Académique Documents
Professionnel Documents
Culture Documents
Q.1
1. What is a Computer?
Rom:- Read only memory .It is non volatile memory. It only reads. It is
semi conductor memory.
Application of IT:-
Speed:-
Bandwidth:- The data transfer capacity of a network. It is measured in bits per second.
Primary memory
Input Output
ALU unit
Control
1. Input device
2. Central processing unit
3. Output device
4. Secondary storage device
Q.4 eg: mouse, light pen, keyboard, punched card reader, optical
character reader,optical bar code scanner, optical mark reader,digitizer.
4. secondary storage device is a hard disc which storage the output from
the ALU unit.
60:- 111100
Eg:89 bit
Byte:-
Nibbles:-
Eg: 4 bit
network to another.
dissimilar.
e) Switches:
Booting of computer:-
4. margins and gutters are one and the same in word. (f)
7. you cannot hide rows and columns with the help of mouse in excel.
(f)
Q.3
A) DIAL UP CONNECTION
B) ISDN
C) DSL
D) CABLE MODEM
E) LEASED LINES
F) FRAME POLICY
G) Optical fiber
2. Explain the advantages of leased line for internet ?
3. http://www.yahoo.com/index.html
5.Write the names of seven layers of OSI . routers and bridges are
used on which layers of OSI?
Layer, application
layer.
Routers and Bridges are used on network layer and data link layer
respectively.
In cryptography?
Cryptography.
A message that human can read is called plain text or clear text.
The process of disguising a message take it unreadable by human is
called encryption and the resulting message is called cipher text. The
reverse process called discryption, take and encrypted message/cipher
text and restore it to the original plain text.
q.4
1. What is a VPN?
Virtual private network can reduce the security risk and provide a
more efficient use of internet connection. A group of 2 or more computer
system that communicate privately over a public network (internet). A vpn
create a feel of a private network by running over a shared network. Using
a technique lnown as tunnelling, a vpn stimulate leasing line all other
point to point connection across the public routed network. Data in a vpn
tunnel remains private bcz. It is incrypted.
Use
Vpn concepts
5.VPN protocols?
Vpn protocols:-
4 L TO F – LAYER TO FORWARDING
2 routers/switches
Q.5
1. What are different technologies used for Internet Connectivity?
larger.
c) More installation.
Frame relay:- when u used a leased line, u need to pay for full amount
of bandwidth at a all time even when you are not using it, In frame relay
you need to install a lease line between client site and ISP but unable to
pay only for the bandwidth you use. Here you need not pay to telephone
company and telephone line but ISP charges are minimise as you are not
paying for the time when you are not accessing the internet.
Web server:- Web pages you are reading, found its way into your
Browser on your computer screen. This process largely depend on Web
site byy either clicking on a hyperlink that bring them that side or lAying
the site URL directly into the address bar of a business.
Q.6
1. What is e commerce ?
Application of e - commerce :-
a) Business to business
b) Business to consumer
c) Consumer to consumer
d) Consumer to business
Advantages of e commerce:-
Q.7
Full duplex:- Full duplex transmission works like traffic on a busy two way street the flow
moves in two directions at the same time. Full-duplexing is ideal for hardware units that need to pass
large amounts of data between each other as in mainframe-to-mainframe communications. Full
duplex transmision is a two way transmission
Communication media:-
1. Coaxil cable.
3. Fibre optics
4. Wireless
5. Satellite system
6. Microwave system
4. What is a firewall?
Q.8
1. What is Wi-Fi ?
Wi-Fi:- A wireless network uses radio waves, just like cell phones, televisions and radios do. In
fact, communication across a wireless network is a lot like two-way radio communication. Here's what
happens:
1. A computer's wireless adapter translates data into a radio signal and transmits it using
an antenna.
2. A wireless router receives the signal and decodes it. The router sends the information to
the Internet using a physical, wired Ethernet connection.
The process also works in reverse, with the router receiving information from the Internet, translating it
into a radio signal and sending it to the computer's wireless adapter.
The radios used for WiFi communication are very similar to the radios used for walkie-talkies, cell
phones and other devices. They can transmit and receive radio waves, and they can convert 1s and
0s into radio waves and convert the radio waves back into 1s and 0s
8. What is a Protocol ?
Types of hub:-
A) Passive hub
b) Active hub
c) Hybrid hub