0% found this document useful (0 votes)
10 views36 pages

Computer Networks Part-5

The document contains a series of questions and answers related to computer networks, operating systems, and database management. It covers topics such as transmission control protocol, transport layer protocols, network topologies, and emerging trends in technology. Additionally, it includes sections on society, law, ethics, and digital footprints, emphasizing data protection and cyber safety.

Uploaded by

Jyothi S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views36 pages

Computer Networks Part-5

The document contains a series of questions and answers related to computer networks, operating systems, and database management. It covers topics such as transmission control protocol, transport layer protocols, network topologies, and emerging trends in technology. Additionally, it includes sections on society, law, ethics, and digital footprints, emphasizing data protection and cyber safety.

Uploaded by

Jyothi S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 36

Q.

Transmission control protocol ___________

(a) is a connection-oriented protocol


(b) uses a three way handshake to establish a connection
(c) receives data from application as a single stream
(d) all of the mentioned
Q. Transport layer protocols deals with ____________

(a) application to application communication


(b) process to process communication
(c) node to node communication
(d) man to man communication
Q. Physical or logical arrangement of network is __________

(a) Topology
(b) Routing
(c) Networking
(d) Control
Q. The sharing of a medium and its link by two or more devices
is called _________

(a) Fully duplexing


(b) Multiplexing
(c) Microplexing
(d) Duplexing
Q. With respect to physical media, STP cables stands for
_________

a) Shielded Twisted Pair Cable


b) Spanning Tree Protocol Cable
c) Static Transport Protocol Cable
d) Shielded Two Power Cable
Q. What is the max data transfer rate for optical fiber cable?

a) 10 Mbps
b) 100 Mbps
c) 1000 Mbps
d) 10000 Mbps
Q. The attacker using a network of compromised devices is
known as _____________

a) Internet
b) Botnet
c) Telnet
d) D-net
Q. Which of this is not a guided media?

a) Fiber optical cable


b) Coaxial cable
c) Wireless LAN
d) Copper wire
Q. To deliver a message to the correct application program
running on a host, the _______ address must be consulted.

a) IP
b) MAC
c) Port
d) None of the mentioned
Q. Electronic mail uses which Application layer protocol?

a) SMTP
b) HTTP
c) FTP
d) SIP
Q. The ____________ translates internet domain and host
names to IP address.

a) domain name system


b) routing information protocol
c) network time protocol
d) internet relay chat
Q. Which one of the following is not correct?

a) IP is an application layer protocol


b) HTTP is a session layer protocol
c) TCP is an application layer protocol
d) All of the mentioned
Q. In FTP protocol, client contacts server using ____ as the
transport protocol.

a) transmission control protocol


b) user datagram protocol
c) datagram congestion control protocol
d) stream control transmission protocol
Q. SMTP uses which of the following TCP port?

a) 22
b) 23
c) 21
d) 25
Q. Which of the following is false with respect to UDP?

a) Connection-oriented
b) Unreliable
c) Transport layer protocol
d) Low overhead
Q. Network layer firewall works as a __________

a) Frame filter
b) Packet filter
c) Content filter
d) Virus filter
Q. MAC address is of ___________

a) 24 bits
b) 36 bits
c) 42 bits
d) 48 bits
Q. Which connector does the STP cable use?

a) BNC
b) RJ-11
c) RJ-45
d) RJ-69
Q. The packet of information at the application layer is called
__________

a) Packet
b) Message
c) Segment
d) Frame
Get the PDF of this lecture
on telegram.
COMPUTER SYSTEMS AND ORGANISATION

➢ Basic Computer Organisation: Introduction to computer


system, hardware, software,input device, output device,
CPU, memory (primary, cache and secondary), units of
memory (Bit, Byte, KB, MB, GB, TB, PB)

➢ Types of software: system software (operating systems,


system utilities, device drivers), programming tools and
language translators (assembler, compiler &
interpreter),application software
COMPUTER SYSTEMS AND ORGANISATION

➢ Operating system (OS): functions of operating system, OS


user interface
➢ Boolean logic: NOT, AND, OR, NAND, NOR, XOR, truth
table, De Morgan’s laws and logic circuits
➢ Number system: Binary, Octal, Decimal and Hexadecimal
number system; conversion between number systems.
➢ Encoding schemes: ASCII, ISCII and UNICODE (UTF8,
UTF32)
SOCIETY, LAW AND ETHICS

➢ Digital Footprints Digital society and Netizen: net etiquettes,


communication etiquettes, social media etiquettes
➢ Data protection: Intellectual Property Right (copyright,
patent, trademark), violation of IPR (plagiarism, copyright
infringement, trademark infringement), open source
software's and licensing (Creative Commons, GPL and
Apache)
➢ Cyber-crime: definition, hacking, eavesdropping, phishing
and fraud emails, ransomware, preventing cyber crime
➢ Cyber safety: safely browsing the web, identity protection,
confidentiality, cyber trolls and bullying.
SOCIETY, LAW AND ETHICS

➢ E-waste management: proper disposal of used electronic


gadgets
➢ Indian Information Technology Act (IT Act)
➢ Technology & Society: Gender and disability issues while
teaching and using computers
COMPUTER NETWORKS

➢ Evolution of networking: introduction to computer


networks, evolution of networking (ARPANET, NSFNET,
INTERNET)
➢ Data communication terminologies: concept of
communication, components of data communication (sender,
receiver, message, communication media, protocols),
measuring capacity of communication media (bandwidth,
data transfer rate), IP address, switching techniques (Circuit
switching, Packet switching)
COMPUTER NETWORKS

➢ Transmission media: Wired communication media (Twisted


pair cable, Co-axial cable, Fiber- optic cable), Wireless
media (Radio waves, Micro waves, Infrared waves)
➢ Network devices (Modem, Ethernet card, RJ45, Repeater,
Hub, Switch, Router, Gateway, WIFI card).
➢ Network topologies and Network types: types of networks
(PAN, LAN, MAN, WAN), networking topologies (Bus, Star,
Tree)
➢ Network protocol: HTTP, FTP, PPP, SMTP, TCP/IP, POP3,
HTTPS, TELNET, VoIP, wireless/mobile communication
protocol such as GSM, GPRS and WLL
COMPUTER NETWORKS

➢ Introduction to web services: WWW, Hyper Text Markup


Language (HTML), Extensible Markup Language (XML),
domain names, URL, website, web browser, web servers,
web hosting.
DATABASE MANAGEMENT

➢ Database concepts: introduction to database concepts and its


need
➢ Relational data model: relation, attribute, tuple, domain,
degree, cardinality, keys (candidate key, primary key,
alternate key, foreign key)
➢ Structured Query Language: introduction, Data Definition
Language and Data Manipulation Language, data type
(char(n), varchar(n), int, float, date), constraints (not null,
unique, primary key), create database, use database, show
databases, drop database, show tables, create table, describe
table, alter table.
DATABASE MANAGEMENT

➢ drop table, insert, delete, select, operators(mathematical,


relational and logical), aliasing, distinct clause, where clause,
in,between, order by, meaning of null, is null, is not null, like,
update command, delete command, aggregate functions
(max, min, avg, sum, count), groupby, having clause, joins:
cartesian product on two tables, equi-join and natural join

➢ Interface of python with an SQL database: connecting SQL


with Python, performing insert, update, delete queries using
cursor, display data by using fetchone(), fetchall(), rowcount,
creating database connectivity applications.
EMERGING TRENDS

➢ Artificial Intelligence, Machine Learning, Natural Language


Processing, Immersive experience (AR, VR), Robotics, Big
data and its characteristics, Internet of Things (IoT),
Sensors, Smart cities, Cloud Computing and Cloud Services
(SaaS, IaaS, PaaS); Grid Computing, Block chain
technology.

https://emrs.tribal.gov.in/showfile.php?lang=1&level=1&ls_id=
156&lid=116
Target Abhi Mobile App

@teachersaddabytargetabhi

You might also like