Assignment – Summer Vacation 2015-16 for XII Informatics Practices
Q1. Give examples of two OSS in each of
the following categories:
(a) OS (b) Graphics and animation (c) Office software (d) Internet related software
(e)
Programming related software.
Q2. Define Network security? What kind
of attacks can be made on data and computer networks?
Q3. What is a MAC address? What is the
difference between a MAC address and an IP address?
Q4. What is Snooping?
Q5. Mr. Kant Sengupta wants to prevent unauthorized access to/from his company's local area network. Write the name of a system (software/hardware), which he should install to do the same.
Q4. What is Snooping?
Q5. Mr. Kant Sengupta wants to prevent unauthorized access to/from his company's local area network. Write the name of a system (software/hardware), which he should install to do the same.
Q6. Seven Brothers Fashion Inc. is a
fashion company with design they are not able to share the information due to
loss of signal in between. Which device out of the following should you suggest
to be installed for a smooth communication?
(a) Modem
(b) Repeater
(c) UPS
Q7. Which of the following is not a
feature of Networking?
(i) Resource
Sharing
(ii) Reliability
(iii) Uninterrupted Power Supply
(iv) Reduced cost
Q8. Identify the type of Topology from
the following:
(i) In it, each node is connected with the help of a single co-axial cable.
(i) In it, each node is connected with the help of a single co-axial cable.
(ii) In it, each node is connected with the help
of independent cable with the help of a central switching (communication
controller)
Q9. Give two characteristics of Star
Topology. Also show it using a diagram with interconnection of 5 Computers.
Q10. What is the use of repeater in a
network? How is it different from Hub?
Q11. Draw a network layout of bus
topology to connect 5 client computers and 1 server computer.
Q12. Which of the following are open
source software’s: GNU, MS-Office, BOSS,
Windows OS
Q13. Read the given activities
carefully and mention in front of the activity whether that activity is
snooping or eavesdropping:
(i) Getting
someone’s login information
by casually watching
what he/she is typing.
(ii) Setting up unauthorized parallel telephone
lines
(iii) Installing
some software/hardware which
captures the data
while on its way.
(iv) Reading the files on someone’s computer in an
unauthorized manner.
Q14. Kristen has typed the following
text in the address bar:
http://www.cbse-international.com/help.htm
Explain to
her the main
concept of URL and Domain
name with reference
to the example given above.
Q15. What is meant be communication
channels? Give two examples of guided media and two examples of unguided media.
Q16. Micro waves are
a. Uni
directional b. Omni directional
c. Guided
media d. Not used for
communication.
Q17. Write some advantages and disadvantages of the following?
Q17. Write some advantages and disadvantages of the following?
(a) Optical Fiber (c) Co-axial cable (e) Twisted Pair wire
(b) Radio Waves
(d) Microwave (f) Satellites
Q18. Expand the terms: OSI, FLOSS, FSF, GNU, GPL, W3C, and OSS.
Q18. Expand the terms: OSI, FLOSS, FSF, GNU, GPL, W3C, and OSS.
Q19. Give two advantages & two
disadvantages of : (a) Star (b)Tree (c) Bus
Q20. What do you understand by Domain
Name Resolution?
_________________________________________________________________________
File for Download
XII Informatics Practices Assignment-Summer Vacation (pdf file)
_________________________________________________________________________
File for Download
XII Informatics Practices Assignment-Summer Vacation (pdf file)