Page 222 - PYTHON-12
P. 222

  Hub refers to a networking component which acts as a convergence point of a network allowing the transfer of
                   data packets.
                   Switch refers to a device which filters and forwards data packets across the network.
                   Web hosting service is a type of internet hosting service that allows individuals and organizations to host their own
                   website and users with online systems to store information such as images, videos, etc.
                   A data channel is the medium used to carry information or data from one point to another.


               OBJECTIVE TYPE QUESTIONS
                 1.  Fill in the blanks.
                     (a)  Through ................................ you can establish contact with anyone in the world.
                     (b)  The main function of ................................ is to divide the message or data into packets of a definite
                         size on the source computer.
                     (c)  ....................... refers to wireless fidelity which enables us to connect to the ISP without any cable.
                     (d)  ................................ is a software that enables us to access the internet and explore websites.
                     (e)  Web page constitutes the ................................ .
                     (f)  A ................................ is someone with a strong interest in how things work, who likes to create and
                         modify things for their own enjoyment.
                     (g)  A computer ................................ is a small software program that spreads from one computer to
                         another and interferes with the normal functioning of computer.
                     (h)  Electronic junk mail or junk newsgroup postings are known as ................................ .
                      (i)  Digital signature meets the need for ................................ and integrity.
                      (j)  The first network that planted the seed of internet was ................................ .
                     (k)  The protocol used for internet is ................................ .
                      (l)  A device used to connect dissimilar networks is called ................................ .
                    (m)  ................................ is responsible for handling the address of the destination computer so that each
                         packet is delivered to its proper destination.
                     (n)  Tricking people through authentic-looking emails or websites is called ................................ .
                     (o)  A program designed to replicate and eat up a computer’s storage is called ................................ .
                     (p)  A digital document issued to a site by a certification authority of the internet is called a ................ .
                     (q)  To connect computers located in a specific building or campus is known as ................................ .
                     (r)  Wi-Fi, infrared and Bluetooth are examples of ................................ .
                     (s)  Interspace is a ................................ .
                     (t)  A server that provides its services to other workstations on a network is a ................................ .
                     (u)  The techniques of switching in which data is fragmented into smaller techniques is called .............. .
                     (v)  ................................ is a dedicated line between the caller and the sender.
                     (w)  ................................ is the measuring unit of speed at which the data transfer takes place.
                     (x)  All  the  computers  are  connected  with  each  other  in  an  unorganized  manner  in  topology
           Computer Science with Python–XII  8.68                      Answers:  (a)  Internet        (b)  TCP        (w)  Bits/Second
                         ................................ .
                     (y)  In ................................, all computers share equivalent responsibility for processing data..
                                                                                        (c)  Wi-Fi

                                                                                        (f)  Hacker
                              (d)  Browser
                                                           (e)  World Wide Web
                                                           (h)  SPAM
                              (g)  Virus


                                                                                        (i)  Authentication


                                                           (k)  TCP/IP

                              (j)  ARPANET

                                                                                        (l)  Gateway
                                                           (n)  Hacking

                                                                                       (o)  WORM


                             (m)  IP

                                                           (q)  LAN
                              (p)  Digital certificate

                                                                                        (t)  Dedicated server
                              (r)  Communication Mediums  (s)  Network


                              (u)  Packet switching
                                                           (v)  Circuit switching


                                                           (y)  Peer-to-peer network

                              (x)  Mesh
   217   218   219   220   221   222   223   224   225   226   227