Page 140 - Web Applications (803) Class 11
P. 140

B.  Fill in the blanks.
                  1.   ................................ software is designed to keep your computer safe from harmful and potentially undesirable
                     malware.
                  2.  Websites utilise ................................ to upload and download files from their servers.
                  3.  A ................................ is a computer that is connected to a network.

                  4.  ................................ connects two networks that may use different networking models.
                  5.  The higher the data transfer rate, ................................ the bandwidth of a given medium.
                  6.  Two or more computers connected to each other for information exchange form a ................................ .
                                                                                                        [CBSE Handbook]
                  7.   A technique in which a dedicated and complete physical connection is established between two nodes for
                     communication is ................................ switching.                       [CBSE Handbook]
                  8.  ................................ is a means of gaining unauthorised access to a computer with the goal of causing harm.
                  9.  ................................ is the network of networks.
                 10.   ................................ is defined as a crime in which a computer or the internet is utilised in an unauthorised manner to
                     harm a user.


                   Ans. 1.  Anti-virus     2. FTP        3. node       4. Gateway        5. greater
                         6.  Network       7. Circuit     8. Cracking     9. Internet     10. Cybercrime

              C.  State whether these statements are true or false:
                  1.  Point-to-Point Protocol helps transfer hypertext files over the internet.               .................
                  2.  Viruses cause the system to slow down or even stop working.                             .................
                  3.  Peer to Peer networks are small networks that use dedicated server.                     .................
                  4.  Voice band is used for regular telephone communication.                                 .................
                  5.  Telnet allows you to connect to a remote machine.                                       .................
                  6.  Broadband is the fastest and is used for transmitting large amounts of data at high speeds.   .................
                  7.  In packet switching, user has direct access to internal memory.                         .................

                  8.  In MAN, transmission speed is lower than WAN.                                           .................

                   Ans. 1.  False      2.  True       3.  False     4.  True      5.  True
                         6.  True      7.  False      8.  False

                                                              Section B
                                                     (Subjective Type Questions)
              A.  Short answer type questions:
                  1.  Differentiate between the following:
                      i.  Circuit Switching and Packet Switching
                  Ans.
                                        Circuit Switching                             Packet Switching

                         Data is processed at source system           All intermediary nodes, including the source system,
                                                                      process data.
                         The whole path’s address provided by the source is   Each data unit only knows the end destination
                         known by each data unit.                     address; the routers choose the intermediate routing.
                         More wastage of resources                    Less wastage of resources

                         User has direct access to internal memory’s   User has no direct access to ROM


                138     Touchpad Web Applications-XI
   135   136   137   138   139   140   141   142   143   144   145