XII-IP-SUMMER VACATION HOME WORK


SUMMER VACATION HOME WORK FOR XII- INFORMATICS PRACTICES 2014-15
(Note : Some questions get repeated. Attempt repeated questions only one time.)

1.A).  Mr. Ramesh is working in an Global Organisation. He wants to login in his office’s computer from his home.Suggest the protocol for the same.

1.B).   Which device is used for connecting multiple networks over different protocols?  
1.C.)  Identify the following topologies.
           (1) A signal/data packets transmit from one end to other end in linear way.
            (2) Each node is connected to two and only two neighboring nodes in circular form.
1.d) Write any two scripts included in Indian Languages on Unicode.  
1.e) What is the difference between free software and freeware ?
1.f) Arun is not clear about the wireless and wired media of communication kindly
describe it to him with suitable example.  
1.g) Explain the term ODF and Ogg Vorbis. What are the advantages of these over others?
………………………………………………………………………………………….
 2.a) Mrs. Geetha is surfing over internet and he wants to know the IP Address of particular website.Do you know which process he has to do to obtain IP Address from website’s name?  
2.b) Mr. Loknath wants to send/receive e-mail over TCP/IP networks(internet).Which protocol he can use for this purpose?
2.c) An Internet Service Provider has a network within a city area.Which type of network is it?  
2.d) Which transmission technology can we use for connecting two countries over an ocean?  
2.e) Differentiate between HUB and SWITCH devices.
2.f) Explain following terms.
(1) Apache Server (2) Linux
2.g) What is Font ?Which are two parameters for to categorized them?
 3.a) Mr. Ram is interested in transferring songs from his mobile to Mr. Shyam’s mobile. Suggest two suitable wireless options he may use for doing the same. 1
3.b) Neha wants to upload/download files from/to a remote internet server.Write the name of the relevant communication protocol, which will let her do the same. 1
3.c) It is technology on computer networks whose purpose is to prevent unwanted networking connection according to some filtering/blocking rules. What is it? 1
3.d) Which of the following are open standards? 1
(1) .OGG (2) .DOC (3) .TTF (4) . JPEG
3.e) What is DOS(Denial of Service) ? Explain briefly. 2
3.f) Differentiate between Dedicated and Non-dedicated server. 2
3.g) List out any four advantages of Open Standards.
(4.a)Jayant transferred one file to one remote host at head office. Which protocol is used for this purpose.
(4.b)Which device is used to convert digital signals to analog and analog signals to digital signals.
(4.c)Which channel is used to carry information or data from one point to another.
(4.d)Kamal wants to connect his computer with the LAN but he is unable to connect it. Suggest him the device which he will fix in his computer so that he will be able to connect LAN cable with his computer.
(4.e)What is a MAC address? Write its example.
(4.f)Define the following.  (i) Node   (ii) Bps
(4.g)What is meant by network topology? Write the name of any 4 topologies
(5.a)Which protocol is used to translate domain names to associated IP address?
(5.b)Amit has a Hub in his office to connect all the computers but speed is slow due to collision suggest any other device for this purpose so the speed can be increased.
(5.c)Write the name used to refer the difference between the highest and lowest frequencies of a transmission channel.
(5.d)Write the name of the computer which takes the services from other computer.
(5.e)Why do we use repeater in a network?
(5.f)How is Coaxial cable different from Optical Fiber?
(5.g)Compare freeware and shareware software.
(6.a) Ms. Taufiq Ahmed wants to prevent unauthorized access to/from his company's
local area network. Write the name of a system (software/ hardware), which
he should install to do the same 1
(6.b) Beauty Lines Fashion Inc. is a fashion company with design unit and market
unit 135 metres away from each other. The company recently connected their
LANs using Ethernet cable to share the stock related information. But after
joining their LANs, they are not able to share the information due to loss of
signal in between. Which device out of the following. should you suggest to
be installed for a smooth communication?
(i) UPS
(ii) Modem
(iii) Repeater
(6.c) which of the following is not a feature of Networking?
(i) Resource sharing
(ii) Uninterrupted power supply
(iii) Reduced cost
(iv) Reliability
(6.d) Name any two Indian scripts included in Unicode.
(6.e) Mr. Jayanto Das is confused between Shareware and Open source software
Mention at least two points of differences to help her understand the same.
(6.f) Identify the type of Topology from the following:
(i) If each node is connected with the help of independent cable with the
help of a central switching (communication controller)
(ii) If each node is connected with the help of a single co-axial cable.
(6.g) Define the following with reference to Threats to Network Security.
(i) Trojan Horse
(ii) Worm
(7.a)Ms. Ritu connected two building in her factory which distance is 150 meters, but she is unable to get the signals. Tell her its reason and suggest the solution.
(7.b)Ms. Pooja connected her laptop with her mobile. Write the name of the network which she developed.
(7.c)Mr. Manish want to prevent his private network from unauthorized access. Suggest him the system, which he will use for this purpose.
(7.d)Ms Lalitha is working in a bank. She wants to transfer one file from her branch in Chennai to her main office Delhi. Write the name of the protocol which she will use for this purpose.
(7.e)What is the Switch? What are the benefits of Switch over Hub?
(7.f)Expend the following abbreviations and explain in brief :
(i) FLOSS
(ii) GNU
(7.g)What do you understand by TTF and OTF?
(8.a) Name the protocol used for sending & receiving e-mails.                                                                   
(8.b) It is a technology on computer networks whose purpose is to prevent unwanted networking connection according to some filtering/blocking rules. What is it?                                              
(8.c) Two neighbouring hospitals at a distance of 125 meters from each other decide to join their LANs using UTP cable so that they can share their e- contents. But due to loss of signals in between they were unable to share resources. Which device can be used to overcome the problem?
(8.d) Which of the following are open standards & which are proprietary standards?                      
                                i) WMA                                 ii) DOC                  iii) JPEG                                iv) HTML
(8.e) What are DoS attacks?                                                                                                                                       
(8.f) What is significance of UNICODE ?                                                                                                                 
(8.g) Give two advantages & two disadvantages of Star and Bus Topology.
(9.a)  Amitesh want to use Internet on his computer. Which protocol must be installed on his
        computer to use  Internet?                                                                                                                   
       (9.b)          PACK N PICK is a food supply company with kitchen and market unit 110  
             meters away from each other. The company recently connected their networks using
             UTP cable to share the stock related information. But after joining their networks,
             they are not able to share the information due to loss of signal in between. Which
             device is to be installed for a smooth communication?                                                         (9.c)     KVS  RO, Raipur is planning to connect all networks the KV schools at Raipur.
            Which type of network will result into?                                                                             
            (i) LAN                        (ii) WAN                                    (iii) MAN                       (iv) PAN
      (9.d)  Arrange the following communication channels in the ascending order of their data   
             transfer range.
             (i) Optical Fiber         (ii)  Coaxial cable                   (iii) UTP cable
     (9.e)           Mr. Gaurav is confused between Free and Freeware software Mention at least two
             points of differences to help her understand the same.                                                        
       (9.f)  Identify the type of Topology from the following:                                                           
(i) If each node is connected with the help of independent cable with the help of a
     central switching (communication controller)
            (ii) If each node is connected with the help of a single co-axial cable.                              
      (9.g)Define the following with reference to Threats to Network Security.
           (i)  Snooping
            (ii) Trojan Horse

 10.A)Utkarsh wants to upload his own web site on internet, write the necessary protocol
to upload the web site.
10.b) The ABC organization is planning to link its sales counter situated in various parts
of the same city, which type of network out of LAN, MAN or WAN will be formed?
Justify your answer. (1)
10.c) Arrange the following communication channels in ascending order of their data transmission rates (1)
Optical Fiber, Co-axial Cable , Ethernet Cable, Telephone Cable
10.d) Distinguished between Open Source software and Proprietary Software with
reference to customizability of the software. (1)
10.e) Write one advantage and one disadvantage of the following topologies in network
i) Bus Topology ii) Star Topology (2)
f) Expand the following term: (2)
i) XML ii) URL iii) PAN iv) PPP
10.g) What is „Trojan Horse‟ program?
11.A) Why do we use repeater?
11.B) What is an IP address?
11.C ) Differentiate between gateway and router.
11.D) What is Mozilla software used for?
11.E) What do you mean by the term open source software?
11.F)What do you mean by the term Ogg Vorbis?
11.G)What is difference between IP and MAC address.
-------------------------------------------------------------------
(12.a) Ms. Taufiq Ahmed wants to prevent unauthorized access to/from his company's
local area network. Write the name of a system (software/ hardware), which
he should install to do the same 1
(12.b) Beauty Lines Fashion Inc. is a fashion company with design unit and market
unit 135 metres away from each other. The company recently connected their
LANs using Ethernet cable to share the stock related information. But after
joining their LANs, they are not able to share the information due to loss of
signal in between. Which device out of the following. should you suggest to
be installed for a smooth communication?
(i) UPS
(ii) Modem
(iii) Repeater
(12.c) which of the following is not a feature of Networking? 1
(i) Resource sharing
(ii) Uninterrupted power supply
*****************************************************

Popular posts from this blog

XII- CS-- SOLVED SQL queries (SQL PRACTICAL ASSIGNMENS)

SQL--HOME ASSIGNMENTS(XII Class)

Python-MySQL Connectivity