Protocol) is a set of protocols that allow users to access data on the
World Wide Web. HTTP can be used to transfer data in the form of text, hypertext, audio,
video, and so on. When data communication starts, the client uses a web browser, such as
Google Chrome or Microsoft Edge, to initiate the request through HTTP protocol and sends it
to a web server. The web server receives the request and processes it. The web server then
sends the response back to the client through HTTP.
c. SMTP (Simple Mail Transfer Protocol) is used to transfer emails between two or more servers.
The main purpose of SMTP is to set up communication rules between the servers.
5. a. POP3 (Post Office Protocol 3) is the most recent version of POP. It is a protocol used to
download emails from the email server to the client computer. As soon as the email is
downloaded, this protocol deletes the email from the server.
IMAP (Internet Message Access Protocol) is also used to download emails from the server
to the client computer. But unlike POP, it does not delete the emails from the server after
they have been downloaded. For saving the emails, it uses more server resources, such as
disk space and CPU time, than POP.
b. In a public cloud, the service providers use the internet to make the services available to
everyone. Any user can access the services of a public cloud. The services include the
hardware (such as storage on servers) and software provided by the cloud. As a public cloud is
accessible to everyone, it is less secure.
A private cloud is accessible only within an organisation. Everyone cannot access services of
a private cloud. Because of this, it is more secure than a public cloud. It is also costlier than
a
public cloud. Therefore, it is mainly used by large companies.

You might also like