Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Students can Download Computer Applications Chapter 11 Network Examples and Protocols Questions and Answers, Notes Pdf, Samacheer Kalvi 12th Computer Applications Book Solutions Guide Pdf helps you to revise the complete Tamilnadu State Board New Syllabus and score more marks in your examinations.

Tamilnadu Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Samacheer Kalvi 12th Computer Applications Network Examples and Protocols Text Book Back Questions and Answers

Part – I

I. Choose The Correct Answer

Question 1.
The ……………………… “the Net,” is a worldwide system of computer networks
(a) Internet
(b) mobile
(c) communication
(d) protocol
Answer:
(a) Internet

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 2.
Which one of the following will be easy the way to uses Internet technology and the public telecommunication system to securely share business’s information with suppliers, vendors, partners and customers.
(a) Extranet
(b) Intranet
(c) arpanet
(d) arcnet
Answer:
(a) Extranet

Question 3.
Match the following and choose the correct Answer:wer
(i) HTTP -The core protocol of the World Wide Web.
(ii) FTP- enables a client to send and receive complete files from a server.
(iii) SMTP – Provide e-mail services.
(iv) DNS- Refer to other host computers by using names rather than numbers.
(a) (i), (ii), (iii), (iv)
(b) (ii), (iii), (iv), (i)
(c) (iii), (iv), (i), (ii)
(d) (iv), (iii), (ii), (i)
Answer:
(a) (i), (ii), (iii), (iv)

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 4.
Communication over …………………………… is be made up of voice, data, images and text messages.
(a) Social media
(b) mobile network
(c) Whatsapp
(d) software
Answer:
(b) mobile network

Question 5.
Wi-Fi stands for ……………………………
(a) Wireless Fidelity
(b) wired fidelity
(c) wired optic fibre
(d) wireless optic fibre
Answer:
(a) Wireless Fidelity

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 6.
A TCP/IP network with access restricted to members of an organization
(a) LAN
(b) MAN
(c) WAN
(d) Intranet
Answer:
(d) Intranet

Question 7.
RFID stands for …………………………
(a) Radio Free identification
(b) real Frequency identity
(c) Radio Frequency indicators
(d) Radio Frequency Identification.
Answer:
(d) Radio Frequency Identification.

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 8.
It guarantees the sending of data is successful and which checks error on operation at OSI layer is ………………………………
(a) Application layer
(b) Network layer
(c) Transport Layer
(d) Physical layer
Answer:
(c) Transport Layer

Question 9.
Which one of the following will secure data on transfer missions?
(a) HTTPS
(b) HTTP
(c) FTP
(d) SMTP
Answer:
(a) HTTPS

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 10.
………………………… provides e-mail service.
(a) DNS
(b) TCP
(c) FTP
(d) SMTP
Answer:
(d) SMTP

Question 11.
………………………… refer to other host computers by using names rather than numbers.
(a) DNS
(b) TCP
(c) FTP
(d) SMTP
Answer:
(a) DNS

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 12.
TCP/IP is a combination of two protocols:
(i) TrAnswer:mission Control Protocol (TCP)
(ii) Internet Protocol (IP)
(iii) Selection Protocol (SP)
(iv) Captial Protocol (CP)
(a) (i), (ii)
(b) (i), (iii)
(c) (iii), (iv)
(d) (ii), (iii)
Answer:
(a) (i), (ii)

PART – II
II. Short Answer

Question 1.
Define Intranet?
Answer:
Intranet:

  • An intranet is a private network within an enterprise to share company data and computing resources between the employees,
  • It may consist of many interlinked local area networks.

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 2.
What is the uses of mobile networks?
Answer:
The common application of mobile networks is mobile phones, tablets, etc.. In past, wireless communications largely used circuit switching to carry only voice over a network, but now currently both data and voice are being transmitted over both circuit via switched networks and packet-switched networks.

Question 3.
List out the benefits of WiFi.
Answer:

  1. It provides mobility.
  2. It provides a connection to the Internet.
  3. The flexibility of LAN.
  4. Ensures connectivity.

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 4.
How many types of RFID Systems available and what are they?
Answer:
Two types of RFID Systems:

  1. Active RFID system: the tag has its own power source. These systems used for larger distances and to track high-value goods like vehicles.
  2. Passive RFID system: the tag gets power through power from a reader antenna to the tag antenna. They are used for shorter-range transmission.

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 5.
Expand HTTP, HTTPS, FTP?
Answer:

  1. HTTP – Hypertext Transfer Protocol
  2. HTTPS – Hypertext Transfer Protocol Secure
  3. FTP – File Transfer Protocol

PART – III
III. Explain in Brief Answer

Question 1.
Compare Internet, Intranet and Extranet?
Answer:
Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 2.
List out the components of an RFID-enabled system?
Answer:
Main Components of an RFID System

  1. An RFID tag: It has a silicon microchip attached to a small antenna and mounted on a substrate.
  2. A reader: It has a scanner with antennas to transmit and receive signals, used for communication.
  3. A Controller: It is the host computer with a Microprocessor which receives the reader input and processes the data.

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 3.
Write short notes on HTTP, HTTPS, FTP?
Answer:
HTTP:

  • A protocol used between a web client and a web server protects nonsecure data transmissions.
  • The core protocol of the World Wide Web.

HTTPS:
A protocol used between a web client and a web server permits secure data transmissions.

FTP:

  • Used between computers for sending and receiving data.
  • Enables a client to send and receive complete files from a server.

Question 4.
What are the layers available in TCP/IP Reference Model?
Answer:
There are four total layers of TCP/IP protocol, each of which is listed below with a brief description.

  1. Network Access Layer – concerned with building packets.
  2. Internet Layer – describes how packets are to be delivered.
  3. Transport Layer – ensure the proper transfer mission of data.
  4. Application Layer – application network processes. These processes include File Transfer Protocol (FTP), Hypertext Transfer Protocol (HTTP), and Simple Mail Transfer Protocol (SMTP).

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 5.
Expand ARP, ICMP, SMTP, and DNS?
Answer:
ARP – Address Resolution Protocol ICMP – Internet Control Message Protocol SMTP – Internet Control Message Protocol DNS – Domain Name System

PART – IV
IV. Explain in detail

Question 1.
Explain about the Internet, Intranet, and Extranet?
Internet/Intranet/Extranet
INTERNET:
Answer:

  1. The Internet, “the Net,” is a worldwide system of computer networks.
  2. A network of networks where the users at any one computer can, if they have permission, get information from any other computer.
  3. The Internet is a network of global connections – comprising private, public, business, academic, and government networks – linked by guided, wireless and fiber-optic technologies.
  4. It was perceived by the Advanced Research Projects Agency (ARPA) of the U.S. government in 1969 and was first recognized as the ARPANet.
  5. The unique aim was to generate a network that would permit users of a research computer from one university to “talk to” research computers on other universities.
  6. The Internet denotes to the global communication system, including infrastructure and hardware, whereas the web is one of the services interconnected over the Internet.

INTRANET:

  1. It is a private network within an enterprise to share company data and computing resources between the employees.
  2. It may consist of many interlinked local area networks.
  3. It includes connections through one or more gateway (connects two networks using different protocols together known as protocol convertor) computers to the outside Internet.

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

EXTRANET:
It is a private network that uses Internet technology and the public – telecommunication system to securely share business information with suppliers, vendors, partners, customers, or other businesses.

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 2.
Discuss the OSI model with its layers?
Answer:
OSI Model:
Open System Interconnection (OSI) model was found in the year 1934, a general framework that enables network protocols along with software and systems to be developed based on a general set of guidelines. It describes the standards for inter-computer communication.
Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

OSI Layers:
(i) Physical Layer:
This is the 1st layer, it defines the electrical and physical specifications for devices.

(ii) Data Link Layer:
It is the 2nd layer and it guarantees that the data transmitted are free of errors. This layer has simple protocols like “802.3 for Ethernet” and “802.11 for Wi-Fi”.

(iii) Network Layer:
It is the 3rd layer determining the path of the data packets. At this layer, routing of data packets is found using IP Addressing.

(iv) Transport Layer:
It is the 4th layer that guarantees the transportation/sending of data is successful. It includes the error checking operation.

(v) Session Layer:
It is the 5th layer, which identifies the established system session between different network entities. It controls dialogues between computers. For instance, while accessing a system remotely, session is created between your computer and the remote system.

(vi) Presentation Layer:
It is the 6th layer that does the translation of data to the next layer (Prepare the data to the Application Layer). Encryption and decryption protocols occur in this layer such as Secure Socket Layer (SSL).

(vii) Application Layer:
It is the 7th layer, which acts as the user interface platform comprising software within the system.

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 3.
Difference between TCP/IP and OSI Reference Model?
Answer:
Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols
TCP/Ip:

  1. TCP/IP stands for Transmission control protocol/Internet protocol
  2. TCP/IP has 4 layers
  3. TCP/IP are a set of rulers/protocols defined for communication over the network
  4. TCP/IP is a client-server model
  5. It follows top to bottom approach

OSI:

  1. OSI means open system interconnect
  2. OSI has 7 layers
  3. OSI is a model based on the concept of layering
  4. OSI is a conceptual model
  5. It follows a bottom-up approach

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 4.
Explain the development, merits, and demerits of Mobile networks?
Answer:
Developments of Mobile Networks
The generations of mobile networks are as follows.

  • First Generation(1G) 1981 – NMT launch
  • Second Generation(2G) 1991 -GSM Launch
  • Second to Third Generation Bridge(2.5) 2000 – GPRS launch
  • Third Generation( 3G) 2003 – UK 3G launch
  • Fourth Generation (4 G) 2007
  • Fifth Generation (5G) 2019+ -LTE, WiMax

Merits of Mobile Networks

  • Less consumption of power is used by mobile devices compared with a single transmitter or satellite often cell towers were nearer.
  • Huge capacity than a large transmitter, at a single frequency, can be used for different or many links as long as they are in different cells.
  • Covering a large area than a single transmitter, we can add more towers indefinitely and cannot be limited by any horizon limits.

Demerits of Mobile Networks

  • Costs: New technologies and devices are often costly to purchase and require ongoing maintenance and upkeep.
  • Workplace distractions – As the range of technologies and devices increases, so does the potential for them to disrupt productivity and workflow in the business.
  • Additional training needs – Staff may need instructions and training on how to use new technology.
  • Increased IT security needs -Portable devices are vulnerable to security risks, especially if they contain sensitive or critical business data.

Samacheer Kalvi 12th Computer Applications Solutions Network Examples and Protocols Additional Question and Answer

I. Choose the Best Answer

Question 1.
……………. 1974 introduced IP connectionless datagram service was in
a) Vint Cerf and Bob Kahn in
b) Bjarne Stroustrup
c) Mark Zuckerberg
d) Douglas
Answer:
a) Vint Cerf and Bob Kahn in

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 2.
IP connectionless datagram service was developed in the year
(a) 1972
(b) 1974
(c) 1976
(d) 1978
Answer:
(b) 1974

Question 3.
The initial periods of the mobile systems were based on transmission.
a) Digital
b) Analog
c) Both (a) and (b)
d) None of these
Answer:
b) Analog

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 4.
TCP/IP stands for …………………………..
Answer:
Transmission Control Protocol/Internet Protocol

Question 5.
GSM data t.ansmission rates typically reached 9.6kbit/s
a) 2.6bit/s
b) 8.6bit/s
c) 9.6bit/s
d) 5.6bit/sec
Answer:
c) 9.6bit/s

Question 6.
Pick the odd one out:
(a) HTTP
(b) SFTL
(c) SSL
(d) SNMP
Answer:
(d) SNMP

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 7.
Find the Network management protocol from the following
(a) ICMP
(b) HTTP
(c) TCP/IP
(d) SFTP
Answer:
(a) ICMP

Question 8.
…………………………… transmits the electromagnetic waves that are received by the antenna
a) RFID
b) Red Antenna
c) Host
d) Node
Answer:
b) Red Antenna

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 9.
ARPANET was first recognized in the year
(a) 1964
(b) 1956
(c) 1972
(d) 1969
Answer:
(d) 1969

Question 10.
ARPAnet was first recognized in the year ……………
a) 1975
b) 1964
c) 1969
d) 1952
Answer:
c) 1969

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 11.
Gateway connects two networks using different protocols together known as …………………………..
Answer:
Protocol Converter

Question 12.
Find the correct statement from the following.
I. Internet or things refers to the digital interconnection of everyday objects with the Internet
II. Extranet is a private network within an enterprise to share company data and computing resources between the employees.
(a) I-True, II-False
(b) I-False, II-True
(c) I, II-True
(d) I, II-False
Answer:
(a) I-True, II-False

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 13.
Sending e-mail to a friend is an example for ………………………..
(a) Internet
(b) Intranet
(c) Extranet
(d) IP address
Answer:
(a) Internet

Question 14.
A …………………………. as it is made up of a large number of signal areas called cells.
(a) Mobile Network
(b) Cellular Network
(c) Both a & b
(d) Chatting
Answer:
(c) Both a & b

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 15.
The NMT launch comes ………………………….. generation of mobile networks
(a) 1G
(b) 2G
(c) 3G
(d) 4G
Answer:
(a) 1G

Question 16.
Expand NMT.
(a) North Mobile Telephone
(b) Nordic Mobile Telephone
(c) Nordic Movement Telephone
(d) Nurture Mobile Telephone
Answer:
(b) Nordic Mobile Telephone

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 17.
Match the following:
(i) 1G – (I) GSM
(ii) 2G – (II) UMTS
(iii) 3G – (III) GPRS
(iv) 2-3G Bridge – (IV) NMT
(a) IV I II III
(b) I II III IV
(c) IV III II I
(d) II I IV III
Answer:
(a) IV I II III

Question 18.
GSM means ……………………………… communication.
Answer:
Global System for Mobile

Question 19.
SIM means …………………………. technology.
Answer:
Subscriber Identity Module

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 20.
TMDA means …………………………
Answer:
Time Division Multiple Access

Question 21.
CMDA stands for
(a) Code Divide Multiple Access
(b) Code Divide Mobile Access
(c) Code Division Multiple Access
(d) Code Division Mobile Access
Answer:
(c) Code Division Multiple Access

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 22.
GPRS stands for ………………………
Answer:
General Packet Radio Service

Question 23.
Expand EDGE
(a) Extra Data rates for Global Evolution
(b) Enhanced Data rates for Global Evolution
(c) Entry Data rates for Global Evolution
(d) Extra Dual rate for Global Evolution
Answer:
(b) Enhanced Data rates for Global Evolution

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 24.
UMTS stands for …………………………..
Answer:
Universal Mobile Telecommunication Systems

Question 25.
WCDMA stands for …………………………
Answer:
Wideband Code Division Multiple Access

Question 26.
ATM stands for ………………………….
Answer:
Asynchronous Transfer Mode

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 27.
First Generation (1G) was developed in the year …………………………
(a) 1980
(b) 1983
(c) 1982
(d) 1981
Answer:
(d) 1981

Question 28.
Find the wrongly matched pair.
(a) First Generation – 1981
(b) Second Generation – 1991
(c) Third Generation – 2004
(d) Fourth Generation – 2007
Answer:
(c) Third Generation – 2004

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 29.
Pick the odd one out.
(a) 1G
(b) 2G
(c) 2.5G
(d) 3.5G
Answer:
(d) 3.5G

Question 30.
Analog transmission has taken place in …………………………
(a) 1G
(b) 2G
(c) 3G
(d) 4G
Answer:
(a) 1G

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 31.
Which technology is used to authenticate a user for identification and billing purposes and to encrypt the data to prevent listen without permission?
(a) GSM
(b) NMT
(c) CDMA
(d) SIM
Answer:
(d) SIM

Question 32.
Which method increased the amount of information transported on the network?
(I) SIM
(II) NMT
(III) TDMA
(IV) CDMA
(a) I, II
(b) II, III
(c) III, IV
(d) IV, I
Answer:
(c) III, IV

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 33.
General Packet Radio Service was introduced in
(a) 1G
(b) 2G
(c) 2.5G
(d) 3G
Answer:
(c) 2.5G

Question 34.
……………………………… is a data service which enables mobile devices to send and receive messages, picture messages, and e-mails.
(a) GPS
(b) GPRS
(c) CDMA
(d) SIM
Answer:
(b) GPRS

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 35.
What is the data transmission rate of GSM?
(a) 9.6 kb/s
(b) 11.2 kb/s
(c) 12.3 kb/s
(d) 8.5 kb/s
Answer:
(a) 9.6 kb/s

Question 36.
MMS is the combination of …………………………
(I) Image, Voice, Video
(II) Voice, Video, Speed
(III) Voice, Video, Data
(IV) Speed, Data, Image
(a) III
(b) II
(c) I
(d) IV
Answer:
(a) III

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 37.
The data transmission used by 3G is ……………………………
(a) TDMA
(b) CDMA
(c) EDGE
(d) WCDMA
Answer:
(d) WCDMA

Question 38.
MPLS means ……………………….
Answer:
Multiprotocol Label Switching

Question 39.
Few 3G suppliers use ATM for their ……………………………. network within MPLS or IP for their network.
Answer:
Over the Air

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 40.
Which generation of the mobile networks is considered a research stage?
(a) 1G
(b) 2G
(c) 3G
(d) 4G
Answer:
(d) 4G

Question 41.
Li-Fi is the short form of …………………………..
(a) Light Fidelity
(b) LAN Fidelity
(c) Light Fix
(d) Low Frequency
Answer:
(a) Light Fidelity

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 42.
The term Li-Fi was first used by …………………………..
Answer:
Harald Haas

Question 43.
How many phases of 5G are there?
(a) 1
(b) 2
(c) 3
(d) 4
Answer:
(b) 2

Question 44.
The two phases of 5G are ………………………….
(I) Release-14
(II) Release-15
(III) Release-16
(IV) Release-17
(a) I, II
(b) II, III
(c) I, III
(d) III, IV
Answer:
(b) II, III

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 45.
ITU stands for ……………………………..
Answer:
International Telecommunication Union

Question 46.
Which is used for radio wares to read and capture information stored on a tag attached to an object?
(a) RF
(b) RFID
(c) Li-Fi
(d) Wi-Fi
Answer:
(b) RFID

Question 47.
How many parts are there in RFID tags are there?
(a) 1
(b) 2
(c) 3
(d) 4
Answer:
(b) 2

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 48.
RFID has a ……………………… and a ……………………….. or a ……………………………..
Answer:
reader, tag, and label

Question 49.
How many types of RFID tags are there?
(a) 1
(b) 2
(c) 3
(d) 4
Answer:
(b) 2

Question 50.
How many components of an RFID system are there?
(a) 1
(b) 2
(c) 3
(d) 4
Answer:
(c) 3

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 51.
………………………… is a scanner with antennas to transmit and receive signals used for communication
(a) RFID tag
(b) Reader
(c) Controller
(d) Em-ware
Answer:
(b) Reader

Question 52.
Find the statement which is true.
(а) Active RFID System – larger distances
(b) Active RFID System – shorter range transfer mission
Answer:
(а) Active RFID System – larger distances

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 53.
Which method is used in a passive RFID system?
(a) TCP
(b) UDP
(c) Induction coupling
(d) Direct coupling
Answer:
(c) Induction coupling

Question 54.
OSI model means ……………………………..
Answer:
Open System Interconnection

Question 55.
OSI model was found in the year
(a) 1927
(b) 1932
(c) 1935
(d) 1934
Answer:
(d) 1934

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 56.
Which one describes the standards for inter-computer communication?
(a) OSI
(b) BSI
(c) DSI
(d) LSI
Answer:
(a) OSI

Question 57.
How many OSI layers are there?
(a) 5
(b) 6
(c) 7
(d) 8
Answer:
(c) 7

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 58.
The protocols for Ethernet in the datalink layer is ………………………….
(a) 8.023
(b) 80.23
(c) 802.3
(d) 8023
Answer:
(c) 802.3

Question 59.
Which is the third layer in the OSI model?
(a) Datalink
(b) Physical
(c) port
(d) Network
Answer:
(d) Network

Question 60.
In which layer, routing of data packets is found using IP address?
(a) Datalink
(b) Network
(c) port
(d) Physical
Answer:
(b) Network

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 61.
SSL stands for ………………………
Answer:
Secure Socket Layer

Question 62.
Match the following
(i) Physical Layer – (I) controls dialogues between computer
(ii) Network Layer – (II) Specifications for devices
(iii) TrAnswer:port Layer – (III) data packets
(iv) Session Layer – (IV) error checking
(v) Application Layer – (V) Encryption, Decryption
(a) II, III, IV, I, V, VI
(b) I, II, III, IV, VI, VI
(c) VI, V, IV, III, II, I
(d) III, IV, V, VI, II, I
Answer:
(a) II, III, IV, I, V, VI

Question 63.
Which protocol is accountable for guaranteeing the trustworthy transmission of data?
(a) TCP
(b) IP
(c) HTTP
(d) SMTP
Answer:
(a) TCP

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 64.
google.com is the ………………………. for Google.
Answer:
domain name

Question 65.
How many different layers of TCP/IP are there?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(c) 4

Question 66.
FTP stands for …………………………
(a) File Transfer Protocol
(b) File Transmission Protocol
(c) File Transport Protocol
(d) File Type Protocol
Answer:
(a) File Transfer Protocol

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 67.
HTTP stands for …………………………..
(a) High Text Transmission Protocol
(b) Hyper Text Transmission Protocol
(c) Hyper Text Transfer Protocol
(d) Height Typed Transfer Protocol
Answer:
(c) Hyper Text Transfer Protocol

Question 68.
SMTP stands for …………………………………
(a) Single Mail Transfer Protocol
(b) Single Message Transfer Protocol
(c) Simple Mail Text Protocol
(d) Simple Mail Transfer Protocol
Answer:
(d) Simple Mail Transfer Protocol

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 69.
Pick the odd one out.
(a) FTP
(b) RFID
(c) HTTP
(d) SMTP
Answer:
(b) RFID

Question 70.
Which one of the following is not a network protocol.
(a) SSL
(b) ARP
(c) TCPI
(d) FTP
Answer:
(c) TCPI

Question 71.
HTTPS stands for …………………………..
Answer:
HyperText Transfer Protocol Secure

Question 72.
ARP stands for ………………………….
Answer:
Address Resolution Protocol

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 73.
Expand MAC
(a) Mega Access Code
(b) Multiple Access Code
(c) Medium Access Code
(d) Medium Access Control
Answer:
Medium Access Control

Question 74.
Which one of the following is a hardware identification number that uniquely identifies each device on a network?
(a) MIC
(b) MAC
(c) MOC
(d) MUC
Answer:
(b) MAC

Question 75.
ICMP stands for ………………………….
Answer:
Internet Control Message Protocol

Question 76.
IGMP stands for …………………………..
Answer:
Internet Group Management Protocol

Question 77.
Which is used to send group communication messages to multiple IP addresses?
(a) ICMP
(b) IGMP
(c) IDMP
(d) IKMP
Answer:
(b) IGMP

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 78.
The two main protocols mainly used in the transport layers are
(I) TCP
(II) UDP
(III) UTP
(IV) ATP
(V) STP
(a) I, II
(b) III, IV
(c) II, V
(d) IV, V
Answer:
(a) I, II

Question 79.
UDP stands for …………………………….
Answer:
User Daragram Protocol

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 80.
DNS means ……………………….
Answer:
Domain Name System.

I. Short Answer Questions

Question 1.
What is Internet Protocol?
Answer:

  • Internet Protocol (IP) is the principle of the communications protocol in the Internet protocols for layering on datagram across boundaries of other networks.
  • The main function is to allows Internetworking and boost up the Internet.

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 2.
Mention the various generations of mobile networks?
Answer:
The generations of mobile networks are as follows.

  1. First Generation(1G) 1981 – NMT launch
  2. Second Generation(2G) 1991 – GSM Launch
  3. Second to Third Generation Bridge (2.5)2000 – GPRS launch
  4. Third Generation( 3G) 2003 – UK 3G launch
  5. Fourth Generation (4G) – 2007
  6. Fifth Generation (5G) – 2019+

Question 3.
What is the Role of Network Protocol?
Answer:
Network protocols have to do the end-to-end process of secure on time and manage data or network communication.

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 4.
Define Wi-Fi?
Answer:
Wi-Fi stands for Wireless Fidelity. It is a wireless network technology that permits computers and alternative devices to be connected to every alternative into a local area network and to the net without wires and cables.

Question 5.
What is Li-Fi?
Answer:

  • Li-Fi is the short form of Light Fidelity.
  • Li-Fi is a wireless technology which uses light-emitting diodes (LEDs) for data transmission whereas Wi-Fi uses radio frequencies for data transmission.

Question 6.
What is mean by DNS?
Answer:

  • DNS-Domain Name System
  • A method of referring to other host computers by using names rather than numbers.

II. Explain in Brief Answer

Question 1.
What are the types of Networking Protocols?
Answer:

  • Network communication protocols are that the Basic data communication protocols which specific to HTTP and TCP/IP.
  • Network security protocols are that which implement security over network communications and include HTTP, SFTP, and SSL.
  • Network management protocols will Provide network governance and maintenance and include ICMP and SNMP.

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 2.
Define the Internet of things?
Answer:
Internet of Things refers to the digital interconnection of everyday objects (home appliances, wearable devices, or automobiles) with the Internet. The ‘thing’ in refers to objects that have been assigned an IP address and have the ability to collect and transfer data over a network without manual assistance or intervention.

Question 3.
List some Applications of Intranet
Answer:

  • Sharing of company policies/rules and regulations
  • Access employee database
  • Distribution of circulars/ Office Orders
  • Access product and customer data
  • Sharing of Information of common interest
  • Launching of personal/ departmental home pages
  • Submission of reports
  • Corporate telephone directories.

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 4.
Differentiate Wi-Fi?
Answer:
Wi-Fi stands for Wireless Fidelity. It is a wireless network technology that permits computers and alternative devices to be connected to every alternative into a local area network and to the net without wires and cables.

Question 5.
What are the various Generations of Mobile Networks?
Answer:

  • First Generation(1G) 1981- NMT launch
  • Second Generation(2G) 1991-GSM Launch
  • Second to Third Generation Bridge(2.5)2000 – GPRS launch
  • Third Generation( 3G) 2003- UK 3Glaunch
  • Fourth Generation (4 G) 2007
  • Fifth Generation (5G) 2019+

III. Explain in Brief Answer

Question 1.
Explain the types of Networking protocols?
Answer:
The broad types of networking protocols, including:

  1. Network communication protocols are that the Basic data communication protocols specific to HTTP and TCP/IP.
  2. Network security protocols is that implement security over network communications and include HTTP, SFTP, and SSL.
  3. Network management protocols will Provide network governance and maintenance and include ICMP and SNMP.

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 2.
Define the Internet of things?
Answer:
Internet of Things refers to the digital interconnection of everyday objects (home appliances, wearable devices, or automobiles) with the Internet. The ‘thing’ in IoT refers to objects that have been assigned an IP address and have the ability to collect and transfer data over a network without manual assistance or intervention.

Question 3.
Write about Mobile Networks?
Answer:
Mobile Networks:
A mobile network or cellular network is made up of a large number of signal areas called cells. These cells join to form a large coverage area. Communication over mobile networks is be made up of voice, data, images, and text messages.

Question 4.
Differentiate Wi-Fi and Li-Fi?
Answer:
Wi-Fi:

  1. Wireless Fidelity
  2. Wi-Fi uses radio frequencies for data transmission.

Li-Fi:

  1. Li-Fi is a wireless technology which uses light-emitting diodes (LEDs) for data transmission.
  2. Li-Fi is the short form of Light Fidelity.

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 5.
What is RFID?
Answer:

  1. RFID stands for Radio -Frequency Identification (RFID).
  2. RFID used for radio waves to read and capture information stored on a tag attached to an object.
  3. The tag can be read from several feet away and does not need to be in direct-line-of-sight of the reader to be tracked.
  4. RFID has been made up of two parts a reader and a tag or a label.
  5. RFID tags are installed with a transmitter and receiver.

Question 6.
List out the two types of RFID tags?
Answer:
Two types of RFID tags were Active RFID and Passive RFID systems.

  1. The passive RFID tag will be used the reader radio wave energy to really its stored information back to the reader.
  2. A battery-powered RFID tag is installed with a small battery that powers the broadcast of information

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 7.
Write a note on Network Interface Layer?
Answer:
Network Interface Layer:

  1. It is the bottom-most level layer.
  2. It is comparable to that of the Open System Interconnection Physical and Data Link layers.
  3. Different TCP/IP protocols are being used at this layer, Ethernet and Token Ring for local area networks and protocols such as X.25, Frame Relay, and ATM for wide area networks.
  4. It is assumed to be an unreliable layer.

Question 8.
Write a note on the Application Layer?
Answer:
The Application layer of the TCP/IP model is similar to the Session, Presentation, and Application layers of the OSI Reference Model. The most popular Application layer protocols are:

  1. Hypertext Transfer Protocol (HTTP): The core protocol of the World Wide Web.
  2. File Transfer Protocol (FTP): enables a client to send and receive complete files from a server.
  3. Telnet: connect to another computer on the Internet.
  4. Simple Mail Transfer Protocol (SMTP): Provide e-mail services.
  5. Domain Name System (DNS): Refer to other host computers by using names rather than numbers

IV. Explain in detail.

Question 1.
Explain any 5 applications of Internet Intranet and Extranet?
Answer:
Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 2.
Explain the working of Passive and Active RFID systems with a diagram?
Answer:
Working of Passive RFID System
A Passive RFID system using the Induction coupling method:
The RFID tag gets power from the reader through the inductive coupling method.
Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols
A Passive RFID system using EM wave propagation method:
The reader antenna transmits the electromagnetic waves that are received by the antenna.
Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Working Of Active RFID System:
The reader sends a signal to the tag using an antenna.
Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 3.
Discuss in detail TCP/IP protocols?
Answer:
TCP/IP:
Transmission Control Protocol/Internet Protocol, TCP/IP is a set of protocols which governs communications among all computers on the Internet. TCP/IP protocol tells how information should be packaged, sent, and received, as well as how to get to its destination.

TCP WORKING: TCP/IP is a combination of two protocols: Transmission Control Protocol (TCP) and Internet Protocol (IP). The Internet Protocol typically specifies the logistics of the packets that are sent out over networks; it specifies the packets which have to go, where to go and how to get there. The Transmission Control Protocol is accountable for guaranteeing the trustworthy Transmission of data. It sees that the packets for errors and submit the requests for re-Transmission incase any of them are missing’.

Frequent TCP/IP Protocols

  • HTTP – It is used between a web client and a web server and it guarantees non-secure Data Transmission.
  • HTTPS – It is used between a web client and a web server ensures secure data Transmission.
  • FTP – It is used between computers for sending and receiving file.

Domain Names and TCP/IP Addresses
The address for any website is not as easy as to remember, domain names are used instead. For example, 216.58.216.164 is one of the IP addresses for Google and google.com is the domain name.
Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

The Different Layers of TCP/IP
There are four total layers of TCP/IP protocol, each of which is listed below with a brief description.

  1. Network Access Layer – concerned with building packets.
  2. Internet Layer – describes how packets are to be delivered.
  3. Transport Layer – ensure the proper transmission of data.
  4. Application Layer – application network processes. These processes include File Transfer Protocol (FTP), Hypertext Transfer Protocol (HTTP), and Simple Mail Transfer Protocol (SMTP).

Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

Question 2.
Explain in detail about the Third Generation of Mobile Networks.
Answer:

  • The third generation of mobile systems merges different mobile technology standards, and uses higher frequency bands for transmission and Code Division Multiple Access to deliver data rates of up to 2Mbit/s supports multimedia services (MMS: voice, video, and data).
  • The European standard is UMTS (Universal Mobile Telecommunication Systems).
  • Mobile phone systems continue to use a digital transmission with SIM authentication for billing systems and for data corruption.
  • Data transmission used a WCDMA. WCDMA stands for (Wideband Code Division Multiple Access).
  • One technique to obtain data rates between 384kbit/s and 2048kbit/s. Few 3G suppliers use ATMs (Asynchronous Transfer Mode) for their ‘over the air’ network within MPLS (Multiprotocol Label Switching) or IP for their backbone network.
  • Mobility still supported at layer2, and hence like 2G it still prohibits seamless roaming beyond heterogeneous access networks and routing domains.
  • The transmission was band frequencies are between 1900 and 2200 MHz. All UMTS license holders at the UK hold a 20-year license with the condition that 80% population coverage is achieved by 31 December 2007.
  • The present third-generation licensed operators in the UK can be seen below as of August 2004.